CN101192920A - A method and device for responding to a request - Google Patents
A method and device for responding to a request Download PDFInfo
- Publication number
- CN101192920A CN101192920A CNA200710163103XA CN200710163103A CN101192920A CN 101192920 A CN101192920 A CN 101192920A CN A200710163103X A CNA200710163103X A CN A200710163103XA CN 200710163103 A CN200710163103 A CN 200710163103A CN 101192920 A CN101192920 A CN 101192920A
- Authority
- CN
- China
- Prior art keywords
- request
- terminal
- black
- white list
- csi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
本发明实施例公开了一种应答请求的方法,适用于电路交换IP多媒体子系统IMS组合服务CSI业务,该方法包括:配置请求消息黑白名单,在所述请求消息黑白名单中分别记录禁止和允许所述请求的终端;当其它终端向CSI终端发送请求时,参照所述请求消息黑白名单,判断发送请求的终端所属的名单,当所述发送请求的终端属于白名单时,则接受该终端的请求;当所述发送请求的终端属于黑名单时,则拒绝该终端的请求。应用本发明实施例,就可以在限制其它终端对CSI终端的各种请求,回避恶意终端的频繁请求,保证正常呼叫的建立,提高系统性能。本发明实施例还公开了一种在CSI业务中应答请求的设备,包括接收模块、黑白名单配置模块和判决模块。
The embodiment of the present invention discloses a method for responding to a request, which is suitable for a CSI service of a circuit-switched IP multimedia subsystem IMS service. The method includes: configuring a request message black and white list, and recording prohibition and permission respectively in the request message black and white list The requesting terminal; when other terminals send a request to the CSI terminal, refer to the black and white list of the request message to determine the list to which the terminal sending the request belongs, and when the terminal sending the request belongs to the white list, accept the terminal's request; when the terminal sending the request belongs to the blacklist, rejecting the terminal's request. By applying the embodiment of the present invention, various requests from other terminals to the CSI terminal can be restricted, frequent requests from malicious terminals can be avoided, normal call establishment can be ensured, and system performance can be improved. The embodiment of the invention also discloses a device for responding to requests in CSI services, including a receiving module, a blacklist and whitelist configuration module and a judgment module.
Description
技术领域technical field
本发明涉及SIP系统中的安全技术,特别涉及一种在电路交换IP多媒体子系统(IMS)组合服务(CSI)业务中应答请求的方法和设备。The invention relates to the security technology in the SIP system, in particular to a method and equipment for responding to requests in circuit-switched IP Multimedia Subsystem (IMS) Composite Service (CSI) services.
背景技术Background technique
随着移动通信技术的发展,越来越多的新的通信技术应用到移动通信当中。移动通信的通信速度更快,通信服务的类型越多,给人们带来的通信也越方便。随着业务的增多以及新业务的不断涌现,如何方便,快速的开展业务成为人们关注的重点,为此,提出了IMS的概念。IMS是3G核心网络提供端到端多媒体业务和集群多媒体业务的中心,在3GPP R6版本中,IMS已经被定义为支持所有IP接入网的多媒体业务核心网,可以支持任何一种移动或者固定、有线或者无线IP接入网(IP-CAN)。IMS正逐渐成为一个通用的业务平台,通过IMS可以实现业务的快速开展和定制,为运营商带来巨大的效益。With the development of mobile communication technology, more and more new communication technologies are applied to mobile communication. The communication speed of mobile communication is faster, the types of communication services are more, and the communication is more convenient for people. With the increase of business and the continuous emergence of new business, how to develop business conveniently and quickly has become the focus of people's attention. Therefore, the concept of IMS is proposed. IMS is the center for the 3G core network to provide end-to-end multimedia services and cluster multimedia services. In the 3GPP R6 version, IMS has been defined as a multimedia service core network that supports all IP access networks, and can support any mobile or fixed, Wired or wireless IP access network (IP-CAN). IMS is gradually becoming a common service platform, through which services can be quickly deployed and customized, bringing huge benefits to operators.
基于IMS技术,运营商可以开展众多的业务,比如说流媒体业务、可视电话业务、CSI业务等。其中所谓的CSI业务,其全称是Combined CircuitSwitched(CS)and IP Multimedia Subsystem(IMS)sessions,也可以称作CSICS。其业务可以简单的表述为CS会话和IMS会话的并发,可以是用户在进行CS通话时建立一个端到端的IMS会话;也可以是用户在IMS会话时建立一个CS会话。Based on IMS technology, operators can carry out many services, such as streaming media services, videophone services, and CSI services. The so-called CSI service, its full name is Combined Circuit Switched (CS) and IP Multimedia Subsystem (IMS) sessions, which can also be called CSICS. Its service can be simply expressed as the concurrency of CS session and IMS session. It can be that a user establishes an end-to-end IMS session during a CS call, or that a user establishes a CS session during an IMS session.
CSI基于3GPP和IETF的标准协议,实现在点到点的设备之间CS会话过程中并发IMS会话,以及在IMS会话过程中并发CS会话。通过CS和IMS会话的并发,可以实现CS电话过程中通过IMS进行内容的共享,包括视频剪辑、音乐、图片、文字以及文件等。因此,CSI又被称为Share的技术。Based on the standard protocols of 3GPP and IETF, CSI implements concurrent IMS sessions during CS sessions between point-to-point devices, and concurrent CS sessions during IMS sessions. Through the concurrency of CS and IMS sessions, it is possible to share content through IMS during CS calls, including video clips, music, pictures, text, and files. Therefore, CSI is also called the technology of Share.
为了实现CSI业务,终端必需同时支持CS连接以及IMS连接。IMS连接可以通过多种方式接入IMS核心网,可以是WCDMA,CDMA2000,WLAN,EDGE等无线网络,也可以通过XDSL等有线网络连接。其中CS网络主要提供高质量,实时的语音通信;IMS网络主要提供用户的端到端的寻址,终端能力的协商以及业务的控制功能。In order to realize the CSI service, the terminal must support CS connection and IMS connection at the same time. The IMS connection can be connected to the IMS core network in various ways, such as wireless networks such as WCDMA, CDMA2000, WLAN, and EDGE, or wired networks such as XDSL. Among them, the CS network mainly provides high-quality, real-time voice communication; the IMS network mainly provides user end-to-end addressing, terminal capability negotiation and service control functions.
CSI业务的实现主要有两种方式,即E2E和E2G的方式。现阶段而言,主要的设备厂商都采用的是E2E的方式。图1为E2E方式的网络结构图。在该方式中,主要的功能、特色和操作集中到终端来完成,IMS网络仅仅提供一个消息路由和转发的机制,辅助终端完成该业务。这种方式需要较强的终端能力,同时,由于主要的功能都有终端侧完成,因此,对整个IMS而言,不需要作太大的改动,基本上现存的网络就能够提供该业务。There are mainly two ways to realize the CSI service, that is, E2E and E2G ways. At this stage, major equipment manufacturers are adopting the E2E method. FIG. 1 is a network structure diagram of the E2E mode. In this mode, the main functions, features and operations are concentrated on the terminal, and the IMS network only provides a message routing and forwarding mechanism to assist the terminal to complete the service. This method requires strong terminal capability, and at the same time, since the main functions are performed on the terminal side, the entire IMS does not require much modification, and basically the existing network can provide this service.
除了上述的E2E方式而言,在业界也考虑采用一种E2G的方式。图2为E2G方式的网络结构图。在该方式中,将控制权从终端转移到系统侧。这种方式的控制加强了集中管理的能力,便于业务的开展,并且降低终端的负担。但是,与此同时,这种方式需要终端进行支持才能够提供业务;同时,这种方式需要对现存的网络进行改造,实现难度较前一种方式要大。In addition to the above-mentioned E2E method, an E2G method is also considered in the industry. FIG. 2 is a network structure diagram of the E2G mode. In this approach, the control right is transferred from the terminal to the system side. The control in this way strengthens the ability of centralized management, facilitates business development, and reduces the burden on the terminal. However, at the same time, this method requires the support of the terminal to provide services; at the same time, this method requires the transformation of the existing network, which is more difficult to implement than the former method.
目前业界主要的实现方式是基于E2E的方式来提供内容共享的功能。终端利用现有的CS网络以及IMS核心网,就可以实现在语音通话的过程中对诸如视频剪辑、视频直播内容、音频、图片,文件等进行共享。在CSI会话建立之前,CSI终端之间需要通过能力协商阶段来实现终端之间能力信息的交互过程。目前,CSI终端能力的交互通过互相查询终端能力来实现,而两个终端互相查询的方法流程相同。下面就以CSI终端A查询CSI终端B的能力为例,说明目前CSI业务中查询CSI终端能力的方法流程。At present, the main implementation method in the industry is to provide the function of content sharing based on the E2E method. Using the existing CS network and IMS core network, the terminal can realize sharing such as video clips, live video content, audio, pictures, files, etc. during the voice call. Before the establishment of the CSI session, the CSI terminals need to go through the capability negotiation phase to realize the interaction process of the capability information between the terminals. At present, the interaction of CSI terminal capabilities is realized by querying the capabilities of the terminals each other, and the procedure for two terminals to query each other is the same. The following uses CSI terminal A to query the capability of CSI terminal B as an example to illustrate the current method flow of querying the capability of the CSI terminal in the CSI service.
图1给出了CSI终端A查询CSI终端B能力的流程。进行UE能力交互有几种原因:CSI终端A不知道CSI终端B的能力;CSI终端A本身的能力发生了变化;CSI终端B请求CSI终端A能力的时候,CSI终端A发现CSI终端B的能力版本发生了变化。FIG. 1 shows the flow of CSI terminal A querying the capability of CSI terminal B. There are several reasons for UE capability interaction: CSI terminal A does not know the capabilities of CSI terminal B; the capabilities of CSI terminal A itself have changed; when CSI terminal B requests the capabilities of CSI terminal A, CSI terminal A discovers the capabilities of CSI terminal B Version changed.
具体地,如果第一次呼叫是标准的IMS呼叫过程,并且在呼叫信令中没有携带扩展的CSI的能力交互字段,呼叫过程中没有进行CSI终端的能力信息交互,那么CSI终端可以使用初始会话协议(SIP)的选项(OPTIONS)命令得到CSI终端的能力信息。在终端完成能力交互后,终端根据得到的对端业务能力信息将可用的业务类型反馈给用户。Specifically, if the first call is a standard IMS call process, and the extended CSI capability interaction field is not carried in the call signaling, and the capability information exchange of the CSI terminal is not performed during the call, then the CSI terminal can use the initial session The option (OPTIONS) command of the protocol (SIP) obtains the capability information of the CSI terminal. After the terminal completes the capability interaction, the terminal feeds back the available service types to the user according to the obtained opposite terminal service capability information.
在CSI业务过程中,不论首先发起的呼叫是IMS呼叫还是CS呼叫,用户都可以在通话过程中使用OPTIONS方法得到CSI终端的能力信息,这对于在通话过程中终端突然改变能力的场景是非常重要的。In the CSI service process, regardless of whether the first call is an IMS call or a CS call, the user can use the OPTIONS method to obtain the capability information of the CSI terminal during the call, which is very important for the scenario where the terminal suddenly changes capabilities during the call of.
如图3所示,查询终端能力的方法包括:As shown in Figure 3, the methods for querying terminal capabilities include:
步骤301,CSI终端A向CSI终端B请求查询能力。In step 301, CSI terminal A requests CSI terminal B for query capability.
本步骤中,利用SIP OPTIONS消息发送查询请求。该OPTIONS消息里面有CSI终端B的URI,以及CSI终端A的URI或者MSISDN。表1即为发送的OPTIONS消息的具体例子。In this step, a query request is sent using a SIP OPTIONS message. The OPTIONS message contains the URI of the CSI terminal B, and the URI or MSISDN of the CSI terminal A. Table 1 is a specific example of the sent OPTIONS message.
OPTIONS request(终端1向终端2)OPTIONS request (
表1Table 1
步骤302,IMS核心网A把SIP OPTIONS消息发送到IMS核心网B。
步骤303,IMS核心网B对SIP OPTIONS消息进行路由选择。In step 303, the IMS core network B selects a route for the SIP OPTIONS message.
步骤304,IMS核心网B把SIP OPTIONS消息发送给CSI终端B。In
步骤305,CSI终端B存储CSI终端A的地址。Step 305, CSI terminal B stores the address of CSI terminal A.
步骤306-308,CSI终端B通过IMS核心网A和IMS核心网B向CSI终端A发送200 OK消息,并在该消息中携带CSI终端B的能力描述。In steps 306-308, CSI terminal B sends a 200 OK message to CSI terminal A through IMS core network A and IMS core network B, and carries the capability description of CSI terminal B in the message.
本步骤中,CSI终端B向CSI终端A返回的应答消息如表2所示:In this step, the response message returned by CSI terminal B to CSI terminal A is shown in Table 2:
200(OK)response(终端2向终端1)200 (OK) response (
表2Table 2
步骤309,CSI终端A保存CSI终端B的能力描述。Step 309, CSI terminal A saves the capability description of CSI terminal B.
按照上述方法进行CSI终端间的能力查询后,即可以建立CSI呼叫。After the capability query between CSI terminals is performed according to the above method, a CSI call can be established.
在上述步骤306-308中,CSI终端B反馈了自己三种媒体处理能力,包括MSRP、H.263视频能力和AMR音频能力,并且详细给出了每种媒体处理能力的具体细节参数。事实上,CSI终端B反馈这些信息需要耗费很多的终端系统资源。In the above steps 306-308, CSI terminal B feeds back its own three media processing capabilities, including MSRP, H.263 video capability and AMR audio capability, and gives detailed parameters of each media processing capability. In fact, it needs to consume a lot of terminal system resources for the CSI terminal B to feed back these information.
发明内容Contents of the invention
在图3所示的CSI终端能力查询方法中,如果存在一台恶意终端频繁发起OPTIONS命令,反复要求CSI终端B发送能力信息,CSI终端B由于每次返回媒体能力信息都需要占用大量的系统资源,很有可能导致整个系统响应用户指令慢,或者无法响应其他终端的正常呼叫请求。甚至终端的软件系统如果在设计上存在缺陷,缺乏系统冗余保护,整个操作系统可能在频繁响应能力查询的过程中崩溃。In the CSI terminal capability query method shown in Figure 3, if there is a malicious terminal that frequently initiates the OPTIONS command and repeatedly requests CSI terminal B to send capability information, CSI terminal B needs to occupy a large amount of system resources because it returns media capability information every time , it is likely to cause the entire system to respond slowly to user instructions, or fail to respond to normal call requests from other terminals. Even if the software system of the terminal has defects in design and lacks system redundancy protection, the entire operating system may crash during the process of frequently responding to capability queries.
另外,CSI终端有多种媒体能力,对于某些应用来说,终端每次收到OPTIONS消息后,反馈所有的媒体能力没有必要,并且会带来安全隐患。特别是如果有一台恶意终端,利用某一个媒体通信能力的缺陷对终端发动攻击,后果会非常严重。In addition, the CSI terminal has multiple media capabilities. For some applications, it is unnecessary for the terminal to feed back all the media capabilities after receiving the OPTIONS message each time, and it will bring security risks. Especially if there is a malicious terminal that uses a defect in a certain media communication capability to launch an attack on the terminal, the consequences will be very serious.
综上所述,目前的CSI业务中查询终端能力的方法,在遇到恶意攻击时,会大大降低系统性能,影响正常呼叫的建立。同时,对于CSI业务中其它诸如连接建立的请求消息,也同样存在被恶意终端利用的安全漏洞,过于频繁地处理请求消息,会造成CSI终端拥塞,甚至导致系统崩溃。To sum up, the current method for querying terminal capabilities in the CSI service will greatly reduce system performance and affect normal call establishment when malicious attacks are encountered. At the same time, for other request messages such as connection establishment in the CSI service, there are also security holes exploited by malicious terminals. Too frequent processing of request messages will cause congestion of CSI terminals and even cause system crashes.
有鉴于此,本发明实施例提供一种应答请求的方法,能够防止利用CSI业务中的请求对CSI终端进行恶意攻击,提高系统性能。In view of this, an embodiment of the present invention provides a method for responding to requests, which can prevent malicious attacks on CSI terminals by using requests in CSI services, and improve system performance.
本发明实施例还提供一种应答请求的设备,该终端能够防止利用CSI业务中的请求对CSI终端进行恶意攻击,提高系统性能。The embodiment of the present invention also provides a request response device, the terminal can prevent malicious attacks on the CSI terminal by using the request in the CSI service, and improve system performance.
本发明实施例采用如下的技术方案:The embodiment of the present invention adopts following technical scheme:
一种应答请求的方法,适用于电路交换IP多媒体子系统IMS组合服务CSI业务,该方法包括:A method for responding to a request, suitable for a circuit-switched IP multimedia subsystem IMS composite service CSI service, the method comprising:
配置请求消息黑白名单,在所述请求消息黑白名单中分别记录禁止和允许所述请求的终端;Configure the request message black and white list, and record the terminals that prohibit and allow the request respectively in the request message black and white list;
当其它终端向CSI终端发送请求时,参照所述请求消息黑白名单,判断发送请求的终端所属的名单,当所述发送请求的终端属于白名单时,则接受该终端的请求;当所述发送请求的终端属于黑名单时,则拒绝该终端的请求。When other terminals send a request to the CSI terminal, refer to the black and white list of the request message to determine the list to which the terminal sending the request belongs, and when the terminal sending the request belongs to the white list, accept the request of the terminal; when the sending When the requested terminal belongs to the blacklist, the request of the terminal is rejected.
一种应答请求的设备,该设备包括:接收模块、黑白名单配置模块和判决模块,其中,A device for responding to a request, the device includes: a receiving module, a black and white list configuration module, and a judgment module, wherein,
所述接收模块,用于接收其它终端发送的请求,并将该请求转发给所述判决模块;The receiving module is configured to receive requests sent by other terminals, and forward the requests to the judging module;
所述黑白名单配置模块,用于接受配置生成并保存请求消息黑白名单;The black-and-white list configuration module is used to accept the configuration to generate and save the request message black-and-white list;
所述判决模块,用于接收所述接收模块转发的请求,并参照所述黑白名单配置模块中保存的请求消息黑白名单,对发送请求的终端进行判断,当所述发送请求的终端属于请求消息白名单时,则接受该终端的请求,当所述发送请求的终端属于请求消息黑名单时,则拒绝该终端的请求。The judging module is configured to receive the request forwarded by the receiving module, and refer to the black and white list of request messages stored in the black and white list configuration module to judge the terminal sending the request, when the terminal sending the request belongs to the request message When the terminal is in the white list, the request of the terminal is accepted, and when the terminal sending the request belongs to the blacklist of the request message, the request of the terminal is rejected.
由上述技术方案可见,本发明实施例中,配置请求消息黑白名单,来控制其它终端对CSI终端的请求。当其它终端向该CSI终端发送请求时,首先根据配置的请求消息黑白名单,判断发送请求的终端所属的名单,进而判断是否接受该发送请求的终端的请求。应用本发明实施例,就可以限制其它终端对CSI终端的各种请求,回避恶意终端的频繁请求,保证正常呼叫的建立,提高系统性能。It can be seen from the above technical solution that in the embodiment of the present invention, a black and white list of request messages is configured to control requests from other terminals to the CSI terminal. When another terminal sends a request to the CSI terminal, it first judges the list to which the terminal sending the request belongs according to the configured black and white list of request messages, and then judges whether to accept the request of the terminal sending the request. By applying the embodiment of the present invention, various requests from other terminals to the CSI terminal can be restricted, frequent requests from malicious terminals can be avoided, normal call establishment can be ensured, and system performance can be improved.
附图说明Description of drawings
图1为E2E方式的网络结构图。FIG. 1 is a network structure diagram of the E2E mode.
图2为E2G方式的网络结构图。FIG. 2 is a network structure diagram of the E2G mode.
图3为目前查询终端能力的方法流程图。FIG. 3 is a flow chart of a current method for querying terminal capabilities.
图4为本发明实施例在CSI业务中应答请求的方法总体流程图。Fig. 4 is an overall flowchart of a method for responding to a request in a CSI service according to an embodiment of the present invention.
图5为本发明实施例一中CSI业务中应答请求的方法主要流程图。FIG. 5 is a main flowchart of a method for responding to a request in a CSI service in
图6为本发明实施例一中CSI业务中应答请求设备的主要结构图。FIG. 6 is a main structural diagram of a device responding to a request in a CSI service in
图7为本发明实施例二中CSI业务中应答请求的方法主要流程图。FIG. 7 is a main flowchart of a method for responding to a request in a CSI service in
图8为本发明实施例二中CSI业务中应答请求设备的主要结构图。FIG. 8 is a main structural diagram of a device responding to a request in a CSI service according to
图9为本发明实施例三中查询CSI终端能力的方法主要流程图。FIG. 9 is a main flow chart of a method for querying a CSI terminal capability in Embodiment 3 of the present invention.
图10为本发明实施例三中CSI业务的终端设备的主要体结构图。FIG. 10 is a main structural diagram of a terminal device for a CSI service in Embodiment 3 of the present invention.
图11为利用终端主动检测的方式配置或修改请求消息黑白名单的主要流程图。FIG. 11 is a main flow chart of configuring or modifying the black and white lists of request messages by means of active terminal detection.
具体实施方式Detailed ways
为使本发明实施例的目的、技术手段和优点更加清楚明白,以下结合附图,对本发明实施例做进一步详细说明。In order to make the purpose, technical means and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.
本发明实施例的基本思想是:在CSI终端配置请求消息黑白名单,来控制其它终端对该CSI终端的请求。当其它终端向该CSI终端发送请求消息时,该CSI终端首先根据配置的请求消息黑白名单,判断发送请求的终端所属的名单,进而判断是否接受该发送请求的终端的请求。The basic idea of the embodiments of the present invention is to configure a black and white list of request messages on a CSI terminal to control requests from other terminals to the CSI terminal. When other terminals send a request message to the CSI terminal, the CSI terminal first judges the list to which the requesting terminal belongs according to the configured black and white list of request messages, and then judges whether to accept the request of the requesting terminal.
图4为本发明实施例的在CSI业务中应答请求的总体流程图。如图4所示,该方法包括:Fig. 4 is an overall flow chart of responding to a request in a CSI service according to an embodiment of the present invention. As shown in Figure 4, the method includes:
步骤401,配置请求消息黑白名单。
步骤402,其它终端向CSI终端发送请求消息。
步骤403,参照配置的请求消息黑白名单,对发送请求的终端所属名单进行判断,若终端A属于请求消息白名单,则执行步骤404,若终端A属于请求消息黑名单,则执行步骤405。
步骤404,接受发送请求的终端的请求,并结束本查询流程。
步骤405,拒绝发送请求的终端的请求,并结束本查询流程。
本发明实施例中配置的请求消息黑白名单中分别记录禁止和允许请求的终端,对照该黑白名单,确定发送请求的终端是否具有请求权限。另外,当发送请求的终端位于白名单中,即具有请求权限后,还可以进一步要求其进行鉴权,从而进一步保证系统的安全性;或者,当发送的请求为能力查询请求时,也可以对进行查询的能力类型进行限制,以节省系统消耗、满足用户需求。In the request message blacklist and blacklist configured in the embodiment of the present invention, terminals that are forbidden and allowed to request are respectively recorded, and compared with the blacklist and whitelist, it is determined whether the terminal that sends the request has request authority. In addition, when the terminal sending the request is in the white list, that is, it has the request authority, it can be further required to perform authentication, so as to further ensure the security of the system; or, when the request sent is a capability query request, it can also be The type of capability for query is limited to save system consumption and meet user needs.
下面举三个实施例,分别说明基本的黑白名单判断的应答请求方法、带鉴权的应答请求方法和增加能力查询限制的能力查询方法的具体实施方式。在三个实施例中,均以进行能力查询请求为例说明具体的应答请求的实施方式。The following three examples are given to illustrate the specific implementations of the basic blacklist and whitelist judgment response request method, the authentication response request method, and the capability query method with added capability query restrictions. In the three embodiments, a capability query request is taken as an example to describe a specific implementation manner of answering the request.
实施例一:Embodiment one:
本实施例中,采用基本的黑白名单判断判断是否允许其它终端的请求,并且,在黑白名单中,采用终端的地址来代表某终端。In this embodiment, a basic black-and-white list is used to determine whether to allow the request of other terminals, and in the black-and-white list, the address of the terminal is used to represent a certain terminal.
图5即为本发明实施例一中CSI业务中应答请求的方法主要流程图。如图5所示,该方法包括:FIG. 5 is a main flowchart of a method for responding to a request in a CSI service in
步骤501,在CSI终端中配置请求消息黑白名单。
本步骤中,可以采用用户主动配置的方式进行请求消息黑白名单的配置。本实施例中,采用终端的地址信息来代表某终端,如利用SIP地址代表终端,也就是说,终端列表实际上为终端的地址列表。In this step, the configuration of the blacklist and whitelist of request messages may be configured actively by the user. In this embodiment, the address information of the terminal is used to represent a certain terminal, for example, a SIP address is used to represent a terminal, that is to say, the terminal list is actually a terminal address list.
通过上述方式对CSI终端配置请求消息黑白名单后,若存在终端A,请求查询配置了请求消息黑白名单的CSI终端的能力时,则执行以下的操作:After configuring the request message blacklist and whitelist for the CSI terminal in the above method, if there is a terminal A requesting to query the capability of the CSI terminal configured with the request message blacklist and whitelist, perform the following operations:
步骤502,终端A向CSI终端发送能力查询请求。
本实施例中,采用SIP OPTIONS命令进行能力查询。In this embodiment, the capability query is performed using the SIP OPTIONS command.
步骤503,CSI终端接收终端A发送的能力查询请求,并对终端A所属的列表进行判断,若终端A属于请求消息白名单,则执行步骤504,若终端A属于请求消息黑名单,则执行步骤505。In
本步骤中,判断终端A所属名单的方式为,从CSI终端接收的OPTIONS消息中提取终端A的地址信息,如SIP地址,比较该地址信息和CSI终端中保存的黑白名单中的地址信息,确定终端A的地址信息存储在哪个列表中,则该终端即属于该名单。In this step, the way to determine the list to which terminal A belongs is to extract the address information of terminal A, such as a SIP address, from the OPTIONS message received by the CSI terminal, compare the address information with the address information in the black and white list stored in the CSI terminal, and determine In which list the address information of terminal A is stored, the terminal belongs to the list.
步骤504,向终端A返回CSI终端的能力信息,并结束本查询流程。Step 504: Return the capability information of the CSI terminal to terminal A, and end the query process.
步骤505,返回拒绝信息,通知终端A禁止其查询CSI终端的能力信息,并结束本查询流程。In
上述即为本实施例中应答能力查询请求的方法具体流程。本实施例中还提供了CSI业务中的终端设备的具体实施方式,可以用于实施上述方法流程。图6即为本发明实施例一中CSI业务中应答请求设备的主要结构图。如图6所示,该设备600包括:接收模块601、黑白名单配置模块602和判决模块603。The above is the specific flow of the method for responding to the capability query request in this embodiment. This embodiment also provides a specific implementation manner of the terminal device in the CSI service, which can be used to implement the above method flow. FIG. 6 is a main structural diagram of a device responding to a request in a CSI service in
在该设备600中,接收模块601,用于接收其它终端发送的请求,并将该请求转发给判决模块602。In the
黑白名单配置模块602,用于接受配置生成并保存请求消息黑白名单。The black and white
判决模块603,用于接收接收模块601转发的请求,并参照黑白名单配置模块602中保存的请求消息黑白名单,对发送请求的终端进行判断,当发送请求的终端属于请求消息白名单时,则接受该终端的请求,当发送请求的终端属于请求消息黑名单时,则拒绝该终端的请求。The judging
由上述可见,本实施例中预先在CSI终端中配置请求消息黑白名单后,对该CSI终端内能力信息的查询就会受到请求消息黑白名单的限制,若请求查询的终端属于请求消息黑名单,就不会向其返回能力信息,将恶意终端归入请求消息黑名单后,就可以回避恶意终端的攻击。As can be seen from the above, after the request message black and white list is pre-configured in the CSI terminal in this embodiment, the query of the capability information in the CSI terminal will be restricted by the request message black and white list. If the terminal requesting the query belongs to the request message blacklist, Capability information will not be returned to it, and after the malicious terminal is included in the blacklist of the request message, the attack of the malicious terminal can be avoided.
本实施例中,请求消息黑名单的配置是由用户主动完成的。事实上,还可以采用终端自动检测OPTIONS攻击并实时更新的方式。例如,定义一个攻击行为,以及相应的门限值,每当终端收到OPTIONS请求后,就对该OPTIONS命令进行一次计算,如果请求的频度超过了某一个门限值时,终端认为这是一种恶意攻击。发起恶意攻击的终端被直接加入禁止进行能力查询的终端列表,或者,在经过用户确认后,加入禁止查询的终端列表。加入终端类别的方式可以为,在禁止查询的终端列表中增加一条非法终端地址。之后的CSI终端可以根据更新后的终端列表,屏蔽攻击方发送的OPTIONS请求。In this embodiment, the configuration of the request message blacklist is actively completed by the user. In fact, it is also possible to use the terminal to automatically detect OPTIONS attacks and update them in real time. For example, define an attack behavior and the corresponding threshold value. Whenever the terminal receives an OPTIONS request, it will calculate the OPTIONS command once. If the frequency of the request exceeds a certain threshold value, the terminal considers it to be A malicious attack. The terminal that initiates a malicious attack is directly added to the terminal list that is prohibited from performing capability query, or, after confirmation by the user, is added to the list of terminal that is prohibited from querying. The method of adding the terminal category may be to add an illegal terminal address in the terminal list prohibited from querying. Subsequent CSI terminals can block the OPTIONS request sent by the attacker according to the updated terminal list.
实施例二:Embodiment two:
为增加系统的灵活性,终端可以在配置允许进行查询的终端列表时设置安全选项,对于来自某些终端的能力请求信息,要求进行鉴权操作。本实施例即在实施例一的基础上,对加入鉴权操作的查询终端能力的方法进行详细说明,具体的鉴权操作为密码鉴权。In order to increase the flexibility of the system, the terminal can set security options when configuring the list of terminals allowed to be queried, and requires authentication operations for capability request information from certain terminals. In this embodiment, on the basis of
图5为本发明实施例二中CSI业务中应答请求的方法主要流程图。如图5所示,该方法包括:FIG. 5 is a main flowchart of a method for responding to a request in a CSI service in
步骤501,在CSI终端中配置请求消息黑白名单。
本步骤中,由于CSI呼叫是建立在IMS呼叫基础上的,因此配置能力黑白名单的方式可以为:与IMS的呼叫黑白名单同步。具体地,在最初配置时,可以将IMS的呼叫黑名单作为请求消息黑名单,将IMS的呼叫白名单作为请求消息白名单。进一步地,可以根据用户需要,采用用户主动配置的方式,对请求消息黑白名单的内容进行相应的修改。当IMS的呼叫黑白名单发生变化时,也同时对请求消息黑白名单进行修改。如,当用户在IMS呼叫的黑名单中加入或删除一个非法终端时,自动在请求消息黑名单中加入或删除该非法终端;当用户在IMS呼叫的白名单中加入或删除一个合法终端时,自动在请求消息白名单中加入或删除该合法终端。In this step, since the CSI call is established on the basis of the IMS call, the way of configuring the capability blacklist and whitelist may be: synchronizing with the call blacklist and whitelist of the IMS. Specifically, during initial configuration, the call blacklist of the IMS may be used as the request message blacklist, and the IMS call whitelist may be used as the request message whitelist. Further, according to the needs of the user, the contents of the blacklist and whitelist of the request message can be modified accordingly by means of active configuration by the user. When the call blacklist and whitelist of the IMS are changed, the request message blacklist and whitelist are also modified at the same time. For example, when the user adds or deletes an illegal terminal in the blacklist of IMS calls, the illegal terminal is automatically added or deleted in the request message blacklist; when the user adds or deletes a legal terminal in the white list of IMS calls, Automatically add or delete the legal terminal in the request message white list.
本实施例中,在白名单中除包括允许进行能力查询的终端列表外,还可以进一步包括鉴权表项,由于鉴权操作采用密码鉴权的方式,因此该鉴权表项包括:该表项对应的终端是否需要进行密码验证,以及鉴权密码。In this embodiment, in addition to the terminal list that is allowed to perform capability query, the white list may further include an authentication entry. Since the authentication operation adopts a password authentication method, the authentication entry includes: Whether the terminal corresponding to the item needs to perform password verification, and the authentication password.
假定存在终端A,请求查询配置了请求消息黑白名单的CSI终端的能力时,执行以下的操作:Assume that terminal A exists, and when requesting to query the capabilities of a CSI terminal configured with a blacklist or blacklist of request messages, perform the following operations:
步骤702,终端A向CSI终端发送能力查询请求。
步骤703,CSI终端接收终端A发送的能力查询请求,并对终端A所属的名单进行判断,若终端A属于请求消息白名单,则执行步骤704及其后续步骤,若终端A属于请求消息黑名单,则执行步骤709。In
本步骤中,判断终端A所属名单的方式与实施例一中相同,这里就不再赘述。In this step, the manner of judging the list to which terminal A belongs is the same as that in
步骤704,CSI终端根据终端A对应的鉴权表项,判断终端A是否需要进行密码验证,若是,则执行步骤705及其后续步骤,否则执行步骤708。In
步骤705,CSI终端判断接收到的能力查询请求中是否包含验证密码,若是,则执行步骤707及其后续步骤,否则执行步骤706及其后续步骤。In
步骤706,CSI终端向终端A发送要求鉴权的消息,终端A收到该消息后,即重新发送携带验证密码的能力查询请求。In
步骤707,CSI终端根据鉴权表项中的鉴权密码,判断能力查询请求中携带的验证密码是否合法,若是,则执行步骤708,否则执行步骤709。In
步骤708,向终端A返回CSI终端的能力信息,并结束本查询流程。Step 708: Return the capability information of the CSI terminal to terminal A, and end the query process.
步骤709,将能力查询请求丢弃,不向终端A反馈任何信息,并结束本查询流程。In
上述即为本实施例中应答能力查询请求的方法具体流程。本实施例中还提供了CSI业务中的终端设备的具体实施方式,可以用于实施上述方法流程。图8即为本发明实施例二的CSI业务中应答请求设备的主要结构图。如图8所示,该设备800包括:接收模块801、黑白名单配置模块802和判决模块803。The above is the specific flow of the method for responding to the capability query request in this embodiment. This embodiment also provides a specific implementation manner of the terminal device in the CSI service, which can be used to implement the above method flow. FIG. 8 is a main structural diagram of a device responding to a request in a CSI service according to
在该设备800中,接收模块801,用于接收其它终端发送的请求,并将该请求转发给判决模块802。In the
黑白名单配置模块802,用于接受配置生成并保存请求消息黑白名单,并在保存的请求消息白名单进一步包括鉴权表项。The black and white
判决模块803,用于接收接收模块801转发的请求,并参照黑白名单配置模块802中保存的请求消息黑白名单,对发送请求的终端进行判断,当发送请求的终端属于请求消息白名单时,进一步从黑白名单配置模块802中查询发送请求的终端是否需要进行鉴权,并进行鉴权,当发送请求的终端属于请求消息黑名单时,则拒绝该终端的请求。The judging
本实施例中查询终端能力的方法与实施例一基本相同。区别在于:一、在配置能力查询白名单时,进一步包括安全选项的设置。具体为:在请求消息白名单中增加一个鉴权表项,表明对应的终端是否需要进行鉴权操作以及进行鉴权操作时的鉴权密码;二、在判断是否反馈CSI终端能力信息时,本实施例进一步包括图7所示的步骤704-707,判断发送能力查询请求的终端A是否需要进行鉴权,以及详细介绍了进行鉴权的全过程。The method for querying terminal capabilities in this embodiment is basically the same as that in
事实上,在进行鉴权操作时也可以采用私有密钥签名的方式。在这种方式下,鉴权表项中保存的鉴权信息为私有密钥签名的结果。当被叫方向主叫发送要求鉴权的消息后,主叫即将私有密钥签名的结果返回到被叫方,被叫方通过接收到的私有密钥签名的结果和鉴权表项中保存的内容进行比对,来实现用户身份识别。In fact, private key signatures can also be used for authentication operations. In this way, the authentication information stored in the authentication entry is the result of the private key signature. When the called party sends a message requesting authentication to the calling party, the calling party will return the result of the private key signature to the called party, and the called party will pass the result of the received private key signature and the value stored in the authentication entry The content is compared to realize user identification.
在本实施例中,配置请求消息黑白名单的方式为与IMS呼叫的黑白名单同步的,在该方式中,具体是根据IMS呼叫的黑白名单配置请求消息黑白名单。事实上,另一种方式可以为:采用用户主动配置的方式自定义地配置专用黑白名单,而用于进行黑白名单判断的请求消息黑白名单具体包括了用户配置的专用黑白名单和IMS呼叫的黑白名单。这样,由于能力查询名单本身包括了IMS呼叫的黑白名单,因此也就自然实现了与IMS呼叫的黑白名单同步的目的。In this embodiment, the method of configuring the blacklist and whitelist of the request message is synchronized with the blacklist and whitelist of the IMS call. In this method, the blacklist and whitelist of the request message are specifically configured according to the blacklist and whitelist of the IMS call. In fact, another way can be: use the user's initiative to configure the special black and white list, and the black and white list of the request message used for black and white list judgment specifically includes the special black and white list configured by the user and the black and white of IMS calls. list. In this way, since the capability query list itself includes the black and white lists of IMS calls, the purpose of synchronizing with the black and white lists of IMS calls is naturally achieved.
通过本实施例中鉴权表项的增加,使得配置了请求消息黑白名单的CSI终端可以设定某些发送请求终端的安全等级,要求其进行鉴权,进一步增加了CSI终端的安全性。Through the addition of authentication entries in this embodiment, the CSI terminals configured with the black and white lists of request messages can set the security level of certain sending request terminals and require them to perform authentication, which further increases the security of the CSI terminals.
实施例三:Embodiment three:
根据用户需要以及节省不必要的系统消耗,可以在黑白名单中规定不需要反馈的终端能力描述类型,在终端确定可以反馈终端能力描述时,只需要反馈终端需要反馈的能力描述即可,从而满足用户需求,并节省系统消耗。本实施例即在实施例一的基础上,对此种实施方式进行详细说明。According to user needs and saving unnecessary system consumption, the terminal capability description type that does not need feedback can be specified in the black and white list. When the terminal determines that the terminal capability description can be fed back, it only needs to feed back the capability description that the terminal needs to feedback, so as to meet user needs, and save system consumption. This embodiment is based on the first embodiment to describe this implementation manner in detail.
图9为本发明实施例三中查询CSI终端能力的方法主要流程图。如图9所示,该方法包括:FIG. 9 is a main flow chart of a method for querying a CSI terminal capability in Embodiment 3 of the present invention. As shown in Figure 9, the method includes:
步骤901,在CSI终端中配置请求消息黑白名单。
本步骤中,配置请求消息黑白名单的方式可以为:终端自动检测OPTIONS攻击,在发现并经过用户确认后,加入黑白名单。具体地,定义一个攻击行为,以及相应的门限值,每当终端收到OPTIONS请求后,就对该OPTIONS命令进行一次计算,如果请求的频度超过了某一个门限值时,终端认为这是一种恶意攻击。随后终端向用户界面报告,经用户认可以后,在黑白名单上增加一条非法SIP地址,之后的终端可以根据黑白名单,屏蔽攻击方发送的OPTIONS请求。例如,用户设置:如果在10秒钟对CSI终端进行10次的连接,那么可以认为它是恶意的攻击者,可以自动加入到黑名单当中。In this step, the method of configuring the blacklist and whitelist of the request message may be as follows: the terminal automatically detects the OPTIONS attack, and adds it to the blacklist and blacklist after it is found and confirmed by the user. Specifically, define an attack behavior and the corresponding threshold value. Whenever the terminal receives an OPTIONS request, it will calculate the OPTIONS command once. If the frequency of the request exceeds a certain threshold value, the terminal considers this It is a malicious attack. Then the terminal reports to the user interface, and after the user approves, an illegal SIP address is added to the black and white list, and the subsequent terminal can block the OPTIONS request sent by the attacker according to the black and white list. For example, user settings: if a CSI terminal is connected 10 times in 10 seconds, it can be considered as a malicious attacker and can be automatically added to the blacklist.
本实施例中,在白名单中除包括允许进行能力查询的终端列表外,还可以进一步包括能力查询限制表项,该表项中记录不允许查询的能力类型。In this embodiment, in addition to the list of terminals allowed to perform capability query, the white list may further include a capability query restriction entry, which records capability types that are not allowed to be queried.
假定存在终端A,请求查询配置了终端列表的CSI终端的能力时,执行以下的操作:Assume that terminal A exists, and when requesting to query the capabilities of a CSI terminal configured with a terminal list, perform the following operations:
步骤902,终端A向CSI终端发送能力查询请求。
步骤903,CSI终端接收终端A发送的能力查询请求,并对终端A所属的列表进行判断,若终端A属于允许进行能力查询的列表,则执行步骤904及其后续步骤,若终端A属于禁止进行能力查询的列表,则执行步骤905。Step 903: The CSI terminal receives the capability query request sent by terminal A, and judges the list to which terminal A belongs. If terminal A belongs to the list that allows capability query, execute
本步骤中,判断终端A所属列表的方式与实施例一中相同,这里就不再赘述。In this step, the manner of judging the list to which terminal A belongs is the same as that in
步骤904,CSI终端根据终端A对应的能力查询限制表项,提取能力查询应答列表,并将该列表中的能力信息反馈给所述发送请求的终端,并结束本查询流程。
本步骤中,CSI终端在白名单中查找到终端A,并确定该终端对应的能力查询限制的具体要求,如限制进行视频通话,则在提取能力查询应答列表时,不再提取与视频通话相关的能力信息。In this step, the CSI terminal finds terminal A in the white list, and determines the specific requirements of the terminal's corresponding capability query restrictions. capability information.
步骤905,将能力查询请求丢弃,不向终端A反馈任何信息,并结束本查询流程。In
本实施例中查询终端能力的方法与实施例一相比的区别在于,步骤501中配置允许进行能力查询的终端列表时,或在业务进行过程中,在白名单中,对于不同的终端,规定不希望反馈的终端能力描述类型。于是,CSI终端就可以根据发送能力查询请求的不同终端,反馈不同的能力描述类型。The difference between the method for querying terminal capabilities in this embodiment and
举个例子,如果用户出于某种原因,不希望在与终端A的MSRP会话中共享多媒体信息,如Jpg图片,或者3gpp格式的视频,那么终端用户可以在白名单中进行设置,在与终端A对应的能力查询限制表项中填入Jpg图片,或者3gpp格式的视频。当CSI终端完成设定后,该CSI终端如果再收到终端A发送的OPTIONS请求,就不会返回这方面的能力信息了。For example, if the user does not want to share multimedia information, such as Jpg pictures, or 3gpp format videos, in the MSRP session with terminal A for some reason, then the terminal user can set it in the white list, and then communicate with terminal A A Jpg picture or a video in 3gpp format is filled in the capability query restriction entry corresponding to A. After the CSI terminal completes the setting, if the CSI terminal receives the OPTIONS request sent by the terminal A, it will not return the capability information in this aspect.
当然在设置限制查询的能力时,也可以一同对所有终端的该项能力查询进行限制。Of course, when setting the ability to limit the query, it is also possible to limit the capability query of all terminals at the same time.
上述即为本实施例中应答能力查询请求的方法具体流程。本实施例中还提供了CSI业务中的终端设备的具体实施方式,可以用于实施上述方法流程。图10即为本发明实施例三的CSI业务中应答请求设备的主要结构图。如图10所示,该设备1000包括:接收模块1001、黑白名单配置模块1002和判决模块1003,其中,判决模块1003包括能力列表存储单元1003a。The above is the specific flow of the method for responding to the capability query request in this embodiment. This embodiment also provides a specific implementation manner of the terminal device in the CSI service, which can be used to implement the above method flow. FIG. 10 is a main structural diagram of a device responding to a request in a CSI service according to Embodiment 3 of the present invention. As shown in Fig. 10, the
在该设备1000中,接收模块1001,用于接收其它终端发送的请求,并将该请求转发给判决模块1002。In the
黑白名单配置模块1002,用于接受配置生成并保存请求消息黑白名单,并在保存的请求消息白名单进一步包括能力查询限制表项。The black and white
判决模块1003,用于接收接收模块1001转发的请求,并参照黑白名单配置模块1002中保存的请求消息黑白名单,对发送请求的终端进行判断,当发送请求的终端属于请求消息白名单时,进一步从黑白名单配置模块1002中查询发送请求的终端对应的能力查询限制内容,并根据该内容,从能力列表存储单元1003a中提取要反馈的能力信息,当发送请求的终端属于请求消息黑名单时,则拒绝该终端的请求。The judging
能力列表存储单元1003a,用于保存本终端设备的能力列表。The capability list storage unit 1003a is configured to store the capability list of the terminal device.
本实施例中配置请求消息黑白名单时,在实施例一配置的请求消息黑白名单基础上,进一步在白名单中加入了能力查询限制的表项;实施例二中配置请求消息黑白名单时,在实施例一配置的请求消息黑白名单基础上,进一步在白名单中加入了鉴权表项。In this embodiment, when configuring the black and white list of request messages, on the basis of the black and white list of request messages configured in
当然,也可以在实施例一配置的请求消息黑白名单基础上,进一步在白名单中同时加入鉴权表项和能力查询限制表项。CSI终端在进行是否反馈自身能力信息的判断时,首先进行黑白名单判断,若属于白名单,则进一步根据鉴权表项判断是否需要鉴权,继而在请求的终端通过鉴权后,根据能力查询限制表项,有选择地反馈CSI终端的能力信息。Of course, on the basis of the request message black and white list configured in the first embodiment, an authentication entry and a capability query restriction entry can be added to the white list at the same time. When the CSI terminal judges whether to feed back its own capability information, it first judges the black and white list. If it belongs to the white list, it further judges whether authentication is required according to the authentication table item, and then after the requesting terminal passes the authentication, according to the capability query Restrict entries to selectively feed back the capability information of CSI terminals.
通过上述能力查询限制表项的增加,使得配置了请求消息黑白名单的CSI终端能够控制向终端反馈的能力信息列表,对于CSI终端不希望开展的业务,可以不在反馈的能力信息中标识,这样,接收到反馈能力信息的终端不能了解到CSI终端的此方面能力。进一步提高了CSI终端的灵活性。Through the addition of the above capability query restriction table items, the CSI terminal configured with the black and white list of the request message can control the capability information list fed back to the terminal, and the services that the CSI terminal does not want to carry out may not be identified in the capability information fed back. In this way, The terminal receiving the feedback capability information cannot know the capability of the CSI terminal in this aspect. The flexibility of the CSI terminal is further improved.
实施例三中,在配置请求消息黑白名单时,采用的是终端自动检测OPTIONS攻击结合用户确认的方式。具体地,预先设定攻击行为,当终端自动检测到该攻击行为后,根据设定的策略,配置和修改请求消息黑白名单。In the third embodiment, when configuring the blacklist and whitelist of the request message, the terminal automatically detects the OPTIONS attack combined with user confirmation. Specifically, the attack behavior is preset, and when the terminal automatically detects the attack behavior, configure and modify the black and white list of request messages according to the set policy.
其中,设定的攻击行为可以是:发送请求的频度超过预设的门限;和/或,需要鉴权的终端鉴权失败的次数超过预设的门限。设定的策略可以是:当CSI终端检测到攻击行为时,将发起该攻击行为的终端列入黑名单;或者,当CSI终端检测到攻击行为时,将该攻击行为上报,在得到用户的确认后,将发起该攻击行为的终端列入黑名单。Wherein, the set attack behavior may be: the frequency of sending requests exceeds a preset threshold; and/or, the number of authentication failures of a terminal requiring authentication exceeds a preset threshold. The set strategy can be: when the CSI terminal detects an attack behavior, blacklist the terminal that initiates the attack behavior; or, when the CSI terminal detects an attack behavior, report the attack behavior, and after getting the user's confirmation After that, the terminal that initiated the attack will be blacklisted.
下面举个具体的例子来说明上述对请求消息黑白名单的配置和修改。在本例中,假定设定的攻击行为是:发送OPTIONS请求的频度超过10次/秒;设定的策略是:当CSI终端检测到攻击行为时,将该攻击行为上报,在得到用户的确认后,将发起该攻击行为的终端列入黑名单。如图11所示,具体包括:A specific example is given below to illustrate the above configuration and modification of the request message blacklist and whitelist. In this example, assume that the set attack behavior is: the frequency of sending OPTIONS requests exceeds 10 times per second; the set strategy is: when the CSI terminal detects the attack behavior, it will report the attack behavior, After confirmation, the terminal that initiated the attack will be blacklisted. As shown in Figure 11, specifically include:
步骤1101,CSI终端空闲,准备接收请求。
步骤1102,CSI终端接收到终端A发送的一条OPTIONS命令。
步骤1103,统计在1s内收到终端A的OPTIONS请求数量。
步骤1104,判断步骤1103中得到的数量是否超过10,若是,则执行步骤1105,否则返回步骤1101。
步骤1105,通过CSI终端界面向用户告警,将该攻击行为上报用户。
步骤1106,用户输入选择。
本例中,该选择为是否将终端A加入请求消息黑名单。In this example, the choice is whether to add terminal A to the blacklist of the request message.
步骤1107,判断用户确认的在步骤1106中的输入,若确认将终端A加入请求消息黑名单,则执行步骤1108,否则执行步骤1109。
步骤1108,将终端A加入请求消息黑名单,并结束本流程。Step 1108, add terminal A to the request message blacklist, and end this process.
步骤1109,将终端A的OPTIONS请求数量统计归0,并结束本流程。In
经过上述过程,就可以对请求消息黑白名单进行配置或修改。当然可以设定其它的攻击行为和相应策略,应用该攻击行为和策略后,具体配置或修改请求消息黑白名单的方式与上例相同,这里就不再赘述。After the above process, the request message blacklist and whitelist can be configured or modified. Of course, other attack behaviors and corresponding strategies can be set. After applying this attack behavior and strategy, the method of configuring or modifying the black and white lists of request messages is the same as the above example, and will not be repeated here.
以上即为本发明实施例的CSI业务中应答请求的方法和终端设备的具体实施方式。在本发明的实施例中,均是以其它终端向某配置了请求消息黑白名单的CSI终端发送OPTIONS命令作为能力查询请求为例进行的,当然,对于向CSI终端发送其它请求,也可以采用本发明实施例中的方式处理。如连接建立请求,该请求可以通过SIP INVITE命令发送,针对该请求建立黑白名单的方式以及判决是否接受该请求的方式与上述实施例均相同,只是建立的黑白名单具体内容可能会有所差异,在接受和拒绝请求后进行的操作不同。而针对于不同的请求,黑白名单的具体内容以及在接受和拒绝该请求时应进行的操作,是本领域技术人员能够掌握的内容,这里就不再赘述。The above is the specific implementation manner of the method for responding to the request in the CSI service and the terminal device in the embodiment of the present invention. In the embodiments of the present invention, it is taken as an example that other terminals send an OPTIONS command to a CSI terminal configured with a black and white list of request messages as a capability query request. Of course, this method can also be used for sending other requests to a CSI terminal. The manner in the embodiment of the invention is processed. Such as a connection establishment request, the request can be sent by a SIP INVITE command, the method of establishing a black and white list for this request and the method of judging whether to accept the request are the same as the above-mentioned embodiment, but the specific content of the black and white list may be different. The actions taken after accepting and rejecting requests are different. For different requests, the specific content of the black and white lists and the operations that should be performed when accepting and rejecting the request are the contents that can be grasped by those skilled in the art, and will not be repeated here.
另外,上述实施例均以在CSI终端内配置黑白名单为例,说明CSI业务中应答请求的具体实施。当然,在E2G网络结构中,也可以在服务器实现本发明实施例的方法和设备,具体包括黑白名单的配置以及是否接受用户请求的判断;或者也可以由服务器和CSI终端配合完成上述操作。具体配置黑白名单的方法和利用该黑白名单判断是否接受用户请求的方式,与上述实施方式相同,这里就不再赘述。In addition, the above-mentioned embodiments all take the configuration of the black and white lists in the CSI terminal as an example to illustrate the specific implementation of the response request in the CSI service. Of course, in the E2G network structure, the method and device of the embodiment of the present invention can also be implemented on the server, specifically including the configuration of black and white lists and the judgment of whether to accept user requests; or the above operations can also be completed by the cooperation of the server and the CSI terminal. The specific method of configuring the black and white lists and the method of using the black and white lists to determine whether to accept the user request are the same as the above-mentioned embodiment, and will not be repeated here.
以上仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710163103.XA CN101192920B (en) | 2006-11-21 | 2006-11-21 | A response request method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710163103.XA CN101192920B (en) | 2006-11-21 | 2006-11-21 | A response request method and device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101457683A Division CN101193068B (en) | 2006-11-21 | 2006-11-21 | A method and device for responding to a request |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101192920A true CN101192920A (en) | 2008-06-04 |
CN101192920B CN101192920B (en) | 2015-04-29 |
Family
ID=39487695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200710163103.XA Active CN101192920B (en) | 2006-11-21 | 2006-11-21 | A response request method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101192920B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977191A (en) * | 2010-10-19 | 2011-02-16 | 深圳市阿尔斯电信技术有限公司 | ISSN basic signaling-based authentication signaling system on Internet |
WO2011029344A1 (en) * | 2009-09-08 | 2011-03-17 | 中兴通讯股份有限公司 | Method and system for automatic answering based on intelligent network |
WO2011079650A1 (en) * | 2009-12-28 | 2011-07-07 | 中兴通讯股份有限公司 | Method and system for implementing instant messaging control |
CN101193068B (en) * | 2006-11-21 | 2011-11-16 | 华为技术有限公司 | A method and device for responding to a request |
CN101370294B (en) * | 2008-10-06 | 2012-07-04 | 华为终端有限公司 | Terminal cell switching method and communication terminal |
CN103081388A (en) * | 2010-09-03 | 2013-05-01 | 夏普株式会社 | Terminal device, base station device, communication system, and communication method |
CN104094575A (en) * | 2012-02-14 | 2014-10-08 | 瑞典爱立信有限公司 | Method and apparatus for improved handling of ims node blacklisting |
EP3013086A1 (en) * | 2014-10-20 | 2016-04-27 | Xiaomi Inc. | Method, apparatus and electronic device for connection management |
CN106470421A (en) * | 2015-08-20 | 2017-03-01 | 中国移动通信集团公司 | A kind of method and apparatus preventing malicious peer from illegally occupying resources of core network |
CN107948592A (en) * | 2017-11-22 | 2018-04-20 | 珠海格力电器股份有限公司 | Method and device for sharing camera and intelligent terminal |
CN110430255A (en) * | 2019-07-31 | 2019-11-08 | 阿里巴巴集团控股有限公司 | The processing method of service request, system and electronic equipment in distributed type assemblies |
CN112769672A (en) * | 2019-11-01 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Data communication method and device and communication configuration method and device |
WO2022021256A1 (en) * | 2020-07-30 | 2022-02-03 | 华为技术有限公司 | Association control method and related apparatus |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134447A (en) * | 1998-05-29 | 2000-10-17 | Ericsson Inc. | System and method for monitoring and barring location applications |
CN100377605C (en) * | 2005-12-30 | 2008-03-26 | 华为技术有限公司 | Session request method for temporary groups |
CN100384133C (en) * | 2005-12-31 | 2008-04-23 | 华为技术有限公司 | A realization method of allowing positioning and a positioning platform system |
CN101193068B (en) * | 2006-11-21 | 2011-11-16 | 华为技术有限公司 | A method and device for responding to a request |
-
2006
- 2006-11-21 CN CN200710163103.XA patent/CN101192920B/en active Active
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101193068B (en) * | 2006-11-21 | 2011-11-16 | 华为技术有限公司 | A method and device for responding to a request |
CN101370294B (en) * | 2008-10-06 | 2012-07-04 | 华为终端有限公司 | Terminal cell switching method and communication terminal |
WO2011029344A1 (en) * | 2009-09-08 | 2011-03-17 | 中兴通讯股份有限公司 | Method and system for automatic answering based on intelligent network |
WO2011079650A1 (en) * | 2009-12-28 | 2011-07-07 | 中兴通讯股份有限公司 | Method and system for implementing instant messaging control |
CN102111343B (en) * | 2009-12-28 | 2014-07-02 | 中兴通讯股份有限公司 | Method for implementing instant messaging control and system adopting same |
CN103081388B (en) * | 2010-09-03 | 2016-01-06 | 夏普株式会社 | Terminal device, base station device, communication system, and communication method |
CN103081388A (en) * | 2010-09-03 | 2013-05-01 | 夏普株式会社 | Terminal device, base station device, communication system, and communication method |
CN101977191B (en) * | 2010-10-19 | 2014-02-12 | 深圳市阿尔斯电信技术有限公司 | ISSN basic signaling-based authentication signaling system on Internet |
CN101977191A (en) * | 2010-10-19 | 2011-02-16 | 深圳市阿尔斯电信技术有限公司 | ISSN basic signaling-based authentication signaling system on Internet |
CN104094575A (en) * | 2012-02-14 | 2014-10-08 | 瑞典爱立信有限公司 | Method and apparatus for improved handling of ims node blacklisting |
US10063495B2 (en) | 2012-02-14 | 2018-08-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for improved handling of IMS node blacklisting |
EP3013086A1 (en) * | 2014-10-20 | 2016-04-27 | Xiaomi Inc. | Method, apparatus and electronic device for connection management |
CN106470421A (en) * | 2015-08-20 | 2017-03-01 | 中国移动通信集团公司 | A kind of method and apparatus preventing malicious peer from illegally occupying resources of core network |
CN107948592A (en) * | 2017-11-22 | 2018-04-20 | 珠海格力电器股份有限公司 | Method and device for sharing camera and intelligent terminal |
CN110430255A (en) * | 2019-07-31 | 2019-11-08 | 阿里巴巴集团控股有限公司 | The processing method of service request, system and electronic equipment in distributed type assemblies |
CN112769672A (en) * | 2019-11-01 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Data communication method and device and communication configuration method and device |
WO2022021256A1 (en) * | 2020-07-30 | 2022-02-03 | 华为技术有限公司 | Association control method and related apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN101192920B (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101192920B (en) | A response request method and device | |
CN101193068B (en) | A method and device for responding to a request | |
JP5518185B2 (en) | System and method for implementing media and / or media transfer between devices | |
CN103220323B (en) | For the device of Service controll | |
JP5452821B2 (en) | System and method for implementing media and / or media transfer between devices | |
CN101472235B (en) | Multi-terminal communication method, system and device | |
CN101401476B (en) | Access control in a communication network | |
US20100312832A1 (en) | System and method for implementing media and media control transfer between devices | |
EP1816825A1 (en) | A method and system for authenticating user terminal | |
WO2006099815A1 (en) | A method for implementing the user registering in the ip multimedia subsystem and the system thereof | |
CN1642083A (en) | Network side anthority-discrimination-mode selecting method | |
WO2006136097A1 (en) | A method for processing the register abnormality during the user register procedure | |
CN101573934A (en) | Authentication in a communication network | |
WO2009010017A1 (en) | The implementing method and system for ue redirection service of sharing pui | |
CN101742011A (en) | A lawful interception method and system across network telephony domains | |
CN101309509B (en) | PANM server, method and system for recognizing PNE in PAN, PNE thereof | |
CN1753363A (en) | The method for selecting the authentication mode on the network side | |
CN100527876C (en) | Method and device for updating user signing data | |
CN100387014C (en) | How to handle exceptions during user registration | |
CN102547651A (en) | User roaming method and ICS (internet connection sharing) enhanced network | |
CN1764140A (en) | A method for realizing application server communication | |
WO2007056925A1 (en) | A session control method and equipment in ims network | |
WO2008151563A1 (en) | Method and apparatus for realizing private network services in pnm | |
CN1812322A (en) | Right discriminating system and processing method | |
WO2008061482A1 (en) | A session control method, system and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |