A response request method and device

A technology for answering requests and devices, applied in the security field, can solve the problems of multi-terminal system resources and consumption, and achieve the effect of improving system performance and ensuring normal calls

Active Publication Date: 2008-06-04
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, CSI terminal B needs to consume a lot of terminal system resources to feed back these information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A response request method and device
  • A response request method and device
  • A response request method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] In this embodiment, a basic black-and-white list is used to determine whether to allow the request of other terminals, and in the black-and-white list, the address of the terminal is used to represent a certain terminal.

[0067] Figure 5 It is the main flow chart of the method for responding to the request in the CSI service in Embodiment 1 of the present invention. Such as Figure 5 As shown, the method includes:

[0068] Step 501, configure black and white lists of request messages in the CSI terminal.

[0069] In this step, the configuration of the blacklist and whitelist of request messages may be configured actively by the user. In this embodiment, the address information of the terminal is used to represent a certain terminal, for example, a SIP address is used to represent a terminal, that is to say, the terminal list is actually a terminal address list.

[0070] After configuring the request message blacklist and whitelist for the CSI terminal in the above...

Embodiment 2

[0084] In order to increase the flexibility of the system, the terminal can set security options when configuring the list of terminals allowed to be queried, and requires authentication operations for capability request information from certain terminals. In this embodiment, on the basis of Embodiment 1, a method for querying terminal capabilities that includes an authentication operation is described in detail, and the specific authentication operation is password authentication.

[0085] Figure 5 It is a main flowchart of the method for responding to the request in the CSI service in the second embodiment of the present invention. Such as Figure 5 As shown, the method includes:

[0086] Step 501, configure black and white lists of request messages in the CSI terminal.

[0087] In this step, since the CSI call is established on the basis of the IMS call, the way of configuring the capability blacklist and whitelist may be: synchronizing with the call blacklist and white...

Embodiment 3

[0108] According to user needs and saving unnecessary system consumption, the terminal capability description type that does not need feedback can be specified in the black and white list. When the terminal determines that the terminal capability description can be fed back, it only needs to feed back the capability description that the terminal needs to feedback, so as to meet user needs, and save system consumption. This embodiment is based on the first embodiment to describe this implementation manner in detail.

[0109] Figure 9 It is a main flow chart of the method for querying the capability of a CSI terminal in Embodiment 3 of the present invention. Such as Figure 9 As shown, the method includes:

[0110] Step 901, configure black and white lists of request messages in the CSI terminal.

[0111] In this step, the method of configuring the blacklist and whitelist of the request message may be as follows: the terminal automatically detects the OPTIONS attack, and ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for replying a request, which is applicable to a CSI service of an IMS service composition in an IP multimedia subsystem of circuit switching. The method includes the following steps: a black-and-white list of a request message is collocated to record terminals that prohibit or permit the request respectively; when other terminals send the request to a CSI terminal, the CSI terminal, according to the black-and-white list of the request message, identifies a list to which the terminal sending the request belongs; when the terminal which sends the request belongs to a white list, the request of the terminal is accepted; and when the terminal which sends the request belongs to a black list, the request of the terminal is refused. The application of the embodiment of the invention can restrict diversified requests to the CSI terminal from other terminals, avoid frequent malicious requests from a terminal, ensure establishment of regular calls and improve system performance thereby. The embodiment of the invention also discloses a device for replying the request in the CSI service, including a receiving module, a black-and-white list collocation module and a decision module.

Description

technical field [0001] The invention relates to the security technology in the SIP system, in particular to a method and equipment for responding to requests in circuit-switched IP Multimedia Subsystem (IMS) Composite Service (CSI) services. Background technique [0002] With the development of mobile communication technology, more and more new communication technologies are applied to mobile communication. The communication speed of mobile communication is faster, the types of communication services are more, and the communication is more convenient for people. With the increase of business and the continuous emergence of new business, how to develop business conveniently and quickly has become the focus of people's attention. Therefore, the concept of IMS is proposed. IMS is the center of the 3G core network to provide end-to-end multimedia services and cluster multimedia services. In the 3GPP R6 version, IMS has been defined as a multimedia service core network that supp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L12/56H04L29/06H04L12/24G06F17/30
Inventor 杨健陈国乔王雷
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products