Method and system for providing conversation switch in multi-access mode
A technology of multiple access methods and session switching, which is applied in the field of communication to achieve the effect of increasing practicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0103] Figure 5 It is a schematic flow diagram of Embodiment 1. As shown in the figure, the IMS calls, and the UE generates a session establishment sequence quantity, so that the DTF and the session identifier on the UE are the same. The implementation steps are as follows:
[0104] In steps 501-503, the UE initiates an IMS session according to user instructions. The sequence quantity for IMS session establishment is generated on the UE, and the sequence quantity for IMS session establishment is carried in the header field User-Agent of the session request INVITE. In order to identify a specific UE, a device identifier of the UE such as PMI may also be carried in the session request. When the IMS calling process of the VCC framework arrives at the DTF, the DTF confirms that the session is an IMS domain calling, and saves the sequence quantity of the IMS session establishment carried in the session request.
[0105] In steps 504-505, the DTF initiates a call to the peer end ...
Embodiment 2
[0110] Figure 6 It is a schematic flow diagram of embodiment two, as shown in the figure, the IMS caller generates the sequence quantity of IMS session establishment on the DTF, and the implementation steps of making the session identifiers on the DTF and UE the same are as follows:
[0111] In steps 601-603, the UE initiates an IMS session according to user instructions. In order for the network to identify which UE initiates the session, a device identifier of the UE, such as PMI, may be carried in the session message. When the IMS calling process according to the VCC framework arrives at the DTF, the DTF confirms that the session is an IMS domain calling, and the DTF generates and saves the sequence quantity for establishing the IMS session.
[0112] In steps 604-605, the DTF initiates a call to the peer end as the B2BUA.
[0113]Steps 606-610: The session is successfully established according to the procedure for establishing the IMS calling session, and the DTF uses th...
Embodiment 3
[0117] Figure 7 It is a schematic flow chart of Embodiment 3, as shown in the figure, when the IMS is called, the UE generates the sequence quantity for setting up the IMS session, and the implementation steps for making the session identifiers on the UE and DTF the same are as follows:
[0118] In steps 701-702, the user is called, and the Invite request reaches the home S-CSCF of the UE, and is triggered to the DTF according to the initial filtering rules, and the session is anchored on the DTF.
[0119] In the IMS, the S-CSCF needs to check each initial filtering rule in turn, but in some cases it is unnecessary or impossible to do so.
[0120] Steps 703-707, DTF triggers Invite request to S-CSCF, triggers to DSF according to filtering rules, DSF makes domain selection decision, continues session in IMS domain, and then DSF interacts with DTF to select domain as the result of IMS domain connection.
[0121] Steps 708-714, the UE receives the session request, generates and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com