Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A response request method and device

A technology for responding to requests and request messages, applied in the security field, can solve problems such as cost and multi-terminal system resources, and achieve the effect of improving system performance and ensuring normal calls

Active Publication Date: 2015-04-29
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, CSI terminal B needs to consume a lot of terminal system resources to feed back these information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A response request method and device
  • A response request method and device
  • A response request method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] In this embodiment, a basic black and white list is used to determine whether requests from other terminals are allowed, and in the black and white list, the address of the terminal is used to represent a certain terminal.

[0067] Figure 5 That is, it is the main flowchart of the method for responding to the request in the CSI service in the first embodiment of the present invention. Such as Figure 5 As shown, the method includes:

[0068] Step 501: Configure a black and white list of request messages in a CSI terminal.

[0069] In this step, the configuration of the black and white list of request messages can be performed in a manner of active configuration by the user. In this embodiment, the address information of the terminal is used to represent a terminal, for example, the SIP address is used to represent the terminal, that is, the terminal list is actually the address list of the terminal.

[0070] After configuring the black and white list of request messages for t...

Embodiment 2

[0084] In order to increase the flexibility of the system, the terminal can set security options when configuring the list of terminals that are allowed to be inquired. For the capability request information from some terminals, authentication operations are required. In this embodiment, on the basis of the first embodiment, the method for querying terminal capabilities that is added to the authentication operation is described in detail, and the specific authentication operation is password authentication.

[0085] Figure 5 It is the main flow chart of the method for responding to the request in the CSI service in the second embodiment of the present invention. Such as Figure 5 As shown, the method includes:

[0086] Step 501: Configure a black and white list of request messages in a CSI terminal.

[0087] In this step, since the CSI call is established on the basis of the IMS call, the method of configuring the capability black and white list may be: synchronization with the IMS...

Embodiment 3

[0108] According to user needs and save unnecessary system consumption, the description types of terminal capabilities that do not need to be fed back can be specified in the black and white list. When the terminal determines that the terminal capability description can be fed back, it is only necessary to feed back the description of the terminal capability that needs to be fed back. User needs and save system consumption. In this embodiment, on the basis of the first embodiment, this embodiment is described in detail.

[0109] Picture 9 This is the main flowchart of the method for querying the capabilities of the CSI terminal in the third embodiment of the present invention. Such as Picture 9 As shown, the method includes:

[0110] Step 901: Configure a black and white list of request messages in a CSI terminal.

[0111] In this step, the way to configure the black and white list of request messages may be: the terminal automatically detects the OPTIONS attack, and after it is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for replying a request, which is applicable to a CSI service of an IMS service composition in an IP multimedia subsystem of circuit switching. The method includes the following steps: a black-and-white list of a request message is collocated to record terminals that prohibit or permit the request respectively; when other terminals send the request to a CSI terminal, the CSI terminal, according to the black-and-white list of the request message, identifies a list to which the terminal sending the request belongs; when the terminal which sends the request belongs to a white list, the request of the terminal is accepted; and when the terminal which sends the request belongs to a black list, the request of the terminal is refused. The application of the embodiment of the invention can restrict diversified requests to the CSI terminal from other terminals, avoid frequent malicious requests from a terminal, ensure establishment of regular calls and improve system performance thereby. The embodiment of the invention also discloses a device for replying the request in the CSI service, including a receiving module, a black-and-white list collocation module and a decision module.

Description

Technical field [0001] The invention relates to the security technology in the SIP system, in particular to a method and equipment for responding to requests in a circuit switched IP multimedia subsystem (IMS) combined service (CSI) service. Background technique [0002] With the development of mobile communication technology, more and more new communication technologies are applied to mobile communication. The communication speed of mobile communication is faster, and the more types of communication services, the more convenient the communication brought to people. With the increase of services and the continuous emergence of new services, how to develop services conveniently and quickly has become the focus of attention. For this reason, the concept of IMS is proposed. IMS is the center for the 3G core network to provide end-to-end multimedia services and cluster multimedia services. In the 3GPP R6 version, IMS has been defined as a multimedia service core network that support...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
Inventor 杨健陈国乔王雷
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products