WO2024000115A1 - Ims会话方法、装置、通信设备及存储介质 - Google Patents

Ims会话方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2024000115A1
WO2024000115A1 PCT/CN2022/101656 CN2022101656W WO2024000115A1 WO 2024000115 A1 WO2024000115 A1 WO 2024000115A1 CN 2022101656 W CN2022101656 W CN 2022101656W WO 2024000115 A1 WO2024000115 A1 WO 2024000115A1
Authority
WO
WIPO (PCT)
Prior art keywords
request
ims session
identification information
information
receive
Prior art date
Application number
PCT/CN2022/101656
Other languages
English (en)
French (fr)
Inventor
商正仪
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280002391.3A priority Critical patent/CN117643043A/zh
Priority to PCT/CN2022/101656 priority patent/WO2024000115A1/zh
Publication of WO2024000115A1 publication Critical patent/WO2024000115A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]

Definitions

  • the present disclosure relates to but is not limited to the field of wireless communication technology, and in particular, to an IMS session method, device, communication equipment and storage medium.
  • the Third Generation Partnership Project (3GPP) has introduced new network capabilities and new types of devices (for example, virtual reality (VR) devices, augmented reality (AR) devices, extended reality (XR) devices, or robots, etc.). This can bring promising improvements to IP Multimedia Subsystem (IMS) multimedia telephony services.
  • IMS IP Multimedia Subsystem
  • enterprise customers believe that multimedia telephony services provide attractive features for their businesses, they also encounter some practical problems that require the support of fifth-generation mobile communication technology (5G) systems.
  • 5G systems are expected to support advanced features and performance of enhanced IMS multimedia telephony services to meet the new needs of consumers, enterprise customers and vertical markets.
  • an IMS session method is provided, executed by a first user equipment (User Equipment, UE), including:
  • the invitation request includes the first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session .
  • CSCF Call Session Control Function
  • the first identification information of the first UE is determined by at least one of the following:
  • Third-party organization or organization information associated with the first UE under the network
  • the invitation request includes: second identification information of the second UE; and the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the second identification information of the second UE is determined by at least one of the following:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • an IMS session method executed by CSCF, including:
  • An invitation request is received, where the invitation request includes first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the first identification information of the first UE is determined by at least one of the following:
  • Third-party organization or organization information associated with the first UE under the network
  • the invitation request includes second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the second identification information of the second UE is determined by at least one of the following:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the invitation request includes: time information;
  • the method includes: determining whether the invitation request is attacked based on the time information and the current time.
  • the method includes: obtaining authorization information; wherein the authorization information is used to indicate at least one of the following:
  • the UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session
  • a UE corresponding to at least one piece of first identification information is allowed to initiate and/or receive an IMS session corresponding to a UE corresponding to at least one piece of second identification information.
  • the method includes at least one of the following:
  • the first UE initiates and/or receives the IMS session with the second UE within the call time range.
  • the method includes: sending a first request to a Home Subscriber Server (HSS), where the first request includes: first identification information of the first UE, or first identification information of the first UE. and the second identification information of the second UE; the first request is used to request authorization information.
  • HSS Home Subscriber Server
  • obtaining authorization information includes: receiving a first response sent by the HSS, where the first response includes: authorization information.
  • the method includes: sending a second request to a third-party authentication, authorization, accounting ((authentication, authorization, accounting), AAA) server; wherein,
  • the second request includes the first identification information of the first UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session;
  • the second request includes the first identification information of the first UE and the second identification information of the second UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • the method includes: receiving a second response sent by the third-party AAA server, wherein the second response includes at least one of the following:
  • the first UE is allowed to initiate and/or receive the authorization result of the IMS session
  • the first UE is allowed to initiate and/or receive an authorization result of an IMS session with the second UE.
  • the first UE initiates and/or receives an authorization result indicating whether the IMS session is within the calling time range
  • the first UE initiates and/or receives an authorization result indicating whether the IMS session with the second UE is within the calling time range.
  • Receiving the invitation request includes: receiving the invitation request sent by the first UE.
  • the CSCF is the CSCF of the second UE
  • Receiving the invitation request includes: receiving the invitation request sent by the CSCF of the first UE.
  • an invitation request is sent to the second UE.
  • an IMS session method executed by an HSS, including:
  • the CSCF Receive the first request sent by the CSCF, where the first request includes the first identification information of the first UE, and the first request is used to request authorization information; the authorization information is used to indicate that the UE corresponding to at least one of the first identification information is allowed to initiate and /or receive IMS session.
  • the first request includes the first identification information of the first UE and the second identification information of the second UE; the authorization information is used to indicate that the UE corresponding to at least one of the first identification information is allowed to initiate and/or receive the An IMS session corresponding to at least one second identification information.
  • the method includes: sending a first response to the CSCF, where the first response includes authorization information.
  • the second request further includes second identification information of the second UE; the second request is also used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • the first UE is allowed to send and/or receive IMS sessions
  • the first UE is allowed to send and/or receive an IMS session with the second UE;
  • Whether the first UE initiates and/or receives the IMS session with the second UE is within the call time range.
  • the method includes: sending a second response to the CSCF, where the second response includes: an authorization result.
  • an IMS session method executed by the second UE, including:
  • an IMS session is established with the first UE.
  • the first sending module is configured to send an invitation request to the CSCF, where the invitation request includes first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the first identification information of the first UE is determined by at least one of the following:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the second identification information of the second UE is determined by at least one of the following:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • an IMS session device including:
  • the second receiving module is configured to receive an invitation request, where the invitation request includes first identification information of the first UE; and the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the first identification information of the first UE is determined by at least one of the following:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the invitation request includes second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the second identification information of the second UE is determined by at least one of the following:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the invitation request includes: time information;
  • the device includes: a second processing module configured to determine whether the invitation request has been attacked based on the time information and the current time.
  • the second receiving module is configured to obtain authorization information; wherein the authorization information is used to indicate at least one of the following:
  • the UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session
  • a UE corresponding to at least one piece of first identification information is allowed to initiate and/or receive an IMS session corresponding to a UE corresponding to at least one piece of second identification information.
  • the second processing module is configured as at least one of the following:
  • the first UE initiates and/or receives the IMS session with the second UE within the call time range.
  • the apparatus includes: a second sending module configured to send a first request to the HSS, where the first request includes: first identification information of the first UE, or first identification information of the first UE and Second identification information of the second UE; the first request is used to request authorization information.
  • the second receiving module is configured to receive the first response sent by the HSS, where the first response includes: authorization information.
  • the second sending module is configured to send a second request to the third-party authentication, authorization and accounting AAA server;
  • the second request includes the first identification information of the first UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session;
  • the second sending module is configured such that the second request includes the first identification information of the first UE and the second identification information of the second UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive the IMS session of the second UE.
  • the second receiving module is configured to receive a second response sent by the third-party AAA server, where the second response includes at least one of the following:
  • the first UE is allowed to initiate and/or receive the authorization result of the IMS session
  • the first UE is allowed to initiate and/or receive an authorization result of an IMS session with the second UE.
  • the second response further includes at least one of the following:
  • the first UE initiates and/or receives an authorization result indicating whether the IMS session is within the calling time range
  • the first UE initiates and/or receives an authorization result indicating whether the IMS session with the second UE is within the calling time range.
  • the second receiving module is configured to receive the invitation request sent by the first UE.
  • the CSCF is the CSCF of the second UE
  • the third receiving module is configured to receive the first request sent, wherein the first request includes the first identification information of the first UE, the first request is used to request authorization information; the authorization information is used to indicate: at least one first identification The UE corresponding to the information is allowed to initiate and/or receive IMS sessions.
  • the first request includes the first identification information of the first UE and the second identification information of the second UE; the authorization information is used to indicate that the UE corresponding to at least one of the first identification information is allowed to initiate and/or receive the An IMS session corresponding to at least one second identification information.
  • the apparatus includes: a third sending module configured to send a first response to the CSCF, where the first response includes authorization information.
  • an IMS session device including:
  • the fourth receiving module is configured to receive a second request sent by the CSCF, where the second request includes the first identification information of the first UE; where the second request is used to request whether the first UE is allowed to initiate and/or receive IMS session.
  • the second request further includes second identification information of the second UE; the second request is also used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • the device includes: a third processing module configured to determine an authorization result of at least one of the following based on the second request and authorization information:
  • the first UE is allowed to send and/or receive IMS sessions
  • the first UE is allowed to send and/or receive an IMS session with the second UE;
  • Whether the first UE initiates and/or receives the IMS session with the second UE is within the call time range.
  • the apparatus includes: a fourth sending module configured to send a second response to the CSCF, where the second response includes: an authorization result.
  • an IMS session device including:
  • the fifth receiving module is configured to receive an invitation request sent by the CSCF of the second UE, where the invitation request includes the first identification information of the first UE and the second identification information of the second UE;
  • a communication device includes:
  • a computer storage medium stores a computer executable program.
  • the executable program is executed by a processor, the IMS session method of any embodiment of the present disclosure is implemented.
  • the first UE sends an invitation request to the CSCF, where the invitation request includes the first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session; in this way, the first UE can initiate and/or receive an IMS session.
  • a UE can use third-party information (such as the first identification information of the first UE) to securely access the IMS network to conduct an IMS session, etc.
  • Figure 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment.
  • Figure 2 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 3 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 4 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 5 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 6 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 7 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 8 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 9 is a schematic diagram of an IMS session method according to an exemplary embodiment.
  • Figure 10 is a block diagram of an IMS session device according to an exemplary embodiment.
  • Figure 11 is a block diagram of an IMS session device according to an exemplary embodiment.
  • Figure 12 is a block diagram of an IMS session device according to an exemplary embodiment.
  • Figure 13 is a block diagram of an IMS session device according to an exemplary embodiment.
  • Figure 14 is a block diagram of an IMS session device according to an exemplary embodiment.
  • Figure 15 is a block diagram of a UE according to an exemplary embodiment.
  • Figure 16 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determining.”
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology.
  • the wireless communication system may include several user equipments 110 and several base stations 120.
  • user equipment 110 may be a device that provides voice and/or data connectivity to a user.
  • the user equipment 110 may communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the user equipment 110 may be an Internet of Things user equipment, such as a sensor device, a mobile phone (or a "cellular" phone) ) and computers with IoT user equipment, which may be, for example, fixed, portable, pocket-sized, handheld, computer-built-in, or vehicle-mounted devices.
  • station station
  • subscriber unit subscriber unit
  • subscriber station subscriber station
  • mobile station mobile station
  • remote station remote station
  • access point remote terminal
  • remote terminal remote terminal
  • the user equipment 110 may also be equipment of an unmanned aerial vehicle.
  • the user equipment 110 may also be a vehicle-mounted device, for example, it may be an on-board computer with a wireless communication function, or a wireless user equipment connected to an external on-board computer.
  • the user equipment 110 may also be a roadside device, for example, it may be a streetlight, a signal light or other roadside device with a wireless communication function.
  • the base station 120 may be a network-side device in a wireless communication system.
  • the wireless communication system can be the 4th generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as the Long Term Evolution (LTE) system; or the wireless communication system can also be a 5G system, Also called new air interface system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called the New Generation-Radio Access Network (NG-RAN).
  • NG-RAN New Generation-Radio Access Network
  • the base station 120 may be an evolved base station (eNB) used in the 4G system.
  • the base station 120 may also be a base station (gNB) that adopts a centralized distributed architecture in the 5G system.
  • eNB evolved base station
  • gNB base station
  • the base station 120 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is equipped with a protocol stack including the Packet Data Convergence Protocol (PDCP) layer, the Radio Link Control protocol (Radio Link Control, RLC) layer, and the Media Access Control (Medium Access Control, MAC) layer;
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Media Access Control
  • the distribution unit is provided with a physical (Physical, PHY) layer protocol stack, and the embodiment of the present disclosure does not limit the specific implementation of the base station 120.
  • a wireless connection may be established between the base station 120 and the user equipment 110 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • an E2E (End to End, end-to-end) connection can also be established between user equipments 110 .
  • vehicle-to-vehicle (V2V) communication vehicle-to-roadside equipment (vehicle to Infrastructure, V2I) communication and vehicle-to-person (vehicle to pedestrian, V2P) communication in vehicle networking communication (vehicle to everything, V2X) Wait for the scene.
  • V2V vehicle-to-vehicle
  • V2I vehicle-to-roadside equipment
  • V2P vehicle-to-person communication in vehicle networking communication
  • V2X vehicle networking communication
  • the above user equipment can be considered as the terminal equipment of the following embodiments.
  • the above-mentioned wireless communication system may also include a network management device 130.
  • the network management device 130 may be a core network device in a wireless communication system.
  • the network management device 130 may be a mobility management entity (Mobility Management Entity) in an evolved packet core network (Evolved Packet Core, EPC). MME).
  • the network management device can also be other core network devices, such as serving gateway (Serving GateWay, SGW), public data network gateway (Public Data Network GateWay, PGW), policy and charging rules functional unit (Policy and Charging Rules) Function, PCRF) or Home Subscriber Server (HSS), etc.
  • serving gateway Serving GateWay, SGW
  • public data network gateway Public Data Network GateWay, PGW
  • Policy and Charging Rules Policy and Charging Rules
  • PCRF Policy and Charging Rules
  • HSS Home Subscriber Server
  • the embodiments of the present disclosure enumerate multiple implementations to clearly describe the technical solutions of the embodiments of the present disclosure.
  • the multiple embodiments provided in the embodiments of the present disclosure can be executed alone or in combination with the methods of other embodiments in the embodiments of the present disclosure. They can also be executed alone or in combination. It is then executed together with some methods in other related technologies; the embodiments of the present disclosure do not limit this.
  • one execution subject when one execution subject sends a certain transmission to another execution subject, it may mean that one execution subject directly sends a transmission to another execution subject, or it may mean that one execution subject directly sends a transmission to another execution subject. It means that one execution subject sends a transmission to another execution subject through any other device; this is not limited in the embodiment of the present disclosure.
  • an embodiment of the present disclosure provides an IMS session method, which is executed by the first UE, including:
  • Step S21 Send an invitation request to the CSCF, where the invitation request includes the first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the first UE and the second UE mentioned below may be various mobile terminals or fixed terminals.
  • the first UE and the second UE may be, but are not limited to, a mobile phone, a computer, a server, a wearable device, a vehicle terminal, a road side unit (RSU, Road Side Unit), a game control platform or a multimedia device, etc.
  • RSU Road Side Unit
  • the first UE may be the UE that initiated the IMS session.
  • the second UE may be a UE that receives the IMS session.
  • the first UE may be the UE receiving the IMS session.
  • the first UE may be the UE that initiates the IMS session.
  • the CSCF and the HSS and third-party AAA servers involved below can be logical nodes or functions that are flexibly deployed in the communication network.
  • the CSCF, HSS and third-party AAA server can all be logical nodes or functions on the core network side.
  • the CSCF and HSS may be logical nodes or functions in the IMS network; the IMS network is a data network connected to the core network.
  • the third-party AAA server may be a logical node or function of the third-party network.
  • the CSCF may be, but is not limited to, at least one of the following: Proxy-Call Session Control Function (P-CSCF), Serving Call Session Control Function (S-CSCF) CSCF), and query call session control function (Interrogation Call Session Control Function, I-CSCF).
  • P-CSCF Proxy-Call Session Control Function
  • S-CSCF Serving Call Session Control Function
  • I-CSCF Interrogation Call Session Control Function
  • the CSCF may be S-CSCF.
  • the CSCF may be, but is not limited to, the CSCF of the first UE or the CSCF of the second UE.
  • the CSCF may be the S-CSCF of the first UE or the S-CSCF of the second UE.
  • the CSCF of the first UE and the CSCF of the second UE may be the same or different.
  • the IMS network where the first UE is located is the same as the IMS network where the second UE is located
  • the CSCF of the first UE is the same as the CSCF of the second UE.
  • the IMS network where the first UE is located is different from the IMS network where the second UE is located
  • the CSCF of the first UE is the same as the CSCF of the second UE, or the CSCF of the first UE is different from the CSCF of the second UE.
  • step S21 Send an invitation request to the CSCF of the first UE
  • the invitation request is used to request the first UE to initiate and/or receive an IMS session, and may be: an invitation request, used to request the first UE to initiate an IMS session with any UE, and/or used to request the first UE to receive an IMS session with any UE.
  • IMS session of any UE Any UE here refers to a UE other than the first UE.
  • the invitation request may be used to request the first UE to initiate an IMS session with the second UE, and/or may be used to request the first UE to receive an IMS session of the third UE.
  • the invitation request includes: second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE, and may be: the invitation request is used to request the first UE to initiate an IMS session with the second UE, and/or to request the third UE to initiate an IMS session with the second UE.
  • a UE receives an IMS session with a second UE.
  • the first UE initiates an IMS session with the second UE
  • the first UE is the calling UE and the second UE is the called UE.
  • the first UE receives the IMS session with the second UE
  • the first UE is the called UE and the second UE is the calling UE.
  • the invitation request also includes: time information; the time information is used by the CSCF to determine whether the invitation request is attacked.
  • Embodiments of the present disclosure provide an IMS session method, executed by a first UE, including: obtaining first identification information of the first UE and/or second identification information of the second UE.
  • the first identification information of the first UE is determined by at least one of the following, but is not limited to:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • the second identification information of the second UE is determined by at least one of the following, but not limited to:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the identity of the first UE may be the name of the user corresponding to the first UE; the identity of the second UE may be the name of the user corresponding to the second UE.
  • the job information of the first UE may be the job information of the user corresponding to the first UE; the job information of the second UE may be the job information of the user corresponding to the second UE.
  • the organization information associated with the first UE may be the organization information associated with the user of the first UE; the organization information associated with the second UE may be the organization information associated with the user of the second UE.
  • the first UE may obtain the first identification information of the first UE and/or the second identification information of the second UE from a third-party AAA server or HSS.
  • the first UE may directly obtain the first identification information of the first UE and/or the second identification information of the second UE from the third-party AAA server or HSS.
  • the first UE may obtain the third-party information of the first UE and/or the third-party information of the second UE from the third AAA server or HSS; the third-party information of the first UE may be, but is not limited to, the third-party information of the first UE.
  • the identity of the first UE in the third-party organization or network, the job information of the first UE in the third-party organization or network, the organizational information associated with the first UE in the third-party organization or network, and the location of the first UE in the third-party organization or network At least one of the relevant information;
  • the third-party information of the second UE may be but is not limited to the identity of the second UE under the third-party organization or network, the job information of the third-party organization or the second UE under the network, the third-party At least one of the organization information associated with the second UE under the organization or network and the location-related information of the second UE under the third-party organization or network.
  • the first UE determines the first identification information of the first UE based on the third party information of the first UE; and/or the first UE determines the second identification information of the second UE based on the third party information of the second UE.
  • the first UE can obtain the third-party information of the first UE and/or the second UE from the third AAA server or HSS, and based on the third-party information of the first UE and/or the second UE , determine the first identification information of the first UE and/or the second identification information of the second UE.
  • third-party information that is, third-party specific user identity or third-party trusted information.
  • the first UE sends an invitation request to the CSCF, where the invitation request includes the first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session; in this way, the first UE can initiate and/or receive an IMS session.
  • a UE can use third-party information (such as the first identification information of the first UE) to securely access the IMS network to conduct an IMS session, etc.
  • the embodiment of the present disclosure provides an IMS session method, which is executed by CSCF, including:
  • Step S31 Receive an invitation request, where the invitation request includes first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the CSCF may be the CSCF in the above embodiment;
  • the invitation request may be the invitation request in the above embodiment;
  • the first identification information of the first UE and the second identification information of the second UE may respectively be the first identification information of the first UE and the second identification information of the second UE.
  • the CSCF may be, but is not limited to, S-CSCF.
  • the CSCF may be, but is not limited to, the CSCF of the first UE or the CSCF of the second UE.
  • the invitation request includes the second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the first identification information of the first UE is determined by at least one of the following but limited to:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the second identification information of the second UE is determined by at least one of the following but is not limited to:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the invitation request includes: time information;
  • the method includes: determining whether the invitation request is attacked based on the time information and the current time.
  • Embodiments of the present disclosure provide an IMS session method, executed by a UE, including: determining whether the invitation request is attacked based on time information and the current time.
  • determining whether the invitation request is attacked based on time information and the current time includes:
  • the CSCF of the first UE receives the invitation request sent by the UE.
  • the invitation request includes the first identification information of the first UE, the second identification information of the second UE, and the time information for sending the invitation request; the CSCF of the first UE Determine whether the difference between the time indicated by the time information and the current time is greater than the predetermined time; if it is determined that the difference is greater than the predetermined time, it is determined that the invitation request has been attacked, or if it is determined that the difference is less than or equal to the predetermined time, it is determined that the invitation request has not been attacked .
  • whether the invitation request is the most recent invitation request can be determined based on the time information in the invitation request; thus, the accuracy of determining whether the invitation request is attacked can be improved.
  • the method includes: obtaining authorization information; wherein the authorization information is used to indicate at least one of the following:
  • the UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session
  • a UE corresponding to at least one piece of first identification information is allowed to initiate and/or receive an IMS session corresponding to a UE corresponding to at least one piece of second identification information.
  • the CSCF is the CSCF of the first UE
  • Receiving the invitation request in step S31 includes: receiving the invitation request sent by the first UE.
  • Embodiments of the present disclosure provide an IMS session method, which is executed by the CSCF of the first UE, including: receiving an invitation request sent by the first UE.
  • Step S41 Obtain authorization information; wherein the authorization information is used to indicate that: a UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session, or that a UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session.
  • the IMS session of the UE corresponds to the at least one second identification information.
  • the method includes: sending a first request to the HSS, where the first request includes: first identification information of the first UE, or first identification information of the first UE and second identification information of the second UE. ;
  • the first request is used to request authorization information.
  • Embodiments of the present disclosure provide an IMS session, executed by the CSCF, including: sending a first request to the HSS, where the first request includes: the first identification information of the first UE, or the first identification information of the first UE and the first identification information of the first UE. 2.
  • the second identification information of the UE; the first request is used to request authorization information.
  • obtaining authorization information includes: receiving a first response sent by the HSS, where the first response includes: authorization information.
  • Embodiments of the present disclosure provide an IMS session, executed by the CSCF, including: receiving a first response sent by the HSS, where the first response includes: authorization information.
  • the CSCF can obtain the subscription information from the HSS, where the subscription information includes authorization information; or the CSCF can directly obtain the authorization information from the HSS.
  • the method includes at least one of the following:
  • the first UE initiates and/or receives the IMS session with the second UE within the call time range.
  • Embodiments of the present disclosure provide an IMS session method, executed by CSCF, including at least one of the following:
  • the first UE initiates and/or receives the IMS session with the second UE within the call time range.
  • the CSCF determines to allow the first UE to send and/or receive the IMS session.
  • the CSCF determines not to allow the first sending and/or receiving of the IMS session.
  • the requirement to meet the authorization information corresponding to the first identification information may be: the authorization information indicates that the user corresponding to the first identification information is allowed or authorized to send and/or receive the IMS session.
  • the CSCF determines that the authorization information corresponding to the first identification information contains a requirement for the second identification information, and determines that the invitation request meets the requirements of the authorization information, then the CSCF determines to allow the first UE to send and/or receive information from the second UE. IMS session.
  • the CSCF determines that the authorization information corresponding to the first identification information contains a requirement for the second identification information, and determines that the invitation request does not meet the requirements of the authorization information, the CSCF determines that the first UE is not allowed to send and/or receive information related to the second identification information.
  • the requirement for the second identification information contained in the authorization letter corresponding to the first identification information may be: the authorization information indicates that the user corresponding to the first identification information allows or authorizes the sending and/or receiving of the user corresponding to the second identification information. IMS session.
  • Embodiments of the present disclosure provide an IMS session, executed by the CSCF, including: obtaining at least one first identification information corresponding to the first UE corresponding to the call time range allowed for initiating and/or receiving the IMS session; and/or obtaining at least one first The first UE corresponding to the identification information initiates and/or receives a call time range allowed by the IMS session of the second UE corresponding to at least one second identification information.
  • it can be determined whether the first UE initiates and/or receives the IMS session within the call time range, and/or determines whether the first UE initiates and/or receives the call time range with the first UE. 2. Whether the IMS session of the UE is within the calling time range.
  • the CSCF of the first UE obtains authorization information from the HSS of the first UE.
  • the CSCF of the second UE obtains authorization information from the HSS of the second UE.
  • the CSCF can obtain authorization information from the HSS, and accurately determine whether the first UE can use third-party information (such as first identification information) to securely access the IMS network for an IMS session based on the authorization information. Or based on the authorization information, it is accurately determined whether the first UE can securely access the IMS network using the first identification information to conduct an IMS session with the second UE using third-party information (second identification information).
  • third-party information such as first identification information
  • the CSCF may also obtain the authorization result from other logical nodes or functions of the communication device, for example, it may also obtain the authorization result from a third-party AAA server.
  • the method includes: sending a second request to a third-party AAA server; wherein the second request includes first identification information of the first UE, and the second request is used to request whether the first UE is allowed to initiate and/or Receive an IMS session; or, the second request includes the first identification information of the first UE and the second identification information of the second UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive the session with the second UE. IMS session.
  • the embodiment of the present disclosure provides an IMS session, which is executed by CSCF, including:
  • Step S51 Send the second request to the third-party AAA server
  • the second request includes the first identification information of the first UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session;
  • the second request includes the first identification information of the first UE and the second identification information of the second UE, and the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • the method includes: receiving a second response sent by the third-party AAA server; wherein the second response includes at least one of the following: whether the first UE is allowed to initiate and/or receive an authorization result of the IMS session; and whether it is allowed The first UE initiates and/or receives an authorization result of the IMS session with the second UE.
  • Embodiments of the present disclosure provide an IMS session method, executed by CSCF, including: receiving a second response sent by a third-party AAA server; wherein the second response includes at least one of the following: whether the first UE is allowed to initiate and/or receive IMS The authorization result of the session; and whether the first UE is allowed to initiate and/or receive the authorization result of the IMS session with the second UE.
  • the second response further includes at least one of the following: the first UE initiates and/or receives an authorization result of whether the IMS session is within the calling time range; and the first UE initiates and/or receives an authorization result with the second UE. Authorization result of whether the IMS session is within the call time range.
  • Embodiments of the present disclosure provide an IMS session method, executed by CSCF, including: receiving a second response sent by a third-party AAA server; wherein the second response includes at least one of the following: whether the first UE initiates and/or receives an IMS session The authorization result is within the call time range; and the authorization result is whether the first UE initiates and/or receives the IMS session with the second UE within the call time range.
  • the CSCF of the first UE obtains the second response from the third-party AAA server of the first UE; and/or the CSCF of the second UE obtains the second response from the third-party AAA server of the second UE.
  • the third-party AAA server of the first UE is the same as the third-party AAA server of the second UE.
  • the IMS network where the first UE is located and the IMS network where the second UE is located may be the same or different.
  • the third-party AAA server of the first UE is different from the third-party AAA server of the second UE.
  • the IMS network where the first UE is located is different from the IMS network where the second UE is located.
  • the CSCF may send a second request to the third-party AAA server to accurately obtain a second response of whether the first UE is allowed to initiate and/or receive an IMS session, or to obtain whether the first UE is allowed to initiate and/or receive a second response. /or receive a second response to the IMS session with the second UE. And there is no need for CSCF to perform authorization check operations, thus reducing the burden on CSCF.
  • the CSCF is the CSCF of the first UE
  • the method includes: sending an invitation request to the CSCF of the second UE.
  • Embodiments of the present disclosure provide an IMS session, which is executed by the CSCF of the first UE, including: sending an invitation request to the CSCF of the second UE.
  • Embodiments of the present disclosure provide an IMS session, which is executed by the CSCF of the first UE, including: based on allowing the first UE to initiate and/or receive an IMS session with the second UE, sending an invitation request to the CSCF of the second UE. In this way, it is beneficial for the second UE to establish an IMS session with the first UE.
  • the CSCF may determine whether to allow the first UE to initiate and/or communicate with the second UE based on the authorization information, or the CSCF may determine from the obtained second response whether to allow the first UE to initiate and/or communicate with the second UE. IMS session.
  • the CSCF of the first UE before sending the invitation request to the CSCF of the second UE, the CSCF of the first UE includes: signing the invitation request.
  • the embodiment of the present disclosure provides an IMS session method, which is executed by the CSCF of the first UE, including:
  • the CSCF of the first UE derives the multimedia common user identity (IP Multimedia Public Identity, IMPU) from the message header of the invitation request.
  • the message header may be, but is not limited to, a PAI format or a From format message header.
  • the CSCF of the first UE calls the first UE's Secure Telephone Identity Authentication Service (STI-AS) or application server (Application Server, AS) based on the IMPU to sign the invitation request; for example, the first UE
  • the CSCF sends a signature request carrying the invitation request to the STI-AS or AS; the STI-AS or AS signs the invitation request based on the signature request, and sends the signed invitation request to the CSCF of the first UE; the signed invitation request
  • the invitation request can add the IMPU identity header.
  • the signature operation may be skipped according to the third party's security policy.
  • the CSCF of the first UE can call the STI-AS to protect the integrity of the invitation request, thereby improving the security of the invitation request.
  • the CSCF is the CSCF of the second UE
  • Receiving the invitation request in step S31 includes: receiving the invitation request sent by the CSCF of the first UE.
  • Embodiments of the present disclosure provide an IMS session, which is executed by the CSCF of the second UE, including: receiving an invitation request sent by the CSCF of the first UE.
  • receiving the invitation request sent by the CSCF of the first UE includes: receiving the signed invitation request sent by the CSCF of the first UE.
  • the CSCF includes: the CSCF of the second UE;
  • the method includes: verifying the signed invitation request to verify the integrity and legality of the invitation request.
  • Embodiments of the present disclosure provide an IMS session method, which is executed by the CSCF of the second UE, including: verifying the signed invitation request to verify the legality and integrity of the invitation request.
  • the CSCF of the second UE verifies the signed invitation. If the verification is successful, the successfully verified invitation request can be obtained.
  • the CSCF of the second UE receives the signed invitation request sent by the CSCF of the first UE, and calls the Secure Telephone Identity Verification Service (STI-VS) or the application server (AS) to verify the signed invitation request. Verify the invitation request to verify the legitimacy and integrity of the invitation request.
  • the CSCF of the second UE sends a verification request to the STI-VS or AS; the STI-VS or AS verifies the signed invitation request based on the verification request, and sends the verified invitation request to the CSCF of the second UE.
  • a verification failure message is sent to the CSCF of the second UE.
  • the CSCF of the second UE can call STI-VS/AS to verify the signed invitation request, so that the CSCF of the second UE can obtain a legitimate invitation request.
  • the method includes: sending an invitation request to the second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE.
  • sending the invitation request to the second UE may include: sending a verified invitation request to the second UE.
  • the following IMS-based session method is executed by the HSS, which is similar to the above description of the IMS session method executed by the first UE and/or CSCF; and the IMS session method executed by the HSS is not disclosed in the embodiment.
  • the IMS session method example executed by the first UE and/or CSCF which will not be described in detail here.
  • the embodiment of the present disclosure provides an IMS session method, which is executed by the HSS, including:
  • Step S61 Receive the first request sent by the CSCF, where the first request includes the first identification information of the first UE, and the first request is used to request authorization information; the authorization information is used to indicate: at least one UE corresponding to the first identification information. Allows initiating and/or receiving IMS sessions.
  • the CSCF may be the CSCF in the above embodiments.
  • the CSCF includes the CSCF of the first UE or the CSCF of the second UE.
  • the HSS includes the HSS of the first UE and/or the HSS of the second UE. If the HSS is the HSS of the first UE, the HSS of the first UE receives the first request sent by the CSCF of the first UE; if the HSS is the second HSS, the HSS of the second UE receives the first request sent by the CSCF of the second UE.
  • the HSS of the first UE is the HSS of the IMS network where the first UE is located; the HSS of the second UE is the HSS of the IMS network where the second UE is located.
  • the HSS of the first UE is the same as the HSS of the second UE, or the HSS of the first UE is different from the HSS of the second UE.
  • the first request may be the first request in the above embodiment;
  • the authorization information may be the authorization information in the above embodiment;
  • the first request includes the first identification information of the first UE and the second identification information of the second UE; the authorization information is used to indicate that the UE corresponding to the at least one first identification information is allowed to initiate and/or receive information related to at least one The IMS session corresponding to the second identification information.
  • the first identification information of the first UE is determined by at least one of the following but limited to:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the second identification information of the second UE is determined by at least one of the following but is not limited to:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the authorization information may also be used to indicate that the UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session.
  • Embodiments of the present disclosure provide an IMS session method, executed by an HSS, including: sending a first response to the CSCF, where the first response includes authorization information.
  • the HSS can receive the first request sent by the CSCF for requesting authorization information and directly send the first response carrying the authorization information to the CSCF, so that the CSCF can implement the use of third-party information for the UE based on the authorization information.
  • the CSCF can implement the use of third-party information for the UE based on the authorization information.
  • the first identification information of the first UE and the second identification information of the second UE authorization judgment for accessing the IMS network.
  • the following IMS-based session method is executed by a third-party AAA server and is similar to the above description of the IMS session method executed by the first UE and/or CSCF; and, for the IMS session executed by a third-party AAA server
  • a third-party AAA server For technical details not disclosed in the method embodiments, please refer to the description of the IMS session method example executed by the first UE and/or CSCF, which will not be described in detail here.
  • the embodiment of the present disclosure provides an IMS session method, which is executed by a third-party AAA server, including:
  • Step S71 Receive a second request sent by the CSCF, where the second request includes the first identification information of the first UE; where the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session.
  • the CSCF may be the CSCF in the above embodiments.
  • the CSCF includes the CSCF of the first UE or the CSCF of the second UE.
  • the third-party AAA server includes a third-party AAA server of the first UE and/or a third-party AAA server of the second UE. If the third-party AAA server is the third-party AAA server of the first UE, the third-party AAA server of the first UE receives the second request sent by the CSCF of the first UE; if the third-party AAA server is the third-party AAA server of the second UE , then the third-party AAA server of the second UE receives the second request sent by the CSCF of the second UE.
  • the second request may be the second request in the above embodiment; the first identification information of the first UE and the second identification information of the second UE may respectively be the first UE in the above embodiment.
  • the second request further includes the second identification information of the second UE; the second request is also used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • the first identification information of the first UE is determined by at least one of the following but limited to:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the second identification information of the second UE is determined by at least one of the following but is not limited to:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • Embodiments of the present disclosure provide an IMS session method, which is executed by a third-party AAA server, including: obtaining authorization information; and/or storing authorization information.
  • the third-party AAA server can also obtain authorization information from logical nodes or functions such as HSS.
  • Embodiments of the present disclosure provide an IMS session method, executed by a third-party AAA server, including: determining an authorization result of at least one of the following based on the second request and authorization information:
  • the first UE is allowed to send and/or receive IMS sessions
  • the first UE is allowed to send and/or receive an IMS session with the second UE;
  • Whether the first UE initiates and/or receives the IMS session with the second UE is within the call time range.
  • Embodiments of the present disclosure provide an IMS session method, which is executed by a third-party AAA server, including sending a second response to the CSCF, where the second response includes an authorization result.
  • the third-party AAA server can use the third-party information (such as the first identification information of the first UE and the first identification information of the second UE) based on the second request and authorization information for the UE after receiving the second request sent by the CSCF. second identification information) to access the IMS network, and sends the authorization result of the authorization judgment to the CSCF.
  • the CSCF can accurately know the authorization results of the first UE and the second UE using third-party information to access the IMS network, and since the CSCF does not need to perform the authorization judgment operation, the power consumption of the CSCF can also be reduced.
  • the following IMS-based session method is executed by the second UE, which is similar to the description of the above-mentioned IMS session method executed by the first UE and/or CSCF and/or HSS and/or third-party AAA server; and, For technical details not disclosed in the IMS session method embodiment executed by the second UE, please refer to the description of the IMS session method example executed by the first UE and/or CSCF and/or HSS and/or third-party AAA server, in This will not be described in detail.
  • the embodiment of the present disclosure provides an IMS session method, which is executed by the second UE, including:
  • Step S81 Receive the invitation request sent by the CSCF of the second UE, where the invitation request includes the first identification information of the first UE and the second identification information of the second UE;
  • Step S82 Based on the invitation request, establish an IMS session with the first UE.
  • the invitation request may be the invitation request in the above embodiment; the first identification information of the first UE and the second identification information of the second UE may be the first identification of the first UE in the above embodiment. information and the second identification information of the second UE.
  • the invitation request includes first identification information of the first UE and second identification information of the second UE, and the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the invitation request includes the first identification information of the first UE, and the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the first identification information of the first UE is determined by at least one of the following but not limited to the following:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the second identification information of the second UE is determined by at least one of the following but not limited to:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the embodiment of the present disclosure provides an IMS session method, which is executed by a communication device.
  • the communication device includes a first UE, the first UE's S-CSCF, STI-AS or AS, HSS, a third-party AAA server, STI-VS or AS, S-CSCF of the second UE and the second UE; in the embodiment of the present disclosure, it is assumed that the first UE and/or the second UE can obtain a third-party specific user identity, and the first UE and/or the second UE Or the second UE has been implicitly registered or independently registered to the IMS session; the third-party specific user identity can be provided by a third-party AAA server or by (IMS) HSS based on information from the third party; the third-party specific user identity can be but is not limited to It is at least one of the identity identifier of a third-party organization or network, the job information of a third-party organization or network, the associated organizational information of a third-party organization or network, and the location-related
  • Step S901 The first UE sends an invitation request to the S-CSCF of the first UE;
  • the invitation request includes first identification information of the first UE, and the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the invitation request includes the first identification information of the first UE and the second identification information of the second UE, and the invitation request is used to request the first UE to initiate and/or receive IMS communication with the second UE. session.
  • the first identification information of the first UE may be determined by the third-party specific user identity of the first UE; and/or the first identification information of the second UE may be determined by the third-party specific user identity of the second UE.
  • Step S902 After receiving the invitation request, the S-CSCF of the first UE determines whether the invitation request has been attacked;
  • the S-CSCF of the first UE determines whether the invitation request is attacked based on the time information included in the invitation request and the current time; if the time indicated by the time information is different from the current time, If the difference is less than or equal to the predetermined time, it is determined that the invitation request has not been attacked; if the difference between the time indicated by the time information and the current time is greater than the predetermined time, it is determined that the invitation request has been attacked.
  • the time information is a timestamp.
  • the S-CSCF of the first UE checks whether the first UE is authorized to initiate an IMS session; the authorization to initiate an IMS session means that the IMS session is allowed to be initiated.
  • This S902 also includes step S902a or step S902b; wherein,
  • Step S902a The S-CSCF of the first UE obtains authorization information from the HSS and checks the authorization;
  • the S-CSCF of the first UE sends a first request to the HSS, where the first request includes first identification information of the first UE and second identification information of the second UE, and the first request Used to request authorization information; the S-CSCF of the first UE receives the first response sent by the HSS, where the first response includes authorization information; the authorization information at least indicates that the UE corresponding to the at least one first identification information is allowed to initiate the connection with the at least one first identification information.
  • the S-CSCF of the first UE determines whether to allow the first UE to initiate an IMS session with the second UE based on the authorization information, the first identification information of the first UE, and the second identification information of the second UE.
  • the S-CSCF of the first UE may determine, based on the authorization information, whether the IMS session initiated by the first UE with the second UE is within the call time range.
  • Step S902b The S-CSCF of the first UE obtains the authorization result from the third-party AAA server;
  • the S-CSCF of the first UE sends a second request to the third-party AAA server, where the second request includes the first identification information of the first UE and the second identification information of the second UE, and The second request is used to request whether the first UE is allowed to initiate an IMS session with the second UE; the third-party AAA server determines whether the first UE is allowed to initiate an IMS session with the second UE based on the authorization information, and sends a request to the S of the first UE.
  • the CSCF sends a second response, where the second response includes an authorization result of whether the first UE is allowed to initiate an IMS session with the second UE.
  • the second request sent by the S-CSCF of the first UE to the third-party AAA server also includes time information; the third-party AAA server determines that the first UE initiates the communication with the third-party AAA server based on the second request and the current time. Whether the IMS session of the second UE is within the calling time range, and the authorization result of whether the IMS session initiated by the first UE with the second UE is within the calling time range is sent to the S-CSCF of the first UE.
  • the second request may also be a second request carrying an invitation request; the invitation request is sent in the S-CSCF and may also involve P-CSCF and/or I-CSCF; since P-CSCF and/or I-CSCF Used for routing and forwarding, the relevant steps will be ignored here.
  • Step S903 The S-CSCF of the first UE calls the STI-AS or AS to sign the invitation request;
  • the S-CSCF of the first UE obtains the IMPU from the header of the invitation request.
  • the header may be a PAI or From header;
  • the S-CSCF of the first UE sends a request to the STI-AS based on the IMPU.
  • the AS sends a signature request, which is used to request the invitation request to be signed;
  • Step S904 The STI-AS or AS signs the invitation request and sends the signed invitation request to the S-CSCF of the first UE;
  • the STI-AS or AS signs the invitation request based on the 5G authentication information, and adds an identity header to the invitation request; and sends the signed invitation request to the S-CSCF of the first UE. .
  • Step S905 The S-CSCF of the first UE sends the signed invitation request to the S-CSCF of the second UE;
  • Step S906 The S-CSCF of the second UE calls the STI-VS or AS to verify the signed invitation request;
  • the S-CSCF of the second UE sends a verification request to the STI-VS or AS, where the verification request is used to request verification of the signed invitation request.
  • Step S907 The STI-VS or AS verifies the signed invitation request and sends the verified invitation request to the S-CSCF of the second UE;
  • the STI-VS or AS verifies the signed invitation request based on the 5G authentication information and obtains the verified invitation request; the STI-VS or AS sends the verified invitation request to the third party.
  • S-CSCF of UE the S-CSCF of UE.
  • Step S908 If the S-CSCF of the second UE determines that the verification is passed, check whether the second UE is authorized to receive the IMS session of the first UE;
  • Step S908 also includes S908a or S908b; wherein,
  • Step S908a The S-CSCF of the second UE obtains authorization information from the HSS and detects authorization;
  • the S-CSCF of the second UE sends a first request to the HSS, where the first request includes the first identification information of the first UE and the identification information of the second UE, and the first request is used to Request authorization information; the S-CSCF of the second UE receives the first response sent by the HSS, where the first response includes authorization information; the authorization information at least indicates: the UE corresponding to the at least one first identification information is allowed to initiate the connection with the at least one second identification The IMS session of the UE corresponding to the information.
  • the S-CSCF of the second UE determines whether to allow the second UE to receive the IMS session with the first UE based on the authorization information, the first identification information of the first UE, and the second identification information of the second UE.
  • the S-CSCF of the second UE may determine whether the IMS session of the first UE received by the second UE is within the calling time range based on the authorization information.
  • Step S908b The S-CSCF of the second UE obtains the authorization result from the third-party AAA server;
  • the S-CSCF of the second UE sends a second request to the third-party AAA server, where the second request includes the identification information of the first UE and the second identification information of the second UE, and the second request The request is used to request whether the second UE is allowed to receive the IMS session of the first UE; the third-party AAA server determines whether the second UE is allowed to receive the IMS session of the first UE based on the authorization information, and sends the second UE to the S-CSCF of the second UE. A second response, wherein the second response includes whether the second UE is allowed to receive the authorization result of the IMS session of the first UE.
  • the S-CSCF of the second UE sends the second request to the third-party AAA server, which also includes time information; the third-party AAA server determines the second request received by the second UE based on the second request and the current time. Whether the IMS session of one UE is within the calling time range, and the second UE receives the authorization result of whether the IMS session of the first UE is within the calling time range and sends it to the S-CSCF of the second UE.
  • Step S909 If the S-CSCF of the second UE determines that the second UE is allowed to receive the IMS session of the first UE, it sends an invitation request to the second UE;
  • the second UE is allowed to receive the IMS session of the first UE, that is, the second UE is authorized to receive the IMS session of the first UE.
  • the S-CSCF of the second UE may send an invitation request authentication failure message to the second UE.
  • Step S910 The second UE establishes an IMS session with the first UE based on the invitation request.
  • an IMS session device including:
  • the first sending module 21 is configured to send an invitation request to the CSCF, where the invitation request includes the first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the IMS session device provided by the embodiment of the present disclosure can be applied to the first UE.
  • the first identification information of the first UE is determined by at least one of the following:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • Embodiments of the present disclosure provide an IMS session device, including: a first sending module 21 configured to send an invitation request to the CSCF, where the invitation request includes first identification information of the first UE and second identification information of the second UE; invitation Request, used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the second identification information of the second UE is determined by at least one of the following:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • Embodiments of the present disclosure provide an IMS session device, including: a first receiving module configured to obtain first identification information of a first UE and/or second identification information of a second UE.
  • Embodiments of the present disclosure provide an IMS session device, including:
  • a first receiving module configured to obtain the third-party specific user identity of the first UE and/or the third-party specific user identity of the second UE;
  • a first processing module configured to determine first identification information of the first UE based on the third-party specific user identity of the first UE, and/or determine second identification information of the second UE based on the third-party specific user identity of the second UE. .
  • the third-party specific user identity of the first UE may be the identity of the first UE under a third-party organization or network, the job information of the first UE under the third-party organization or network, the third-party organization or network under the first UE. At least one of the organization information associated with a UE and the location-related information of the first UE under a third-party organization or network.
  • the third-party specific user identity of the second UE may be the identity of the second UE under a third-party organization or network, the job information of the second UE under the third-party organization or network, the third-party organization or network under the second UE. At least one of the organization information associated with the second UE and the location-related information of the second UE under a third-party organization or network.
  • an IMS session device including:
  • the second receiving module 31 is configured to receive an invitation request, where the invitation request includes the first identification information of the first UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session.
  • the IMS session device provided by the embodiment of the present disclosure can be executed by the CSCF.
  • the CSCF includes the CSCF of the first UE or the CSCF of the second UE.
  • the first identification information of the first UE is determined by at least one of the following:
  • the job information of the first UE in a third-party organization or network is a third-party organization or network
  • Third-party organization or organization information associated with the first UE under the network
  • the invitation request includes second identification information of the second UE; the invitation request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
  • the second identification information of the second UE is determined by at least one of the following:
  • the job information of the second UE in a third-party organization or network is a third-party organization or network
  • the invitation request includes: time information;
  • the device includes: a second processing module configured to determine whether the invitation request has been attacked based on the time information and the current time.
  • the present disclosure provides an IMS session device, including: a second processing module configured to determine whether the invitation request has been attacked based on time information and the current time.
  • the present disclosure provides an IMS session device, including: a second receiving module 31 configured to obtain authorization information; wherein the authorization information is used to indicate at least one of the following:
  • the UE corresponding to at least one first identification information is allowed to initiate and/or receive an IMS session
  • a UE corresponding to at least one piece of first identification information is allowed to initiate and/or receive an IMS session corresponding to a UE corresponding to at least one piece of second identification information.
  • the present disclosure provides an IMS session device, including: a second processing module configured as at least one of the following:
  • the first UE initiates and/or receives the IMS session with the second UE within the call time range.
  • the present disclosure provides an IMS session device, including: a second sending module configured to send a first request to the HSS, where the first request includes: first identification information of the first UE, or first identification of the first UE information and the second identification information of the second UE; the first request is used to request authorization information.
  • a second sending module configured to send a first request to the HSS, where the first request includes: first identification information of the first UE, or first identification of the first UE information and the second identification information of the second UE; the first request is used to request authorization information.
  • the present disclosure provides an IMS session device, including: a second receiving module 31 configured to receive a first response sent by the HSS, where the first response includes: authorization information.
  • the present disclosure provides an IMS session device, including: a second sending module configured to send a second request to a third-party authentication authorization accounting AAA server; wherein the second request includes the first identification information of the first UE, and the The second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session; or, the second sending module is configured such that the second request includes the first identification information of the first UE and the second identification information of the second UE, And the second request is used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • the present disclosure provides an IMS session device, including: a second receiving module 31 configured to receive a second response sent by a third-party AAA server, where the second response includes at least one of the following: whether the first UE is allowed to initiate and/or or receive the authorization result of the IMS session; and whether the first UE is allowed to initiate and/or receive the authorization result of the IMS session with the second UE.
  • the second response further includes at least one of the following:
  • the first UE initiates and/or receives an authorization result indicating whether the IMS session is within the calling time range
  • the first UE initiates and/or receives an authorization result indicating whether the IMS session with the second UE is within the calling time range.
  • the CSCF is the CSCF of the first UE
  • the second receiving module 31 is configured to receive the invitation request sent by the first UE.
  • the present disclosure provides an IMS session device, which is applied in the CSCF of a first UE and includes: a second receiving module 31 configured to receive an invitation request sent by the first UE.
  • the CSCF is the CSCF of the second UE
  • the second receiving module is configured to receive the invitation request sent by the CSCF of the first UE.
  • the present disclosure provides an IMS session device, applied in the CSCF of the second UE, including: a second receiving module 31 configured to receive an invitation request sent by the CSCF of the first UE.
  • the present disclosure provides an IMS session device, applied in the CSCF of a second UE, including: a second sending module configured to send a message to the second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE. Send an invitation request.
  • an IMS session device including:
  • the third receiving module 41 is configured to receive the first request sent, where the first request includes the first identification information of the first UE, the first request is used to request authorization information; the authorization information is used to indicate: at least one first The UE corresponding to the identification information is allowed to initiate and/or receive IMS sessions.
  • the IMS session device provided by the embodiment of the present disclosure can be applied in HSS.
  • the HSS includes the HSS of the first UE or the HSS of the second UE.
  • the first request includes the first identification information of the first UE and the second identification information of the second UE; the authorization information is used to indicate that the UE corresponding to at least one of the first identification information is allowed to initiate and/or receive the An IMS session corresponding to at least one second identification information.
  • Embodiments of the present disclosure provide an IMS session device, including: a third sending module configured to send a first response to the CSCF, where the first response includes authorization information.
  • an IMS session device including:
  • the fourth receiving module 51 is configured to receive a second request sent by the CSCF, where the second request includes the first identification information of the first UE; where the second request is used to request whether the first UE is allowed to initiate and/or receive IMS session.
  • the IMS session device provided by the embodiment of the present disclosure can be applied to a third-party AAA server.
  • the third-party AAA server includes a third-party AAA server of the first UE or a third-party AAA server of the second UE.
  • the second request further includes second identification information of the second UE; the second request is also used to request whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  • an IMS session device including: a third processing module configured to determine an authorization result of at least one of the following based on the second request and authorization information:
  • the first UE is allowed to send and/or receive IMS sessions
  • the first UE is allowed to send and/or receive an IMS session with the second UE;
  • Whether the first UE initiates and/or receives the IMS session with the second UE is within the call time range.
  • Embodiments of the present disclosure provide an IMS session device, including: a fourth sending module configured to send a second response to the CSCF, where the second response includes: an authorization result.
  • an IMS session device including:
  • the fifth receiving module 61 is configured to receive an invitation request sent by the CSCF of the second UE, where the invitation request includes the first identification information of the first UE and the second identification information of the second UE;
  • the fourth processing module 62 is configured to establish an IMS session with the first UE based on the invitation request.
  • the IMS session device provided by the embodiment of the present disclosure can be applied to the second UE.
  • An embodiment of the present disclosure provides a communication device, including:
  • Memory used to store instructions executable by the processor
  • the processor is configured to implement the IMS session method of any embodiment of the present disclosure when running executable instructions.
  • the communication device may include but is not limited to at least one of: a first UE, a second UE, a CSCF, an HSS, and a third-party AAA server.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to memorize the information stored thereon after the user equipment is powered off.
  • the processor may be connected to the memory through a bus or the like, and be used to read the executable program stored in the memory, for example, at least one of the methods shown in FIGS. 2 to 9 .
  • An embodiment of the present disclosure also provides a computer storage medium.
  • the computer storage medium stores a computer executable program.
  • the executable program is executed by a processor, the IMS session method of any embodiment of the present disclosure is implemented. For example, at least one of the methods shown in Figures 2 to 9.
  • Figure 15 is a block diagram of a user equipment 800 according to an exemplary embodiment.
  • the user device 800 may be a mobile phone, a computer, a digital broadcast user device, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like.
  • the user device 800 may include one or more of the following components: a processing component 802 , a memory 804 , a power supply component 806 , a multimedia component 808 , an audio component 810 , an input/output (I/O) interface 812 , and a sensor component 814 , and communication component 816.
  • Processing component 802 generally controls the overall operations of user device 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operations at user device 800 . Examples of such data include instructions for any application or method operating on user device 800, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 804 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power supply component 806 provides power to various components of user equipment 800.
  • Power supply components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to user device 800 .
  • Multimedia component 808 includes a screen that provides an output interface between the user device 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
  • multimedia component 808 includes a front-facing camera and/or a rear-facing camera.
  • the front camera and/or the rear camera may receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) configured to receive external audio signals when user device 800 is in operating modes, such as call mode, recording mode, and speech recognition mode. The received audio signal may be further stored in memory 804 or sent via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 814 includes one or more sensors that provide various aspects of status assessment for user device 800 .
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the user device 800, the sensor component 814 can also detect the user device 800 or a component of the user device 800. position changes, the presence or absence of user contact with user device 800 , user device 800 orientation or acceleration/deceleration and temperature changes of user device 800 .
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communication between user device 800 and other devices.
  • User equipment 800 may access a wireless network based on a communication standard, such as WiFi, 4G or 5G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communications component 816 also includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • user equipment 800 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A programmable gate array
  • controller microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • a non-transitory computer-readable storage medium including instructions such as a memory 804 including instructions, which can be executed by the processor 820 of the user device 800 to complete the above method is also provided.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of a base station.
  • the base station 900 may be provided as a network side device.
  • base station 900 includes a processing component 922, which further includes one or more processors, and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922.
  • the application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the foregoing methods applied to the base station.
  • Base station 900 may also include a power supply component 926 configured to perform power management of base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input/output (I/O) interface 958.
  • Base station 900 may operate based on an operating system stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开实施例提供一种IMS会话方法、装置、通信设备及存储介质;IMS会话方法由第一UE执行,包括:向CSCF发送邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。

Description

IMS会话方法、装置、通信设备及存储介质 技术领域
本公开涉及但不限于无线通信技术领域,尤其涉及一种IMS会话方法、装置、通信设备及存储介质。
背景技术
第三代合作伙伴计划(3GPP)已经引入了新的网络能力和新类型的设备(例如,虚拟现实(VR)设备、增强现实(AR)设备、扩展现实(XR)设备、或者机器人等)。这可以给IP多媒体系统(IP Multimedia Subsystem,IMS)多媒体电话服务带来有希望的改进。虽然企业客户认为多媒体电话服务为他们的业务提供了有吸引力的功能,但他们也遇到了一些实际问题,需要第五代移动通信技术(5G)系统的支持。5G系统有望支持增强型IMS多媒体电话服务的高级功能和性能,以满足消费者、企业客户和垂直市场的新需求。
目前,正在研究使用第三方特定用户身份访问IMS网络对架构的影响,以及如何增强IMS网络才可以支持可信第三方。然而,所提出的解决方案没有考虑UE的安全问题,使得UE无法使用第三方特定用户身份安全地接入IMS网络。
发明内容
本公开实施例提供一种IMS会话方法、装置、通信设备及存储介质。
根据本公开的第一方面,提供一种IMS会话方法,由第一用户设备(User Equipment,UE)执行,包括:
向呼叫会话控制功能(Call Session Control Function,CSCF)发送邀请请求(Invite Request),其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
在一些实施例中,第一UE的第一标识信息,由以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,邀请请求包括:第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二UE的第二标识信息,由以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
根据本公开的第二方面,提供一种IMS会话方法,由CSCF执行,包括:
接收邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
在一些实施例中,第一UE的第一标识信息,由以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,邀请请求包括第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二UE的第二标识信息,由以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
在一些实施例中,邀请请求,包括:时间信息;
方法包括:基于时间信息与当前时间,确定邀请请求是否被攻击。
在一些实施例中,方法包括:获取授权信息;其中,授权信息用于指示以下至少之一:
至少一个第一标识信息对应的UE允许发起和/或接收IMS会话;
至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应UE的IMS会话。
在一些实施例中,方法包括以下至少之一:
基于授权信息,确定是否允许第一UE发送和/或接收IMS会话;
基于授权信息,确定是否允许第一UE发送和/或接收与第二UE的IMS会话;
基于授权信息,确定第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
基于授权信息,确定第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
在一些实施例中,方法包括:向归属用户服务器(Home Subscriber Server,HSS)发送第一请求,其中,第一请求包括:第一UE的第一标识信息,或者第一UE的第一标识信息及第二UE的第二标识信息;第一请求用于请求授权信息。
在一些实施例中,获取授权信息,包括:接收HSS发送的第一响应,其中,第一响应,包括: 授权信息。
在一些实施例中,方法包括:向第三方认证授权计费((authentication、authorization、accounting),AAA)服务器发送第二请求;其中,
第二请求包括第一UE的第一标识信息,且第二请求用于请求是否允许第一UE发起和/或接收IMS会话;
或者,第二请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第二请求用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
在一些实施例中,方法包括:接收第三方AAA服务器发送的第二响应,其中,第二响应包括以下至少之一:
是否允许第一UE发起和/或接收IMS会话的授权结果;
是否允许第一UE发起和/或接收与第二UE的IMS会话的授权结果。
在一些实施例中,第二响应还包括以下以下至少之一:
第一UE发起和/或接收IMS会话是否在呼叫时间范围内的授权结果;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内的授权结果。
在一些实施例中,CSCF为第一UE的CSCF;
接收邀请请求,包括:接收第一UE发送的邀请请求。
在一些实施例中,CSCF为第二UE的CSCF;
接收邀请请求,包括:接收第一UE的CSCF发送的邀请请求。
在一些实施例中,方法包括:
基于允许第一UE发起和/或接收与第二UE的IMS会话,向第二UE发送邀请请求。
根据本公开的第三方面,提供一种IMS会话方法,由HSS执行,包括:
接收CSCF发送的第一请求,其中,第一请求包括第一UE的第一标识信息,第一请求用于请求授权信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收IMS会话。
在一些实施例中,第一请求包括第一UE的第一标识信息及第二UE的第二标识信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应的IMS会话。
在一些实施例中,方法包括:向CSCF发送第一响应,其中,第一响应包括授权信息。
根据本公开的第四方面,提供一种IMS会话方法,由第三方AAA服务器执行,包括:
接收CSCF发送的第二请求,其中,第二请求包括第一UE的第一标识信息;其中,第二请求用于请求是否允许第一UE发起和/或接收IMS会话。
在一些实施例中,第二请求还包括第二UE的第二标识信息;第二请求还用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
在一些实施例中,基于第二请求及授权信息,确定以下至少之一的授权结果:
是否允许第一UE发送和/或接收IMS会话;
是否允许第一UE发送和/或接收与第二UE的IMS会话;
第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
在一些实施例中,方法包括:向CSCF发送第二响应,其中,第二响应包括:授权结果。
根据本公开第五方面,提供一种IMS会话方法,由第二UE执行,包括:
接收第二UE的CSCF发送的邀请请求,其中,邀请请求包括第一UE的第一标识信息及第二UE的第二标识信息;
基于邀请请求,建立与第一UE的IMS会话。
根据本公开的第六方面,提供一种IMS会话装置,包括:
第一发送模块,被配置为向CSCF发送邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
在一些实施例中,第一UE的第一标识信息,由以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二UE的第二标识信息,由以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
根据本公开的第七方面,提供一种IMS会话装置,包括:
第二接收模块,被配置为接收邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
在一些实施例中,第一UE的第一标识信息,由以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,邀请请求包括第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二UE的第二标识信息,由以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
在一些实施例中,邀请请求,包括:时间信息;
装置包括:第二处理模块,被配置为基于时间信息与当前时间,确定邀请请求是否被攻击。
在一些实施例中,第二接收模块,被配置为获取授权信息;其中,授权信息用于指示以下至少之一:
至少一个第一标识信息对应的UE允许发起和/或接收IMS会话;
至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应UE的IMS会话。
在一些实施例中,第二处理模块,被配置为以下至少之一:
基于授权信息,确定是否允许第一UE发送和/或接收IMS会话;
基于授权信息,确定是否允许第一UE发送和/或接收与第二UE的IMS会话;
基于授权信息,确定第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
基于授权信息,确定第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
在一些实施例中,装置包括:第二发送模块,被配置为向HSS发送第一请求,其中,第一请求包括:第一UE的第一标识信息,或者第一UE的第一标识信息及第二UE的第二标识信息;第一请求用于请求授权信息。
在一些实施例中,第二接收模块,被配置为接收HSS发送的第一响应,其中,第一响应,包括:授权信息。
在一些实施例中,第二发送模块,被配置为向第三方认证授权计费AAA服务器发送第二请求;
其中,第二请求包括第一UE的第一标识信息,且第二请求用于请求是否允许第一UE发起和/或接收IMS会话;
或者,第二发送模块,被配置为第二请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第二请求用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二接收模块,被配置为接收第三方AAA服务器发送的第二响应,其中,第二响应包括以下至少之一:
是否允许第一UE发起和/或接收IMS会话的授权结果;
是否允许第一UE发起和/或接收与第二UE的IMS会话的授权结果。
在一些实施例中,第二响应还包括以下以下至少之一:
第一UE发起和/或接收IMS会话是否在呼叫时间范围内的授权结果;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内的授权结果。
在一些实施例中,CSCF为第一UE的CSCF;
第二接收模块,被配置为接收第一UE发送的邀请请求。
在一些实施例中,CSCF为第二UE的CSCF;
第二接收模块,被配置为接收第一UE的CSCF发送的邀请请求。
在一些实施例中,第二发送模块,被配置为基于允许第一UE发起和/或接收与第二UE的IMS会话,向第二UE发送邀请请求。
根据本公开的第八方面,提供一种IMS会话装置,包括:
第三接收模块,被配置为接收发送的第一请求,其中,第一请求包括第一UE的第一标识信息,第一请求用于请求授权信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收IMS会话。
在一些实施例中,第一请求包括第一UE的第一标识信息及第二UE的第二标识信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应的IMS会话。
在一些实施例中,装置包括:第三发送模块,被配置为向CSCF发送第一响应,其中,第一响应包括授权信息。
根据本公开的第九方面,提供一种IMS会话装置,包括:
第四接收模块,被配置为接收CSCF发送的第二请求,其中,第二请求包括第一UE的第一标识信息;其中,第二请求用于请求是否允许第一UE发起和/或接收IMS会话。
在一些实施例中,第二请求还包括第二UE的第二标识信息;第二请求还用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
在一些实施例中,装置包括:第三处理模块,被配置为基于第二请求及授权信息,确定以下至少之一的授权结果:
是否允许第一UE发送和/或接收IMS会话;
是否允许第一UE发送和/或接收与第二UE的IMS会话;
第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
在一些实施例中,装置包括:第四发送模块,被配置为向CSCF发送第二响应,其中,第二响应包括:授权结果。
根据本公开的第十方面,提供一种IMS会话装置,包括:
第五接收模块,被配置为接收第二UE的CSCF发送的邀请请求,其中,邀请请求包括第一UE的第一标识信息及第二UE的第二标识信息;
第四处理模块,被配置为基于邀请请求,建立与第一UE的IMS会话。
根据本公开的十一方面,提供一种通信设备,通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现本公开任意实施例的IMS会话方法。
根据本公开的第十二方面,提供一种计算机存储介质,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的IMS会话方法。
本公开实施例提供的技术方案可以包括以下有益效果:
在本公开实施例中,第一UE向CSCF发送邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话;如此可以使得第一UE可以使用第三方信息(例如第一UE的第一标识信息)安全地接入IMS网络进行IMS会话等。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种IMS会话方法的示意图。
图3是根据一示例性实施例示出的一种IMS会话方法的示意图。
图4是根据一示例性实施例示出的一种IMS会话方法的示意图。
图5是根据一示例性实施例示出的一种IMS会话方法的示意图。
图6是根据一示例性实施例示出的一种IMS会话方法的示意图。
图7是根据一示例性实施例示出的一种IMS会话方法的示意图。
图8是根据一示例性实施例示出的一种IMS会话方法的示意图。
图9是根据一示例性实施例示出的一种IMS会话方法的示意图。
图10是根据一示例性实施例示出的一种IMS会话装置的框图。
图11是根据一示例性实施例示出的一种IMS会话装置的框图。
图12是根据一示例性实施例示出的一种IMS会话装置的框图。
图13是根据一示例性实施例示出的一种IMS会话装置的框图。
图14是根据一示例性实施例示出的一种IMS会话装置的框图。
图15是根据一示例性实施例示出的一种UE的框图。
图16是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为新一代无线接入网(New Generation-Radio Access Network,NG-RAN)。
其中,基站120可以是4G系统中采用的演进型基站(eNB)。或者,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体接入控制(Medium Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通 信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的车对车(vehicle to vehicle,V2V)通信、车对路边设备(vehicle to Infrastructure,V2I)通信和车对人(vehicle to pedestrian,V2P)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
需要说明的是,本公开实施例中涉及到多个执行主体时,当一个执行主体向另一个执行主体发送某一传输时,可以是指一个执行主体直接向另一个执行主体发送传输,也可以是指一个执行主体通过其他任意设备向另一个执行主体发送传输;本公开实施例中并不对此进行限定。
如图2所示,本公开实施例提供一种IMS会话方法,由第一UE执行,包括:
步骤S21:向CSCF发送邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
这里,第一UE及以下涉及的第二UE可以是各种移动终端或固定终端。例如,该第一UE及第二UE分别可以是但不限于是手机、计算机、服务器、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、游戏控制平台或多媒体设备等。
在一个实施例中,第一UE可以是发起IMS会话的UE。这里,第二UE可以为接收IMS会话的UE。
在另一个实施例中,第一UE可以是接收IMS会话的UE。这里,第一UE可以为发起IMS会话的UE。
这里,CSCF及以下涉及的HSS、第三方AAA服务器等均可以是通信网络中灵活部署的逻辑节 点的或者功能等。例如,该CSCF、HSS及第三方AAA服务器均可以为核心网侧的逻辑节点或者功能。又如,该CSCF、HSS均可以是IMS网络中逻辑节点或者功能;该IMS网络为与核心网连接的数据网络。再如,该第三方AAA服务器可以是第三方网络的逻辑节点或者功能。
在一个实施例中,CSCF可以是但不限于是以下至少之一:代理呼叫会话控制功能(Proxy-Call Session Control Function,P-CSCF)、服务呼叫会话控制功能(Serving Call Session Control Function,S-CSCF)、及查询呼叫会话控制功能(Interrogation Call Session Control Function,I-CSCF)。示例性的,CSCF可以是S-CSCF。
在另一个实施例中,CSCF可以是但不限于是第一UE的CSCF或者第二UE的CSCF。示例性的,CSCF可以是第一UE的S-CSCF或者第二UE的S-CSCF。
这里,第一UE的CSCF与第二UE的CSCF可以相同或者不同。示例性的,第一UE所在的IMS网络与第二UE所在的IMS网络相同,则第一UE的CSCF与第二UE的CSCF相同。示例性的,第一UE所在的IMS网络与第二UE所在的IMS网络不同,则第一UE的CSCF与第二UE的CSCF相同,或者第一UE的CSCF与第二UE的CSCF不同。
在一个实施例中,步骤S21:向第一UE的CSCF发送邀请请求
这里,邀请请求用于请求第一UE发起和/或接收IMS会话,可以是:邀请请求,用于请求第一UE发起与任意一个UE的IMS会话,和/或用于请求第一UE接收与任意一个UE的IMS会话。这里任意一个UE是指除第一UE以外的UE。示例性的,邀请请求可用于请求第一UE发起与第二UE的IMS会话,和/或可用于请求第一UE接收第三UE的IMS会话。
在一些实施例中,邀请请求包括:第二UE的第二标识信息;邀请请求用于请求第一UE发起和/或接收与第二UE的IMS会话。
这里,邀请请求用于请求第一UE发起和/或接收与第二UE的IMS会话,可以是:邀请请求用于请求第一UE发起与第二UE的IMS会话,和/或用于请求第一UE接收与第二UE的IMS会话。这里,第一UE发起与第二UE的IMS会话时,第一UE为主叫UE,第二UE为被叫UE。这里,第一UE接收与第二UE的IMS会话时,第一UE为被叫UE,第二UE为主叫UE。
在一些实施例中,邀请请求还包括:时间信息;时间信息用于CSCF确定邀请请求是否被攻击。
本公开实施例提供一种IMS会话方法,由第一UE执行,包括:获取第一UE的第一标识信息和/或第二UE的第二标识信息。
在一些实施例中,第一UE的第一标识信息,由以下但不限于以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,第二UE的第二标识信息,由以下但不限于以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
这里,第一UE的身份标识可以是第一UE对应用户的姓名;第二UE的身份标识可以是第二UE对应用户的姓名。第一UE的职务信息可以是第一UE对应用户的职务信息;第二UE的职务信息可以是第二UE对应用户的职务信息。第一UE关联的组织信息可以是第一UE对应用户关联的组织信息;第二UE关联的组织信息可以是第二UE对应用户关联的组织信息。
示例性的,第一UE可以从第三方AAA服务器或者HSS获取第一UE的第一标识信息和/或第二UE的第二标识信息。如此,在本公开实施例中,第一UE可以直接从第三方AAA服务器或者HSS获取第一UE的第一标识信息和/或第二UE的第二标识信息。
示例性的,第一UE可以从第三AAA服务器或者HSS获取第一UE的第三方信息和/或第二UE的第三方信息;该第一UE的第三方信息可以是但并不限于是第三方组织或网络下第一UE的身份标识、第三方组织或网络下第一UE的职务信息、第三方组织或网络下第一UE关联的组织信息以及第三方组织或网络下第一UE的位置相关信息的其中至少之一;该第二UE的第三方信息可以是但不限于是第三方组织或网络下第二UE的身份标识、第三方组织或网络下第二UE的职务信息、第三方组织或网络下第二UE关联的组织信息以及第三方组织或网络下第二UE的位置相关信息的其中至少之一。第一UE基于第一UE的第三方信息,确定第一UE的第一标识信息;和/或,第一UE基于第二UE的第三方信息,确定第二UE的第二标识信息。如此,在本公开实施例中,第一UE可以从第三AAA服务器或者HSS获取第一UE和/或第二UE的第三方信息,并基于第一UE和/或第二UE的第三方信息,确定第一UE的第一标识信息和/或第二UE的第二标识信息。
在一个实施例中,第三方信息,也即第三方特定用户身份或者第三方可信信息。
在本公开实施例中,第一UE向CSCF发送邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话;如此可以使得第一UE可以使用第三方信息(例如第一UE的第一标识信息)安全地接入IMS网络进行IMS会话等。
并且,若邀请请求包括:第二UE的第二标识信息;邀请请求用于请求第一UE发起和/或接收与第二UE的IMS会话;如此可以使得第一UE和第二UE使用第三方信息(例如第一UE的第一标识信息以及第二UE的第二标识信息)安全地接入IMS网络进行IMS会话等。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种基于IMS会话方法,是由CSCF执行的,与上述由第一UE执行的IMS会话方法的描述是类似的;且,对于由CSCF执行的IMS会话方法实施例中未披露的技术细节,请参照由第一UE执行的IMS会话方法示例的描述,在此不做详细描述说明。
如图3所示,本公开实施例提供一种IMS会话方法,由CSCF执行,包括:
步骤S31:接收邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
在本公开的一些实施例中,CSCF可以是上述实施例中CSCF;邀请请求可以是上述实施例中邀请请求;第一UE的第一标识信息、第二UE的第二标识信息分别可以是第一UE的第一标识信息、第二UE的第二标识信息。
示例性的,CSCF可以是但不限于是S-CSCF。示例性的,CSCF可以是但不限于是第一UE的CSCF或者第二UE的CSCF。
示例性的,邀请请求包括第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
示例性的,第一UE的第一标识信息,由以下但限于以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
示例性的,第二UE的第二标识信息,由以下但不限于至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
在一些实施例中,邀请请求,包括:时间信息;
方法包括:基于时间信息与当前时间,确定邀请请求是否被攻击。
本公开实施例提供一种IMS会话方法,由UE执行,包括:基于时间信息与当前时间,确定邀请请求是否被攻击。
在一个实施例中,基于时间信息与当前时间,确定邀请请求是否被攻击,包括:
若时间信息指示的时间与当前时间之差小于或等于预定时间,确定邀请请求未攻击;或者,
若时间信息指示的时间与当前时间之差大于预定时间,确定邀请请求被攻击。
示例性的,第一UE的CSCF接收UE发送的邀请请求,邀请请求包括第一UE的第一标识信息、第二UE的第二标识信息、以及发送邀请请求的时间信息;第一UE的CSCF确定时间信息指示时间与当前时间的差值是否大于预定时间;若确定该差值大于与预定时间,确定邀请请求被攻击,或者若确定该差值小于或等于预定时间,确定邀请请求未被攻击。
如此,在本公开实施例中,可以通过邀请请求中时间信息确定该邀请请求是否为最近发的邀请请求;从而可以提高确定该邀请请求是否为被攻击的准确性。
以上实施方式,具体可以参见第一UE侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
在一些实施例中,方法包括:获取授权信息;其中,授权信息用于指示以下至少之一:
至少一个第一标识信息对应的UE允许发起和/或接收IMS会话;
至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应UE的IMS会话。
在一些实施例中,CSCF为第一UE的CSCF;
步骤S31中接收邀请请求,包括:接收第一UE发送的邀请请求。
本公开实施例提供一种IMS会话方法,由第一UE的CSCF执行,包括:接收第一UE发送的邀请请求。
如图4所示,本公开实施例提供一种IMS会话方法,由CSCF执行,包括:
步骤S41:获取授权信息;其中,授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收IMS会话,或者,至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应UE的IMS会话。
在一些实施例中,方法包括:向HSS发送第一请求,其中,第一请求包括:第一UE的第一标识信息,或者第一UE的第一标识信息及第二UE的第二标识信息;第一请求用于请求授权信息。
本公开实施例提供一种IMS会话,由CSCF执行,包括:向HSS发送第一请求,其中,第一请求包括:第一UE的第一标识信息,或者第一UE的第一标识信息及第二UE的第二标识信息;第一请求用于请求授权信息。
在一些实施例中,获取授权信息,包括:接收HSS发送的第一响应,其中,第一响应,包括:授权信息。
本公开实施例提供一种IMS会话,由CSCF执行,包括:接收HSS发送的第一响应,其中,第一响应,包括:授权信息。
这里,CSCF可以从HSS获取签约信息,其中,签约信息包括授权信息;或者CSCF可以从HSS中直接获取授权信息。
在一些实施例中,方法包括以下至少之一:
基于授权信息,确定是否允许第一UE发送和/或接收IMS会话;
基于授权信息,确定是否允许第一UE发送和/或接收与第二UE的IMS会话;
基于授权信息,确定第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
基于授权信息,确定第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
本公开实施例提供一种IMS会话方法,由CSCF执行,包括以下至少之一:
基于授权信息,确定是否允许第一UE发送和/或接收IMS会话;
基于授权信息,确定是否允许第一UE发送和/或接收与第二UE的IMS会话;
基于授权信息,确定第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
基于授权信息,确定第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
这里,CSCF若确定邀请请求达到第一标识信息对应的授权信息的要求,确定允许第一UE发送和/或接收IMS会话。或者,CSCF若确定邀请请求未达到第一标识信息对应的授权信息的要求,确定不允许第一发送和/或接收IMS会话。这里,达到第一标识信息对应的授权信息的要求可以是:授权信息中指示第一标识信息对应的用户允许或授权发送和/或接收IMS会话。
这里,CSCF若确定第一标识信息对应的授权信息中包含对第二标识信息的要求,且确定邀请请求达到所述授权信息的要求,则确定允许第一UE发送和/或接收与第二UE的IMS会话。或者,CSCF若确定第一标识信息对应的授权信息中包含对第二标识信息的要求,且确定邀请请求未达到所述授权信息的要求则确定不允许第一UE发送和/或接收与第二UE的IMS会话。这里,第一标识信息对应的授权信中包含对第二标识信息的要求可以是:授权信息中指示第一标识信息对应的用户允许或授权发送和/或接收与第二标识信息对应的用户的IMS会话。
本公开实施例提供一种IMS会话,由CSCF执行,包括:获取至少一个第一标识信息对应的第一UE发起和/或接收IMS会话允许的呼叫时间范围;和/或,获取至少一个第一标识信息对应的第一UE发起和/或接收与至少一个第二标识信息对应的第二UE的IMS会话允许的呼叫时间范围。如此,可以基于当前时间及CSCF获取的这些呼叫时间范围等,确定出第一UE发起和/或接收IMS会话是否在呼叫时间范围内,和/或确定出第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
这里,第一UE的CSCF从第一UE的HSS获取授权信息。第二UE的CSCF从第二UE的HSS获取授权信息。
如此,在本公开实施例中,CSCF可以从HSS获取授权信息,并基于授权信息准确确定出第一UE是否能够使用第三方信息(例如第一标识信息)安全地接入IMS网络进行IMS会话,或者基于授权信息准确确定出第一UE是否能够使用第一标识信息安全地接入IMS网络与使用第三方信息(第二标识信息)的第二UE进行IMS会话。
当然,在其它实施例中,CSCF也可以从通信设备的其它逻辑节点或者功能获取授权结果,例如也可以从第三方AAA服务器获取授权结果。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
在一些实施例中,方法包括:向第三方AAA服务器发送第二请求;其中,第二请求包括第一UE的第一标识信息,且第二请求用于请求是否允许第一UE发起和/或接收IMS会话;或者,第二请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第二请求用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
如图5所示,本公开实施例提供一种IMS会话,由CSCF执行,包括:
步骤S51:向第三方AAA服务器发送第二请求;
其中,第二请求包括第一UE的第一标识信息,且第二请求用于请求是否允许第一UE发起和/ 或接收IMS会话;
或者,第二请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第二请求用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
在一些实施例中,方法包括:接收第三方AAA服务器发送的第二响应;其中,第二响应包括以下至少之一:是否允许第一UE发起和/或接收IMS会话的授权结果;以及是否允许第一UE发起和/或接收与第二UE的IMS会话的授权结果。
本公开实施例提供一种IMS会话方法,由CSCF执行,包括:接收第三方AAA服务器发送的第二响应;其中,第二响应包括以下至少之一:是否允许第一UE发起和/或接收IMS会话的授权结果;以及是否允许第一UE发起和/或接收与第二UE的IMS会话的授权结果。
在一些实施例中,第二响应还包括以下以下至少之一:第一UE发起和/或接收IMS会话是否在呼叫时间范围内的授权结果;以及第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内的授权结果。
本公开实施例提供一种IMS会话方法,由CSCF执行,包括:接收第三方AAA服务器发送的第二响应;其中,第二响应包括以下至少之一:第一UE发起和/或接收IMS会话是否在呼叫时间范围内的授权结果;以及第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内的授权结果。
在一个实施例中,第一UE的CSCF从第一UE的第三方AAA服务器获取第二响应;和/或,第二UE的CSCF从第二UE的第三方AAA服务器获取第二响应。
在一个实施例中,第一UE的第三方AAA服务器与第二UE的第三方AAA服务器相同。这里,第一UE所处的IMS网络与第二UE所处的IMS网络可以相同或者不同。
在另一个实施例中,第一UE的第三方AAA服务器与第二UE的第三方AAA服务器不同。这里,第一UE所处的IMS网路与第二UE所处的IMS网络不同。
如此,在本公开实施例中,CSCF可以向第三方AAA服务器发送第二请求,以准确获取是否允许第一UE发起和/或接收IMS会话的第二响应,或者获取是否允许第一UE发起和/或接收与第二UE的IMS会话的第二响应。且还无需CSCF执行授权检查操作,从而可以减轻CSCF的负担。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
在一些实施例中,CSCF为第一UE的CSCF,
方法包括:向第二UE的CSCF发送邀请请求。
本公开实施例提供一种IMS会话,由第一UE的CSCF执行,包括:向第二UE的CSCF发送邀请请求。
本公开实施例提供一种IMS会话,由第一UE的CSCF执行,包括:基于允许第一UE发起和/或接收与第二UE的IMS会话,向第二UE的CSCF发送邀请请求。如此,有利于第二UE建立与第一UE的IMS会话。
这里,CSCF可以基于授权信息确定是否允许第一UE发起和/或与第二UE的IMS会话,或者,CSCF可以从获取的第二响应中确定是否允许第一UE发起和/或与第二UE的IMS会话。
在一些实施例中,第一UE的CSCF向第二UE的CSCF发送邀请请求之前,包括:对邀请请求进行签名。
本公开实施例提供一种IMS会话方法,由第一UE的CSCF执行,包括:
若确定允许第一UE发起和/或接收与第二UE的IMS会话,对邀请请求进行签名;
发送签名后的邀请请求。
示例性的,第一UE的CSCF从邀请请求的报文头中导出多媒体共用用户身份(IP Multimedia Public Identity,IMPU),该报文头可以是但不限于是PAI格式或者From格式报文头。第一UE的CSCF基于IMPU调用第一UE的安全电话身份认证服务(Secure Telephone Identity Authentication Service,STI-AS)或应用服务器(Application Server,AS)对所述邀请请求进行签名;例如,第一UE的CSCF向STI-AS或者AS发送携带邀请请求的签名请求;STI-AS或者AS基于该签名请求对邀请请求进行签名,并将签名后的邀请请求发送给第一UE的CSCF;该签名后的邀请请求可添加IMPU的身份报文头。这里,若第一UE和第二UE属于同一第三方之间的UE;则根据第三方安全策略,可以跳过签名操作。
如此,第一UE的CSCF可以调用STI-AS对邀请请求进行完整性保护,提高邀请请求的安全性。
在一些实施例中,CSCF为第二UE的CSCF;
步骤S31中接收邀请请求,包括:接收第一UE的CSCF发送的邀请请求。
本公开实施例提供一种IMS会话,由第二UE的CSCF执行,包括:接收第一UE的CSCF发送的邀请请求。
这里,接收第一UE的CSCF发送的邀请请求,包括:接收第一UE的CSCF发送的签名后的邀请请求。
在一些实施例中,CSCF包括:第二UE的CSCF;
方法包括:对签名后的邀请请求进行验证,以验证邀请请求的完整性和合法性。
本公开实施例提供一种IMS会话方法,由第二UE的CSCF执行,包括:对签名后的邀请请求进行验证,以验证邀请请求的合法性和完整性。这里,第二UE的CSCF对签名后的邀请进行验证,若验证成功,可获得验证成功后的邀请请求。
示例性的,第二UE的CSCF接收第一UE的CSCF发送的签名后的邀请请求,并调用安全电话身份验证服务(Secure Telephone Identity Verification Service,STI-VS)或应用服务器(AS)对签名后的邀请请求进行验证,以验证邀请请求的合法性和完整性。例如,第二UE的CSCF向STI-VS或者AS发送验证请求;STI-VS或者AS基于验证请求对签名后的邀请请求进行验证,并将验证通过的邀请请求发送给第二UE的CSCF。这里,若STI-VS或者AS基于验证请求对签名后的邀请请求进行验证且验证失败,则将验证失败的消息发送给第二UE的CSCF。
如此,第二UE的CSCF可以调用STI-VS/AS对签名后的邀请请求进行验证,以使得第二UE的 CSCF可以获得合法的邀请请求。
在一些实施例中,方法包括:基于允许第一UE发起和/或接收与第二UE的IMS会话,向第二UE发送邀请请求。
这里,向第二UE发送邀请请求,可以是:向第二UE发送验证通过后的邀请请求。
以上实施方式,具体可以参见第一UE侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种基于IMS会话方法,是由HSS执行的,与上述由第一UE和/或CSCF执行的IMS会话方法的描述是类似的;且,对于由HSS执行的IMS会话方法实施例中未披露的技术细节,请参照由第一UE和/或CSCF执行的IMS会话方法示例的描述,在此不做详细描述说明。
如图6所示,本公开实施例提供一种IMS会话方法,由HSS执行,包括:
步骤S61:接收CSCF发送的第一请求,其中,第一请求包括第一UE的第一标识信息,第一请求用于请求授权信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收IMS会话。
在本公开的一些实施例中,CSCF可以为上述实施例中CSCF。示例性的,CSCF包括第一UE的CSCF或者第二UE的CSCF。
在本公开的一些实施例中,HSS包括第一UE的HSS和/或第二UE的HSS。若HSS为第一UE的HSS,则第一UE的HSS接收第一UE的CSCF发送的第一请求;若HSS为第二的HSS,则第二UE的HSS接收第二UE的CSCF发送的第一请求。第一UE的HSS为第一UE所处IMS网络的HSS;第二UE的HSS为第二UE所处IMS网络的HSS。第一UE的HSS与第二UE的HSS相同,或者第一UE的HSS与第二UE的HSS不同。
在本公开的一些实施例中,第一请求可以为上述实施例中第一请求;授权信息可以为上述实施例中授权信息;第一UE的第一标识信息及第二UE的第二标识信息分别可以为上述实施例中第一UE的第一标识信息及第二UE的第二标识信息。
示例性的,第一请求包括第一UE的第一标识信息及第二UE的第二标识信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应的IMS会话。
示例性的,第一UE的第一标识信息,由以下但限于以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
示例性的,第二UE的第二标识信息,由以下但不限于至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
示例性的,授权信息还可用于指示:至少一个第一标识信息对应的UE允许发起和/或接收IMS会话。
本公开实施例提供一种IMS会话方法,由HSS执行,包括:向CSCF发送第一响应,其中,第一响应包括授权信息。
在本公开的一些实施例中,第一响应可以为上述实施例中第一响应。
在本公开实施例中,HSS可以通过接收CSCF发送的用于请求授权信息的第一请求,向CSCF直接发送携带授权信息的第一响应,使得CSCF可以基于该授权信息实现对UE使用第三方信息(例如第一UE的第一标识信息和第二UE的第二标识信息)接入IMS网络的授权判断。
以上实施方式,具体可以参见CSCF侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种基于IMS会话方法,是由第三方AAA服务器执行的,与上述由第一UE和/或CSCF执行的IMS会话方法的描述是类似的;且,对于由第三方AAA服务器执行的IMS会话方法实施例中未披露的技术细节,请参照由第一UE和/或CSCF执行的IMS会话方法示例的描述,在此不做详细描述说明。
如图7所示,本公开实施例提供一种IMS会话方法,由第三方AAA服务器执行,包括:
步骤S71:接收CSCF发送的第二请求,其中,第二请求包括第一UE的第一标识信息;其中,第二请求用于请求是否允许第一UE发起和/或接收IMS会话。
在本公开的一些实施例中,CSCF可以为上述实施例中CSCF。示例性的,CSCF包括第一UE的CSCF或者第二UE的CSCF。
在本公开的一些实施例中,第三方AAA服务器包括第一UE的第三方AAA服务器和/或第二UE的第三方AAA服务器。若第三方AAA服务器为第一UE的第三方AAA服务器,则第一UE的第三方AAA服务器接收第一UE的CSCF发送的第二请求;若第三方AAA服务器为第二UE的第三方AAA服务器,则第二UE的第三方AAA服务器接收第二UE的CSCF发送的第二请求。
在本公开的一些实施例中,第二请求可以为上述实施例中第二请求;第一UE的第一标识信息和第二UE的第二标识信息,分别可以为上述实施例中第一UE的第一标识信息和第二UE的第二标识信息。
示例性的,第二请求还包括第二UE的第二标识信息;第二请求还用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
示例性的,第一UE的第一标识信息,由以下但限于以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
示例性的,第二UE的第二标识信息,由以下但不限于至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
本公开实施例提供一种IMS会话方法,由第三方AAA服务器执行,包括:获取授权信息;和/或存储授权信息。这里,第三方AAA服务器也可以从HSS等逻辑节点或者功能中获取授权信息。
本公开实施例提供一种IMS会话方法,由第三方AAA服务器执行,包括:基于第二请求及授权信息,确定以下至少之一的授权结果:
是否允许第一UE发送和/或接收IMS会话;
是否允许第一UE发送和/或接收与第二UE的IMS会话;
第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
本公开实施例提供一种IMS会话方法,由第三方AAA服务器执行,包括:向CSCF发送第二响应,其中,第二响应包括:授权结果。
如此,在本公开实施例中,第三方AAA服务器可以接收到CSCF发送第二请求后,基于第二请求及授权信息对UE使用第三方信息(例如第一UE的第一标识信息及第二UE的第二标识信息)接入IMS网络的授权判断,并将该授权判断的授权结果发送给CSCF。如此可以使得CSCF准确知晓第一UE和第二UE使用第三方信息接入IMS网络的授权结果,且由于无需CSCF进行该授权判断的操作,从而也能够降低CSCF的功耗等。
以上实施方式,具体可以参见CSCF侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种基于IMS会话方法,是由第二UE执行的,与上述由第一UE和/或CSCF和/或HSS和/或第三方AAA服务器执行的IMS会话方法的描述是类似的;且,对于由第二UE执行的IMS会话方法实施例中未披露的技术细节,请参照由第一UE和/或CSCF和/或HSS和/或第三方AAA服务器执行的IMS会话方法示例的描述,在此不做详细描述说明。
如图8所示,本公开实施例提供一种IMS会话方法,由第二UE执行,包括:
步骤S81:接收第二UE的CSCF发送的邀请请求,其中,邀请请求包括第一UE的第一标识信 息及第二UE的第二标识信息;
步骤S82:基于邀请请求,建立与第一UE的IMS会话。
在本公开的一些实施例中,邀请请求可以为上述实施例中邀请请求;第一UE的第一标识信息和第二UE的第二标识信息可以为上述实施例中第一UE的第一标识信息及第二UE的第二标识信息。
示例性的,邀请请求包括第一UE的第一标识信息及第二UE的第二标识信息,且邀请请求用于用于请求第一UE发起和/或接收与第二UE的IMS会话。
示例性的,邀请请求包括第一UE的第一标识信息,且邀请请求用于请求第一UE发起和/或接收IMS会话
示例性的,第一UE的第一标识信息,由以下但不限于以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
示例性的,第二UE的第二标识信息,由以下但不限于以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
以上实施方式,具体可以参见第一UE和/或CSCF和/或HSS和/或第三方AAA服务器侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
为了进一步解释本公开任意实施例,以下提供一个具体实施例。
如图9所示,本公开实施例提供一种IMS会话方法,由通信设备执行,通信设备包括第一UE、第一UE的S-CSCF、STI-AS或AS、HSS、第三方AAA服务器、STI-VS或AS、第二UE的S-CSCF及第二UE;在本公开实施例中,假设第一UE和/或第二UE可以获得第三方特定用户身份,且该第一UE和/或第二UE已经隐式注册或者独立注册到IMS会话;第三方特定用户身份可以由第三方AAA服务器或者由(IMS)HSS基于来自第三方信息来提供;第三方特定用户身份可以是但不限于是第三方组织或网络下的身份标识、第三方组织或网络下的职务信息、第三方组织或网络下的关联的组织信息以及第三方组织或网络下的位置相关信息的其中至少之一。这里,第三方网络可以通过5G网络功能连接到IMS网络;可以通过网络开放功能(Network Exposure Function,NEF)在第三方AAA服务器和CSCF之间转发消息。IMS会话方法包括以下步骤:
步骤S901:第一UE向第一UE的S-CSCF发送邀请请求;
在一个可选实施例中,邀请请求包括第一UE的第一标识信息,且邀请请求用于请求第一UE发起和/或接收IMS会话。
在另一个可选实施例中,邀请请求包括第一UE的第一标识信息及第二UE的第二标识信息,且邀请请求用于请求第一UE发起和/或接收与第二UE的IMS会话。
这里,第一UE的第一标识信息可以由第一UE的第三方特定用户身份确定;和/或第二UE的第一标识信息可以由第二UE的第三方特定用户身份确定。
步骤S902:第一UE的S-CSCF接收到邀请请求后,确定邀请请求是否被攻击;
在一个可选实施例中,第一UE的S-CSCF接收到邀请请求后,基于邀请请求中包括的时间信息及当前时间,确定邀请请求是否被攻击;若时间信息指示的时间与当前时间的差值小于或等于预定时间,确定邀请请求未被攻击;若时间信息指示的时间与当前时间的差值大于预定时间,确定邀请邀请请求被攻击。示例性的,时间信息为时间戳。这里,若邀请请求未被攻击,第一UE的S-CSCF检查第一UE是否被授权发起IMS会话;该授权发起IMS会话,即允许发起IMS会话。
该S902还包括步骤S902a或者步骤S902b;其中,
步骤S902a:第一UE的S-CSCF从HSS获取授权信息并检查授权;
在一个可选实施例中,第一UE的S-CSCF向HSS发送第一请求,其中,第一请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第一请求用于请求授权信息;第一UE的S-CSCF接收HSS发送的第一响应,其中,第一响应包括授权信息;授权信息至少指示:至少一个第一标识信息对应的UE允许发起与至少一个第二标识信息对应的UE的IMS会话。第一UE的S-CSCF基于该授权信息、第一UE的第一标识信息及第二UE的第二标识信息,确定是否允许第一UE发起与第二UE的IMS会话。
在另一个可选实施例中,第一UE的S-CSCF可基于授权信息,确定第一UE发起与第二UE的IMS会话是否在呼叫时间范围内。
步骤S902b:第一UE的S-CSCF从第三方AAA服务器获取授权结果;
在一个可选实施例中,第一UE的S-CSCF向第三方AAA服务器发送第二请求,其中,第二请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第二请求用于请求是否允许第一UE发起与第二UE的IMS会话;第三方AAA服务器基于授权信息确定出是否允许第一UE发起与第二UE的IMS会话,并向第一UE的S-CSCF发送第二响应,其中,第二响应包括是否允许第一UE发起与第二UE的IMS会话的授权结果。
在又一个可选实施例中,第一UE的S-CSCF向第三方AAA服务器发送的第二请求中还包括时间信息;第三方AAA服务器基于第二请求及当前时间,确定第一UE发起与第二UE的IMS会话是否在呼叫时间范围内,并将第一UE发起与第二UE的IMS会话是否在呼叫时间范围内的授权结果发送给第一UE的S-CSCF。
这里,第二请求也可以是携带邀请请求的第二请求;该邀请请求在S-CSCF中发送,还可涉及到P-CSCF和/或I-CSCF;由于P-CSCF和/或I-CSCF用于路由和转发,在此相关步骤将被忽略。
步骤S903:第一UE的S-CSCF调用STI-AS或AS对邀请请求签名;
在一个可选实施例中,第一UE的S-CSCF从邀请请求的报头文中获取IMPU,该报文头可以是PAI或者From报文头;第一UE的S-CSCF基于IMPU向STI-AS或AS发送签名请求,该签名请求用于请求对邀请请求进行签名;
步骤S904:STI-AS或AS对邀请请求进行签名并将签名后的邀请请求发送给第一UE的S-CSCF;
在一个可选实施例中,STI-AS或AS基于5G认证信息对邀请请求进行签名,并对该邀请请求添加身份报文头;并将签名后的邀请请求发送给第一UE的S-CSCF。
这里,若第一UE和第二UE属于同一第三方下的UE,则基于运营商策略,上述步骤S903及步骤S904可以被跳过。
步骤S905:第一UE的S-CSCF将签名后的邀请请求发送给第二UE的S-CSCF;
步骤S906:第二UE的S-CSCF调用STI-VS或AS对签名后的邀请请求进行验证;
在一个可选实施例中,第二UE的S-CSCF向STI-VS或AS发送验证请求,该验证请求用于请求对签名后的邀请请求进行验证。
步骤S907:STI-VS或AS对签名后的邀请请求进行验证并将验证通过的邀请请求发送给第二UE的S-CSCF;
在一个可选实施例中,STI-VS或AS基于5G认证信息对签名后的邀请请求进行验证,并获得验证通过后的邀请请求;STI-VS或AS将验证通过后的邀请请求发送给第二UE的S-CSCF。
步骤S908:第二UE的S-CSCF若确定验证通过,检查第二UE是否被授权接收第一UE的IMS会话;
步骤S908还包括S908a或者S908b;其中,
步骤S908a:第二UE的S-CSCF从HSS获取授权信息并检测授权;
在一个可选实施例中,第二UE的S-CSCF向HSS发送第一请求,其中,第一请求包括第一UE的第一标识信息及第二UE的标识信息,且第一请求用于请求授权信息;第二UE的S-CSCF接收HSS发送的第一响应,其中,第一响应包括授权信息;授权信息至少指示:至少一个第一标识信息对应的UE允许发起与至少一个第二标识信息对应的UE的IMS会话。第二UE的S-CSCF基于该授权信息、第一UE的第一标识信息及第二UE的第二标识信息,确定是否允许第二UE接收与第一UE的IMS会话。
在另一可选实施例中,第二UE的S-CSCF可基于授权信息,确定第二UE接收的第一UE的IMS会话是否在呼叫时间范围内。
步骤S908b:第二UE的S-CSCF从第三方AAA服务器获取授权结果;
在一个可选实施例中,第二UE的S-CSCF向第三方AAA服务器发送第二请求,其中,第二请求包括第一UE的标识信息及第二UE的第二标识信息,且第二请求用于请求是否允许第二UE接收第一UE的IMS会话;第三方AAA服务器基于授权信息确定出是否允许第二UE接收第一UE的IMS会话,并向第二UE的S-CSCF发送第二响应,其中,第二响应包括是否允许第二UE接收第一UE 的IMS会话的授权结果。
在另一个可选实施例中,第二UE的S-CSCF向第三方AAA服务器发送第二请求中还包括时间信息;第三方AAA服务器基于第二请求及当前时间,确定第二UE接收的第一UE的IMS会话是否在呼叫时间范围内,并将第二UE接收第一UE的IMS会话是否在呼叫时间范围内的授权结果发送给第二UE的S-CSCF。
步骤S909:第二UE的S-CSCF若确定允许第二UE接收第一UE的IMS会话,向第二UE发送邀请请求;
这里,允许第二UE接收第一UE的IMS会话,即授权第二UE接收第一UE的IMS会话。
这里,第二UE的S-CSCF若接收到STI-VS或者AS发送的邀请请求认证失败的消息,可向第二UE发送邀请请求验证失败的消息。
步骤S910:第二UE基于邀请请求,建立与第一UE的IMS会话。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图10所示,本公开实施例提供一种IMS会话装置,包括:
第一发送模块21,被配置为向CSCF发送邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
本公开实施例提供的IMS会话装置,可应用于第一UE中。
在一些实施例中,第一UE的第一标识信息,由以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
本公开实施例提供一种IMS会话装置,包括:第一发送模块21,被配置为向CSCF发送邀请请求,邀请请求包括第一UE的第一标识信息和第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二UE的第二标识信息,由以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
本公开实施例提供一种IMS会话装置,包括:第一接收模块,被配置为获取第一UE的第一标 识信息和/或第二UE的第二标识信息。
本公开实施例提供一种IMS会话装置,包括:
第一接收模块,被配置为获取第一UE的第三方特定用户身份和/或第二UE的第三方特定用户身份;
第一处理模块,被配置为基于第一UE的第三方特定用户身份确定第一UE的第一标识信息,和/或基于第二UE的第三方特定用户身份确定第二UE的第二标识信息。
在一些实施例中,第一UE的第三方特定用户身份可以是第三方组织或网络下第一UE的身份标识、第三方组织或网络下第一UE的职务信息、第三方组织或网络下第一UE关联的组织信息以及第三方组织或网络下第一UE的位置相关信息的其中至少之一。
在一些实施例中,第二UE的第三方特定用户身份可以是第三方组织或网络下第二UE的身份标识、第三方组织或网络下第二UE的职务信息、第三方组织或网络下第二UE关联的组织信息以及第三方组织或网络下第二UE的位置相关信息的其中至少之一。
如图11所示,本公开实施例提供一种IMS会话装置,包括:
第二接收模块31,被配置为接收邀请请求,其中,邀请请求包括第一UE的第一标识信息;邀请请求用于请求第一UE发起和/或接收IMS会话。
本公开实施例提供的IMS会话装置,可由CSCF执行。
在一些实施例中,CSCF包括第一UE的CSCF或者第二UE的CSCF。
在一些实施例中,第一UE的第一标识信息,由以下至少之一确定:
第三方组织或网络下第一UE的身份标识;
第三方组织或网络下第一UE的职务信息;
第三方组织或网络下第一UE关联的组织信息;
以及第三方组织或网络下第一UE的位置相关信息。
在一些实施例中,邀请请求包括第二UE的第二标识信息;邀请请求,用于请求第一UE发起和/或接收与第二UE的IMS会话。
在一些实施例中,第二UE的第二标识信息,由以下至少之一确定:
第三方组织或网络下第二UE的身份标识;
第三方组织或网络下第二UE的职务信息;
第三方组织或网络下第二UE关联的组织信息;
以及第三方组织或网络下第二UE的位置相关信息。
在一些实施例中,邀请请求,包括:时间信息;
装置包括:第二处理模块,被配置为基于时间信息与当前时间,确定邀请请求是否被攻击。
本公开提供一种IMS会话装置,包括:第二处理模块,被配置为基于时间信息与当前时间,确定邀请请求是否被攻击。
本公开提供一种IMS会话装置,包括:第二接收模块31,被配置为获取授权信息;其中,授权 信息用于指示以下至少之一:
至少一个第一标识信息对应的UE允许发起和/或接收IMS会话;
至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应UE的IMS会话。
本公开提供一种IMS会话装置,包括:第二处理模块,被配置为以下至少之一:
基于授权信息,确定是否允许第一UE发送和/或接收IMS会话;
基于授权信息,确定是否允许第一UE发送和/或接收与第二UE的IMS会话;
基于授权信息,确定第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
基于授权信息,确定第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
本公开提供一种IMS会话装置,包括:第二发送模块,被配置为向HSS发送第一请求,其中,第一请求包括:第一UE的第一标识信息,或者第一UE的第一标识信息及第二UE的第二标识信息;第一请求用于请求授权信息。
本公开提供一种IMS会话装置,包括:第二接收模块31,被配置为接收HSS发送的第一响应,其中,第一响应,包括:授权信息。
本公开提供一种IMS会话装置,包括:第二发送模块,被配置为向第三方认证授权计费AAA服务器发送第二请求;其中,第二请求包括第一UE的第一标识信息,且第二请求用于请求是否允许第一UE发起和/或接收IMS会话;或者,第二发送模块,被配置为第二请求包括第一UE的第一标识信息及第二UE的第二标识信息,且第二请求用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
本公开提供一种IMS会话装置,包括:第二接收模块31,被配置为接收第三方AAA服务器发送的第二响应,其中,第二响应包括以下至少之一:是否允许第一UE发起和/或接收IMS会话的授权结果;以及是否允许第一UE发起和/或接收与第二UE的IMS会话的授权结果。
在一些实施例中,第二响应还包括以下以下至少之一:
第一UE发起和/或接收IMS会话是否在呼叫时间范围内的授权结果;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内的授权结果。
在一些实施例中,CSCF为第一UE的CSCF;
第二接收模块31,被配置为接收第一UE发送的邀请请求。
本公开提供一种IMS会话装置,应用于第一UE的CSCF中,包括:第二接收模块31,被配置为接收第一UE发送的邀请请求。
在一些实施例中,CSCF为第二UE的CSCF;
第二接收模块,被配置为接收第一UE的CSCF发送的邀请请求。
本公开提供一种IMS会话装置,应用于第二UE的CSCF中,包括:第二接收模块31,被配置为接收第一UE的CSCF发送的邀请请求。
本公开提供一种IMS会话装置,应用于第二UE的CSCF中,包括:第二发送模块,被配置为基 于允许第一UE发起和/或接收与第二UE的IMS会话,向第二UE发送邀请请求。
如图12所示,本公开实施例提供一种IMS会话装置,包括:
第三接收模块41,被配置为接收发送的第一请求,其中,第一请求包括第一UE的第一标识信息,第一请求用于请求授权信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收IMS会话。
本公开实施例提供的IMS会话装置,可应用于HSS中。
在一些实施例中,HSS包括第一UE的HSS或者第二UE的HSS。
在一些实施例中,第一请求包括第一UE的第一标识信息及第二UE的第二标识信息;授权信息用于指示:至少一个第一标识信息对应的UE允许发起和/或接收与至少一个第二标识信息对应的IMS会话。
本公开实施例提供一种IMS会话装置,包括:第三发送模块,被配置为向CSCF发送第一响应,其中,第一响应包括授权信息。
如图13所示,本公开实施例提供一种IMS会话装置,包括:
第四接收模块51,被配置为接收CSCF发送的第二请求,其中,第二请求包括第一UE的第一标识信息;其中,第二请求用于请求是否允许第一UE发起和/或接收IMS会话。
本公开实施例提供的IMS会话装置,可应用于第三方AAA服务器中。
在一些实施例中,第三方AAA服务器包括第一UE的第三方AAA服务器或者第二UE的第三方AAA服务器。
在一些实施例中,第二请求还包括第二UE的第二标识信息;第二请求还用于请求第一UE是否允许发起和/或接收与第二UE的IMS会话。
公开实施例提供一种IMS会话装置,包括:第三处理模块,被配置为基于第二请求及授权信息,确定以下至少之一的授权结果:
是否允许第一UE发送和/或接收IMS会话;
是否允许第一UE发送和/或接收与第二UE的IMS会话;
第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
第一UE发起和/或接收与第二UE的IMS会话是否在呼叫时间范围内。
本公开实施例提供一种IMS会话装置,包括:第四发送模块,被配置为向CSCF发送第二响应,其中,第二响应包括:授权结果。
如图14所示,本公开实施例提供一种IMS会话装置,包括:
第五接收模块61,被配置为接收第二UE的CSCF发送的邀请请求,其中,邀请请求包括第一UE的第一标识信息及第二UE的第二标识信息;
第四处理模块62,被配置为基于邀请请求,建立与第一UE的IMS会话。
本公开实施例提供的IMS会话装置可应用于第二UE中。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的装置,可以被单独执行,也可 以与本公开实施例中一些装置或相关技术中的一些装置一起被执行。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
本公开实施例提供一种通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现本公开任意实施例的IMS会话方法。
在一个实施例中,通信设备可以包括但不限于至少之一:第一UE、第二UE、CSCF、HSS及第三方AAA服务器。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在用户设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图2至图9示的方法的至少其中之一。
本公开实施例还提供一种计算机存储介质,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的IMS会话方法。例如,如图2至图9所示的方法的至少其中之一。
关于上述实施例中的装置或者存储介质,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图15是根据一示例性实施例示出的一种用户设备800的框图。例如,用户设备800可以是移动电话,计算机,数字广播用户设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图15,用户设备800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制用户设备800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在用户设备800的操作。这些数据的示例包括用于在用户设备800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM), 可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为用户设备800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为用户设备800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述用户设备800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当用户设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当用户设备800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为用户设备800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如所述组件为用户设备800的显示器和小键盘,传感器组件814还可以检测用户设备800或用户设备800一个组件的位置改变,用户与用户设备800接触的存在或不存在,用户设备800方位或加速/减速和用户设备800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于用户设备800和其他设备之间有线或无线方式的通信。用户设备800可以接入基于通信标准的无线网络,如WiFi,4G或5G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,用户设备800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由用户设备800的处理器820执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图16所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图16,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (34)

  1. 一种IMS会话方法,其中,由第一UE执行,包括:
    向呼叫会话控制功能CSCF发送邀请请求,其中,所述邀请请求包括第一UE的第一标识信息;所述邀请请求用于请求所述第一UE发起和/或接收IMS会话。
  2. 根据权利要求1所述的方法,其中,所述第一UE的第一标识信息,由以下至少之一确定:
    第三方组织或网络下第一UE的身份标识;
    第三方组织或网络下第一UE的职务信息;
    第三方组织或网络下第一UE关联的组织信息;
    以及第三方组织或网络下第一UE的位置相关信息。
  3. 根据权利要求1或2所述的方法,其中,所述邀请请求包括:第二UE的第二标识信息;
    所述邀请请求,用于请求所述第一UE发起和/或接收与所述第二UE的IMS会话。
  4. 根据权利要求3所述的方法,其中,所述第二UE的第二标识信息,由以下至少之一确定:
    第三方组织或网络下第二UE的身份标识;
    第三方组织或网络下第二UE的职务信息;
    第三方组织或网络下第二UE关联的组织信息;
    以及第三方组织或网络下第二UE的位置相关信息。
  5. 一种IMS会话方法,其中,由呼叫会话控制功能CSCF执行,包括:
    接收邀请请求,其中,所述邀请请求包括第一UE的第一标识信息;所述邀请请求用于请求所述第一UE发起和/或接收IMS会话。
  6. 根据权利要求5所述的方法,其中,所述第一UE的第一标识信息,由以下至少之一确定:
    第三方组织或网络下第一UE的身份标识;
    第三方组织或网络下第一UE的职务信息;
    第三方组织或网络下第一UE关联的组织信息;
    以及第三方组织或网络下第一UE的位置相关信息。
  7. 根据权利要求5所述的方法,其中,所述邀请请求包括第二UE的第二标识信息;
    所述邀请请求,用于请求所述第一UE发起和/或接收与所述第二UE的IMS会话。
  8. 根据权利要求7所述的方法,其中,所述第二UE的第二标识信息,由以下至少之一确定:
    第三方组织或网络下第二UE的身份标识;
    第三方组织或网络下第二UE的职务信息;
    第三方组织或网络下第二UE关联的组织信息;
    以及第三方组织或网络下第二UE的位置相关信息。
  9. 根据权利要求5所述的方法,其中,所述邀请请求,包括:时间信息;
    所述方法包括:基于所述时间信息与当前时间,确定所述邀请请求是否被攻击。
  10. 根据权利要求5至9任一项所述的方法,其中,所述方法包括:
    获取授权信息;其中,所述授权信息用于指示以下至少之一:
    至少一个所述第一标识信息对应的UE允许发起和/或接收IMS会话;
    至少一个所述第一标识信息对应的UE允许发起和/或接收与至少一个所述第二标识信息对应UE的IMS会话。
  11. 根据权利要求10所述的方法,其中,所述方法包括以下至少之一:
    基于所述授权信息,确定是否允许所述第一UE发送和/或接收IMS会话;
    基于所述授权信息,确定是否允许所述第一UE发送和/或接收与所述第二UE的IMS会话;
    基于所述授权信息,确定所述第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
    基于所述授权信息,确定所述第一UE发起和/或接收与所述第二UE的IMS会话是否在呼叫时间范围内。
  12. 根据权利要求10所述的方法,其中,所述方法包括:
    向归属用户服务器HSS发送第一请求,其中,所述第一请求包括:所述第一UE的第一标识信息,或者所述第一UE的第一标识信息及所述第二UE的第二标识信息;所述第一请求用于请求所述授权信息。
  13. 根据权利要求12所述的方法,其中,所述获取授权信息,包括:
    接收所述HSS发送的第一响应,其中,所述第一响应,包括:所述授权信息。
  14. 根据权利要求5至9任一项所述的方法,其中,所述方法包括:
    向第三方认证授权计费AAA服务器发送第二请求;
    其中,所述第二请求包括所述第一UE的第一标识信息,且所述第二请求用于请求是否允许所述第一UE发起和/或接收IMS会话;
    或者,
    所述第二请求包括所述第一UE的第一标识信息及所述第二UE的第二标识信息,且所述第二请求用于请求所述第一UE是否允许发起和/或接收与所述第二UE的IMS会话。
  15. 根据权利要求14所述的方法,其中,所述方法包括:
    接收所述第三方AAA服务器发送的第二响应,其中,所述第二响应包括以下至少之一:
    是否允许所述第一UE发起和/或接收IMS会话的授权结果;
    是否允许所述第一UE发起和/或接收与所述第二UE的IMS会话的授权结果。
  16. 根据权利要求15所述的方法,其中,所述第二响应还包括以下以下至少之一:
    所述第一UE发起和/或接收IMS会话是否在呼叫时间范围内的授权结果;
    所述第一UE发起和/或接收与所述第二UE的IMS会话是否在呼叫时间范围内的授权结果。
  17. 根据权利要求5所述的方法,其中,所述CSCF为所述第一UE的CSCF;
    所述接收邀请请求,包括:接收所述第一UE发送的所述邀请请求。
  18. 根据权利要求5所述的方法,其中,所述CSCF为所述第二UE的CSCF;
    所述接收邀请请求,包括:接收所述第一UE的CSCF发送的所述邀请请求。
  19. 根据权利要求18所述的方法,其中,所述方法包括:
    基于允许所述第一UE发起和/或接收与所述第二UE的IMS会话,向所述第二UE发送所述邀请请求。
  20. 一种IMS会话方法,由归属用户服务器HSS执行,包括:
    接收呼叫会话控制功能CSCF发送的第一请求,其中,第一请求包括所述第一UE的第一标识信息,所述第一请求用于请求授权信息;所述授权信息用于指示:至少一个所述第一标识信息对应的UE允许发起和/或接收IMS会话。
  21. 根据权利要求20所述的方法,其中,所述第一请求包括所述第一UE的第一标识信息及所述第二UE的第二标识信息;所述授权信息用于指示:至少一个所述第一标识信息对应的UE允许发起和/或接收与至少一个所述第二标识信息对应的IMS会话。
  22. 根据权利要求20或者21所述的方法,其中,所述方法包括:
    向所述CSCF发送第一响应,其中,所述第一响应包括所述授权信息。
  23. 一种IMS会话方法,其中,由第三方认证授权计费AAA服务器执行,包括:
    接收呼叫会话控制功能CSCF发送的第二请求,其中,所述第二请求包括所述第一UE的第一标识信息;其中,所述第二请求用于请求是否允许第一UE发起和/或接收IMS会话。
  24. 根据权利要求23所述的方法,其中,所述第二请求还包括所述第二UE的第二标识信息;所述第二请求还用于请求所述第一UE是否允许发起和/或接收与所述第二UE的IMS会话。
  25. 根据权利要求23或24所述的方法,其中,所述方法包括:
    基于所述第二请求及所述授权信息,确定以下至少之一的授权结果:
    是否允许所述第一UE发送和/或接收IMS会话;
    是否允许所述第一UE发送和/或接收与所述第二UE的IMS会话;
    所述第一UE发起和/或接收IMS会话是否在呼叫时间范围内;
    所述第一UE发起和/或接收与所述第二UE的IMS会话是否在呼叫时间范围内。
  26. 根据权利要求25所述的方法,其中,所述方法包括:
    向所述CSCF发送所述第二响应,其中,所述第二响应包括:所述授权结果。
  27. 一种IMS会话方法,其中,由第二UE执行,包括:
    接收所述第二UE的CSCF发送的邀请请求,其中,所述邀请请求包括所述第一UE的第一标识信息及所述第二UE的第二标识信息;
    基于所述邀请请求,建立与所述第一UE的IMS会话。
  28. 一种IMS会话装置,其中,包括:
    第一发送模块,被配置为向呼叫会话控制功能CSCF发送邀请请求,其中,所述邀请请求包括第一UE的第一标识信息;所述邀请请求用于请求所述第一UE发起和/或接收IMS会话。
  29. 一种IMS会话装置,其中,包括:
    第二接收模块,被配置为接收邀请请求,其中,所述邀请请求包括第一UE的第一标识信息; 所述邀请请求用于请求所述第一UE发起和/或接收IMS会话。
  30. 一种IMS会话装置,其中,包括:
    第三接收模块,被配置为接收呼叫会话控制功能CSCF发送的第一请求,其中,第一请求包括所述第一UE的第一标识信息,所述第一请求用于请求授权信息;所述授权信息用于指示:至少一个所述第一标识信息对应的UE允许发起和/或接收IMS会话。
  31. 一种IMS会话装置,其中,包括:
    第四接收模块,被配置为接收呼叫会话控制功能CSCF发送的第二请求,其中,所述第二请求包括所述第一UE的第一标识信息;其中,所述第二请求用于请求是否允许第一UE发起和/或接收IMS会话。
  32. 一种IMS会话装置,其中,包括:
    第五接收模块,被配置为接收所述第二UE的CSCF发送的邀请请求,其中,所述邀请请求包括所述第一UE的第一标识信息及所述第二UE的第二标识信息
    第四处理模块,配置为基于所述邀请请求,建立与所述第一UE的IMS会话。
  33. 一种通信设备,其中,所述通信设备,包括:
    处理器;
    用于存储所述处理器可执行指令的存储器;
    其中,所述处理器被配置为:用于运行所述可执行指令时,实现权利要求1至4、或者权利要求5至19、权利要求20至22、或者权利要求23至26、或者权利要求27任一项所述的IMS会话方法。
  34. 一种计算机存储介质,其中,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现权利要求1至4、或者权利要求5至19、权利要求20至22、或者权利要求23至26、或者权利要求27任一项所述的IMS会话方法。
PCT/CN2022/101656 2022-06-27 2022-06-27 Ims会话方法、装置、通信设备及存储介质 WO2024000115A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280002391.3A CN117643043A (zh) 2022-06-27 2022-06-27 Ims会话方法、装置、通信设备及存储介质
PCT/CN2022/101656 WO2024000115A1 (zh) 2022-06-27 2022-06-27 Ims会话方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/101656 WO2024000115A1 (zh) 2022-06-27 2022-06-27 Ims会话方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024000115A1 true WO2024000115A1 (zh) 2024-01-04

Family

ID=89383629

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/101656 WO2024000115A1 (zh) 2022-06-27 2022-06-27 Ims会话方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN117643043A (zh)
WO (1) WO2024000115A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426887A (zh) * 2013-09-04 2015-03-18 华为技术有限公司 业务权限确定方法和装置
CN108886520A (zh) * 2016-01-25 2018-11-23 黑莓有限公司 建立会话发起协议会话
CN114365466A (zh) * 2019-09-05 2022-04-15 瑞典爱立信有限公司 通过不同5gc切片上的多个ims pdu会话支持ims路由
EP3985945A1 (en) * 2020-10-15 2022-04-20 T-Mobile USA, Inc. Enhanced n17 interface between ims network and 5g-eir

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426887A (zh) * 2013-09-04 2015-03-18 华为技术有限公司 业务权限确定方法和装置
CN108886520A (zh) * 2016-01-25 2018-11-23 黑莓有限公司 建立会话发起协议会话
CN114365466A (zh) * 2019-09-05 2022-04-15 瑞典爱立信有限公司 通过不同5gc切片上的多个ims pdu会话支持ims路由
EP3985945A1 (en) * 2020-10-15 2022-04-20 T-Mobile USA, Inc. Enhanced n17 interface between ims network and 5g-eir

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on enhancements to Web Real Time Communication (WebRTC) access to IP Multimedia Subsystem (IMS); Stage 2; (Release 13)", 3GPP STANDARD; 3GPP TR 23.706, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. V0.3.0, 5 May 2015 (2015-05-05), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 65, XP050966443 *

Also Published As

Publication number Publication date
CN117643043A (zh) 2024-03-01

Similar Documents

Publication Publication Date Title
WO2024000115A1 (zh) Ims会话方法、装置、通信设备及存储介质
WO2023184561A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2024000121A1 (zh) Ims会话方法、装置、通信设备及存储介质
WO2024021137A1 (zh) Api调用者认证方法以及装置、通信设备及存储介质
WO2024031399A1 (zh) Ue加入pin的方法及装置、通信设备及存储介质
WO2024021142A1 (zh) 应用程序接口api认证方法、装置、通信设备及存储介质
WO2023230924A1 (zh) 认证方法、装置、通信设备和存储介质
WO2024031565A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2024092801A1 (zh) 认证方法、装置、通信设备及存储介质
WO2023216276A1 (zh) 认证方法、装置、通信设备及存储介质
WO2024031391A1 (zh) 测距或侧行链路定位方法、装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质
WO2023216275A1 (zh) 认证方法、装置、通信设备及存储介质
WO2024055329A1 (zh) 邻近服务ProSe的无线通信方法、装置、通信设备及存储介质
WO2024016349A1 (zh) 提供感知服务的方法、装置、通信设备及存储介质
WO2023240657A1 (zh) 认证与授权方法、装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2023142090A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2023184172A1 (zh) 创建pin的方法、装置、通信设备及存储介质
WO2023070685A1 (zh) 中继通信的方法、装置、通信设备及存储介质
WO2023240659A1 (zh) 认证方法、装置、通信设备和存储介质
WO2024050736A1 (zh) 通信方法、装置、系统、电子设备及介质
WO2023184105A1 (zh) 获取终端位置的方法、装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2023240661A1 (zh) 认证与授权方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280002391.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22948239

Country of ref document: EP

Kind code of ref document: A1