A kind of ims cascade networking method and equipment

A technology for accessing a network and a terminal, which is applied in the field of IMS cascade networking methods and equipment, and can solve the problems of heavy workload, tediousness, and expensive gateway equipment for reconfiguring routing information.

Active Publication Date: 2020-07-17
DATANG MOBILE COMM EQUIP CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the expensive gateway equipment for accessing the network, the workload of reconfiguring routing information is huge and cum

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of ims cascade networking method and equipment
  • A kind of ims cascade networking method and equipment
  • A kind of ims cascade networking method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] Embodiment 1. When a terminal is registered in both the first IMS system and the second IMS system, the added field in the UAA can control whether to perform authentication and encryption.

[0104] The first IMS system and the second IMS system can execute as Figure 4 The steps shown:

[0105] Step 401: The terminal sends Register to the P-CSCF in the first IMS system.

[0106] Step 402: The P-CSCF in the first IMS system determines the address of the I-CSCF in the first IMS system according to the home domain name of the terminal, and sends the Register to the I-CSCF.

[0107] Step 403: After receiving the Register, the I-CSCF in the first IMS system sends a SAR to the HSS in the first IMS system to query the address of the S-CSCF in the first IMS system.

[0108] Step 404: The HSS in the first IMS system carries the address of the S-CSCF in the SAA and sends it to the I-CSCF in the first IMS system.

[0109] Step 405: The I-CSCF in the first IMS system sends the Register to the...

Embodiment 2

[0120] Embodiment 2. The terminal needs to perform authentication and encryption when registering in the first IMS system, and when registering in the second IMS system, it can be controlled not to perform authentication and encryption by a field added in the UAA.

[0121] After the terminal completes registration in the first IMS system according to the above steps 301 to 322, the first IMS system and the second IMS system can perform the following Figure 5 The steps shown:

[0122] Step 501: The S-CSCF in the first IMS system sends the Register of the terminal to the P-CSCF in the second IMS system.

[0123] Wherein, when the S-CSCF in the first IMS system sends the Register, it needs to modify the home domain name in the original Register to the home domain name of the second IMS system.

[0124] Step 502: The P-CSCF in the second IMS system determines the address of the I-CSCF in the second IMS system according to the home domain name in the Register, and sends the REGISTER to the...

Embodiment 3

[0135] Embodiment 3. The terminal needs to perform authentication encryption when registering in the first IMS system. When registering in the second IMS system, the added field in the UAA can control authentication not encryption.

[0136] After the terminal is registered in the first IMS system, the terminal, the first IMS system, and the second IMS system can perform such as Image 6 The steps shown:

[0137] Step 601 to step 606 are consistent with the above step 501 to step 506, and will not be described again.

[0138] Step 607: The HSS in the second IMS system returns the authentication information to the S-CSCF in the second IMS system through the UAA, where the value of the bit corresponding to the Authorization-Indication field in the UAA is 0, which indicates to initiate authentication. However, the value of the bit corresponding to the SA-Indication field in the UAA is 1, that is, no encryption is required.

[0139] Step 608: The S-CSCF in the second IMS system sends a "40...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IMS cascaded networking method and equipment. In the IMS cascaded networking method disclosed by the invention, a first IMS sends a first registration request to a second IMS, the first registration request is used for requesting the second IMS to access to the network, and comprises a user identifier distributed by the first IMS for a terminal registered at the first IM, thereby enabling the second IMS to provide service for the terminal corresponding to the user identifier; and the second IMS returns a registration successful message to the first IM after receivingthe first registration request. Through the method disclosed by the invention, the configuration process of the routing information in the IMS networking can be simplified, and the cost of the IMS networking is reduced.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to an IMS cascaded networking method and equipment. Background technique [0002] In the provisions of protocols such as 3GPP, different IMS (IP Multimedia Subsystem, IP Multimedia Subsystem) systems realize communication through mutual configuration of routing information. The IMS system performs service processing according to the pre-configured routing information and the IMS system name and address in the received signaling. [0003] In practical applications, multiple IMS systems are distributed in different enterprise networks. For a group company, multiple enterprise networks need to be connected. According to the existing IMS networking method, when adding a set of IMS system, a set of gateway equipment to access the network needs to be added, and routing information in other IMS systems needs to be reconfigured. [0004] Because the gateway equipment for accessing the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L1/16
CPCH04L1/1607H04L63/0876H04L65/1016H04L65/1066H04L65/1073
Inventor 吴鹏程
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products