[go: up one dir, main page]

WO2007121672A1 - Procédé et appareil de fonctionnement et de gestion, et procédé et serveur pour déterminer la validité du fonctionnement d'un service - Google Patents

Procédé et appareil de fonctionnement et de gestion, et procédé et serveur pour déterminer la validité du fonctionnement d'un service Download PDF

Info

Publication number
WO2007121672A1
WO2007121672A1 PCT/CN2007/001310 CN2007001310W WO2007121672A1 WO 2007121672 A1 WO2007121672 A1 WO 2007121672A1 CN 2007001310 W CN2007001310 W CN 2007001310W WO 2007121672 A1 WO2007121672 A1 WO 2007121672A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
service
message
determining
name
Prior art date
Application number
PCT/CN2007/001310
Other languages
English (en)
French (fr)
Inventor
Chaohai Xiao
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CNB2006100760043A external-priority patent/CN100562019C/zh
Priority claimed from CN200710006445A external-priority patent/CN100596105C/zh
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to CN2007800003188A priority Critical patent/CN101317419B/zh
Priority to EP07720883A priority patent/EP1874000A4/en
Publication of WO2007121672A1 publication Critical patent/WO2007121672A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/14Backbone network devices

Definitions

  • the present invention relates to the field of network communication technologies, and in particular, to an operation processing method, an apparatus, a service operation legality determination method, and a server.
  • the core part of the IMS mainly includes network elements such as P-CSCF, I-CSCF, S-CSCF, HSS, and AS.
  • the P-CSCF provides proxy functions, that is, accepts service requests and forwards them;
  • the I-CSCF provides local user service node assignment, route query, and IMS inter-domain topology hiding function;
  • the S-CSCF is responsible for registration authentication and session control of the UE.
  • the basic session routing function is performed for the calling end and the called end IMS user, and according to the IMS triggering rule signed by the user, the value-added service route triggering and service control interaction to the AS are performed when the condition is satisfied; the HSS is saved in the home network.
  • the subscription information of the IMS user includes a centralized integrated database such as basic identification, routing information, and service subscription information.
  • the AS mainly provides IP multimedia value-added services for IMS users.
  • IMS newly introduces two user identifiers: IMPI (IMS Private Identity) and IMPU (IMS Public Identity).
  • IMPI is an IMS user private identifier and is used to identify the UE (User Equipment). And corresponding to the UE; IMPU is a public identifier of the IMS user, which is a symbol used to identify each other, which is equivalent to a telephone number.
  • the user's status refers to the status of the IMPI - IMPU pair.
  • the registration process is a process in which the UE performs bidirectional authentication and network resources allocation with the network.
  • the registration status of the user includes: Authentication Pending, Registered, Unregistered, Unregistered, and Unregistered ( Not registered ) 4 states, the above four registration states can be converted to each other.
  • the logout process is a process of releasing various resources allocated to the UE, corresponding to the registration function.
  • the logout can be divided into two types: UE logout and network logout.
  • the step is divided into a network logout initiated by the HSS (Home Subscriber Server) and a network logout initiated by the S-CSCF (Serving Call Session Control Function).
  • HSS Home Subscriber Server
  • S-CSCF Serving Call Session Control Function
  • the first registration of the UE is initiated by the UE when it first accesses the IMS network, such as when the UE is powered on, and the UE enters the IMS network through the P-CSCF.
  • the entire registration process is as shown in FIG.
  • step 1 after the UE obtains a path interconnected with the IP network, the UE sends a SIP (Session Initiated Protocol) registration message flow to the P-CSCF (Proxy CSCF, proxy CSCF) through the path. ).
  • the main IE (Information Element) of the SIP registration message flow includes: IMPU, IMPI, the home network domain name and the IP address of the UE.
  • the P-CSCF receives the SIP registration message flow, finds the I-CSCF (Interrogating CSCF) of the home network by querying the home network domain name, and forwards the registration message flow to the I-CSCF, and forwards the registration message.
  • the main IEs of the flow include: P-CSCF address or domain name, IMPU, IMPI, P-CSCF network identifier and IP address of the UE.
  • the I-CSCF performs UE access authority authentication by sending a UAR (User Authorization Request) message stream to the HSS.
  • the message stream main IE includes the IMPU, IMPI and P-CSCF network identifiers.
  • step 3 the HSS checks whether the UE has been registered, and determines whether to allow the UE to register through the P-CSCF according to the UE subscription and the constraint of the operator. If the UE is allowed to register through the P-CSCF, go to step 4.
  • the HSS determines whether the user is allowed to check in. If the user is allowed to check in, the UAA (user authorization response) is sent as a response message flow of the UAR to the I-CSCF by the HSS, and the main feedback of the response message flow is available for the UE to serve.
  • the S-CSCF name also referred to herein as the S-CSCF network element name
  • the HSS knows the S-CSCF name of the UE, it returns the S-CSCF name. When it is necessary to reselect the S-CSCF, the HSS should return the S-CSCF capability.
  • the UAA contains the S-CSCF name and capability
  • the I-CSCF can perform a new S-CSCF assignment. When only the capability returns in the UAA, the I-CSCF should make a new S-CSCF selection based on the return capability. Go to step 5.
  • step 4 if it is determined that the check-in HSS is unsuccessful, the HSS should return the UAA rejecting the attempt to register, and the registration process ends.
  • the I-CSCF determines the IP address of the S-CSCF by using the S-CSCF name through the domain name-address mechanism, and also determines the matching home network access point by using the information returned based on the HSS. then The I-CSCF sends a registration message flow to the selected S-CSCF.
  • the S-CSCF will send a MAR (Media Authentication Request) message flow to the HSS for authentication quintuple application.
  • the main IE of the message flow includes: IMPU, IMPL S-CSCF name, and the applied authentication quintuple Quantity and application authentication model.
  • step 7 the HSS saves the issued S-CSCF name for the UE, and returns the MAA (Media Authentication Response) message flow to the S after the registration status of the UE is set to Authentication Pending.
  • the returned MAA main IEs include: IMPU, IMPL authentication quintuple number and all authentication quintuple.
  • step 8 to step 15 the S-CSCF applies one of the applied authentication quintuaries to the two-way authentication process between the UE and the IMS network.
  • the S-CSCF sends a SAR (Server-Assignment-Request) registration notification message flow to the HSS.
  • the main IEs of the message flow include: IMPU, IMPI, and S-CSCF names.
  • the HSS clears the UE's Authentication Pending status and sets the registration status to registered ( After the registered, the UE-related user data and charging information are delivered to the S-CSCF through the SAA (Server-Assignment Answer) message flow.
  • SAA Server-Assignment Answer
  • the S-CSCF notifies the UE of the successfully registered SIP message flow through the I-CSCF and the P-CSCF.
  • the UE initiates registration for the first time, that is, the entire process of accessing the IMS network for the first time.
  • the process corresponding to the registration process is the logout process, and the logout is divided into two types: logout initiated by the UE and logout initiated by the IMS network.
  • the logout initiated by the IMS network side is further divided into: logout initiated by the HSS and logout initiated by the S-CSCF.
  • FIG. 2 is a schematic diagram of a process for deregistering a UE in the prior art. As shown in Figure 2, the process includes:
  • Step 201 The UE initiates a logout message to the P-CSCF. To cancel, the UE initiates a SIP REGISTER request with an expiration value of zero.
  • the logout message includes: an IMPU, an IMPL home network domain name, and an IP address of the UE.
  • the P-CSCF finds the I-CSCF according to the home network domain name received in step 201, and sends a logout message to the I-CSCF.
  • the message includes: an address or a domain name of the P-CSCF, an IMPU, an IMPL P-CSCF network identifier, and an IP address of the UE.
  • Step 203 The I-CSCF sends a UAR message to the HSS.
  • the I-CSCF sends a UAR message to the HSS to query the status of the UE, and the message includes: IMPL IMPU> P-CSCF network identifier and I-CSCF host name.
  • Step 204 The HSS shall determine that the UE has registered and send a UAA message to the I-CSCF.
  • the UAA message carries the S-CSCF network element name and the I-CSCF host name currently serving the UE.
  • Step 205 The I-CSCS sends a logout message to the S-CSCF.
  • the I-CSCF queries the IP address of the S-CSCF by using the S-CSCF network element name retrieved in step 204 according to the domain name-address mechanism, and sends a logout message to the S-CSCF.
  • Step 206 The S-CSCF sends a logout notification to the HSS through the SAR message.
  • the SAR message includes: IMPU, IMPL S-CSCF network element name and host name.
  • Step 207 If the S-CSCF name of the SAR request is consistent with the HSS already saved, the HSS replaces the registration state of the UE with Not registered or Unregistered.
  • the HSS shall clear or retain the saved NE name of the S-CSCF serving the UE, and return the operation result to the S-CSCF through the SAA message.
  • Step 208 to step 210 The S-CSCF sends the message of successful logout to the UE through the I-CSCF and the P-CSCF.
  • the embodiment shown in FIG. 1 and FIG. 2 describes the process of registering and deregistering a UE in the prior art.
  • the application server (AS) is a network element that provides IP multimedia value-added services in the IMS, and the AS can use the user data request (UDR).
  • the message is queried to the HSS.
  • the subscription notification request (SNR) message can also be used to subscribe to the HSS subscription user data. The following describes the process for the AS to subscribe.
  • FIG. 3 is a schematic diagram of a process for an AS to subscribe in the prior art. As shown in Figure 3, the process includes the following steps:
  • Step 301 The AS sends a User Data Update Request (PUR) message to the HSS.
  • PUR User Data Update Request
  • the AS stores user subscription service data, for example, transparent data, for the UE in the HSS through the PUR message.
  • Step 302 The HSS sends a User Data Update Response (PUA) message to the AS.
  • PUA User Data Update Response
  • Step 303 The UE initiates registration with the S-CSCF.
  • the process of initiating registration by the UE is the same as the registration method shown in FIG. 1, and will not be described here.
  • Step 304 The UE downloads the user subscription data.
  • the user downloads user subscription data from the HSS via the SAR message, for example, the User Initial Filtering Standard (IFC).
  • IFC User Initial Filtering Standard
  • Step 305 The S-CSCF sends a 200 OK message to the user.
  • This message identifies the operation as successful.
  • Step 306 The S-CSCF sends a third-party SIP message to the AS.
  • the S-CSCF sends a third-party SIP message to the AS to notify the UE that the registration has succeeded.
  • Step 307 The AS sends a 200 OK message to the S-CSCF.
  • Step 308 The AS sends a UDR message to the HSS.
  • the data is downloaded from the HSS through the message, and the data is data necessary for providing the service, and the NE name and host name of the AS are carried in the message.
  • Step 309 The HSS sends a User Data Response (UDA) to the AS.
  • UDA User Data Response
  • Step 310 The AS sends an SNR message to the HSS.
  • the AS subscribes the changed service data to the HSS through the SN message, and carries the NE name and host name of the AS in the message.
  • Step 311 The HSS sends a subscription notification response (SNA) message to the AS.
  • SNA subscription notification response
  • the HSS feeds back the operation result to the AS through the SNA message.
  • Step 312 Update the business data in the HSS.
  • Step 313 The HSS sends an Update Notification Request (PNR) message to the AS.
  • PNR Update Notification Request
  • the HSS sends a PNR message to the AS, informing the service data in the AS step 310 that it has been updated.
  • Step 314 The AS sends an Update Notification Response (PNA) message to the HSS.
  • PNA Update Notification Response
  • the AS informs the HSS that the notification has been received through the PNA message.
  • Step 315 The AS decides to update the data in the HSS.
  • Step 316 The AS sends a PUR message to the HSS.
  • the AS uses the PUR message to update the service data of the UE.
  • Step 317 The HSS sends a PUA message to the AS.
  • the HSS notifies the AS of the operation result of the updated data by the PUA message.
  • the S-CSCF network element name and the host name are carried in the MAR or SAR message; when the UE or the network initiates the logout, the S-CSCF network element name and The host name is carried in the SAR message of the network logout operation initiated by the S-CSCF.
  • the NE name and host name of the AS are carried in the UDR message that the AS queries the IFC data and the SNR message that subscribes to the user IFC data.
  • An attribute value pair named Server-Name (AVP) and an Origin-Host AVP are present in the MAR message, SAR message, UDR message, and SNR message, where Server-Name
  • the value of the AVP is the name of the network element of the S-CSCF.
  • the service request initiated by the I-CSCF carries the UAR message and the immediate location request (LIR) message
  • LIR immediate location request
  • the PUR message is carried in the service request initiated by the AS
  • only the host name is carried in the UAR message, the LIR message, and the PUR message.
  • the host name is the value of the AVP of Origin-Host.
  • the naming format of the S-CSCF NE name conforms to the SIP Uniform Resource Identifier (URI).
  • URI SIP Uniform Resource Identifier
  • sip:s-cscf@huawei.com is a legal S-CSCF network element name; the host name naming format is not required to be met.
  • the naming rules for SIP URIs such as s-cscf, s-cscf.huawei.com, or sip:s-cscf@huawei.com, are legal S-CSCF host names.
  • the naming rules of the AS are the same as those of the S-CSCF.
  • the AS name of the AS can be sip:as@huawei.com, and the host name can be named as, as.huawei.com, or sip:as@huawei.com and many more.
  • the method for determining the legality of the network element operation operation on the network element by the HSS is as follows:
  • the HSS compares the pre-configured network element name with the network element name carried by the network element, and if the same, the network element service is considered to be the same.
  • the operations are legal network element service operations.
  • These network elements include: S-CSCF, AS, I-CSCF, and so on.
  • the NE name can be obtained by other network elements in the network.
  • other NEs can capture the NE name through the 4 or the NE maintenance tool.
  • the S-CSCF network element name of the service in the above UE registration, UE logout, UE called and In the network logout operation initiated by the S-CSCF, if the other illegal network element initiates the service request by using the obtained network element name of the S-CSCF, the HSS still determines that the service operation initiated by the network element is a legal network element service operation, and thus cannot Ensure the legality of S-CSCF business operations.
  • any AS can obtain the NE name of the AS, query the user IFC data by using the NE name, and subscribe to the user IFC data. Operation, because the network element name is correct, the HSS determines that the network element service operation is a legitimate network element service operation, and cannot ensure the legitimacy of the AS service operation carrying the UDR and SNR messages.
  • the PUR message of the service request initiated by the AS only carries the host name, so the HSS cannot perform the I-CSCF and carry the PUR according to the network element name.
  • the AS of the message performs the legality determination of the operation of the network element service, so that the legality of the service operation of the I-CSCF and the AS carrying the PUR message cannot be ensured.
  • the validity of the network element operation performed by the HSS on the network element is determined by comparing the name of the network element that has been saved by the HS to the name of the network element carried in the NE request message.
  • the network element service operations are legal network element service operations. These network elements include: S-CSCF, AS, I-CSCF, and so on.
  • the network element name can be obtained by other network elements in the network, and any network element can obtain the name of the S-CSCF network element that initiates the service, where the UE is registered, the UE is logged off, the UE is called, and In the network logout operation initiated by the S-CSCF, if the other illegal network element initiates the service request by using the obtained network element name of the S-CSCF, the HSS still determines that the service operation initiated by the network element is a legal network element service operation, and thus cannot Ensure the legality of S-CSCF business operations.
  • an AVP Attribute Value Pair
  • Server-Assignment-Type exists in the SAR message flow
  • the main role is to define various operation codes that notify the HSS to perform, such as initial registration, re-registration, logout, etc., and its value includes NO_ASSIGNMENT (user service data is not assigned); REGISTRATION (first registration) RE_REGISTRATION (re-registration), etc. 12 types (see the 3GPP TS 29228 protocol specification for details).
  • the operations defined by the existing 3GPP TS 29228 protocol specification for the above SAR only specify the legitimacy of the user and the necessary processing, and the legality of various operations initiated by the S-CSCF is not specified, for example, when the user is When the Unregistered state is not registered, The S-CSCF initiates a re-registration operation. If the HSS performs the re-registration operation, it will bring operational security risks to the data stored in the HSS.
  • the embodiment of the invention provides an operation processing method, a device, a service operation legality determination method and a server, so as to eliminate the security risk of the HSS side user data in the prior art, and improve the processing efficiency of the legal operation.
  • an embodiment of the present invention provides an operation processing method, where the method includes:
  • the specified operation is performed when the specified operation is a legal operation.
  • an embodiment of the present invention further provides an operation processing apparatus, where the operation processing apparatus includes: a receiving unit, configured to receive a service message sent by a network element, and obtain a corresponding data configuration message; a legality determining unit, configured to The service message and the data configuration message determine the legality of the network element;
  • the first determining unit is configured to determine whether the service request operation sent by the legal network element is a legal service operation, and send a judgment result that is a legal service operation;
  • a second determining unit configured to continue to determine, according to the received judgment result, whether the message sent by the network element is to allocate a request SAR message to the server;
  • a specified operation determining unit configured to determine a specified operation received in the SAR message
  • a determining execution unit connected to the specified operation determining unit, configured to determine whether the specified operation in the SAR message is legal, and perform a legal specified operation .
  • the embodiment of the present invention further provides an operation processing method in an IP multimedia subsystem, which is applicable to an interaction process between a SAR and an SAA message flow between an S-CSCF and an HSS, where the method includes the following steps:
  • the HSS After receiving the SAR message flow transmitted by the S-CSCF, the HSS is carried according to the SAR message flow. Information determines the specified operation in the SAR message flow;
  • the HSS performs the specified operation when it is determined that the specified operation is a legal operation according to the user registration status.
  • the embodiment of the present invention further provides a method for determining the legality of operation of a network element, where the method includes: pre-configuring a host name of the network element;
  • step C determining, according to the host name and the message, whether the network element type is legal; if yes, performing step C;
  • the present invention further provides a server for determining the legality of operation of a network element service, where the server is configured to store subscription information of a user, including: an interface, a parsing unit, and a service processing unit; Receiving a service request initiated by the network element, and sending the service request to the parsing unit;
  • the parsing unit is configured to receive the service request, obtain a message initiated by the network element, parse the host name of the network element, and send the host name and the message to the service processing unit.
  • a service processing unit configured to configure a host name of the network element, receive the host name and message sent by the parsing unit, determine whether the network element type of the network element is legal, and if yes, compare the received host Whether the name and the configured host name are the same. If they are consistent, the network element service operation is determined to be a legal network element service operation.
  • the embodiment of the present invention determines whether the network element type is legal and determines the legality of the network element service operation, thereby ensuring accurate judgment on the legality of the operation of the network element service, and ensuring user data security and IMS service. Reliability; then, by combining the user registration status to determine the legality of the specified operation in the SAR message flow, filtering the specified operation in the SAR message flow, avoiding the process of the HSS performing illegal operations, reducing the illegal operation on the HSS The occupation of resources also reduces the security risks of storing data in the HSS and improves the processing efficiency of legitimate operations.
  • 1 is a flow chart of a registration process for the first registration in the prior art
  • 2 is a flow chart of a user logout process in the prior art
  • FIG. 5 is a flow chart of determining the legality of operation of a network element service in an operation processing method according to an embodiment of the present invention
  • FIG. 6 is another flow chart for judging the legality of operation of a network element service in the operation processing method of the embodiment of the present invention.
  • FIG. 7 is a flowchart of determining the legality of the specified operation in the operation processing method according to the embodiment of the present invention
  • FIG. 8 is a flowchart of the specified operation processing in the determining SAR message in FIG. 7;
  • FIG. 9 is another flowchart of the specified operation process in the determining SAR message in FIG. 7;
  • FIG. 10 is a schematic structural diagram of an operation processing apparatus according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of a server for determining the legality of operation of a network element service according to an embodiment of the present invention
  • Figure 12 is a block diagram showing the structure of the service data processing unit of Figure 11.
  • Step 301 Receive a service message sent by a network element
  • Step 302 Determine validity of the network element according to the service message.
  • Step 303 Determine whether the service request operation sent by the legal network element is a legal service operation. If no, go to step 307 and end;
  • Step 304 If yes, determine whether the message sent by the network element is a server assignment request SAR message, and if yes, determine a specified operation in the SAR message (ie, step 305); if not, execute step 307, and end;
  • Step 306 Perform the specified operation when the specified operation is a legal operation
  • Step 307 Process according to the existing process.
  • the legality judgment of the request service operation from the network element name and/or the host name is first added as a first threshold; and then the request service operation is legally supplemented from the perspective of the business logic. It is a perfect judgment of the internal level of the service, so as to ensure the business data. safety.
  • the host name and the network element name of the network element are pre-configured; the service request initiated by the network element is received, the host name of the network element is parsed from the request, and the corresponding network element type is searched according to the host name; Obtaining a message type requested by the network element, determining a requesting network element type from the message type, and comparing the obtained network element type with the found network element type to determine whether the network element type is legal, if The network element type of the requesting network element is legal, and it is determined whether the obtained host name of the network element is the same as the host name of the pre-configured network element. If the same, the service operation of the network element is determined to be a legal network element service operation. .
  • the legality judgment of the request service operation from the network element name and/or the host name may also exist independently in the network, and the legality judgment of the network operation of the network element may be performed, and the user data security and the reliability of the IMS service may also be ensured.
  • the specific implementation process is shown in Figure 4 and Figure 5). See Figure 4 for the specific implementation process.
  • FIG. 5 it is a flowchart of determining the legality of operation of a network element service in an operation processing method according to an embodiment of the present invention. As shown in FIG. 5, the method includes:
  • Step 401 Receive a service request initiated by the network element, obtain a message initiated by the network element, and parse the host name of the network element.
  • the host name is obtained from the service request initiated by the network element.
  • the network element referred to here may be: an I-CSCF or an AS carrying a PUR message.
  • the host name is carried in the corresponding message.
  • the host name of the S-CSCF is carried in the MAR or SAR message initiated by the S-CSCF.
  • the host name of the AS is carried in the PUR message initiated by the AS.
  • the Origin-Host carried in each message stores the host name.
  • Step 402 Determine, according to the host name and the message initiated by the network element, whether the network element type of the network element is legal. If yes, go to step 403; otherwise, go to step 405.
  • the specific determination method in this step is as follows: According to the host name, the corresponding network element type ID is searched in the pre-configured network element type coding table, and the network element type is determined according to the network element type ID; Meta type. If the two network element types are the same, if the network element type is a legal network element type, go to step 403; otherwise, go to step 405.
  • the network element type coding table described herein refers to a network element type coding table that stores a host name, a network element type ID, and a network element name, and their corresponding relationships.
  • the method for determining the network element type by the message initiated by the network element may be: determining the type of the message.
  • the message includes at least one of a UAR message and a LIR message, determining that the network element type is I -CSCF; if the message includes at least one of: a UDR message, an SNR, and a PUR message, determining that the network element type is an AS; if the message includes at least: at least one of a MAR message and a SAR message, the The network element is the S-CSCF.
  • Step 403 The host name of the network element is compared with the pre-configured host name. If yes, go to step 404; otherwise, go to step 405.
  • the pre-configured host name means that the host name of the network element is pre-configured before step 401.
  • Step 404 Determine that the operation of the network element service is a legal network element service operation.
  • Step 405 Determine that the operation of the network element service is an illegal network element service operation, and end the process.
  • the method further includes: pre-configuring the network element name of the network element, determining whether the network element name carried in the message initiated by the network element is consistent with the pre-configured network element name, and if yes, performing the operation of step 404; The operation of step 405. It should be noted that the step of determining whether the network element names are consistent may be performed before step 403, that is, when the network element names are consistent, step 403 is performed.
  • UE first registration REGISTRATION
  • UE re-registration RE - REGISTRATION
  • non-registered service UE is called ( UNREGISTERED - USER );
  • Timeout logout to save the S-CSCF name (TIMEOUT_DEREGISTRATION STORE_SERVER_NAM ⁇ );
  • Authentication failure logout (AUTHENTICATION-FAILURE); Authentication timeout is cancelled (AUTHENTICATION-TIMEOUT); but it is not limited to this, and other operations can be performed.
  • FIG. 6 is another flowchart of determining the legality of the operation of the network element service in the operation processing method according to the embodiment of the present invention. As shown in FIG. 6, the method specifically includes:
  • Step 500 Determine whether the received message is UAR and LIR, or one of the two. If yes, perform step 501; otherwise, perform step 510.
  • the type of the message is determined according to the attribute value AVP of the command code (Command-Code) in the message, and different values of the AVP of the Command-Code correspond to different message types, which can be referred to the relevant protocol. , no longer detailed description here.
  • Step 501 Determine whether the I-CSCF is a legal network element type; if yes, perform step 502. Otherwise, perform step 550.
  • the specific implementation of this step is as follows: The network element type ID is queried according to the host name, and the network element type is further determined by the network element type ID.
  • the specific operations for determining the NE type ID are shown in Table 1.
  • Table 1 shows the NE type encoding table.
  • the NE type ID is determined according to the host name, and the network element type ID is further determined by the network element type ID. For example, if the host name is ⁇ , then the network element type ID is 1 according to Table 1, and the network element type can be determined as I-CSCF.
  • step 501 it is determined that the message initiated by the network element is UAR and LIR, or one of the two; therefore, the network element can be determined to be an I-CSCF.
  • the network element type obtained by the two methods in this step is the I-CSCF. Therefore, it can be determined that the network element type is the legal network element type J-CSCF, and step 502 is performed.
  • Step 502 Determine whether the I-CSCF host name matches, if the matching proceeds to step 540, otherwise, go to step 550.
  • This step is implemented as follows: The host name obtained from the UAR or LIR message is compared with the host name pre-configured in the HSS in Table 1. If the host name of the obtained host type code table does not exist, the host name is the same as the obtained host name. If the network element type is the same, the network element service operation is determined to be an illegal network element service operation; otherwise, the network element service operation is determined to be a legal network element service operation.
  • Step 510 Determine whether the received message is a MAR and SAR message, or one of the two, and if yes, perform step 511; otherwise, perform step 520.
  • the type of the message is determined according to the value of the AVP of the existing Command-Code in the message, and the different values of the AVP of the Command-Code correspond to different message types, which can be referred to the relevant protocol, and will not be detailed here. .
  • Step 511 Determine whether the S-CSCF network element is a legal network element type. If yes, perform the step.
  • step 501 The specific implementation of the step is the same as that of the step 501, except that the message type and the network element type are different, and details are not described herein again.
  • Step 512 Determine whether the S-CSCF network element name and the host name match. If the match is yes, go to step 540; otherwise, go to step 550.
  • the step is specifically implemented as: comparing the host name obtained from the MAR or SAR message with the host name configured in Table 1. If there is no host name record in the table 1 that is the same as the obtained host name, it is determined.
  • the operation of the NE is an illegal network element service operation.
  • the corresponding network element type ID is found from Table 1, and then according to The NE type ID and the host name are compared with the pre-configured NE name, and the NE name is compared with the NE name obtained from the MAR or SAR message. If the two are the same, the NE service operation is determined as The legal network element service is operated; otherwise, the operation of the network element is determined to be an illegal network element service operation.
  • a preferred method for obtaining the name of the network element is provided in this step, and the method for obtaining the name of the network element according to the host name is also within the protection scope of the present invention.
  • Step 520 Determine whether the received message is a UDR and an SNR message, or one of the two. If yes, go to step 521; otherwise, go to step 530.
  • the type of the message is determined according to the value of the AVP of the existing Command-Code in the message.
  • the different values of the AVP of the Command-Code correspond to different message types. For details, refer to the related protocol, which is not described in detail here.
  • Step 521 Determine whether the AS network element is a legal network element type. If yes, go to step 522; otherwise, go to step 550.
  • this step is the same as that of the step 501.
  • the message type and the NE type are different, and details are not described here.
  • Step 522 Determine whether the AS network element name and the host name match. If yes, go to step 540; otherwise, go to step 550.
  • the NE name and the host name of the AS are carried in the UDR message of the IFC, or are carried in the SNR message of the IFC.
  • this step is the same as that of the step 512.
  • the message type and the NE type are different and will not be described here.
  • Step 530 Determine whether the received message is a PUR message. If yes, go to step 531; otherwise, go to step 550.
  • Step 531 Determine whether the AS network element is a legal network element type. If yes, go to step 532; otherwise, go to step 550.
  • Step 532 Determine whether the AS host name matches. If yes, go to step 540. If no, go to step 550.
  • This step is implemented as follows: The host name obtained from the PUR message is compared with the host name in Table 1. If the host name with the same host name and the same network element type are not found in the table 1, Then, the network element service operation is determined to be an illegal network element service operation; otherwise, the network element service operation is determined to be a legal network element service operation.
  • Step 540 After the service initiated by the network element is processed according to the protocol specification in the prior art, the process ends.
  • Step 550 Send a response message to the network element.
  • the response message is a result of a result-code (Result-Code) that cannot be processed by the DIAMRTER protocol (DIAMRTER_ UNABLE_TO-COMPLY), indicating that the network element is an illegal network element.
  • Result-Code a result-code that cannot be processed by the DIAMRTER protocol (DIAMRTER_ UNABLE_TO-COMPLY)
  • the message types of the UAR, LIR, MAR, SAR, UDR, SNR, and PUR messages are respectively judged in the order shown in FIG. 6, and different network element types such as I are determined.
  • -CSCF. S-CSCF and AS In the actual business, only some of these operations may be involved; or all of the above operations may be involved, but the order may be different.
  • the method of implementation is the same as the method of the embodiment shown in Fig. 6, and Fig. 6 is only a preferred embodiment of the present invention, and is not intended to limit the present invention.
  • the method for judging the legitimacy of the embodiment of the present invention does not violate the consistency of the determination method of the protocol of the Third Generation Cooperation Organization (3GPP) Telecommunication Standard (TS) 29228 protocol specification and the 29328 protocol specification.
  • 3GPP Third Generation Cooperation Organization
  • step 304 to step 306 after determining that the service operation of the network element is a legitimate service operation, the legality of the service operation is determined from the perspective of the service logic, that is, determining whether the message sent by the network element is a server Assigning a request SAR message, if yes, determining a specified operation in the SAR message; then determining whether the specified operation is legal, and if so, performing the specified operation.
  • the process may also exist independently in the network, and continue to determine whether the message sent by the network element is a server assignment request SAR message from the perspective of the service logic, and if yes, determine the specified operation in the SAR message, and then determine the location. Describe the legality of the specified operation and perform a legal specified operation.
  • the specific implementation process is shown in Figure 7:
  • the judging process is to implement the method when the service operation of the network element is a legitimate service operation, and the method includes:
  • Step 600 Determine whether the message sent by the network element is a server assignment request SAR message; Step 601: If yes, determine that the server assigns a specified operation in the SAR message flow, and if no, step 604 is performed;
  • Step 602 Determine whether the specified operation is a legal designated operation
  • Step 603 If yes, perform the specified operation, and if not, perform step 604;
  • Step 604 Process according to the existing process.
  • the HSS performs the specified operation in the SAR message flow, if the HSS can perform the legality judgment, the process of performing the illegal operation can be effectively avoided, thereby eliminating the security risk of the user data on the HSS side and avoiding the illegal operation occupying the HSS resource. .
  • FIG. 8 is a flowchart for determining the specified operation processing in the SAR message as described in FIG.
  • the HSS receives the SAR message stream transmitted by the S-CSCF.
  • the HSS determines a specified operation in the SAR message flow according to the information carried in the SAR message flow; for example, the HSS determines the specified operation in the SAR message flow according to the value of the AVP (Attribute Value Pair) in the SAR message flow. For example, if Server-Assignment-Type is equal to 1, it means registration; when it is equal to 2, it means re-registration; when it is equal to 5, it means user log-out. For other values, please refer to 3GPP TS 29229 standard.
  • This specified operation is an operation that the S-CSCF needs to perform.
  • the HSS determines the user registration status corresponding to the specified operation according to the stored user data (the user data is the HSS according to the requested user and the status information data saved by the HSS side in the previous service operation).
  • step 703 the HSS is in the user registration state to determine the legality of the specified operation.
  • the process proceeds to step 704, and the HSS performs the designation according to the existing execution process. Operation.
  • step 705 if the HSS determines that the specified operation is an illegal operation, to step 705, the HSS may return the information of the illegal operation to the S-CSCF through the SAA message flow, that is, the HSS does not perform the designation according to the existing execution process. operating.
  • the specified operations in the SAR message flow include: NO - ASSIGNMENT, REGISTRATION, or any of the following specified operations: RE - REGISTRATION, UNREGISTERED— USER (UE notification for non-registered business), TIMEOUT—DEREGISTRATION, TIMEOUT—DEREGISTRATION—STORE—SERVER_NAME (timeout logout for saving service S-CSCF name), USER_DEREGISTRATION (UE logout), USER—DEREGISTRATION — STORE— SERVER— NAME (UE logout for saving service S-CSCF name), DEREGISTRATION—TOO_MUCH— DATA (data long logout), ADMINISTRATIVE—DEREGISTRATION (admin logout), AUTHENTICATION_FAILURE (authentication failure logout), or AUTHENTICATION—TIMEOUT ( Authentication timeout cancellation).
  • RE - REGISTRATION UNREGISTERED— USER (UE notification for non-registered business)
  • NO-ASSIGNMENT When the specified operation in the SAR message flow is NO-ASSIGNMENT, only if and only if the registration status of the UE is: Registered, Unregistered, Unregistered, HSS The NO-ASSIGNMENT operation is determined to be a legal operation.
  • the HSS performs the NO_ASSIGNMENT operation according to the existing method, that is, according to the provisions of the existing protocol, that is, the operation scenario is:
  • the S-CSCF needs to be restarted due to, for example, a fault or the like
  • the operation is initiated to the HSS; in the above process of judging the legality of the NO-ASSIGNMENT operation, if the registration status of the user is other conditions, such as Not registered, the HSS determines this.
  • the secondary NO_ASSIGNMENT operation is an illegal operation.
  • the HSS does not perform the NO_ASSIGNMENT operation, and the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • the HSS When the specified operation in the SAR message flow is a REGISTRATION operation, the HSS will determine that the REGISTRATION operation is only if and only if the UE's registration status is: Authentication Pending or Unregistered. Legal operation, then, HSS is now There is a method to perform the REGISTRATION operation according to the provisions of the existing protocol.
  • the S-CSCF initiates a registration notification operation to the HSS; in the above process of judging the legality of the REGISTRATION operation, if the user registers
  • the status is other conditions, such as Registered or Not registered
  • the HSS determines that the REGISTRATION operation is illegal.
  • the HSS does not perform the REGISTRATION operation, and the HSS can pass the illegal operation information through the SAA.
  • the message flow is replied to the S-CSCF.
  • the HSS determines that the RE_REGISTRATION operation is a legal operation only if and only if the registration status of the UE is: Registered, and then the HSS follows The existing method performs the RE-REGISTRATION operation according to the provisions of the existing protocol; in the above process of judging the legality of the RE-REGISTRATION operation, if the registration status of the user is other conditions, such as Authentication Pending, Unregistered or Not registered, the HSS determines The RE-REGISTRATION operation is illegal. At this time, the HSS does not perform the RE-REGISTRATION operation, and the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • the HSS When the specified operation in the SAR message flow is UNREGISTERED_USER (UE notification notification of non-registered service), the HSS will determine that the UNREGISTEREDJJSER operation is legal only if and only if the status of the UE is: Not registered. Operation, then, the HSS performs the UNREGISTERED-USER operation according to the existing method, such as according to the provisions of the existing protocol; in the above process of judging the legality of the RE-REGISTRATION operation, if the registration status of the user is other conditions, such as Registered, Unregistered or Authentication When Pending, the HSS determines that the RE-REGISTRATION operation is an illegal operation. At this time, the HSS does not perform the RE-REGISTRATION operation, and the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • UNREGISTERED_USER UE notification notification of non-registered service
  • the HSS When the specified operation in the SAR message flow is TIMEOUT_DEREGISTRATION, the HSS will determine that the TIMEOUT_DEREGISTRATION operation is a legal operation only if and only if the state of the UE is Registered. Then, the HSS follows The existing method performs the TIMEOUT_DEREGISTRATION operation according to the provisions of the existing protocol; in the above process of judging the legality of the TIMEOUT_DEREGISTRATION operation, if the registration status of the user is other conditions, such as Authentication Pending, or Unregistered, or Not registered, The HSS determined that the TIMEOUT_DEREGISTRATION operation was an illegal operation. At this time, the HSS does not execute. TIMEOUT_DEREGISTRATION operation, the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • the HSS When the specified operation in the SAR message flow is TIMEOUT_DEREGISTRATION_STORE_SERVER_NAME (timeout logout of the save service S-CSCF name) operation, the HSS will determine the TIMEOUT only if and only if the state of the UE is Registered. — DEREGISTRATION— STORE— SERVER—The NAME operation is a legal operation.
  • the HSS performs the TIMEOUT-DEREGISTRATION-STORE-SERVER-NAME operation according to the existing method, as defined by the existing protocol; in the above judgment TIMEOUT—DEREGISTRATION—STORE—SERVER —
  • TIMEOUT—DEREGISTRATION—STORE—SERVER During the legality of the NAME operation, if the user's registration status is other conditions, such as Authentication Pending, or Unregistered, or Not registered, the HSS determines that the TIMEOUT_DEREGISTRATION_STORE_ SERVER NAME operation is illegal. At this time, the HSS does not execute.
  • the HSS determines that the USER_DEREGISTRATION operation is a legitimate operation only if and only if the status of the UE is Registered, and then the HSS follows the existing The method performs the USER_DEREGISTRATION operation according to the provisions of the existing agreement; in the above process of judging the legality of the USER-DEREGISTRATION operation, if the registration status of the user is other conditions, the authentication Pending, Unregistered or Not registered, the HSS determines the JM The USER-DEREGISTRATION operation is an illegal operation. At this time, the HSS does not perform the USER_DEREGISTRATION operation, and the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • USER_DEREGISTRATION UE logout
  • the HSS performs the USER_DEREGISTRATION-STORE-SERVER_NAME operation according to the existing method, as defined by the existing agreement; in the above judgment USER-DEREGISTRATION-STORE-SERVER — NAME operation is legal
  • the HSS determines that the USER_DEREGISTRATION_STORE_SERVER_NAME operation is illegal. At this time, the HSS does not perform USER DEREGISTRATION.
  • STORE — SERVER — NAME operation the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • the HSS When the specified operation in the SAR message flow is DEREGISTRATION - TOO - MUCH DATA operation, the HSS will determine the DEREGISTRATION only if and only if the status of the UE is Authentication Pending or Registered or Unregistered - The TOO-MUCH-DATA operation is a legal operation. Then, the HSS performs the DEREGISTRATION-TOO-MUCH-DATA operation according to the existing method as specified in the existing protocol; in the above judgment of the DEREGISTRATION-TOO-MUCH-DATA operation legality If the registration status of the user is otherwise, such as Not registered, the HSS determines that the DEREGISTRATION-TOO-MUCH-DATA operation is illegal. At this time, the HSS does not perform the DEREGISTRATION_TOO-MUCH-DATA operation, and the HSS can operate illegally. The information is replied to the S-CSCF through the SAA message flow.
  • the HSS When the specified operation in the SAR message flow is an ADMINISTRATIVE_DEREGISTRATION operation, the HSS will determine that the ADMINISTRATIVE-DEREGISTRATION operation is a legal operation only if and only if the UE status is Registered or Unregistered, and then, The HSS performs the ADMINISTRATIVE-DEREGISTRATION operation according to the existing method, as specified in the existing agreement. In the above process of judging the legality of the ADMINISTRATIVE-DEREGISTRATION operation, if the registration status of the user is other conditions, such as Not registered, the HSS determines this time.
  • ADMINISTRATIVE The DEREGISTRATION operation is an illegal operation. At this time, the HSS does not perform the ADMINISTRATIVE-DEREGISTRATION operation.
  • the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • the HSS determines that the AUTHENTICATION-FAILURE operation is a legal operation only if and only if the status of the UE is Authentication Pending or Unregistered. Then, the HSS performs AUTHENTICATION according to existing methods, such as in accordance with existing protocols.
  • the HSS In the above process of judging the legality of AUTHENTICATION-FAILURE operation, if the registration status of the user is other conditions, such as Registered, or Not registered, the HSS determines that the AUTHENTICATION-FAILURE operation is illegal, at this time, the HSS does not By performing the AUTHENTICATION_FAILURE operation, the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • the HSS determines that the AUTHENTICATION_TIMEOUT operation is a legal operation only if and only if the UE's status is Authentication Pending or Unregistered. Then, the HSS performs the AUTHENTICATION-TIMEOUT operation according to the existing method, such as according to the provisions of the existing protocol; in the above process of judging the validity of the AUTHENTICATION-TIMEOUT operation, if the registration status of the user is other conditions, such as Registered or Not registered, The HSS determines that the AUTHENTICATION-TIMEOUT operation is an illegal operation. At this time, the HSS does not perform the AUTHENTICATION-TIMEOUT operation, and the HSS can reply the illegal operation information to the S-CSCF through the SAA message flow.
  • AUTHENTICATION_TIMEOUT Authentication Timeout Logout
  • the illegal operation information may be DIAMETER-
  • the specified operation in the SAR message flow of the present invention may not be limited to the above-exemplified case, and the HSS may also perform legality judgment only on one or more of the above-specified designated operations, where the HSS is combined with the user registration status. After the legality judgment is performed on the specified operation in the SAR message flow, the process of performing the legal operation belongs to the scope claimed by the present invention.
  • step 800 the HSS receives the SAR message stream transmitted from the S-CSCF, and starts the legality judgment process of the present invention.
  • the HSS determines the specified operation in the SAR message flow according to the value of the AVP in the SAR message flow. If the specified operation is: the first registration operation, the authentication failure logout operation, or the authentication timeout logout operation, go to step 820. , HSS determines whether the user registration status is an authentication pending or non-registered service Status, if the HSS determines that the user registration status is an authenticated pending or unregistered service status, to step 821, the HSS performs the specified operation in the SAR message flow in accordance with the existing protocol specifications. Go to step 860, and the validity of the specified operation in the SAR message flow is judged and the execution process ends.
  • step 820 if the HSS determines that the user registration status is not an authenticated or unregistered service status, to step 822, the HSS will illegally operate the information such as Experimental-Result-Code equal to DIAMETER_ERROR-
  • the SAA message flow of IN_ASSIGNMENT_TYPE (diagnosing type error) is returned to the S-CSCF. Go to step 860, and the validity of the specified operation in the SAR message flow is judged and the execution process ends.
  • step 810 if the HSS determines, according to the value of the AVP in the SAR message flow, the specified operation in the SAR message flow is: a re-registration operation, a timeout logout operation, a timeout logout operation for saving the service S-CSCF name, a UE logout operation, or
  • the process proceeds to step 830, and the HSS determines whether the user registration status is the registered state. If the HSS determines that the user registration status is the registered state, the process proceeds to step 831, and the HSS follows the existing protocol specification. Perform the specified operation in the SAR message flow. Go to step 860 to determine the legality of the specified operation in the SAR message flow and the execution process ends.
  • step 830 if the HSS determines that the user registration status is not the registered status, go to step 822.
  • the HSS replies to the S-CSCF the illegally operated information such as the Experimental-Result-Code equal to DIAMETER ERROR_IN_ASSIGNMENT_TYPE; to step 860, the validity judgment and execution of the specified operation in the SAR message flow. The process ends.
  • step 810 if the HSS determines, according to the value of the AVP in the SAR message flow, that the specified operation in the SAR message flow is: when the UE of the non-registered service is called to notify the operation, to step 840, the HSS determines whether the user registration status is non- The registered service status or the unregistered status, if the HSS determines that the user registration status is the unregistered service status or the unregistered status, to step 841, the HSS performs the specified operation in the SAR message flow according to the existing protocol specification. Go to step 860, and the validity of the specified operation in the SAR message flow is judged and the execution process ends.
  • step 840 if the HSS determines that the user registration status is not the unregistered service status or the unregistered status, the process of the illegal operation of the HSS, such as the Experimental-Result-Code equal to the DIAMETER_ERROR_IN_ASSIGNMENT_TYPE SAA, is performed in step 842.
  • the message flow is replied to the S-CSCF. Go to step 860, and the validity of the specified operation in the SAR message flow is judged and the execution process ends.
  • step 810 if the HSS determines the SAR message flow based on the value of the AVP in the SAR message flow.
  • the specified operation is: when the data long logout operation, the management logout, or the user service data unassigned operation, to step 850, the HSS determines whether the user registration status is a registered state or a non-registered service state, if the HSS determines that the user registration state is The registration status or the unregistered service status, to step 851, the HSS performs the specified operation in the SAR message flow in accordance with the existing protocol specifications. Go to step 860, and the validity of the specified operation in the SAR message flow is judged and the execution process ends.
  • step 850 if the HSS determines that the user registration status is not the registered status or the non-registered service status, to step 842, the HSS will illegally operate the information such as Experimental-Result-Code equal to DIAMETER_ERROR_IN_ASSIGNMENT_TYPE
  • the SAA message flow is replied to the S-CSCF. Go to step 860, and the validity of the specified operation in the SAR message flow is judged and the execution process ends.
  • the embodiment of the present invention further provides an operation processing device, which may be integrated in a server or integrated in other devices, or may exist independently.
  • the structure of the operation processing device is as shown in FIG. 10.
  • the device includes: a receiving and acquiring unit 91, a legality determining unit 92, a first determining unit 93, a second determining unit 94, a designated operation determining unit 95, and a determining executing unit. 96 and/or operate feedback unit 97.
  • the receiving and obtaining unit 91 is configured to receive a service message sent by the peer network element, and obtain corresponding data configuration information.
  • the validity determining unit 92 is configured to determine, according to the service message and the data configuration message, Determining the legality of the network element;
  • the first determining unit 93 is configured to determine whether the service request operation sent by the legal network element is a legal service operation, and send a judgment result of a legitimate service operation;
  • the second determining unit For determining, according to the received judgment result, whether the message sent by the network element is a server assignment request SAR message, the specified operation determining unit 95, configured to determine that the specified operation in the SAR message is received;
  • the determining execution unit 96 is connected to the specified operation determining unit, configured to determine whether the specified operation in the SAR message is legal, and performs a legal designated operation;
  • the operation feedback unit 97 is connected to the specified operation determining unit 95 for feedback illegal The specified operation.
  • the legality determining unit 92 includes a determining subunit 921, an obtaining search subunit 922, and a comparing subunit 923.
  • the determining sub-unit 921 is configured to determine, according to an attribute value of the instruction code in the service message, a network element type of the network element, where the obtaining the search sub-unit 922 is configured to acquire the network element according to the service request. a host name, and searching for a corresponding network element type according to the host name; the comparing subunit 923, configured to compare whether the determined network element type is the same as the found network element type, If they are the same, the network element type of the network element is a legal network element type.
  • the first determining unit 93 includes: a storage subunit 931 and a judging subunit 932.
  • the storage subunit 931 is configured to store a host name configured in advance for the network element.
  • the determining subunit 932 is connected to the obtaining and searching subunit, and is configured to determine the host name of the obtained network element and preconfigure the network element. If the host name is the same, the service operation of the network element is determined to be a legitimate service operation.
  • the judgment execution unit 96 includes a designation operation judgment sub-unit 961 and a designation operation execution sub-unit 962.
  • the specified operation determining sub-unit 961 is connected to the specified operation determining unit 95 for determining whether the specified operation is legal according to the registration status of the storage user, and if so, sending a legal designated operation; the specifying operation executing sub-unit 962, It is connected to the specified operation judging subunit 961 for performing the receiving of the specified operation.
  • the receiving unit 91 is configured to receive a service request sent by the peer network element, and parse the host name of the network element from the service request, and obtain a message corresponding to the network element. And obtaining the host name of the network element and the corresponding network element type from the message. Then, the parsing legality determining unit 92 searches the received host name for the corresponding network element type ID in the pre-configured network element type encoding table, and determines the network element type according to the network element type ID, and then The two NE types are compared. If the two are the same, the NE type is a legal NE. Otherwise, the NE type is invalid.
  • the network element of the network element type is sent to the first determining unit 93, and the first determining unit 93 first obtains the host name of the network element, and then performs the host name and the network element type of the network element. Judging, determining whether the two are consistent, and if yes, determining that the service operation of the network element is a legitimate business operation. And then sent to the second determining unit 94, the second determining unit 94 continues to determine whether the message sent by the network element is a server assignment request SAR message; if so, the specified operation determining unit 95 is based on the user stored in the HSS. The registration status determines whether the specified operation in the SAR message flow is a legal operation.
  • the determination execution unit 96 is notified; otherwise, the operation feedback unit 97 is notified, and the operation feedback unit 97 passes the SAA.
  • the message flow returns the illegal operation information to the S-CSCF, for example, the Experimental-Result-Code is equal to
  • ASSIGNMENT The TYPE SAA message flow is replied to the S-CSCF.
  • the determining execution unit 96 is mainly configured to perform the specified operation in the SAR message flow transmitted by the S-CSCF The execution unit 96 executes the specified operation in the SAR message stream upon receiving the notification of the legality decision of the specified operation determination unit 95.
  • the specific decision process and operation performed by the specified operation determining unit 95 are as follows:
  • the specified operation determining unit 95 determines the SAR when it is determined that the specified operation in the SAR message flow is the first registration operation, the authentication failure logout operation, or the authentication timeout logout operation, and the user registration status is the authentication pending or non-registered service state.
  • the specified operation in the message flow is a legal operation, and the notification execution unit 96; when the user registration status is another registration status, the illegal operation information is returned to the S-CSCF through the SAA message flow.
  • the specified operation determining unit 95 determines that the specified operation in the SAR message flow is a re-registration operation, a timeout logout operation, a timeout logout operation of saving the service S-CSCF name, a UE logout operation, or a UE logout operation of saving the service S-CSCF name,
  • the specified operation in the SAR message flow is determined to be a legal operation, and the judgment execution unit 96 is notified; when the user registration status is another registration status, the illegal operation information is returned to the S through the SAA message flow.
  • -CSCF the specified operation in the SAR message flow is a re-registration operation, a timeout logout operation, a timeout logout operation of saving the service S-CSCF name, a UE logout operation, or a UE logout operation of saving the service S-CSCF name
  • the specified operation determining unit 95 determines that the specified operation in the SAR message flow is a non-registered service
  • the UE When the UE is called to notify the operation, and the user registration status is the unregistered state, it is determined that the specified operation in the SAR message flow is a legal operation, and the judgment execution unit 96 is notified; when the user registration status is another registration status, the SAA message flow will be Illegal operation information is returned to the S-CSCF.
  • the specified operation determining unit 95 determines that the specified operation in the SAR message flow is a data long logout operation, a management logout, or a user service data unassigned operation, and the user registration status is an authenticated pending or registered state or a non-registered service state.
  • the judgment execution unit 96 is notified; when the user registration status is another registration status, the illegal operation information is returned to the S-CSCF through the SAA message flow.
  • the present invention further provides a server for determining the legality of operation of a network element service, and a schematic structural diagram thereof is shown in FIG.
  • the server is a subscription user server for storing subscription user information, and includes: an interface 10, a parsing unit 11, and a service processing unit 12.
  • the interface 10 is configured to receive a service request initiated by the network element, and send the service request to the parsing unit 11.
  • the parsing unit 11 is configured to receive the service request sent by the interface, obtain the message initiated by the network element, parse the host name of the network element, and send the message and the parsed host name to the service processing unit 12.
  • the service processing unit 12 is configured to configure a host name of the network element, receive a host name and a message sent by the parsing unit, determine whether the network element type of the network element is a legal network element type, and if yes, compare the received host name and configuration. If the host name is the same, if the host name is consistent, the network element service operation is determined to be a legal network element service operation. It should be noted that the host name of the configuration mentioned here refers to the host name of the network element stored in Table 1.
  • the service processing unit 12 is further configured to compare whether the host name sent by the parsing unit 11 and the configured host name are consistent, and if not, determine that the network element service operation is an illegal network element service operation, and generate a response message. Sending the response message to the parsing unit, where the response message carries the network element service operation as the illegal network element service operation information.
  • the parsing unit is further configured to receive the response message, and send the response message to the interface.
  • the interface 10 receives the response message, and sends the response message to the network element that initiates the service request.
  • the subscriber server first determines whether the network element type of the network element that initiates the service request is a legal network element type. If the network element type is a legal network element type, further determine the host name carried by the network element. It is consistent with the pre-configured host name. If they are consistent, the network element service operation is determined to be a legal network element service operation.
  • the network element that communicates with the subscriber server can be uniquely identified by the host name, and only one host name matching the network element that initiates the service request is configured in the network element type code table, so that the network element service operation can be accurately determined. legality.
  • FIG. 12 is a schematic structural diagram of the service processing unit in FIG. 11. As shown in FIG. 12, the service unit 12 includes: a storage subunit 121 and a decision subunit 122.
  • the storage subunit 121 is configured to configure a host name of the network element, and send the host name to the determining subunit.
  • the determining sub-unit 122 is configured to receive the host name and the message sent by the parsing unit 11, receive the host name sent by the storage sub-unit 121, and determine whether the network element type of the network element is a legal type according to the host name and the message sent by the parsing unit 11, If yes, it is determined whether the two host names are consistent. If they are consistent, the network element service operation is determined to be a legal network element service operation. If the network element service operation is an illegal network element service operation, a response message is generated. Sending the response message to the parsing unit 11.
  • the network element in the embodiment introduced in FIG. 11 and FIG. 12 includes: an I-CSCF, or an AS carrying a PUR message in a service request. If the network element is an S-CSCF, or an AS that carries the UDR of the IFC and the SNR message, the parsing unit 11 is further configured to parse the network element name of the network element from the message initiated by the network element, and name the network element Send to the decision subunit.
  • the storage sub-unit 121 is further configured to configure a network element name of the network element, and send the configured network element name to the determining sub-unit 122.
  • the determining sub-unit 122 is further configured to receive the network sent by the parsing unit 11 in addition to determining whether the two host names are consistent according to the host name sent by the parsing unit 11 and the storage sub-unit 121 received in the embodiment of the server.
  • the name of the cell, and the name of the cell to be sent by the storage sub-unit 121 If the names of the two NEs are the same, when the host name and the NE name are the same, the operation of the NE can be determined as a legal service operation.
  • the name of the network element to be configured here refers to the name of the network element of the network element stored in Table 1.
  • the interface is a Cx or Dx interface.
  • the interface is a Sh or Dh interface.
  • the method and the server for implementing the technical solution of the present invention are described by taking the contracted user server as an HSS as an example.
  • Other contracted user servers having the same principle are also within the protection scope of the present invention.
  • the network element determines whether the network element type is legal, and determining whether the host name is consistent, if the agreement is consistent, determining the legality of the network element service operation, if legal, on the other hand, Then, the network element is judged from a logical point of view, that is, the legality judgment is performed on various operation definitions specified by the S-CSCF through the SAR message flow, and if the operation is a legal operation, the operation is performed.
  • the specified operation in the SAR message flow is filtered, thereby avoiding the process of the HSS performing the illegal operation and reducing the occupation of the HSS resource by the illegal operation. It also reduces the security risks of storing data in the HSS.
  • the HSS completes the SAR/SAA interaction process by returning the illegal operation information to the S-CSCF, and improves the security of the HSS side user data and the legal operation. effectiveness. At the same time, it ensures the accurate judgment of the legality of the operation of the network element, and ensures the security of the user data and the reliability of the IMS service.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

操作处理方法、 装置及业务操作合法性判定方法51^务器 本申请分别要求于 2006年 4月 24日、 2007年 2月 1 日提交中国专利局、 申请号分别为 200610076004.3、 200710006445. 0, 发明名称分别为 "IP多媒体 子系统中的操作处理方法和归属签约用户服务器"、 "一种对网元业务操作合法 性进行判定的方法和服务器" 的中国专利申请的优先权, 其全部内容通过引用 结合在本申请中。
技术领域
本发明涉及网络通信技术领域, 具体涉及一种操作处理方法、 装置及业务 操作合法性判定方法及服务器。
背景技术
IMS ( IP Multimedia Subsystem, IP多媒体子系统)核心部分主要包括 P-CSCF、 I-CSCF、 S-CSCF、 HSS以及 AS等网元。 P-CSCF提供代理功能, 即接 受业务请求并转发它们; I-CSCF提供本域用户服务节点分配、路由查询以及 IMS 域间拓朴隐藏功能; S-CSCF负责对 UE的注册鉴权和会话控制, 执行针对主叫 端及被叫端 IMS用户的基本会话路由功能, 并根据用户签约的 IMS触发规则,在 条件满足时进行到 AS的增值业务路由触发及业务控制交互; HSS 是归属网络 中保存 IMS用户的签约信息, 包括基本标识、 路由信息以及业务签约信息等集 中综合数据库; AS主要为 IMS用户提供 IP多媒体增值业务。 IMS新引入了 IMPI ( IMS Private Identity, IMS私有标识)和 IMPU ( IMS Public Identity, IMS公共 标识) 两种用户标识, 其中, IMPI为 IMS用户私有标识, 用来标识 UE ( User Equipment, 用户设备) , 并与 UE对应; IMPU为 IMS用户的公共标识, 是用来 标识彼此通信的一种符号,相当于电话号码。用户的状态是指 IMPI - IMPU对的 状态。
注册流程是 UE与网络进行双向鉴权认证和分配网络资源的过程, 用户的注 册状态包括: 鉴权未决 ( Authentication Pending ) 、 已注册(Registered ) 、 非 注册业务状态 ( Unregistered )和未注册( Not registered ) 4种状态, 上述四种注 册状态可以互相转换。
注销流程是释放为 UE分配的各种资源的过程, 与注册功能相对应。 根据发 起对象的不同, 注销又可分为 UE注销和网络注销两种, 其中, 网络注销可进一 步划分为 HSS ( Home Subscriber Server, 归属签约用户服务器)发起的网络注 销和 S-CSCF ( Serving Call Session Control Function, 服务呼叫会话控制功能) 发起的网络注销。
UE首次注册由 UE在首次接入 IMS网络如 UE开机时发起, UE经过 P-CSCF进 入 IMS网络, 整个注册过程如附图 1所示。
图 1中, 在步骤 1、 UE在拜访网络获得与 IP网络互连的通路后, 通过该通路 发送 SIP( Session Initiated Protocol,起始会话协议 )注册消息流到 P-CSCF( Proxy CSCF, 代理 CSCF ) 。 SIP注册消息流的主要 IE ( Information Element, 信元) 包括: IMPU, IMPI, 归属网域名和 UE的 IP地址。
到步骤 2、 P-CSCF接收到 SIP注册消息流后, 通过查询归属网域名找到归属 网的 I-CSCF ( Interrogating CSCF,查询 CSCF ),并将注册消息流转发给 I-CSCF, 转发的注册消息流的主要 IE包括: P-CSCF地址或域名, IMPU, IMPI, P-CSCF 网络标识和 UE的 IP地址。
到步骤 3、 I-CSCF通过向 HSS发送 UAR (用户授权请求) 消息流进行 UE接 入权限认证, 消息流主要 IE包括 IMPU, IMPI和 P-CSCF网络标识。
步骤 3中, HSS检查 UE是否已经注册, 根据 UE签约以及运营商的约束决定 是否允许 UE通过该 P-CSCF进行注册, 如果允许 UE通过 P-CSCF的注册, 到步骤 4。
到步骤 4、 HSS判断是否允许该用户检入, 如果允许该用户检入, 则 UAA (用户授权应答)作为 UAR的响应消息流由 HSS发送给 I-CSCF, 响应消息流主 要反馈可供 UE服务的 S-CSCF名称(本文也称为 S-CSCF网元名称)或能力。 如 果 HSS知道 UE的 S-CSCF名称, 则返回 S-CSCF名称。 在有必要重新选择 S-CSCF 时, HSS应该返回 S-CSCF能力。 当 UAA中包含 S-CSCF名称和能力时, I-CSCF 可以执行一个新 S-CSCF的指派。 当 UAA中只有能力返回时, I-CSCF应该基于返 回的能力进行新 S-CSCF的选择。 到步骤 5。
在步骤 4, 如果确定出检入 HSS不成功, 则 HSS应该返回拒绝尝试注册的 UAA, 本次注册过程结束。
在步骤 5、 I-CSCF通过域名 -地址机制, 利用 S-CSCF名称确定 S-CSCF的 IP 地址, 同时, 通过基于 HSS返回的信息也确定相匹配的归属网络接入点。 然后 I-CSCF将注册消息流发送给选定的 S-CSCF。
到步骤 6、 S-CSCF将向 HSS发送 MAR (媒体鉴权请求) 消息流进行鉴权五 元组申请, 该消息流主要 IE包括: IMPU、 IMPL S-CSCF名称、 申请的鉴权五 元组数量和申请的鉴权模式。
到步骤 7、 HSS为该 UE保存下发的 S-CSCF名称, 同时, 在将该 UE的注册状 态置为鉴权未决 ( Authentication Pending )后, 返回 MAA (媒体鉴权应答) 消 息流给 S-CSCF, 返回的 MAA主要 IE包括: IMPU、 IMPL 鉴权五元组数量和所 有的鉴权五元组。
从步骤 8到步骤 15, S-CSCF将申请到的其中一组鉴权五元组用于 UE与 IMS 网络之间的双向认证过程。
到步骤 16, S-CSCF向 HSS发送 SAR ( Server-Assignment- Request, 服务器指 派请求)注册通知消息流, 该消息流的主要 IE包括: IMPU、 IMPI和 S-CSCF名 称。
到步骤 17、 如果 SAR为注册通知消息, 并且请求的 S-CSCF名称和 HSS已保 存的相一致, HSS清除 UE的鉴权未决 ( Authentication Pending )状态, 并将注 册^ 态置为已注册( Registered )后, 通过 SAA ( Server- Assignment- Answer, 月良 务器指派应答) 消息流向 S-CSCF下发 UE相关的用户数据和计费信息。
从步骤 18到步骤 20、 S-CSCF将注册成功的 SIP消息流通过 I-CSCF、 P-CSCF 通知 UE。
在图 1中, 介绍了 UE首次发起注册, 即首次接入 IMS网络的全过程。 与 注册过程相对应的过程是注销过程, 注销又分为 UE端发起的注销 '和 IMS网络 侧发起的注销两种。 IMS网络侧发起的注销又分为: HSS发起的注销和 S-CSCF 发起的注销。 当用户注册后, 如果 UE又要发起注销, 下面介绍 UE发起注销 的过程。
请参阅图 2, 为现有技术中 UE进行注销的流程示意图。 图 2所示, 该流程 包括:
步骤 201 : UE向 P-CSCF发起注销消息, 为了注销, UE发起一个期满时 间值( expiration value )为零的 SIP REGISTER请求。
其中, 该注销消息中包括: IMPU、 IMPL 归属网络域名和 UE的 IP地址。 步骤 202: P-CSCF将注销消息发送给 I-CSCF。
在本步骤中, P-CSCF 根据步骤 201 中接收到的归属网络域名查找到 I-CSCF, 并将注销消息发送给该 I-CSCF。
其中, 该消息包括: P-CSCF的地址或域名、 IMPU、 IMPL P-CSCF 网络 标识和 UE的 IP地址。
步骤 203: I-CSCF向 HSS发送 UAR消息。
在本步骤中, I-CSCF向 HSS发送 UAR消息查询 UE的状态,该消息包括: IMPL IMPU> P-CSCF网络标识和 I-CSCF主机名称。
步骤 204: HSS应确定 UE已经注册, 同时向 I-CSCF发送 UAA消息。 在该 UAA消息中携带当前为 UE服务的 S-CSCF网元名称和 I-CSCF主机 名称。
步骤 205: I-CSCS向 S-CSCF发送注销消息。
在本步骤中, I-CSCF根据域名 -地址机制, 利用步骤 204中荻取的 S-CSCF 网元名称查询出 S-CSCF的 IP地址, 向该 S-CSCF发送注销消息。
步骤 206: S-CSCF通过 SAR消息向 HSS发送注销通知。
该 SAR消息中包括: IMPU、 IMPL S-CSCF网元名称和主机名称。
步骤 207: 如果 SAR请求的 S-CSCF名称和 HSS已经保存的相一致, HSS 将 UE的注册^ >态置换为 Not registered或 Unregistered。
在本步骤中, HSS应清除或者保留已保存的为 UE服务的 S-CSCF的网元 名称, 通过 SAA消息向 S-CSCF返回操作结果。
步骤 208〜步骤 210: S-CSCF将注销成功的消息通过 I-CSCF和 P-CSCF发 送给 UE。
图 1和图 2所示的实施例,介绍了现有技术中 UE进行注册和注销的过程, 应用服务器(AS )是 IMS中提供 IP多媒体增值业务的网元, AS可以使用用户 数据请求( UDR )消息向 HSS查询数据, 也可以使用订阅通知请求( SNR )消 息向 HSS订阅签约用户数据, 下面介绍 AS进行订阅的流程。
图 3为现有技术中 AS进行订阅的流程示意图。 如图 3所示, 该流程包括 以下步骤:
步骤 301: AS向 HSS发送用户数据更新请求( PUR ) 消息。 在本步骤中, AS通过 PUR消息在 HSS中为 UE存储用户签约业务数据, 例如, 透明数据。
步骤 302: HSS向 AS发送用户数据更新响应 (PUA ) 消息。
步骤 303: UE向 S-CSCF发起注册。
在本步骤中, UE发起注册的过程与图 1所示注册方法相同,这里就不做赘 述。
步骤 304: UE下载用户签约数据。
在本步骤中, 用户通过 SAR消息从 HSS下载用户签约数据, 例如, 用户 初始过滤标准(IFC )。
步骤 305: S-CSCF向用户发送 200OK消息。
该消息标识操作成功。
步骤 306: S-CSCF向 AS发送第三方 SIP消息。
S-CSCF通过发送第三方 SIP消息到 AS , 通知 UE已经注册成功。
步骤 307: AS向 S-CSCF发送 200OK消息。
步骤 308: AS向 HSS发送 UDR消息。
通过该消息从 HSS下载数据, 这些数据是提供业务所必需的数据, 在该消 息中携带 AS的网元名称和主机名称。
步骤 309: HSS向 AS发送用户数据响应 ( UDA )。
在该消息中, 携带 AS要求下载的业务数据。
步骤 310: AS向 HSS发送 SNR消息。
当业务数据发生变化时, AS通过该 SN 消息向 HSS订阅变化后的业务数 据, 在该消息中携带 AS的网元名称和主机名称。
步骤 311: HSS向 AS发送订阅通知响应 ( SNA ) 消息。
HSS通过该 SNA消息向 AS反馈操作结果。
步骤 312: 更新 HSS中的业务数据。
步骤 313: HSS向 AS发送更新通知请求(PNR ) 消息。
HSS向 AS发送 PNR消息, 通知 AS步骤 310中的业务数据已经被更新。 步骤 314: AS向 HSS发送更新通知响应 ( PNA ) 消息。
AS通过该 PNA消息通知 HSS 已经接收到该通知。 步骤 315: AS决定更新 HSS中的数据。
步骤 316: AS向 HSS发送 PUR消息。
AS使用该 PUR消息更新 UE的业务数据。
步骤 317: HSS向 AS发送 PUA消息。
HSS通过该 PUA消息通知 AS数据被更新的操作结果。
由上面的实施例可以看出, 当 UE注册时, 会将 S-CSCF网元名称和主机 名称携带在 MAR或 SAR消息中; 当 UE或网络发起注销时, 会将 S-CSCF网 元名称和主机名称携带在 S-CSCF发起的网络注销操作的 SAR消息中。
AS的网元名称和主机名称, 携带在 AS查询 IFC数据的 UDR消息和订阅 用户 IFC数据的 SNR消息中。
上述 MAR消息、 SAR消息、 UDR消息和 SNR消息中均存在一个名为服 务器 -名称 (Server-Name ) 的属性值对( AVP )和原始 -主机 ( Origin-Host ) 的 AVP, 其中, Server-Name的 AVP的值为 S-CSCF的网元名称。
当 I-CSCF发起的业务请求中携带 UAR消息和即时位置请求(LIR ) 消息 时, 和当 AS发起的业务请求中携带 PUR消息时, 在 UAR消息、 LIR消息和 PUR消息中只携带主机名称, 该主机名称为 Origin-Host的 AVP的值。
S-CSCF 网元名称的命名格式符合 SIP 统一资源标识 (URI ), 例如, sip:s-cscf@huawei.com是一个合法的 S-CSCF网元名称; 而主机名称的命名格 式没有要求必须符合 SIP URI的命名规则, 比如 s-cscf、 s-cscf.huawei.com或 sip:s-cscf@huawei.com等, 都是合法的 S-CSCF 主机名称。 AS 的命名规则与 S-CSCF的命名规则相同, 比如, AS的网元名称可以为 sip:as@ huawei.com, 主机名称可以命名为 as、 as.huawei.com或 sip:as@huawei.com等等。
现有技术中, HSS对网元进行网元业务操作合法性判定的方法如下: HSS 将自身预先配置的网元名称与网元携带的网元名称进行比较, 如果相同, 则认 为该网元业务操作为合法网元业务操作, 这些网元包括: S-CSCF、 AS、 I-CSCF 等。
但是实际操作中, 网元名称可以被网络中的其他网元所获取, 例如, 其他 网元可以通过 4艮文或网元维护工具来捕获该网元名称, 由于其他任何网元都能 够获取发起业务的 S-CSCF网元名称, 在上述 UE注册、 UE注销、 UE被叫和 S-CSCF发起的网络注销操作中,如果其他非法网元以获取的 S-CSCF的网元名 称发起上述业务请求时, HSS仍然会判定网元发起的业务操作是合法网元业务 操作, 从而不能确保 S-CSCF业务操作的合法性。
另外, 当某 AS在查询用户 IFC数据, 以及订阅用户 IFC数据的操作中, 任何一个 AS均能够获取该 AS的网元名称,并以该网元名称进行查询用户 IFC 数据, 以及订阅用户 IFC数据的操作, 因为网元名称是正确的, 所以 HSS会判 定该网元业务操作是合法的网元业务操作, 不能确保携带 UDR和 SNR消息的 AS业务操作的合法性。
此外, 在 I-CSCF发起的业务请求的 UAR消息、 LIR消息中, 和 AS发起 的业务请求的 PUR消息中只携带主机名称, 所以 HSS无法根据网元名称, 对 I-CSCF和携带所述 PUR消息的 AS进行网元业务操作合法性判定,从而无法确 保 I-CSCF和携带所述 PUR消息的 AS的业务操作的合法性。
由此可见, 现有技术中, HSS对网元进行网元业务操作合法性判定主要是 将自身已经保存的网元名称与网元请求消息携带的网元名称进行比较, 如果相 同,则认为该网元业务操作为合法网元业务操作,这些网元包括: S- CSCF、 AS、 I-CSCF等。 但是, 在实际操作中, 网元名称可以被网络中的其他网元所获取, 他任何网元都能够获取发起业务的 S-CSCF网元名称, 在上述 UE注册、 UE注 销、 UE被叫和 S-CSCF发起的网络注销操作中, 如果其他非法网元以获取的 S-CSCF 的网元名称发起上述业务请求时, HSS仍然会判定网元发起的业务操 作是合法网元业务操作, 从而不能确保 S-CSCF业务操作的合法性。
另外, 在如图 1所示的 UE注册流程中, 所述 SAR消息流中存在一个名为 Server-Assignment-Type (月 务器指派类型)的 AVP ( Attribute Value Pair, 属性 值对), 该 AVP的主要作用在于定义通知 HSS执行的各种操作码, 如首次注册、 重注册、 注销等, 其取值包括 NO— ASSIGNMENT (用户业务数据未指派) ; REGISTRATION (首次注册) RE_REGISTRATION (重注册)等12种(具体详 见 3GPP TS 29228协议规范) 。 但是, 在现有的 3GPP TS 29228协议规范针对上 述 SAR定义的操作只对用户合法性以及必须的处理作了规定, 对于 S-CSCF发起 的各种操作的合法性没有作规定, 如当用户为未注册的 Unregistered状态时, S-CSCF发起重注册操作, 如果 HSS执行该重注册操作, 则会给 HSS中存储的数 据带来操作安全上的隐患。
发明内容
本发明实施例提供一种操作处理方法、 装置及业务操作合法性判定方法及 服务器, 以消除目前技术中 HSS侧用户数据的安全隐患, 并提高合法操作的处 理效率问题。
为解决上述技术问题, 本发明的实施例提供的一种操作处理方法, 所述方 法包括:
接收网元发送的业务消息;
根据所述业务消息确定所述网元的合法性;
判断所述合法网元发送的业务请求操作是否为合法业务操作;
若是, 则判断该网元发送的消息是否为服务器指派请求 SAR消息, 若是, 则确定 S AR消息中的指定操作;
当所述指定操作为合法操作时, 执行所述指定操作。
另外, 本发明的实施例还提供一种操作处理装置, 所述操作处理装置包括: 接收单元, 用于接收网元发送的业务消息及获取对应的数据配置消息; 合法性确定单元, 用于根据所述业务消息及数据配置消息确定所述网元的 合法性;
第一判断单元, 用于判断所述合法网元发送的业务请求操作是否为合法业 务操作, 并发送是合法业务操作的判断结果;
第二判断单元, 用于根据接收到判断结果, 继续判断该网元发送的消息是 否为服务器指派请求 SAR消息;
指定操作确定单元, 用于确定接收到所述 SAR消息中的指定操作; 判断执行单元, 与指定操作确定单元相连, 用于判断所述 SAR消息中的指 定操作是否合法, 并执行合法的指定操作。
另外, 本发明实施例还提供一种 IP多媒体子系统中的操作处理方法, 适用 于 S-CSCF和 HSS之间的 SAR和 SAA消息流的交互过程, 在该交互过程中所 述方法包括步骤:
a、 HSS在接收到 S-CSCF传输来的 SAR消息流后, 根据 SAR消息流中承载的 信息确定 SAR消息流中的指定操作;
b、 HSS根据用户注册状态确定出所述指定操作为合法操作时, 执行所述指 定操作。
此外, 本发明实施例还提供一种对网元业务操作合法性进行判定的方法, 该方法包括: 预先配置网元的主机名称;
A、 接收网元发起的业务请求, 获取所述网元发起的消息, 解析出所述网 元的主机名称;
B、 根据所述主机名称和所述消息, 判断所述网元类型是否合法; 如果是, 执行步骤 C;
C.比较所述解析出的主机名称与所述配置的主机名称是否一致,如果一致, 判定该网元业务操作为合法网元业务操作。
相应地, 本发明是还提供一种对网元业务操作合法性进行判定的服务器, 所述服务器用于存储用户的签约信息, 包括: 接口、 解析单元和业务处理单元; 所述接口, 用于接收网元发起的业务请求, 将所述业务请求发送给所述解 析单元;
所述解析单元, 用于接收所述业务请求, 获取所述网元发起的消息, 解析 出所述网元的主机名称;将所述主机名称和所述消息发送给所述业务处理单元; 所述业务处理单元, 用于配置所述网元的主机名称, 接收解析单元发送的 所述主机名称和消息; 判断所述网元的网元类型是否合法; 如果是, 比较所述 接收到的主机名称和所述配置的主机名称是否一致, 如果一致, 判定所述网元 业务操作为合法网元业务操作。
由上述技术方案可知, 本发明实施例通过判断网元类型是否合法, 以及对 网元业务操作合法性进行判定, 确保了对网元业务操作合法性的准确判断, 保 证了用户数据安全和 IMS业务的可靠性; 然后再通过结合用户注册状态对 SAR 消息流中的指定操作进行合法性判断, 对 SAR 消息流中的指定操作进行了过 滤, 避免了 HSS执行非法操作的过程, 减少非法操作对 HSS资源的占用, 同 时, 也减小了 HSS中存储数据的安全隐患, 提高合法操作的处理效率。
附图说明
图 1是现有技术中首次注册的注册过程流程图; 图 2是现有技术中用户注销过程流程图;
图 3是现有技术中用户订阅过程的流程图;
图 4是本发明实施例所述操作处理方法的流程图;
图 5是本发明实施例操作处理方法中对网元业务操作合法性进行判定的流 程图;
图 6是本发明实施例操作处理方法中对网元业务操作合法性判断的另一流 程图;
图 7是本发明实施例操作处理方法中指定操作合法性判断的流程图; 图 8是图 7中所述判断 SAR消息中的指定操作处理的流程图;
图 9是图 7中所述判断 SAR消息中的指定操作处理的另一流程图;
图 10是本发明实施例所述操作处理装置的结构示意图;
图 11 是本发明实施例对网元业务操作合法性进行判定的服务器的结构示 意图;
图 12是图 11中所述业务数据处理单元的结构示意图。
具体实施方式
下面结合附图及具体实施例对本发明作进一步的详细说明。
请参阅图 4, 为本发明实施例中操作处理方法的流程图, 所述方法包括: 步驟 301 : 接收网元发送的业务消息;
步骤 302: 据所述业务消息确定所述网元的合法性;
步骤 303: 判断所述合法网元发送的业务请求操作是否为合法业务操作, 若 否, 执行步骤 307, 结束;
步骤 304:若是,则判断该网元发送的消息是否为服务器指派请求 SAR消息, 若是, 则确定 SAR消息中的指定操作 (即步骤 305 ) ; 若不是, 执行步骤 307, 结束;
步骤 306: 当所述指定操作为合法操作时, 执行所述指定操作;
步骤 307: 按照现有的流程处理。
在本发明的实施例中, 首先对请求业务操作从网元名称和 /或主机名称进行 合法性判断作第一道门槛补充; 然后再对请求业务操作从业务逻辑的角度进行合 法性补充, 这是对^务较内部层次的一种完善性判断, 从而可以确保业务数据的 安全性。
为了便于本领域技术人员的理解, 下面分别对上述流程进行说明。
在步骤 301至 303中, 预先配置网元的主机名称和网元名称; 接收网元发 起的业务请求, 从该请求中解析出网元的主机名称, 以及根据主机名称查找对 应的网元类型; 获取该网元请求的消息类型, 并从该消息类型确定请求网元类 型, 然后比较所述获取的网元类型和查找到的网元类型进行比较, 来判断该网 元类型是否合法, 若该请求网元的网元类型合法, 再判断所获取的该网元的主 机名称与预先配置的该网元得到主机名称是否相同, 若相同, 则判定该网元的 业务操作为合法网元业务操作。 当然, 对请求业务操作从网元名称和 /或主机名 称进行合法性判断也可以独立存在于网络中, 对网元的业务操进行合法性判断, 也可以保证用户数据安全和 IMS业务的可靠性。 其具体的实现过程以图 4和图 5为例)。 其具体的实现过程请参阅图 4。
请参阅图 5, 为本发明实施例操作处理方法中对网元业务操作合法性进行 判定的流程图, 如图 5所示, 该方法包括:
步骤 401 : 接收网元发起的业务请求, 获取该网元发起的消息, 解析出该 网元的主机名称。
本步骤中, 从网元发起的业务请求中获取主机名称, 这里所指的网元可以 是: I-CSCF或携带 PUR消息的 AS。
主机名称在相应的消息中携带: 比如, 在 S-CSCF发起的 MAR或 SAR消 息中携带 S-CSCF的主机名称; 在 AS发起的 PUR消息中携带 AS的主机名称。
各消息中携带的 Origin-Host的隱中存放有主机名称。
步骤 402: 根据主机名称和网元发起的消息, 判断该网元的网元类型是否 合法, 如果是, 则执行步骤 403; 否则, 执行步骤 405。
在本步骤具体判定方法如下: 根据该主机名称, 在预先配置的网元类型编 码表中查找对应的网元类型 ID, 根据该网元类型 ID确定网元类型; 根据网元 发起的消息确定网元类型。 将这两个网元类型进行比较, 如果两者一致, 则表 示该网元类型为合法网元类型, 则执行步骤 403; 否则, 执行步骤 405。 这里所 述的网元类型编码表是指, 存放主机名称、 网元类型 ID和网元名称, 及其对应 关系的网元类型编码表。 在本步骤中, 居网元发起的消息确定网元类型的方法可以为: 判断消息 的类型, 如果该消息至少包括: UAR消息和 LIR消息两者中的一个, 则确定该 网元类型为 I-CSCF; 如果该消息至少包括: UDR消息, SNR以及 PUR消息三 者中的一个,则确定该网元类型为 AS;如果消息中至少包括: MAR消息和 SAR 消息中的至少一个, 可以确定该网元为 S-CSCF。
步骤 403: 比较获取该网元的主机名称与预先配置的主机名是否相同, 若 相同, 则执行步骤 404; 否则, 执行步骤 405。
其中, 所述预先配置的主机名称是指, 在步骤 401之前预先配置该网元的 主机名称。
步骤 404: 判定该网元业务操作为合法网元业务操作。
步骤 405: 判定该网元业务操作为非法网元业务操作, 结束本流程。
在本实施例中, 如果发起业务请求的网元是 S-CSCF、 或者携带查询 IFC 的 UDR和订阅 IFC的 SNR消息, 或者两者中的一个的 AS时。 步骤 403之后 还进一步包括: 预先配置网元的网元名称, 判断网元发起的消息中携带的网元 名称和预先配置的网元名称是否一致, 当一致时, 执行步骤 404的操作; 否则 执行步骤 405的操作。 需要指出的是, 该判断网元名称是否一致的步骤可以在 步骤 403之前, 即当网元名称一致时, 再执行步骤 403。
本发明实施例所涉及到的网元业务操作主要包括:
UE首次注册( REGISTRATION ); UE重注册( RE— REGISTRATION ); 非注册业务的 UE被叫 ( UNREGISTERED— USER );
超时注销 ( TIMEOUT_DEREGISTRATION );
保存 S-CSCF名称的超时注销 ( TIMEOUT— DEREGISTRATION STORE — SERVER— NAM^ );
UE注销 ( USER— DEREGISTRATION );
保存月良务 S-CSCF名称的 UE注销 ( USER— DEREGISTRATION— STORE
—SERVER— NAME );
数据超长注销 ( DEREGISTRATION— TOO— MUCH_DATA );
管理注销 ( ADMINISTRATIVE— DEREGISTRATION );
鉴权失败注销 ( AUTHENTICATION— FAILURE ); 鉴权超时注销( AUTHENTICATION—TIMEOUT ); 但并不限于此, 也可以 时其他等操。
请参阅图 6, 为本发明实施例操作处理方法中对网元业务操作合法性判断 的另一流程图, 如图 6所示, 具体包括:
步骤 500: 判断接收到的消息是否为 UAR和 LIR, 或者两者中的一个, 如 果是, 则执行步骤 501 ; 否则, 执行步骤 510。
在本步骤中, 根据消息中已有的指令码 ( Command-Code ) 的属性值 AVP 判断消息的类型, 所述 Command-Code的 AVP的不同值对应不同的消息类型, 这点可参见相关协议规定, 在此不再详细的描述。
步骤 501 : 判断该 I-CSCF是否为合法网元类型; 如果是, 则执行步骤 502 否则, 执行步骤 550
本步骤的具体实现如下: 才艮据主机名称查询出网元类型 ID, 进一步由该网 元类型 ID确定网元类型。 确定网元类型 ID的具体操作如表 1所示, 表 1为网 元类型编码表。
表 1 网元类型 ID 网元类型
Figure imgf000015_0001
网元名称
1 I-CSCF xxxl sip:xxxl
2 S-CSCF xxx2 sip:xxx2
3 AS xxx3 sip:xxx3
4 GGSN xxx4
5 SGSN xxx5 协 没有
6 MSC Server xxx6 协
7 GMSC Server xxx7 根据 Origin-Host的 AVP中存放的网元的主机名称 , 根据主机名称, 对应 表 1查出网元类型 ID, 居该网元类型 ID进一步确定网元类型。 例如, 如果 主机名称为 χχχΐ , 则才艮据表 1对应查出网元类型 ID为 1, 即可以确定该网元类 型为 I- CSCF。
因为在步骤 501中, 判断出网元发起的消息是 UAR和 LIR, 或者两者中的 一个; 因此可以确定该网元为 I-CSCF。 在本步骤中通过两种途径获取的网元类 型均为 I-CSCF, 因此可以判定该网元类型为合法网元类型 J-CSCF, 执行步骤 502。
步骤 502: 判断 I-CSCF主机名称是否匹配, 如果匹配执行步骤 540, 否则, 执行步骤 550。
本步骤具体实现为: 将从 UAR或 LIR消息中获取的主机名称与 HSS预先 配置在表 1 中的主机名称进行比较, 如果该网元类型编码表中不存在与获得的 主机名称相同的主机名称且网元类型相同的记录, 则判定该网元业务操作为非 法网元业务操作; 否则, 则判定该网元业务操作为合法网元业务操作。
步骤 510: 判断接收到的消息是否为 MAR和 SAR消息, 或者两者中的一 个, 如果是, 则执行步骤 511; 否则, 执行步骤 520。
在本步骤中,根据消息中的已有 Command-Code的 AVP的值判断消息的类 型, Command-Code的 AVP的不同值对应不同的消息类型, 这点可参见相关协 议规定, 这里不再详述。
步骤 511 : 判定该 S-CSCF网元是否为合法网元类型, 如果是, 则执行步骤
512; 否则, 执行步骤 550。
该步骤的具体实现与步骤 501完全一致, 只是消息类型和网元类型不同, 在此不再赘述。
步骤 512: 判断 S-CSCF网元名称和主机名称是否匹配, 如果匹配是, 则执 行步骤 540; 否则, 执行步骤 550。
本步骤具体实现为: 将从 MAR或 SAR消息中获取的主机名称, 与表 1中 配置的主机名称进行比较, 如果该表 1 中不存在与获得的主机名称相同的主机 名称记录, 则判定该网元业务操作为非法网元业务操作;
否则, 进一步根据该主机名称, 从表 1中查出对应的网元类型 ID, 再根据 该网元类型 ID 和主机名称查询出预先配置的网元名称, 将该网元名称与从 MAR或 SAR消息中获取的网元名称进行比较, 如果两者相同, 则判定该网元 业务操作为合法网元业务操作; 否则, 判定该网元业务操作为非法网元业务操 作。
其中, 在本步骤中给出了获取网元名称的一个较佳方法, 并非限定本发明, 其他根据主机名称获取网元名称的方法, 也在本发明的保护范围之内。 在本步 骤中, 也可以先判断 S-CSCF的网元名称是否一致, 当网元名称一致时, 再判 断 S-CSCF的主机名称是否一致。
步骤 520: 判断接收到的消息是否为 UDR和 SNR消息, 或者两者中的一 个, 如果是, 则执行步骤 521; 否则, 执行步骤 530。
本步骤中,根据消息中的已有 Command-Code的 AVP的值判断消息的类型, Command-Code的 AVP的不同值对应不同的消息类型, 这点可参见相关协议规 定, 这里不再详述。
步骤 521 : 判断该 AS网元是否为合法网元类型,如果是,则执行步骤 522; 否则, 执行步骤 550。
本步骤的具体实现与步骤 501完全一致, 只是消息类型和网元类型不同, 在此不再赘述。
步骤 522: 判断 AS网元名称和主机名称是否匹配, 如果匹配, 则执行步骤 540; 否则, 执行步骤 550。
其中, AS的网元名称和主机名称在查询 IFC的 UDR消息中携带, 或在订 阅 IFC的 SNR消息中携带。
本步骤的具体实现与步骤 512完全一致, 只是消息类型和网元类型不同, 在此不再赘述。
步骤 530:判断接收到的消息是否为 PUR的消息,如果是,则执行步骤 531 ; 否则, 执行步骤 550。
步骤 531 : 判定该 AS网元是否为合法网元类型,如果是,则执行步骤 532; 否则, 执行步骤 550。
本步骤的具体实现与步骤 501完全一致, 只是消息类型和网元类型不同, 在此不再赘述。 步骤 532: 判断 AS主机名称是否匹配, 如果匹配, 则执行步骤 540; 否贝' J , 执行步骤 550。
本步骤具体实现为: 将从 PUR消息中获取的主机名称, 与表 1中的主机名 称进行比较, 如果该表 1中不存在与获得的主机名称相同的主机名称且网元类 型相同的记录, 则判定该网元业务操作为非法网元业务操作; 否则, 判定该网 元业务操作为合法网元业务操作。
步骤 540: 按照现有技术中协议规范, 对网元发起的业务进行处理后, 结 束本流程。
步骤 550: 向网元发送响应消息。
该响应消息为结果-码(Result-Code ) 的值为直径(DIAMRTER )协议无 法处理( DIAMRTER— UNABLE一 TO— COMPLY ) 的消息, 表示该网元为非法网 元。
在图 6所示的实施例中,按图 6所示的顺序分别对 UAR、 LIR、 MAR, SAR、 UDR、 SNR和 PUR消息的消息类型进行了判断, 并判断了不同的网元类型如 I-CSCF. S-CSCF和 AS。 在实际业务中, 可能只会涉及这些操作中的一部分操 作; 或者涉及上述的所有操作, 但顺序可能不同。 无论采取哪种方式, 其实现 方法与图 6所示的实施例的方法完全相同,图 6仅是本发明的一个较佳实施例, 并不是对本发明的限定。 本发明实施例的合法性判定方法, 不违反第三代合作 组织 (3GPP ) 电信标准(TS ) 29228协议规范和 29328协议规范的协议的判定 方法的一致性。
在步骤 304至步骤 306中 ,在判断所述网元的业务操作为合法业务操作后, 再从业务逻辑的角度对该业务操作进行合法性判断, 即判断判断该网元发送的消 息是否为服务器指派请求 SAR消息, 若是, 则确定 SAR消息中的指定操作; 然后判断所述指定操作是否合法, 若合法, 则执行所述指定操作。 当然, 该过 程也可以独立存在网络中,对请求业务操作从业务逻辑的角度来继续判断网元发 送的消息是否为服务器指派请求 SAR消息, 若是, 并确定 SAR消息中的指定 操作, 然后判断所述指定操作的合法性, 并执行合法的指定操作。 其具体的实 现过程如图 7所示:
请参阅图 7, 为本发明实施例操作处理方法中指定操作合法性判断的流程 图; 该判断过程是在当网元的业务操作为合法业务操作时, 才执行该方法的实 现过程, 所述方法包括:
步骤 600: 判断该网元发送的消息是否为服务器指派请求 SAR消息; 步骤 601: 若是, 则确定服务器指派请求 SAR消息流中的指定操作, 若否, 执行步骤 604, 结束;
步骤 602: 判断所述指定操作是否为合法指定操作;
步骤 603: 若是, 则执行所述指定操作, 若否, 执行步骤 604;
步骤 604: 按照现有的流程处理。
在 IP多媒体子系统 IMS网络中, 当用户为未注册状态、而服务呼叫会话控制 功能 S-CSCF通过服务器指派请求 SAR消息流发起重注册操作时, 很明显, SAR 消息流中指定的这个重注册操作不是一个合法的操作, 此时, 归属签约用户服 务器 HSS应拒绝执行该重注册操作。 如果 HSS执行了这个非法的重注册操作, 则会给 HSS中存储的数据带来操作安全上的隐患。 同理, SAR消息流中指定的 其他操作如首次注册、 注销操作等也存在上述合法性的问题。 因此, 在 HSS执 行 SAR消息流中的指定操作时, 如果 HSS能够进行合法性判断, 则能够有效避 免其执行非法操作的过程, 从而能够消除 HSS侧用户数据的安全隐患, 避免非 法操作占用 HSS资源。
还请参阅图 8, 为图 7中所述判断 SAR消息中的指定操作处理的流程图。 如图 8所示, 在步骤 700, HSS接收到 S-CSCF传输来的 SAR消息流。
到步骤 701 , HSS根据 SAR消息流中承载的信息确定 SAR消息流中的指 定操作; 比如 HSS根据 SAR消息流中的 AVP ( Attribute Value Pair, 属性值) 的取值确定 SAR消息流中的指定操作; 比如, Server-Assignment-Type等于 1 时表示注册; 等于 2时表示重注册; 等于 5时表示用户注销, 其他取值请参考 3GPP TS 29229标准。 这个指定操作是 S-CSCF需要 HSS执行的操作。
到步骤 702, HSS根据其存储的用户数据 (所述用户数据为 HSS根据请求 的用户和先前的业务操作中 HSS侧保存的状态信息数据。 )确定上述指定操作 对应的用户注册状态。
到步骤 703, HSS 居用户注册状态来判断上述指定操作的合法性, 在确定 上述指定操作为合法操作时, 到步骤 704, HSS根据现有的执行过程执行该指定 操作。
在所述步骤 703中, 如果 HSS确定出上述指定操作为非法操作时, 到步骤 705, HSS可以通过 SAA消息流向 S-CSCF返回非法操作的信息, 即 HSS不根据现 有的执行过程执行该指定操作。
在图 7的描述中, SAR消息流中的指定操作包括: NO— ASSIGNMENT (用 户业务数据未指派) 、 REGISTRATION (首次注册)或下述指定操作的任意一 种: RE— REGISTRATION (重注册) 、 UNREGISTERED— USER (非注册业务 的 UE被叫 通知 ) 、 TIMEOUT— DEREGISTRATION ( 超时注销 ) 、 TIMEOUT— DEREGISTRATION— STORE— SERVER_NAME (保存服务 S-CSCF名 称 的 超 时 注 销 ) 、 USER_DEREGISTRATION ( UE 注 销 ) 、 USER— DEREGISTRATION— STORE— SERVER— NAME (保存服务 S-CSCF名称的 UE注销) 、 DEREGISTRATION— TOO_MUCH— DATA (数据超长注销) 、 ADMINISTRATIVE— DEREGISTRATION ( 管 理 注 销 ) 、 AUTHENTICATION_FAILURE ( 鉴 权 失 败 注 销 ) 或 者 AUTHENTICATION— TIMEOUT (鉴权超时注销) 。 但并不限于此, 也可以是 其它的操作。 下面依次为例分别对其进行说明。
当 SAR消息流中的指定操作为 NO— ASSIGNMENT (用户业务数据未指派) 操作时, 只有当且仅当 UE的注册状态为: Registered (已注册业务状态) 、 Unregistered (非注册业务状态), HSS才会确定出此次 NO— ASSIGNMENT操作 为合法操作, 然后, HSS按照现有方法如按照现有协议的规定来执行 NO_ASSIGNMENT操作, 即操作场景为: 当 S-CSCF比如因故障等原因引起需 要重新下载用户的业务数据时, 向 HSS发起该操作; 在上述判断 NO— ASSIGNMENT操作合法性过程中,如果用户的注册状态为其他情况,如 Not registered (未注册业务状态) ) 时, HSS确定出此次 NO_ASSIGNMENT操作为 非法操作, 此时, HSS不执行 NO— ASSIGNMENT操作, HSS可以将非法操作的 信息通过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 REGISTRATION (首次注册)操作时, 只有 当且仅当 UE的注册状态为: Authentication Pending (筌权未决)或者 Unregistered 时, HSS才会确定出此次 REGISTRATION操作为合法操作, 然后, HSS按照现 有方法如按照现有协议的规定来执行 REGISTRATION操作, 当用户首次注册 时, 鉴权成功后, S-CSCF向 HSS发起的注册通知操作; 在上述判断 REGISTRATION操作合法性过程中, 如果用户的注册状态为其他情况, 如 Registered (已注册) 、 或者 Not registered (未注册) 时, HSS确定出此次 REGISTRATION操作为非法操作,此时, HSS不执行 REGISTRATION操作, HSS 可以将非法操作的信息通过 SAA消息流回复给 S-CSCF。
当 S AR消息流中的指定操作为 RE— REGISTRATION (重注册)操作时, 只 有当且仅当 UE的注册状态为: Registered , HSS才会确定出此次 RE_REGISTRATION操作为合法操作, 然后, HSS按照现有方法如按照现有协 议的规定来执行 RE— REGISTRATION操作; 在上述判断 RE— REGISTRATION操 作合法性过程中, 如果用户的注册状态为其他情况, 如 Authentication Pending, Unregistered或者 Not registered时, HSS确定出此次 RE— REGISTRATION操作为 非法操作, 此时, HSS不执行 RE— REGISTRATION操作, HSS可以将非法操作 的信息通过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 UNREGISTERED— USER (非注册业务的 UE 被叫通知)操作时, 只有当且仅当 UE的状态为: Not registered时, HSS才会确 定出此次 UNREGISTEREDJJSER操作为合法操作, 然后, HSS按照现有方法如 按照现有协议的规定来执行 UNREGISTERED— USER操作; 在上述判断 RE— REGISTRATION操作合法性过程中, 如果用户的注册状态为其他情况, 如 Registered、 Unregistered或者 Authentication Pending时, HSS确定出此次 RE— REGISTRATION操作为非法操作, 此时, HSS不执行 RE— REGISTRATION 操作, HSS可以将非法操作的信息通过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 TIMEOUT— DEREGISTRATION (超时注销 ) 操作时, 只有当且仅当 UE的状态为 Registered时, HSS才会确定出此次 TIMEOUT— DEREGISTRATION操作为合法操作, 然后, HSS按照现有方法如按 照现有协议的规定来执行 TIMEOUT— DEREGISTRATION操作; 在上述判断 TIMEOUT— DEREGISTRATION操作合法性过程中,如果用户的注册状态为其他 情况, 如 Authentication Pending、 或者 Unregistered、 或者 Not registered时, HSS 确定出此次 TIMEOUT_DEREGISTRATION操作为非法操作, 此时, HSS不执行 TIMEOUT_DEREGISTRATION操作, HSS可以将非法操作的信息通过 SAA消息 流回复给 S-CSCF。
当 SAR消息流中的指定操作为 TIMEOUT— DEREGISTRATION_STORE— SERVER— NAME (保存服务 S-CSCF名称的超时注销)操作时, 只有当且仅当 UE 的 状 态 为 Registered 时 , HSS 才 会 确 定 出 此 次 TIMEOUT— DEREGISTRATION— STORE— SERVER— NAME操作为合法操作, 然 后 , HSS 按 照 现 有 方 法 如 按 照 现 有 协 议 的 规 定 来 执 行 TIMEOUT— DEREGISTRATION— STORE— SERVER— NAME操作; 在上述判断 TIMEOUT— DEREGISTRATION— STORE— SERVER— NAME操作合法性过程中, 如果用户的注册状态为其他情况 , 如 Authentication Pending、 或者 Unregistered、 或者 Not registered时, HSS确定出此次 TIMEOUT— DEREGISTRATION_STORE_ SERVER NAME 操 作 为 非 法 操 作 , 此 时 , HSS 不 执 行 TIMEOUT— DEREGISTRATION— STORE— SERVER— NAME操作, HSS可以将非 法操作的信息通过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 USER_DEREGISTRATION ( UE注销)操作 时, 只有当且仅当 UE的状态为 Registered时, HSS才会确定出此次 USER— DEREGISTRATION操作为合法操作, 然后, HSS按照现有方法如按照现 有协议的规定来执行 USER— DEREGISTRATION操作; 在上述判断 USER— DEREGISTRATION操作合法性过程中, 如果用户的注册状态为其他情 况, 口 Authentication Pending、 Unregistered或者 Not registered时, HSS确定出 JM 次 USER— DEREGISTRATION操作为 非法操作, 此时, HSS不执行 USER— DEREGISTRATION操作, HSS可以将非法操作的信息通过 SAA消息流回 复给 S-CSCF。
当 SAR消息流中的指定操作为 USER— DEREGISTRATION— STORE— SERVER— NAME (保存服务 S- CSCF名称的 UE注销)操作时, 只有当且仅当 UE 的状态为 Registered时, HSS才会确定出此次 USER— DEREGISTRATION— STORE— SERVER— NAME操作为合法操作, 然后, HSS按照现有方法如按照现 有协议的规定来执行 USER— DEREGISTRATION— STORE— SERVER_NAME操 作;在上述判断 USER— DEREGISTRATION— STORE— SERVER— NAME操作合法 性过程中, 如果用户的注册状态为其他情况, 如 Authentication Pending、 Unregistered或者 Not registered时, HSS确定出此次 USER— DEREGISTRATION— STORE— SERVER— NAME操作 为 非 法操作 , 此时 , HSS 不执行 USER DEREGISTRATION— STORE— SERVER— NAME操作, HSS可以将非法操 作的信息通过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 DEREGISTRATION— TOO— MUCH DATA (数据超长注销)操作时, 只有当且仅当 UE的状态为 Authentication Pending或 Registered 或 Unregistered 时 , HSS 才 会 确 定 出 此 次 DEREGISTRATION— TOO— MUCH— DATA操作为合法操作, 然后, HSS按照现 有方法如按照现有协议的规定来执行 DEREGISTRATION— TOO— MUCH— DATA 操作;在上述判断 DEREGISTRATION— TOO— MUCH— DATA操作合法性过程中, 如果用户的注册状态为其他情况, 如 Not registered时, HSS确定出此次 DEREGISTRATION— TOO— MUCH— DATA操作为非法操作, 此时, HSS不执行 DEREGISTRATION_TOO— MUCH— DATA操作, HSS可以将非法操作的信息通 过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 ADMINISTRATIVE—DEREGISTRATION(管 理注销)操作时, 只有当且仅当 UE的状态为 Registered或 Unregistered时, HSS 才会确定出此次 ADMINISTRATIVE— DEREGISTRATION操作为合法操作, 然 后 , HSS 按 照 现 有 方 法 如 按 照 现 有 协 议 的 规 定 来 执 行 ADMINISTRATIVE— DEREGISTRATION 操 作 ; 在 上 述 判 断 ADMINISTRATIVE— DEREGISTRATION操作合法性过程中, 如果用户的注册 状 态 为 其 他 情 况 , 如 Not registered 时 , HSS 确 定 出 此 次 ADMINISTRATIVE— DEREGISTRATION操作为非法操作, 此时, HSS不执行 ADMINISTRATIVE— DEREGISTRATION操作, HSS可以将非法操作的信息通过 SAA消息流回复给 S-CSCF。
当 SAR消息流中的指定操作为 AUTHENTICATION— FAILURE(鉴权失败注 销 )操作时, 只有当且仅当 UE的状态为 Authentication Pending或 Unregistered时, HSS才会确定出此次 AUTHENTICATION— FAILURE操作为合法操作, 然后 , HSS按照现有方法如按照现有协议的规定来执行 AUTHENTICATION— FAILURE操作; 在上述判断 AUTHENTICATION— FAILURE操作合法性过程中, 如果用户的注册状态为其他情况, 如 Registered, 或者 Not registered时, HSS确 定出此次 AUTHENTICATION— FAILURE操作为非法操作, 此时, HSS不执行 AUTHENTICATION— FAILURE操作, HSS可以将非法操作的信息通过 SAA消息 流回复给 S-CSCF。
当 SAR消息流中的指定操作为 AUTHENTICATION— TIMEOUT (鉴权超时 注销)操作时, 只有当且仅当 UE的状态为 Authentication Pending或 Unregistered 时, HSS才会确定出此次 AUTHENTICATION— TIMEOUT操作为合法操作, 然 后 , HSS按照现有方法如按照现有协议的规定来执行 AUTHENTICATION— TIMEOUT操作; 在上述判断 AUTHENTICATION— TIMEOUT操作合法性过程 中, 如果用户的注册状态为其他情况, 如 Registered或者 Not registered时, HSS 确定出此次 AUTHENTICATION— TIMEOUT操作为非法操作, 此时, HSS不执 行 AUTHENTICATION— TIMEOUT操作, HSS可以将非法操作的信息通过 SAA 消息流回复给 S-CSCF。
在上述实施例的描述过程中, 非法操作的信息可以为 DIAMETER—
ERROR— IN— ASSIGNMENT— TYPE ( DIAMETER指派类型错误) , 该信息可以 承载于 SAA消息流的 Experimental-Result-Code (实 ¾r的结果码) 中, 即 HSS将 Experimental-Result-Code等于 DIAMETER— ERRORJN— ASSIGNMENT— TYPE 的 SAA消息流回复给 S-CSCF。
本发明的 SAR消息流中的指定操作可以不限于上述例举的情况,而且, HSS 也可以仅对上述例举的指定操作中的一种或多种进行合法性判断, 凡是 HSS结 合用户注册状态对 SAR消息流中的指定操作进行合法性判断后 , 执行合法操作 的过程均属于本发明要求保护的范围。
还请参阅图 9, 为图 7中所述判断 SA 消息中指定操作处理的另一流程图。 在图 9中, 在步骤 800, HSS接收到 S-CSCF传输来的 SAR消息流, 开始进行 本发明的合法性判断过程。
到步骤 810, HSS根据 SAR消息流中的 AVP的取值判断 SAR消息流中的指定 操作, 如果该指定操作为: 首次注册操作、 鉴权失败注销操作或者鉴权超时注 销操作时, 到步骤 820, HSS判断用户注册状态是否为鉴权未决或者非注册业务 状态, 如果 HSS判断出用户注册状态为鉴权未决或者非注册业务状态, 到步骤 821 , HSS按照现有的协议规范执行 SAR消息流中的指定操作。 到步骤 860, 本 次对 SAR消息流中指定操作的合法性判断、 执行过程结束。
在步骤 820中, 如果 HSS判断出用户注册状态不为鉴权未决或者非注册业务 状态, 到步骤 822, HSS将非法操作的信息如 Experimental-Result-Code (试验结 果代码)等于 DIAMETER— ERROR— IN— ASSIGNMENT—TYPE ( DIAMEMER指 派类型错误) 的 SAA消息流回复给 S-CSCF。 到步骤 860, 本次对 SAR消息流中 指定操作的合法性判断、 执行过程结束。
在步骤 810中, 如果 HSS根据 SAR消息流中的 AVP的取值判断 SAR消息流中 的指定操作为: 重注册操作、 超时注销操作、 保存服务 S-CSCF名称的超时注销 操作、 UE注销操作或保存服务 S-CSCF名称的 UE注销操作时, 到步骤 830, HSS 判断用户注册状态是否为已注册状态, 如果 HSS判断出用户注册状态为已注册 状态, 到步骤 831, HSS按照现有的协议规范执行 SAR消息流中的指定操作。 到 步骤 860, 本次对 SAR消息流中指定操作的合法性判断、 执行过程结束。
在步骤 830中, 如果 HSS判断出用户注册状态不为已注册状态, 到步骤 822,
HSS将非法操作的信息如 Experimental-Result-Code等于 DIAMETER ERROR— IN— ASSIGNMENT—TYPE的 SAA消息流回复给 S-CSCF;到步骤 860,本次对 SAR 消息流中指定操作的合法性判断、 执行过程结束。
在步骤 810中, 如果 HSS根据 SAR消息流中的 AVP的取值判断 SAR消息流中 的指定操作为: 非注册业务的 UE被叫通知操作时, 到步骤 840, HSS判断用户 注册状态是否为非注册业务状态或未注册状态, 如果 HSS判断出用户注册状态 为非注册业务状态或未注册状态, 到步骤 841, HSS按照现有的协议规范执行 SAR消息流中的指定操作。 到步骤 860, 本次对 SAR消息流中指定操作的合法性 判断、 执行过程结束。
在步骤 840, 如果 HSS判断出用户注册状态不为非注册业务状态或未注册状 态, 到步骤 842, HSS将非法操作的信息如 Experimental-Result-Code等于 DIAMETER— ERROR— IN— ASSIGNMENT— TYPE的 SAA消息流回复给 S-CSCF。 到步骤 860, 本次对 SAR消息流中指定操作的合法性判断、 执行过程结束。
在步骤 810, 如果 HSS根据 SAR消息流中的 AVP的取值判断 SAR消息流中的 指定操作为: 数据超长注销操作、 管理注销或用户业务数据未指派操作时, 到 步骤 850, HSS判断用户注册状态是否为已注册状态或非注册业务状态, 如果 HSS判断出用户注册状态为已注册状态或非注册业务状态, 到步骤 851 , HSS按 照现有的协议规范执行 SAR消息流中的指定操作。 到步骤 860, 本次对 SAR消息 流中指定操作的合法性判断、 执行过程结束。
在步骤 850中, 如果 HSS判断出用户注册状态不为已注册状态、 或非注册业 务状态, 到步骤 842, HSS将非法操作的信息如 Experimental-Result-Code等于 DIAMETER— ERROR— IN— ASSIGNMENT— TYPE的 SAA消息流回复给 S-CSCF。 到步骤 860, 本次对 SAR消息流中指定操作的合法性判断、 执行过程结束。
相应地, 本发明实施例还提供一种操作处理装置, 所述操作处理装置可以 集成在服务器中或集成在其它的设备中, 也可以独立存在。 所述操作处理装置 的结构示意图如 10所示, 所述装置包括: 接收获取单元 91、 合法性确定单元 92、 第一判断单元 93、 第二判断单元 94、 指定操作确定单元 95、 判断执行单 元 96和 /或操作反馈单元 97。
其中, 所述接收获取单元 91 , 用于接收对端网元发送的业务消息, 并获取 对应的数据配置信息; 所述合法性确定单元 92, 用于根据所述业务消息及数据 配置消息确定所述网元的合法性; 所述第一判断单元 93, 用于判断所述合法网 元发送的业务请求操作是否为合法业务操作, 并发送是合法业务操作的判断结 果; 所述第二判断单元 94, 用于根据接收到判断结果, 继续判断该网元发送的 消息是否为服务器指派请求 SAR消息; 所述指定操作确定单元 95, 用于确定 接收到所述 SAR消息中的指定操作; 所述判断执行单元 96, 与指定操作确定 单元相连, 用于判断所述 SAR消息中的指定操作是否合法, 并执行合法的指定 操作; 操作反馈单元 97, 与指定操作确定单元 95相连, 用于反馈非法的指定 操作。
其中,所述合法性确定单元 92包括:确定子单元 921、获取查找子单元 922 和比较子单元 923。 所述确定子单元 921, 用于根据所述业务消息中指令码的属 性值确定该网元的网元类型; 所述获取查找子单元 922, 用于根据所述业务请 求获取所述网元的主机名称, 并根据所述主机名称查找对应的网元类型; 所述 比较子单元 923 , 用于比较所确定的网元类型与查找到的网元类型是否相同, 若相同, 则所述网元的网元类型为合法网元类型。
所述第一判断单元 93包括: 存储子单元 931和判断子单元 932。 所述存储 子单元 931, 用于存储预先为网元配置的主机名称; 所述判断子单元 932, 与获 取查找子单元相连, 用于判断所获取该网元的主机名称与预先配置该网元的主 机名称是否一致, 若是, 则判断所述网元的业务操作为合法业务操作。
所述判断执行单元 96包括:指定操作判断子单元 961和指定操作执行子单 元 962。 所述指定操作判断子单元 961, 与指定操作确定单元 95相连, 用于根 据存储用户的注册状态判断所述指定操作是否合法, 若是, 发送合法的指定操 作; 所述指定操作执行子单元 962, 与指定操作判断子单元 961相连, 用于执 行接收到合法的指定操作。
在本实施例所述的装置中,所述接收单元 91用于接收对端网元发送的业务 请求, 并从该业务请求中解析出该网元的主机名称, 以及获取该网元对应的消 息, 并从该消息中得到该网元的主机名称及对应的网元类型。 然后将所述解析 合法性判断单元 92对接收到的主机名称,在预先配置的网元类型编码表中查找 对应的网元类型 ID, 才艮据网元类型 ID确定网元类型, 然后将这两个网元类型 进行比较, 如果二者相同, 则表示该网元类型为合法网元类型, 否则, 为该网 元类型不合法。 然后再将网元类型合法的网元发送给第一判断单元 93 , 所述第 一判断单元 93, 先获取该网元的主机名称, 然后与预先配置该网元的主机名称 以及网元类型进行判断, 判断二者是否都一致, 若是, 则判定所述网元的业务 操作为合法业务操作。 然后将其发送给第二判断单元 94, 所述第二判断单元 94 继续判断该网元发送的消息是否为服务器指派请求 SAR消息; 若是, 则指定操 作确定单元 95才艮据 HSS中存储的用户注册状态确定出 SAR消息流中的指定操 作是否为合法操作, 若是, 即所述指定操作为合法操作, 则通知判断执行单元 96; 否则, 通知操作反馈单元 97, 所述操作反馈单元 97通过 SAA消息流将非 法操作信息返回至 S-CSCF, 比如将 Experimental-Result-Code等于
DIAMETER— ERROR— IN—
ASSIGNMENT— TYPE的 SAA消息流回复给 S-CSCF。
判断执行单元 96,主要用于执行 S-CSCF传输来的 SAR消息流中的指定操 断执行单元 96在接收到指定操作确定单元 95的合法性判决的通知后,执行 SAR 消息流中的指定操作。
指定操作确定单元 95的具体判决过程及执行的操作如下:
指定操作确定单元 95在判断出 SAR消息流中的指定操作为首次注册操作、 鉴权失败注销操作或鉴权超时注销操作, 且用户注册状态为鉴权未决或者非注 册业务状态时, 确定 SAR消息流中的指定操作为合法操作, 通知判断执行单元 96; 当用户注册状态为其他注册状态时,通过 SAA消息流将非法操作信息返回 至 S-CSCF。
指定操作确定单元 95在判断出 SAR消息流中的指定操作为重注册操作、 超时注销操作、保存服务 S-CSCF名称的超时注销操作、 UE注销操作或保存服 务 S-CSCF名称的 UE注销操作, 且用户注册状态为已注册状态时, 确定 SAR 消息流中的指定操作为合法操作, 并通知判断执行单元 96; 当用户注册状态为 其他注册状态时, 通过 SAA消息流将非法操作信息返回至 S-CSCF。
指定操作确定单元 95在判断出 SAR消息流中的指定操作为非注册业务的
UE被叫通知操作, 且用户注册状态为未注册状态时, 确定 SAR消息流中的指 定操作为合法操作, 并通知判断执行单元 96; 当用户注册状态为其他注册状态 时, 通过 SAA消息流将非法操作信息返回至 S-CSCF。
指定操作确定单元 95在判断出 SAR消息流中的指定操作为数据超长注销 操作、 管理注销或者用户业务数据未指派操作, 且用户注册状态为鉴权未决或 已注册状态或非注册业务状态时, 确定 SAR消息流中的指定操作为合法操作, 并通知判断执行单元 96; 当用户注册状态为其他注册状态时, 通过 SAA消息 流将非法操作信息返回至 S-CSCF。
另外, 本发明还提供一种对网元业务操作合法性进行判定的服务器, 其结 构示意图如图 11所示。 该服务器是用于存放签约用户信息的签约用户服务器, 包括: 接口 10、 解析单元 11和业务处理单元 12。
接口 10,用于接收网元发起的业务请求,将该业务请求发送给解析单元 11。 解析单元 11, 用于接收接口发送的业务请求, 获取网元发起的消息, 解析 出该网元的主机名称, 将消息和解析出的主机名称发送给业务处理单元 12。 业务处理单元 12, 用于配置网元的主机名称, 接收解析单元发送的主机名 称和消息; 判断该网元的网元类型是否为合法网元类型, 如果是, 比较接收到 的主机名称和配置的主机名称是否一致, 如果一致, 判定该网元业务操作为合 法网元业务操作。 需要指出的是, 这里所说的配置的主机名称是指, 在表 1 中 存放的网元的主机名称。
其中, 业务处理单元 12, 进一步用于比较接收到的解析单元 11发送的主 机名称和配置的主机名称是否一致, 如果不一致, 判定该网元业务操作为不合 法网元业务操作, 生成响应消息, 将该响应消息发送给解析单元, 在响应消息 中携带网元业务操作为不合法网元业务操作信息。 解析单元, 进一步用于接收 该响应消息, 将该响应消息发送给接口; 接口 10, 接收该响应消息, 将该响应 消息发送给发起业务请求的网元。
由本实施可以看出, 该签约用户服务器首先判断发起业务请求的网元的网 元类型是否为合法网元类型, 如果该网元类型为合法网元类型, 再进一步判断 该网元携带的主机名称和预先配置的主机名称是否一致, 如果一致, 判定该网 元业务操作为合法网元业务操作。 与签约用户服务器通信的网元可以用主机名 称来唯一进行标识, 且在网元类型编码表中仅配置一条与发起业务请求的网元 相匹配的主机名称, 因此可以准确判断网元业务操作的合法性。
图 12为图 11中所述业务处理单元的结构示意图。如图 12所示, 该业务处 单元 12包括: 存储子单元 121和判定子单元 122。
存储子单元 121, 用于配置网元的主机名称, 将该主机名称发送给判定子 单元。
判定子单元 122, 用于接收解析单元 11发送的主机名称和消息, 接收存储 子单元 121发送的主机名称;根据解析单元 11发送的主机名称和消息判断网元 的网元类型是否为合法类型, 如果是, 比较接收到的两个主机名称是否一致, 如果一致, 则判定该网元业务操作为合法网元业务操作; 如果不一致, 判定网 元业务操作为不合法网元业务操作, 生成响应消息, 将该响应消息发送给所述 解析单元 11。
其中, 在图 11和图 12所介绍的实施例中的网元包括: I-CSCF、 或业务请 求中携带 PUR消息的 AS。 如果网元为 S-CSCF, 或者携带 IFC的 UDR和 SNR消息的 AS时; 解析单元 11, 进一步用于从网元发起的消息中, 解析出网元的网元名称, 并将该网元名称发送给判定子单元。
存储子单元 121, 进一步用于配置网元的网元名称, 将配置的网元名称发 送给判定子单元 122。
判定子单元 122, 除了根据上述服务器的实施例中接收到的解析单元 11和 存储子单元 121发送的主机名称, 判定这两个主机名称是否一致外, 还进一步 用于接收解析单元 11发送的网元名称, 和存储子单元 121发送的网元名称; 比 较这两个网元名称是否一致, 当主机名称和网元名称都一致时, 方可判定该网 元业务操作为合法业务操作。 需要指出的是, 这里所说的配置的网元名称是指, 在表 1中存放的网元的网元名称。
当网元为 S-CSCF和 I-CSCF时, 接口为 Cx或 Dx接口; 当网元为 AS时, 接口为 Sh或 Dh接口。
在本发明的实施例中, 以签约用户服务器是 HSS为例, 介绍了实现本发明 技术方案的方法和服务器, 对于其他具有相同原理的签约用户服务器也在本发 明的保护范围之内。
由此可见, 本发明的实施例中, 一方面, 通过判断网元类型是否合法, 以 及判断主机名称是否一致, 若一致, 再对网元业务操作合法性进行判定, 若合 法, 另一方面, 再从逻辑的角度对该网元进行判断, 即: 通过 SAR 消息流对 S-CSCF指定的各种操作定义进行合法性判断,如果该操作为合法操作,则执行 该操作。 即通过结合用户注册状态对 SAR消息流中的指定操作进行合法性判 断, 对 SAR消息流中的指定操作进行了过滤, 避免了 HSS执行非法操作的过 程, 减少非法操作对 HSS资源的占用, 同时, 也减小了 HSS中存储数据的安 全隐患。 另外, HSS在确定出 SAR消息流中的指定操作为非法操作时, 通过向 S-CSCF返回非法操作的信息, 完善了 SAR/SAA的交互流程, 提高 HSS侧用 户数据安全性及合法操作的处理效率。 同时也确保了对网元业务操作合法性的 准确判断, 保证了用户数据安全和 IMS业务的可靠性。
以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发 明的精神和原则之内所作的任何修改、 等同替换和改进等, 均应包含在本发明 的保护范围之内。

Claims

权 利 要 求
1、 一种操作处理方法, 其特征在于, 包括步骤:
接收网元发送的业务消息;
根据所述业务消息确定所述网元的合法性;
判断所述合法网元发送的业务请求操作是否为合法业务操作;
若是, 则判断该网元发送的业务消息是否为服务器指派请求 SAR消息, 若 是, 则确定 SA 消息中的指定操作;
当所述指定操作为合法操作时, 执行所述指定操作。
2、 如权利要求 1所述操作处理方法, 其特征在于, 所述根据业务消息确定 该网元的合法性的具体过程为:
才艮据所述业务消息中指令码的属性值确定该网元的网元类型;
根据所述业务请求获取所述网元的主机名称, 并根据所述主机名称查找配 置数据中对应的网元类型;
将所确定的网元类型与查找到的网元类型进行比较, 若二者相同, 则所述 网元的网元类型为合法网元类型。
3、 如权利要求 2所述操作处理方法, 其特征在于, 所述根据业务消息确定 该网元的网元类型的过程为:
判断所述业务消息的类型, 如果所述业务消息包括用户认证请求消息和 /或 即时位置请求消息, 确定所述网元类型为问询呼叫会话控制功能;
如果所述业务消息包括多媒体认证请求消息和 /或服务分配请求消息, 确定 所述网元类型为服务呼叫会话控制功能;
如果所述业务消息包括用户数据请求消息和 /或订阅通知请求消息, 或者用 户数据更新请求消息, 确定所述网元类型为应用服务器。
4、 如权利要求 2所述操作处理方法, 其特征在于, 所述根据业务请求获取 所述网元的主机名称, 并根据所述主机名称查找对应的网元类型的过程为: 从所述业务请求中解析出该网元的主机名称, 并根据所述主机名称, 在预 设的网元类型编码表中查找网元类型标识符, 根据所述网元类型标识符确定所 述网元的网元类型。
5、 如权利要求 1所述操作处理方法, 其特征在于, 所述判断所述网元发送 的业务操作是否为合法业务操作的过程为:
判断解析出所述网元的主机名称、网元类型与预先配置该网元的主机名称、 网元类型是否一致, 若是, 则所述网元的业务操作为合法业务操作。
6、 根据权利要求 3所述操作处理方法, 其特征在于, 所述发送业务请求及 消息的网元包括下述任一种:
问询呼叫会话控制功能或携带用户数据更新请求消息的应用服务器; 服务呼叫会话控制功能、 携带查询初始过滤标准的用户数据请求消息和 /或 订阅初始过滤标准通知请求消息的应用服务器。
7、 根据权利要求 6所述操作处理方法, 其特征在于, 当所述发送业务请求 及消息的网元为服务呼叫会话控制功能、 携带查询初始过滤标准的用户数据请 求消息和 /或订阅初始过滤标准通知请求消息的应用服务器时, 从所述业务请求 中解析出所述网元的网元主机名称; 判断所述网元的主机名称、 网元类型与预 先配置该网元的主机名称、 网元类型是否一致, 若是, 则所述网元的业务操作 为合法网元业务操作。
8、 如权利要求 1所述操作处理方法, 其特征在于, 根据 SAR消息流中承载 服务器指派类型的取值确定 SAR消息流中的指定操作; 并结合用户注册状态对 所述指定操作进行合法性判断, 若为合法操作时, 执行所述指定操作。
9、 如权利要求 8所述操作处理方法, 其特征在于, 当所述 SAR消息流中 的指定操作为: 首次注册操作、 鉴权失败注销操作或鉴权超时注销操作, 且用 户注册状态为鉴权未决或非注册业务状态时, 确定所述首次注册操作、 鉴权失 败注销操作或鉴权超时注销操作为合法操作, 执行所述指定操作。
10、 如权利要求 8所述操作处理方法, 其特征在于, 当 SAR消息流中的指 定操作为: 重注册操作、 超时注销操作、 保存服务呼叫会话控制功能 S-CSCF 名称的超时注销操作、 UE注销操作或保存服务 S-CSCF名称的 UE注销操作 , 且用户注册状态为已注册状态时, 确定所述重注册操作、 超时注销操作、 保存 服务 S-CSCF名称的超时注销操作、 UE注销操作或保存服务 S-CSCF名称的 UE注销操作为合法操作, 执行所述指定操作。
11、 如权利要求 8所述操作处理方法, 其特征在于, 当 SAR消息流中的指 定操作为: 非注册业务的 UE被叫通知操作, 且用户注册状态为未注册状态时, 确定该非注册业务的 UE被叫通知操作为合法操作, 执行所述指定操作。
12、 如权利要求 8所述操作处理方法, 其特征在于, 当 SAR消息流中的指 定操作为: 数据超长注销操作, 且用户注册状态为鉴权未决或已注册状态或非 注册业务状态时, 确定所述数据超长注销操作为合法操作,执行所述指定操作; 管理注销操作或用户业务数据未指派操作, 且用户注册状态为已注册状态或非 注册业务状态时, 确定所述管理注销操作或用户业务数据未指派操作为合法操 作, 执行所述指定操作。
13、 一种操作处理装置, 其特征在于, 所述操作处理装置包括:
接收获取单元,用于接收对端网元发送的业务消息及获取对应的数据配置; 合法性确定单元, 用于根据所述业务消息和数据配置确定所述网元的合法 性;
第一判断单元, 用于判断所述合法网元发送的业务请求操作是否为合法业 务操作, 并发送是合法业务操作的判断结果;
第二判断单元, 用于根据接收到判断结果, 继续判断该网元发送的消息是 否为服务器指派请求 SAR消息;
指定操作确定单元, 用于确定接收到所述 SAR消息中的指定操作; 判断执行单元, 与指定操作确定单元相连, 用于判断所述 SAR消息中的指 定操作是否合法, 并执行合法的指定操作。
14、 如权利要求 13所述操作处理装置, 其特征在于, 所述合法性确定单元 包括:
确定子单元, 用于根据所述业务消息中指令码的属性值确定该网元的网元 类型;
获取查找子单元, 用于根据所述业务请求获取所述网元的主机名称, 并根 据所述主机名称查找对应的网元类型;
比较子单元, 用于比较所确定的网元类型与查找到的网元类型是否相同, 若相同, 则所述网元的网元类型为合法网元类型。
15、 如权利要求 13所述操作处理装置, 其特征在于, 所述第一判断单元包 括:
存储子单元, 用于存储预先为网元配置的网元类型、 主机名称和网元名称; 判断子单元, 与获取查找子单元相连, 用于判断所获取该网元的网元类型、 主机名称与预先配置该网元的网元类型、 主机名称是否一致, 若是, 则判断所 述网元的业务操作为合法业务操作。
16、 如权利要求 13所述操作处理装置, 其特征在于, 所述判断执行单元包 括:
指定操作判断子单元, 与指定操作确定单元相连, 用于根据存储用户的注 册状态判断所述指定操作是否合法, 若是, 发送合法的指定操作;
指定操作执行子单元, 与指定操作判断子单元相连, 用于执行接收到合法 的指定操作。
17、 如权利要求 13所述操作处理装置, 其特征在于, 所述操作处理装置集 成在服务器中。
18、 一种 IP多媒体子系统中的操作处理方法, 包括: S-CSCF和 HSS之 间的 SAR和 SAA消息流的交互过程, 其特征在于, 在该交互过程中所述方法 包括步骤:
a、 HSS在接收到 S-CSCF传输来的 SAR消息流后, 根据 SAR消息流中承载的 信息确定 SAR消息流中的指定操作;
b、 HSS根据用户注册状态确定出所述指定操作为合法操作时, 执行所述指 定操作。
19、 如权利要求 18所述 IP多媒体子系统中的操作处理方法, 其特征在于, 所述步骤 a中 SAR消息流中的指定操作为: 首次注册操作、 鉴权失败注销操作 或鉴权超时注销操作时, 所述步骤 b包括:
HSS在用户注册状态为鉴权未决或者非注册业务状态时, 确定所述首次注 册、 鉴权失败注销或鉴权超时注销操作为合法操作, 执行所述指定操作。
20、 如权利要求 18所述 IP多媒体子系统中的操作处理方法, 其特征在于, 所述步骤 a中 SAR消息流中的指定操作为: 重注册操作、 超时注销操作、 保存 服务 S-CSCF名称的超时注销操作、 UE注销操作或保存服务 S-CSCF名称的 UE注销操作时, 所述步骤 b包括:
HSS在用户注册状态为已注册状态时, 确定所述重注册、 超时注销、 保存 服务 S-CSCF名称的超时注销或 UE注销 /保存服务 S-CSCF名称的 UE注销操作 为合法操作, 执行所述指定操作。
21、 如权利要求 18所述 IP多媒体子系统中的操作处理方法, 其特征在于, 所述步骤 a中 SAR消息流中的指定操作为:非注册业务的 UE被叫通知操作时, 所述步骤 b包括:
HSS在用户注册状态为非注册业务状态或未注册状态时, 确定该非注册业 务的 UE被叫通知操作为合法操作, 执行所述指定操作。
22、 如权利要求 18所述 IP多媒体子系统中的操作处理方法, 其特征在于, 所述步骤 a中 SAR消息流中的指定操作为: 数据超长注销操作、 管理注销操作 或用户业务数据未指派时, 所述步骤 b包括:
HSS在用户注册状态为已注册状态或非注册业务状态时, 确定所述数据超 长注销或管理注销操作为合法操作, 执行所述指定操作。
23、 一种对网元业务操作合法性进行判定的方法, 其特征在于,
该方法包括: 预先配置网元的主机名称;
A、 接收网元发起的业务请求, 获取所述网元发起的消息, 解析出所述网 元的主机名称;
B、 根据所述主机名称和所述消息, 判断所述网元类型是否合法; 如果是, 执行步骤 C;
C、比较所述解析出的主机名称与所述配置的主机名称是否一致,如果一致, 判定该网元业务操作为合法网元业务操作。
24、如权利要求 23所述对网元业务操作合法性进行判定的方法, 其特征在 于, 所述步骤 B进一步包括: 如果否, 判定所述网元类型不合法, 所述网元业 务操作为不合法网元业务操作, 结束本流程。
25、 如权利要求 23或 24所述对网元业务操作合法性进行判定的方法, 其 特征在于, 预先将所述网元的主机名称、 网元类型标识符和网元名称配置在网 元类型编码表, 所述步骤 B为:
根据所述主机名称, 在网元类型编码表中查找网元类型标识符, 根据所述 网元类型标识符确定所述网元类型;
才艮据所述消息确定所述网元类型;
比较所述两个网元类型是否一致, 如果一致, 判定所述网元类型合法。
26、如权利要求 25所述对网元业务操作合法性进行判定的方法, 其特征在 于, 所述根据消息确定所述网元类型的方法包括:
判断所述消息的类型, 如果所述消息包括用户认证请求消息和 /或即时位置 请求消息 , 确定所述网元类型为问询呼叫会话控制功能;
如果所述消息包括多媒体认证请求消息和 /或服务分配请求消息, 确定所述 网元类型为服务呼叫会话控制功能;
如果所述消息包括用户数据请求消息和 /或订阅通知请求消息, 或者用户数 据更新请求消息, 确定所述网元类型为应用服务器。
27、如权利要求 23所述对网元业务操作合法性进行判定的方法, 其特征在 于, 所述发起业务请求的网元包括: 问询呼叫会话控制功能或携带用户数据更 新请求消息的应用服务器。
28、如权利要求 25所述对网元业务操作合法性进行判定的方法, 其特征在 于, 当所述发起业务请求的网元包括: 服务呼叫会话控制功能、 携带查询初始 过滤标准的用户数据请求消息和 /或订阅通知请求消息的应用服务器时,
所述步骤 A进一步包括: 获取所述网元的网元名称;
所述步骤 C进一步包括: 比较所述获取的网元名称与所述配置的网元名称 是否一致, 如果一致, 判定该网元业务操作为合法网元业务操作。
29、如权利要求 23所述对网元业务操作合法性进行判定的方法, 其特征在 于, 所述步骤 C之后, 进一步包括: 如果不一致, 判定所述网元业务操作为不 合法网元业务操作, 结束本流程。
30、如权利要求 29所述对网元业务操作合法性进行判定的方法, 其特征在 于, 判定所述网元业务操作为不合法网元业务操作之后, 进一步包括:
向所述网元返回响应消息。
31、 一种对网元业务操作合法性进行判定的服务器, 所述服务器用于存储 用户的签约信息, 其特征在于, 该服务器包括: 接口、 解析单元和业务处理单 元;
所述接口, 用于接收网元发起的业务请求, 将所述业务请求发送给所述解 析单元;
所述解析单元, 用于接收所述业务请求, 获取所述网元发起的消息, 解析 出所述网元的主机名称;将所述主机名称和所述消息发送给所述业务处理单元; 所述业务处理单元, 用于配置所述网元的主机名称, 接收解析单元发送的 所述主机名称和消息; 判断所述网元的网元类型是否合法; 如果是, 比较所述 接收到的主机名称和所述配置的主机名称是否一致, 如果一致, 判定所述网元 业务操作为合法网元业务操作。
32、 如权利要求 31所述对网元业务操作合法性进行判定的服务器, 其特征 在于, 如果不一致,
所述业务处理单元,进一步判定所述网元业务操作为不合法网元业务操作, 生成包含所述判定结果的响应消息, 将所述响应消息发送给所述解析单元; 所述解析单元, 进一步用于接收所述响应消息, 将所述响应消息发送给所 述接口;
所述接口, 接收所述响应消息, 将所述响应消息转发给所述网元。
33、 如权利要求 32所述对网元业务操作合法性进行判定的服务器, 其特征 在于, 所述业务处理单元包括: 判定子单元和存储子单元;
所述存储子单元, 用于配置所述网元的主机名称, 将所述主机名称发送所 述判定子单元;
所述判定子单元, 用于接收所述解析单元发送的所述主机名称、 所述消息 和所述存储子单元发送的所述主机名称; 判断所述网元的网元类型是否为合法 网元类型, 如果是; 比较接收到的所述两个主机名称是否一致, 如果一致, 判 定所述网元业务操作为合法网元业务操作; 如果不一致, 判定所述网元业务操 作为不合法网元业务操作, 生成所述响应消息, 将所述响应消息发送给所述解 析单元。
34、如权利要求 33所述对网元业务操作合法性进行判定的服务器, 其特征 在于, 若所述发起业务请求的网元为: 服务呼叫会话控制功能、 携带查询初始 过滤标准的用户数据请求消息和 /或订阅通知请求消息的应用服务器 ,
所述解析单元, 进一步用于解析出所述网元的网元名称, 将所述网元名称 发送所述判定子单元;
所述存储子单元, 进一步用于配置所述网元的网元名称, 将配置的所述网 元名称发送给判定子单元; 所述判定子单元,用于接收所述解析单元发送的所述网元名称和主机名称, 以及所述存储子单元发送的所述网元名称和主机名称, 将所述解析单元发送的 所述网元名称和主机名称, 与所述存储子单元发送的所述网元名称和主机名称 分别对应进行比较, 若比较结果均一致, 判定所述网元业务操作为合法网元业 务操作; 否则, 判定所述网元业务操作为不合法网元业务操作。
PCT/CN2007/001310 2006-04-24 2007-04-20 Procédé et appareil de fonctionnement et de gestion, et procédé et serveur pour déterminer la validité du fonctionnement d'un service WO2007121672A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2007800003188A CN101317419B (zh) 2006-04-24 2007-04-20 操作处理方法、装置及业务操作合法性判定方法及服务器
EP07720883A EP1874000A4 (en) 2006-04-24 2007-04-20 METHOD AND APPARATUS FOR OPERATION AND MANAGEMENT, AND METHOD AND SERVER FOR DETERMINING THE VALIDITY OF THE OPERATION OF A SERVICE

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CNB2006100760043A CN100562019C (zh) 2006-04-24 2006-04-24 Ip多媒体子系统中的操作处理方法和归属签约用户服务器
CN200610076004.3 2006-04-24
CN200710006445A CN100596105C (zh) 2007-02-01 2007-02-01 一种对网元业务操作合法性进行判定的方法和服务器
CN200710006445.0 2007-02-01

Publications (1)

Publication Number Publication Date
WO2007121672A1 true WO2007121672A1 (fr) 2007-11-01

Family

ID=38624553

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/001310 WO2007121672A1 (fr) 2006-04-24 2007-04-20 Procédé et appareil de fonctionnement et de gestion, et procédé et serveur pour déterminer la validité du fonctionnement d'un service

Country Status (2)

Country Link
EP (2) EP2562989A3 (zh)
WO (1) WO2007121672A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003081431A1 (en) * 2002-03-22 2003-10-02 Nokia Corporation Temporary identity for authentication with session initiation protocol__________________________
CN1758634A (zh) * 2004-09-30 2006-04-12 朗迅科技公司 提供分布的用户定位器功能路由能力的方法和设备
KR20060033407A (ko) * 2004-10-15 2006-04-19 삼성전자주식회사 아이피 기반 멀티미디어 서브시스템에서 가입자 정보유실시 착신호를 가능하게 하는 방법

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003081431A1 (en) * 2002-03-22 2003-10-02 Nokia Corporation Temporary identity for authentication with session initiation protocol__________________________
CN1758634A (zh) * 2004-09-30 2006-04-12 朗迅科技公司 提供分布的用户定位器功能路由能力的方法和设备
KR20060033407A (ko) * 2004-10-15 2006-04-19 삼성전자주식회사 아이피 기반 멀티미디어 서브시스템에서 가입자 정보유실시 착신호를 가능하게 하는 방법

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GONZALO CAMARILLO; MIGUEL A. GARCIA-MARTIN: "The 3G IP Multimedia Subsystem (IMS", 2004, JOHN WILEY & SONS
See also references of EP1874000A4 *

Also Published As

Publication number Publication date
EP2562989A3 (en) 2013-08-21
EP1874000A4 (en) 2008-07-16
EP2562989A2 (en) 2013-02-27
EP1874000A1 (en) 2008-01-02

Similar Documents

Publication Publication Date Title
RU2312466C2 (ru) Способ и система, предназначенные для санкционирования доступа к пользовательской информации в сети
CN101527902B (zh) 改变签约的方法和系统
RU2434351C2 (ru) Способ, система и устройство для использования идентификаторов услуг связи ims в системе связи
CN101106795B (zh) 一种ims域隐含注册的方法
US8935374B2 (en) Method, system, and device for realizing registration mechanism of IP multimedia subsystem
WO2006047925A1 (fr) Procede permettant de selectionner le mode d'authentification cote reseau
US20070055874A1 (en) Bundled subscriber authentication in next generation communication networks
WO2008083587A1 (fr) Procédé, système et élément de réseau pour traitement du service après invalidation de données d'élément et survenue d'un incident
WO2009024006A1 (fr) Contrôleur de session locale, sous-système multimédia ip et procédé d'enregistrement de session
US8600031B2 (en) Method for connecting calls between an IP multimedia subsystem (IMS) domain and a circuit switched (CS) domain
WO2009036629A1 (en) Processing method after core network element restarting or recovering form failure
WO2008003209A1 (fr) Élément de réseau à fonction de localisation de serveur et son procédé d'utilisation
WO2006111078A1 (fr) Procede d’obtention des informations d’acces utilisateur dans le reseau de prochaine generation
BRPI0816737B1 (pt) base de dados, entidade aplicativa, ponto de conexão, entidade de controle, processo de obtenção de um endereço de uma entidade de controle e suporte de registro
WO2010069197A1 (zh) 多媒体子系统业务处理的方法、装置和多媒体子系统
CN101317419B (zh) 操作处理方法、装置及业务操作合法性判定方法及服务器
WO2008080341A1 (fr) Procédé, système et dispositif d'identification d'un terminal d'utilisateur
WO2007112621A1 (fr) Procédé destiné à assurer le maintien de la cohérence d'un désenregistrement d'adresses ip de domaine ps et de domaine ims
WO2006053502A1 (fr) Procede pour assurer la conformite d'information entre les noeuds de reseau
CN1753363A (zh) 网络侧选择鉴权方式的方法
WO2011029342A1 (zh) 一种识别pui类型的方法、设备及系统
CN100596105C (zh) 一种对网元业务操作合法性进行判定的方法和服务器
WO2007121672A1 (fr) Procédé et appareil de fonctionnement et de gestion, et procédé et serveur pour déterminer la validité du fonctionnement d'un service
KR101075614B1 (ko) 아이피 기반 멀티미디어 서브시스템에서 가입자 정보유실시 착신호를 가능하게 하는 방법
KR20070025271A (ko) 아이피 기반 멀티미디어 서브시스템에서 가입자 정보유실시 발신 및 착신 호를 가능하게 하는 방법 및 장치

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780000318.8

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2007720883

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07720883

Country of ref document: EP

Kind code of ref document: A1

WWP Wipo information: published in national office

Ref document number: 2007720883

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE