Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of processing call initiated from application server camouflaged by user facility

An application server, user equipment technology, applied in the field of communication, can solve problems such as unavoidable UE

Inactive Publication Date: 2011-04-20
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] In consideration of the problems existing in related technologies that cannot avoid the UE masquerading as an AS to initiate a call for correct processing, the present invention is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of processing call initiated from application server camouflaged by user facility
  • Method of processing call initiated from application server camouflaged by user facility
  • Method of processing call initiated from application server camouflaged by user facility

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0058] Fig. 4 shows the situation that the P-CSCF deletes the "orig" parameter in step S306. As shown in Figure 4, including the following processing:

[0059] Step 401, UE sends a session request to P-CSCF;

[0060] Step 402, the P-CSCF checks whether there is an "orig" parameter in the preloaded Route header of the initial session request, and if so, deletes it;

[0061] Step 403, P-CSCF sends the session request to S-CSCF;

[0062] Step 404, the S-CSCF checks whether the service requires authentication;

[0063] Step 405, perform subsequent authentication and call flow (as described above).

example 2

[0065] Fig. 5 shows the processing flow of replacing the contents of the preloaded routing header by the P-CSCF using the Service-Route header saved during registration in step S306. The difference between the process shown in FIG. 5 and the process in FIG. 4 lies in step 503. In step 503, if the "orig" parameter is detected, the content of the preloaded route header is replaced with the Service-Route header saved during registration. The remaining processes are similar to those in Figure 4.

[0066] Specifically, as shown in Figure 5, including:

[0067] Step 501, UE sends a session request to P-CSCF;

[0068] Step 502, P-CSCF checks whether there is an "orig" parameter in the preloaded Route header of the initial session request, and if so, replaces the content of the preloaded route header with the Service-Route header saved during registration;

[0069] Step 503, P-CSCF sends the session request to S-CSCF;

[0070] Step 504, the S-CSCF checks whether the service require...

example 3

[0073] FIG. 6 shows the signaling process in which the P-CSCFP-CSCF replies an error request response to the UE in step S306 and ends the processing. As shown in Figure 6, including the following processing:

[0074] Step 601, UE sends a session request to P-CSCF;

[0075] Step 602, P-CSCF checks whether there is an "orig" parameter in the preloaded Route header of the session request;

[0076] In step 603, when it is detected that the "orig" parameter exists, the P-CSCF replies a bad request response 400 (Bad Request) to the UE.

[0077] Through the present invention, the UE is prevented from affecting the processing flow of subsequent network elements by carrying the "orig" parameter in the preloaded route (Route) header of the request, and it can effectively prevent the UE from carrying the "orig" parameter to pretend to be an AS to initiate a session to avoid The system authenticates the call.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a processing method of calling at UE in the disguise of AS, comprising the following processes: a P-CSCF receives an initial conversation application from a user device; the P-CSCF checks whether a preloaded routing header of the initial conversation has orig parameter; if the orig parameter is checked to exist, the P-CSCF deletes the orig parameters or replaces the content of the preloaded routing header with a Service-Route header stored in registration process and transmits the initial conversation application to an S-CSCF, or replies a wrong application response tothe user device and finishes the process. The invention can prevent the phenomenon that if the preloaded routing header of the application has the orig parameter, the UC can influence the processing flow of the follow-up network element, and the invention can effectively prevent the UE from disguising the AS with the orig parameter to launch conversation to avoid the authentication of the system on the call.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to a method for initiating a call by disguising a User Equipment (UE) as an Application Server (AS for short), and the method is especially suitable for an IP multimedia subsystem. Background technique [0002] IP Multimedia Core Network Subsystem (IMS) is a next-generation network standard defined by the 3rd Generation Partnership Project (3GPP). Protocol (SIP for short) system, communication has nothing to do with access, and can have multiple capabilities such as separation of multimedia service control functions and carrying capacity, separation of calls and services, separation of applications and services, separation of services and networks, and integration of mobile network and Internet services. . [0003] The main functional entities in the IMS include the Call Session Control Function (CSCF for short) that controls functions such as user registration and sessio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/12H04L12/56H04L29/06H04W4/16H04L47/76H04W12/122
Inventor 罗永胜王斌盛国平
Owner ZTE CORP