Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for P-CSCF to identify forbidden calling subscriber

A P-CSCF, calling user technology, which is applied in the field of proxy call session control function entity identification and prohibition of calling users, can solve the problems of refusal to logout, unable to prohibit calls, unable to identify the public identity of barred, etc.

Inactive Publication Date: 2011-06-22
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0036] 1. After the initial registration is successful through P-CSCF, I-CSCF, S-CSCF, and HSS, if the barred user immediately initiates a logout, since the P-CSCF cannot obtain the barred public identity information, the P-CSCF checks that the user data does not exist , will deny the user's logout
[0037] 2. The originating user uses the barred public identity to initiate a session. Because the P-CSCF cannot recognize the barred public identity in the existing mechanism, when the user initiates a session, the P-CSCF judges that the user’s public identity carried in the session message does not exist. , the P-CSCF will modify the session request (replacing the original public identity with a registered default user public identity), and route the session to the S-CSCF, which causes the user to initiate a call with the barred public identity and can also pass the P- The CSCF routes to the S-CSCF, and the S-CSCF also believes that the call is legal, so the IMS system cannot barred the call of the barred user's public identity
[0038] 3. The HSS modifies the user's public identity to barred, sends a notification to inform the S-CSCF, and the S-CSCF sends a subscription notification to the P-CSCF. The message will only carry a non-barred public identity, and the P-CSCF will not be able to perceive the user's change to bar red

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for P-CSCF to identify forbidden calling subscriber
  • Method and system for P-CSCF to identify forbidden calling subscriber
  • Method and system for P-CSCF to identify forbidden calling subscriber

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0063] In related technologies, the P-CSCF cannot accurately perceive whether the user information is barred, and the S-CSCF needs to inform the P-CSCF through various mechanisms. However, in the embodiment of the present invention, the S-CSCF carries additional indications in the successful registration response Bring the information to the P-CSCF to inform the barred user information. After receiving the barred user information, the P-CSCF saves it locally; after the registration is successful, the P-CSCF then subscribes the user. When the subsequent user information is modified after the PPR occurs in the HSS When the user is barred, the S-CSCF constructs a subscr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a P-CSCF calling forbidden user identifying method and system which is used in an IP multimedia subsystem, wherein, the method comprises the following processes: during the S-CSCF inception registering process of the equipment of the user, the S-CSCF carries the information of the calling forbidden user in a response message of a structural registering success; after receives the response message of registering success, the P-CSCF updates the information of the calling forbidden user and the information of the non-forbidden user according to the response messageof registering success; when a home subscriber server informs the S-CSCF that the identity identification of the user is revised as the calling forbidden, the S-CSCF carries the information of the calling forbidden user in a structural subscribed informing message; after receives the subscribed informing message, the P-CSCF analyzes the subscribed informing message, to update the information of the calling forbidden user and the information of the non-forbidden user.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a method and a system for a Proxy Call Session Control Function (P-CSCF) in an IP multimedia subsystem to identify a barred user. Background technique [0002] If an IP Multimedia Subsystem (IP Multimedia Core Network Subsystem, IMS) user wants to have a session, he needs to register first, and the registration process is to register his location on the network. [0003] The Subscribe / Notify mechanism enables network entities to subscribe to a certain resource state, and when the resource state changes, the network entity in charge of the resource can notify the subscriber. After the registration is successful, P-CSCF (Proxy Call Session Control Function, proxy call session control function) will establish a subscription to the user registration status to S-CSCF (Serving Call Session Control Function, service call session control function), so that the user registra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W88/08H04W88/12H04W4/12H04W8/18H04W48/08
Inventor 王健刘伟盛国平白平在
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products