US20110216701A1 - Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions - Google Patents
Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions Download PDFInfo
- Publication number
- US20110216701A1 US20110216701A1 US13/040,990 US201113040990A US2011216701A1 US 20110216701 A1 US20110216701 A1 US 20110216701A1 US 201113040990 A US201113040990 A US 201113040990A US 2011216701 A1 US2011216701 A1 US 2011216701A1
- Authority
- US
- United States
- Prior art keywords
- ims
- wtru
- scc
- anchor
- sip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1045—Proxies, e.g. for session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1063—Application servers providing network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1083—In-session procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1083—In-session procedures
- H04L65/1094—Inter-user-equipment sessions transfer or sharing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1083—In-session procedures
- H04L65/1095—Inter-network session transfer or sharing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1096—Supplementary features, e.g. call forwarding or call holding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1104—Session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/80—Responding to QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
Definitions
- This application is related to communications.
- IP Multimedia Subsystem is an architectural framework for providing multimedia services across a variety of access platforms. IMS facilitates multimedia service creation and deployment based on Internet protocols allowing IMS subscribers to access personalized interactive, multimedia services, on any device, and anywhere. IMS is access-agnostic, whereby service delivery is independent of the underlying access platform and the use of Internet protocols in IMS allows for interoperability among the access platforms. IMS also leads to savings in network infrastructure, administration and management. Further, IMS allows for the migration of Circuit Switched (CS) services like voice telephony to the Packet Switched (PS) domain by using separate control and bearer functions and featuring an overlay service delivery network on top of a packet switch network infrastructure.
- CS Circuit Switched
- PS Packet Switched
- media sessions may be directed to any one of multiple IMS-capable devices communicating via an IMS network.
- An IMS network may therefore face decisions regarding the routing of media sessions and how to signal such determinations.
- multiple IMS-capable devices may be served by multiple IMS networks and the networks' functional entities, whereby the various networks may face decisions regarding the management of IMS sessions that they may seek to resolve without creating unnecessary signaling traffic.
- IMS-capable devices It is therefore desirable to have a method and apparatus for IMS-capable devices to indicate routing preferences to an IMS network. It is further desirable to have a method and apparatus for IMS networks and IMS-capable devices to efficiently identify and transfer their roles.
- a wireless transmit/receive unit registers an IMS service priority with an IMS network.
- the IMS service priority indicates the WTRU's priority in receiving IMS services.
- the WTRU may receive an IMS service from the IMS network based on the WTRU's IMS service priority.
- the IMS service priority may be indicated using a priority value and the WTRU may use Session Initiation Protocol (SIP) messaging to signal with the IMS network.
- SIP Session Initiation Protocol
- the WTRU may register the service priority value using a q-value parameter in an SIP Contact field header.
- the WTRU may also register a public user identity with the IMS network and the public user identity may be shared with other IMS-capable WTRUs.
- FIG. 1A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented
- FIG. 1B is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated in FIG. 1A ;
- WTRU wireless transmit/receive unit
- FIG. 1C is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated in FIG. 1A ;
- FIG. 2A shows a WTRU in an IMS session with a remote party
- FIG. 2B shows functional entities within an IMS network
- FIG. 2C shows multiple WTRUs served by a single IMS network in a collaborative IMS session
- FIG. 3 shows an information flow for WTRU registration and IMS session routing in accordance with a described embodiment
- FIG. 4 shows multiple WTRUs served by multiple IMS networks in a IMS collaborative session
- FIG. 5 shows an information flow for anchor Service Centralization and Continuity Application Server (SCC AS) identification and transferring in accordance with a described embodiment
- FIG. 6 shows an information flow for the transfer of IMS collaborative session control.
- FIG. 1A is a diagram of an example communications system 100 in which one or more disclosed embodiments may be implemented.
- the communications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users.
- the communications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth.
- the communications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), and the like.
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal FDMA
- SC-FDMA single-carrier FDMA
- the communications system 100 may include wireless transmit/receive units (WTRUs) 102 a , 102 b , 102 c , 102 d , a radio access network (RAN) 104 , a core network 106 , a public switched telephone network (PSTN) 108 , the Internet 110 , and other networks 112 , though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements.
- Each of the WTRUs 102 a , 102 b , 102 c , 102 d may be any type of device configured to operate and/or communicate in a wireless environment.
- the WTRUs 102 a , 102 b , 102 c , 102 d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a laptop, a netbook, a personal computer, a wireless sensor, consumer electronics, and the like.
- UE user equipment
- PDA personal digital assistant
- smartphone a laptop
- netbook a personal computer
- a wireless sensor consumer electronics, and the like.
- the communications systems 100 may also include a base station 114 a and a base station 114 b .
- Each of the base stations 114 a , 114 b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102 a , 102 b , 102 c , 102 d to facilitate access to one or more communication networks, such as the core network 106 , the Internet 110 , and/or the networks 112 .
- the base stations 114 a , 114 b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 114 a , 114 b are each depicted as a single element, it will be appreciated that the base stations 114 a , 114 b may include any number of interconnected base stations and/or network elements.
- BTS base transceiver station
- AP access point
- the base station 114 a may be part of the RAN 104 , which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc.
- BSC base station controller
- RNC radio network controller
- the base station 114 a and/or the base station 114 b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown).
- the cell may further be divided into cell sectors.
- the cell associated with the base station 114 a may be divided into three sectors.
- the base station 114 a may include three transceivers, i.e., one for each sector of the cell.
- the base station 114 a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
- MIMO multiple-input multiple output
- the base stations 114 a , 114 b may communicate with one or more of the WTRUs 102 a , 102 b , 102 c , 102 d over an air interface 116 , which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.).
- the air interface 116 may be established using any suitable radio access technology (RAT).
- RAT radio access technology
- the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like.
- the base station 114 a in the RAN 104 and the WTRUs 102 a , 102 b , 102 c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 116 using wideband CDMA (WCDMA).
- WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+).
- HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
- the base station 114 a and the WTRUs 102 a , 102 b , 102 c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 116 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A).
- E-UTRA Evolved UMTS Terrestrial Radio Access
- LTE Long Term Evolution
- LTE-A LTE-Advanced
- the base station 114 a and the WTRUs 102 a , 102 b , 102 c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1X, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
- IEEE 802.16 i.e., Worldwide Interoperability for Microwave Access (WiMAX)
- CDMA2000, CDMA2000 1X, CDMA2000 EV-DO Code Division Multiple Access 2000
- IS-95 Interim Standard 95
- IS-856 Interim Standard 856
- GSM Global System for Mobile communications
- GSM Global System for Mobile communications
- EDGE Enhanced Data rates for GSM Evolution
- GERAN GSM EDGERAN
- the base station 114 b in FIG. 1A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like.
- the base station 114 b and the WTRUs 102 c , 102 d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN).
- the base station 114 b and the WTRUs 102 c , 102 d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN).
- WPAN wireless personal area network
- the base station 114 b and the WTRUs 102 c , 102 d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell.
- a cellular-based RAT e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.
- the base station 114 b may have a direct connection to the Internet 110 .
- the base station 114 b may not be required to access the Internet 110 via the core network 106 .
- the RAN 104 may be in communication with the core network 106 , which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the WTRUs 102 a , 102 b , 102 c , 102 d .
- the core network 106 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication.
- the RAN 104 and/or the core network 106 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 104 or a different RAT.
- the core network 106 may also be in communication with another RAN (not shown) employing a GSM radio technology.
- the core network 106 may also serve as a gateway for the WTRUs 102 a , 102 b , 102 c , 102 d to access the PSTN 108 , the Internet 110 , and/or other networks 112 .
- the PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS).
- POTS plain old telephone service
- the Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite.
- the networks 112 may include wired or wireless communications networks owned and/or operated by other service providers.
- the networks 112 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 104 or a different RAT.
- the WTRUs 102 a , 102 b , 102 c , 102 d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102 a , 102 b , 102 c , 102 d may include multiple transceivers for communicating with different wireless networks over different wireless links.
- the WTRU 102 c shown in FIG. 1A may be configured to communicate with the base station 114 a , which may employ a cellular-based radio technology, and with the base station 114 b , which may employ an IEEE 802 radio technology.
- FIG. 1B is a system diagram of an example WTRU 102 .
- the WTRU 102 may include a processor 118 , a transceiver 120 , a transmit/receive element 122 , a speaker/microphone 124 , a keypad 126 , a display/touchpad 128 , non-removable memory 106 , removable memory 132 , a power source 134 , a global positioning system (GPS) chipset 136 , and other peripherals 138 .
- GPS global positioning system
- the processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like.
- the processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment.
- the processor 118 may be coupled to the transceiver 120 , which may be coupled to the transmit/receive element 122 . While FIG. 1B depicts the processor 118 and the transceiver 120 as separate components, it will be appreciated that the processor 118 and the transceiver 120 may be integrated together in an electronic package or chip.
- the transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114 a ) over the air interface 116 .
- a base station e.g., the base station 114 a
- the transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals.
- the transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, ITV, or visible light signals, for example.
- the transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
- the WTRU 102 may include any number of transmit/receive elements 122 . More specifically, the WTRU 102 may employ MIMO technology. Thus, in one embodiment, the WTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface 116 .
- the transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122 .
- the WTRU 102 may have multi-mode capabilities.
- the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
- the processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124 , the keypad 126 , and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit).
- the processor 118 may also output user data to the speaker/microphone 124 , the keypad 126 , and/or the display/touchpad 128 .
- the processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 106 and/or the removable memory 132 .
- the non-removable memory 106 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device.
- the removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like.
- SIM subscriber identity module
- SD secure digital
- the processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102 , such as on a server or a home computer (not shown).
- the processor 118 may receive power from the power source 134 , and may be configured to distribute and/or control the power to the other components in the WTRU 102 .
- the power source 134 may be any suitable device for powering the WTRU 102 .
- the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
- the processor 118 may also be coupled to the GPS chipset 136 , which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102 .
- location information e.g., longitude and latitude
- the WTRU 102 may receive location information over the air interface 116 from a base station (e.g., base stations 114 a , 114 b ) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
- the processor 118 may further be coupled to other peripherals 138 , which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity.
- the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
- the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game
- FIG. 1C is a system diagram of the RAN 104 and the core network 106 according to an embodiment.
- the RAN 104 may employ an E-UTRA radio technology to communicate with the WTRUs 102 a , 102 b , 102 c over the air interface 116 .
- the RAN 104 may also be in communication with the core network 106 .
- the RAN 104 may include eNode-Bs 140 a , 140 b , 140 c , though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment.
- the eNode-Bs 140 a , 140 b , 140 c may each include one or more transceivers for communicating with the WTRUs 102 a , 102 b , 102 c over the air interface 116 .
- the eNode-Bs 140 a , 140 b , 140 c may implement MIMO technology.
- the eNode-B 140 a for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102 a.
- Each of the eNode-Bs 140 a , 140 b , 140 c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in FIG. 1C , the eNode-Bs 140 a , 140 b , 140 c may communicate with one another over an X2 interface.
- the core network 106 shown in FIG. 1C may include a mobility management gateway (MME) 142 , a serving gateway 144 , and a packet data network (PDN) gateway 146 . While each of the foregoing elements are depicted as part of the core network 106 , it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
- MME mobility management gateway
- PDN packet data network
- the MME 142 may be connected to each of the eNode-Bs 142 a , 142 b , 142 c in the RAN 104 via an S1 interface and may serve as a control node.
- the MME 142 may be responsible for authenticating users of the WTRUs 102 a , 102 b , 102 c , bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102 a , 102 b , 102 c , and the like.
- the MME 142 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
- the serving gateway 144 may be connected to each of the eNode Bs 140 a , 140 b , 140 c in the RAN 104 via the S1 interface.
- the serving gateway 144 may generally route and forward user data packets to/from the WTRUs 102 a , 102 b , 102 c .
- the serving gateway 144 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102 a , 102 b , 102 c , managing and storing contexts of the WTRUs 102 a , 102 b , 102 c , and the like.
- the serving gateway 144 may also be connected to the PDN gateway 146 , which may provide the WTRUs 102 a , 102 b , 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and IP-enabled devices.
- the PDN gateway 146 may provide the WTRUs 102 a , 102 b , 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and IP-enabled devices.
- the core network 106 may facilitate communications with other networks.
- the core network 106 may provide the WTRUs 102 a , 102 b , 102 c with access to circuit-switched networks, such as the PSTN 108 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and traditional land-line communications devices.
- the core network 106 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 106 and the PSTN 108 .
- the core network 106 may provide the WTRUs 102 a , 102 b , 102 c with access to the networks 112 , which may include other wired or wireless networks that are owned and/or operated by other service providers.
- IMS IP multimedia subsystem
- FIG. 2A shows a WTRU 201 in an IMS session with a remote party 205 .
- the IMS session is conducted over the IMS network 210 .
- the WTRU 201 may have any number of ongoing media sessions with the remote party.
- FIG. 2A shows an audio session 202 and a video session 203 . These sessions are exemplary and other multimedia sessions may be used.
- the IMS network 210 hosts IMS services and provides session and media control. It manages a WTRU's service interactions and establishes, monitors, supports and releases multimedia sessions.
- the WTRU 201 maintains IMS control signaling 204 with the IMS network 210 .
- the WTRU may use the IMS control signaling 204 to exercise session control capabilities.
- IMS control signaling allows a WTRU to accept or reject an incoming request for the establishment of a media session from a remote party.
- the WTRU 201 executes IMS control signaling on the control path 204 .
- the IMS network 210 is on the recipient end of the WTRU's IMS control signaling 204 .
- FIG. 2B shows functional entities of an IMS network 210 .
- the Call Session Control Function (CSCF) entity 213 sits on the path of IMS control signaling amongst WTRUs, remote parties, and other IMS network entities.
- the CSCF entity may inspect the messaging of WTRUs, remote parties, and other IMS network entities.
- the CSCF entity decides to which application server (AS) control messaging is forwarded to provide for IMS services.
- the CSCF entity provides routing services and enforces the policies of network operators.
- the CSCF entity also handles WTRU registrations.
- the IMS network may use one or more ASs.
- the one or more ASs are configured to host and execute IMS services and to interface with the CSCF 213 .
- Service Centralization and Continuity AS (SCC AS) 214 anchors IMS sessions and enables service continuity for media sessions including providing for and executing the transfer of media sessions amongst WTRUs, combining and dividing media flows, and the addition of media flows.
- SCC AS 214 anchors IMS sessions and enables service continuity for media sessions including providing for and executing the transfer of media sessions amongst WTRUs, combining and dividing media flows, and the addition of media flows.
- ASs such as AS 215 shown in FIG. 2B , may interface with the CSCF 213 to provide for other IMS-related services.
- WTRU 201 has control signaling with the IMS network 210 , represented by control path 212 .
- WTRU 201 may also have any number of IMS media sessions that are collectively represented by media path 211 .
- FIG. 2B also shows access and remote legs for an IMS session.
- An access leg is a control leg between a WTRU and the SCC AS and a remote leg is a control leg between the SCC AS and a remote party.
- FIG. 2C shows multiple WTRUs served by a single IMS network in a collaborative IMS session.
- WTRUs 201 A-C (collectively hereinafter referred to by the numeral alone, WTRUs 201 ) are involved in a collaborative IMS session with a remote party (not shown).
- Each WTRU 201 has a control path 212 A-C and a media path 211 A-C.
- the media paths 211 represent the ongoing media sessions of the WTRUs 201 .
- the control paths 212 represent the control signaling for the WTRUs 201 .
- WTRU A 201 A functions as the controller WTRU for the collaborative session.
- WTRU A 201 A is able to execute Inter-Device Transfer (IDT) procedures by which WTRU A 201 A may add, transfer, duplicate, and remove media sessions on any WTRU 201 involved in the collaborative session.
- IDTT Inter-Device Transfer
- the service profile of the controller WTRU in a collaborative session such as WTRU A 201 A, may determine the services available on the paths between the collaborative session and the remote party.
- the remote party may not be aware that one or more of its media sessions are with controllee WTRUs, such as WTRU B 201 B and WTRU C 201 C.
- the remote party may only be aware of a controller WTRU, WTRU A 201 A.
- the controller WTRU A 201 A uses control path 212 A for collaborative session control messaging, as well as for control signaling associated with its own media path 211 .
- controllee WTRUs B 201 B and C 201 C are engaged in media sessions via media paths 211 B-C, respectively.
- Controllee WTRUs B 201 B and C 201 C also use control paths 212 B-C for control signaling.
- controllee WTRUs are subordinate to the controller WTRU for IDT procedures. For example, a controller WTRU may remove a media session from a controllee WTRU. Additionally, if a controllee WTRU seeks to establish a media session, the controllee WTRU may request such establishment from a controller WTRU and the controller WTRU may accept or reject this request.
- Service Centralization and Continuity Application Server (SCC AS) 214 serves as an anchor SCC AS, that manages session control signaling between the WTRUs and the remote party. Furthermore, SCC AS 214 enables service continuity for media sessions in the collaborative session and provides for and executes IDT procedures. While in FIG. 2C , only one SCC AS serves the collaborative session, in other scenarios multiple WTRUs in a collaborative session may each have their own SCC AS that acts as a proxy to an anchor SCC AS. FIG. 2C also shows IMS network entities CSCF 213 and AS 215 .
- Control signaling via a control path in an IMS session may utilize a signaling protocol such as Session Initiation Protocol (SIP).
- SIP Session Initiation Protocol
- SIP is a signaling protocol that allows for establishing, modifying, terminating, adding, and duplicating IMS multimedia sessions.
- SIP is a text-based protocol, where messages may take one of two forms: requests and responses.
- SIP requests include a REGISTER request, which may be used by a WTRU to register a Public User Identity (PUI) that is associated with the WTRU with the IMS network.
- PUI Public User Identity
- SIP requests include an INVITE request, which may be used to establish a media session between a WTRU and a remote party, and ACK request, which may be used to confirm that a response has been received.
- SIP response codes include a provisional response, i.e., 1xx, which may be used to indicate the request was received and is being processed and a success response, i.e., 2xx, which may be use to indicate the action was successfully received and accepted.
- SIP headers may be used by WTRUs and the IMS network that is utilizing SIP messaging.
- Some SIP headers include “To” (the address of the intended recipient), “From” (the address of the sender), and “Contact” (address information that identifies the resource requested or the request originator, depending on whether it is a header for a request or a response).
- a WTRU may be registered in the IMS network using a Public User Identity (PUI).
- PUI may be a SIP Uniform Resource Identifier (URI), such as an e-mail address, or a Tel URI, such as a telephone number.
- URI Uniform Resource Identifier
- An IMS network may contact a WTRU by addressing the WTRU's PUI. Multiple WTRUs may share the same PUI. For instance, an IMS subscriber may have multiple WTRUs sharing the same PUI under one IMS subscription.
- a WTRU may register its capabilities with the IMS network.
- a WTRU that is capable of controlling a collaborative session may register as a collaborative session controller WTRU with the IMS network.
- a WTRU that is capable of media control may register as such.
- a media controller WTRU regardless of being a controller WTRU or a controllee WTRU of a collaborative session, may have certain defined media control privileges within a collaborative session.
- a WTRU may update or change its registered profile with the network at any time.
- a WTRU may use a feature tag within an SIP Contact header.
- a WTRU may include the feature tags indicating its IMS capabilities when utilizing the SIP REGISTER request to contact the IMS network.
- the IMS network may maintain a profile of a WTRU's capabilities. This profile may be influenced by the capabilities that the WTRU registered with the network or by other information within the network's knowledge.
- the network may rely upon the WTRU's registered capabilities or information within the service profile in providing IMS services, such as media session routing or determining whether a WTRU is permitted to perform IMS actions.
- an SCC AS that is responsible for media session continuity may use registered WTRU capabilities or profile information to influence media session routing.
- an SCC AS may indicate to a CSCF a preference for the session to be routed to a registered controller WTRU. A CSCF may then use this preference to route the media session to the controller registered WTRU.
- an SCC AS may indicate routing preferences to a CSCF using IETF RFC 3841 headers and parameters. For instance, an SCC AS may add an Accept-Contact header field in an SIP request with a controller WTRU feature tag and an “explicit” parameter, thereby requiring that the request be routed to a WTRU registered with controller capabilities. Upon receiving the header field and controller feature tag in the SIP request, a CSCF routes the request to a WTRU with registered controller capabilities. If no WTRUs have registered controller capabilities, the request is routed to a WTRU that is not a registered controller. A SCC AS may also indicate routing preferences by adding an SIP Contact header field with a “require” parameter.
- a WTRU may register a priority value with the IMS network.
- the priority value may indicate to the IMS network a WTRU's priority in comparison to other WTRUs that may also be registered with the IMS network under the same PUI.
- the priority value may also indicate to the IMS network the WTRU's preference level for receiving IMS sessions.
- a priority value may be used by the IMS network in IMS management and providing IMS services, such as determining where to establish or route media sessions.
- a higher priority value associated with a WTRU may indicate to the network a greater preference for the establishment and routing of media sessions to that WTRU.
- the CSCF within the IMS network may route an incoming media session to the WTRU with the higher priority value.
- a WTRU may register a priority value with the IMS network using the q-value parameter in the SIP Contact header field.
- FIG. 3 shows an information flow for WTRU registration and IMS session routing in accordance with this embodiment.
- WTRU A 301 which is IMS-capable, seeks to register its capabilities and a priority value with the IMS network.
- WTRU A 301 A sends an SIP REGISTER request 310 to an IMS CSCF 313 .
- the SIP REGISTER request 310 has a Contact header field that includes both a feature tag indicating a capability of WTRU A 301 and a q-value indicating a priority value associated with WTRU A 301 A.
- CSCF 313 sends the SIP REGISTER request 310 to SCC AS 314 and CSCF 313 sends an SIP 200 (OK) response 310 to WTRU A 301 A.
- SCC AS 314 also sends an SIP 200 (OK) response 310 to CSCF 313 .
- WTRU A 301 A has registered its capability and a priority value with the IMS network.
- WTRU B 301 B and WTRU C 301 C similarly register 320 , 330 their capabilities and associated priority values with the IMS network.
- WTRUs A-C 301 A-C are registered under the same PUI with the IMS network.
- CSCF 313 receives an SIP INVITE request 340 from a remote party (not shown) for a media session.
- the SIP INVITE request 340 is addressed to the PUI shared by WTRUs A-C 301 A-C.
- CSCF 313 sends the SIP INVITE request 340 to SCC AS 314 .
- SCC AS 314 prefers that the SIP INVITE request be routed to a controller WTRU.
- SCC AS 314 uses RFC 3841 procedures and adds an Accept-Contact 345 with a controller feature tag to indicate this preference in the SIP INVITE request.
- SCC AS 314 sends the SIP INVITE request 350 to CSCF 313 .
- WTRU A 301 A and WTRU B 301 B have controller capabilities, while WTRU C 301 C does not have such capabilities.
- CSCF 313 may therefore send the SIP INVITE request to either WTRU A 301 A or WTRU B 301 B, but not WTRU C 301 C.
- WTRU B 301 B has a higher associated q-value than WTRU A 301 A, so CSCF 313 determines that the SIP INVITE request is directed to the controller WTRU with the higher q-value 355 and then sends the SIP INVITE request 360 to WTRU B 301 B.
- the CSCF 313 sends the SIP INVITE request to WTRU B 301 B.
- SCC ASs may be involved in an IMS session, with each SCC AS serving one WTRU or multiple WTRUs. This may be the case where multiple WTRUs are involved in a collaborative IMS session and the WTRUs are served by multiple SCC ASs.
- one SCC AS may be an anchor SCC AS for the collaborative session, and the remaining SCC ASs may proxy messages for the anchor SCC AS.
- the WTRUs involved in an IMS session may have different SCC ASs because the WTRUs are under different IMS subscriptions or are served by different IMS networks.
- the SCC AS serving the WTRU that initiated the IMS session may function as an anchor SCC AS until the anchor point is transferred to another SCC AS.
- the initiating WTRU may have involved other WTRUs in the IMS session (for example, by transferring, duplicating, or establishing IMS media sessions to these WTRUs).
- the SCC ASs serving the other WTRUs may, therefore, act as proxies to the SCC AS of the initiating WTRU.
- FIG. 4 shows multiple WTRUs served by multiple IMS networks in an IMS collaborative session.
- WTRUs 401 A-C (collectively hereinafter referred to by the numeral alone, WTRUs 401 ) are each served by SCC AS 402 A-C, respectively, within their respective IMS networks.
- SCC AS A 402 A is the anchor whose policies govern the IMS session. Further, the anchor SCC AS A 402 A enables service continuity for media sessions amongst all WTRUs 401 .
- SCC AS B 402 B and SCC AS C 402 C serve WTRU B 401 B and WTRU C 402 C, respectively, where WTRU B 402 B and WTRU C 402 C may belong to different IMS subscriptions.
- SCC AS B 402 B and SCC AS C 402 C as act proxies for messages between WTRU B 401 B and WTRU C 401 C, respectively, and SCC AS A 402 A.
- an access leg 407 is presented to anchor SCC AS A 402 A and a remote leg 408 is presented to SCC AS A 402 A from a remote party (not shown).
- WTRUs 401 each have a control path 405 with their respective SCC ASs 402 and a media path 406 with the remote party.
- each of the IMS networks has a CSCF 403 A-C.
- An SCC AS may use control signaling to identify itself as an anchor to other SCC ASs. Additionally, an anchor SCC AS may transfer the anchor point from itself to another SCC AS via control signaling or a non-anchor SCC AS may request the transfer of the anchor point from an anchor SCC AS via control signaling.
- Signaling between SCC ASs may be dedicated for the purposes of anchor identification and transfer or the signaling may be incorporated or contained within IMS signaling.
- an anchor SCC AS may identify itself as such by incorporating control signaling to that effect within an IMS control message that was routed through a non-anchor SCC AS but was intended for a WTRU served by the non-anchor SCC AS.
- a non-anchor SCC AS routing a message to the WTRU it is serving may be informed of the identity of the anchor SCC AS via the message.
- a non-anchor may remove the signaling incorporated in the message and pass the message to its intended party, the WTRU.
- this anchor signaling may in a sense “ride” conventional IMS signaling.
- signaling for the purpose of anchor identification and transfer that is incorporated in IMS signaling may be removed by the SCC AS recipient before the IMS signaling is passed along to WTRUs.
- An SIP header may be utilized by SCC ASs to identify an anchor SCC AS and to transfer the anchor from one SCC AS to another SCC AS.
- a private header, or a P-Header is one example of an SIP header field that may be utilized for these purposes.
- a P-Header labeled as P-Anchor-Point-ID may be used to identify an anchor point.
- P-Anchor-Point-ID: sccas1@example.com may be used to identify an anchor SCC AS by its address, sccas1@example.com, whereby, an anchor SCC AS may insert this header field in IMS SIP signaling to identify itself as an anchor SCC AS to other SCC ASs.
- a trusted network or domain where it is unlikely that an SCC AS who is not an anchor will identify itself as such.
- an SCC AS may request anchor transfer by changing the P-Anchor-Point-ID address from the address of the current anchor SCC AS to the address of the SCC AS to which anchor point transfer is sought.
- Parameters may be added to this header for transferring the SCC AS anchor.
- transfer-anchor-point-to may be used by an anchor SCC AS to transfer the anchor point to another SCC AS identified by the parameter.
- the P-Header P-Anchor-Point-ID: sccas1@example.com; transfer-anchor-to: sccas2@example.com may be inserted by an SCC AS in an SIP message to identify itself as an anchor point and to request transfer of the anchor point to another SCC AS (identified by its address, sccas2@example.com).
- a header field utilized for the purpose of anchor identification or transfer may comprise multiple parameters.
- An inserted-by parameter may identify the SCC AS that inserted the header in the SIP message.
- An Action parameter may allow an SCC AS to notify other SCC ASs of the purpose of the header field.
- the Action header field may identify the anchor point, request anchor transfer to another SCC AS, request anchor transfer from the anchor SCC AS to another SCC AS, or reject a requested anchor transfer. Table 1 shows instances of Action parameter fields and their associated meanings.
- Action parameter fields Action Accompanied parameter Purpose by: anchor-point Identifies the anchor request-anchor Request anchor transfer request-To* from an anchor SCC AS transfer-anchor Request anchor transfer request-To* to another SCC AS reject-anchor Reject the request of anchor transfer *Identifies SCC AS the request is addressed to
- an anchor SCC AS with the address sccas1@example.com seeks to transfer the anchor point to another SCC AS with the address sccas2@example.com
- the anchor SCC AS may utilize the header P-Anchor-Point-ID: inserted-by: sccas1@example.com Action: transfer-anchor request-to: sccas2@example.com.
- the non-anchor SCC AS with the address sccas2@example.com accepts the anchor point transfer
- the non-anchor SCC AS may respond by utilizing the header P-Anchor-Point-ID: Inserted-by: sccas2@example.com Action: anchor-point.
- the non-anchor SCC AS rejects the anchor point transfer, it may respond by utilizing the header P-Anchor-Point-ID: Inserted-by: sccas2@example.com Action: reject-anchor.
- FIG. 5 shows an information flow for anchor SCC AS identification and transferring in accordance with this embodiment.
- SCC AS A 502 A is an anchor SCC AS 505 for an ongoing IMS session
- SCC AS B 502 B and SSC AS C 502 C are non-anchors.
- Each SCC AS 502 A-C may serve IMS-capable WTRUs (not shown), with SCC AS B 502 B and SCC AS C 502 C acting as proxies for the IMS signaling between their respective WTRUs and anchor SCC AS A 502 A.
- the WTRUs which belong to different IMS networks, may be involved in a collaborative IMS session.
- SCC AS A 502 A identifies itself as an anchor by including an SIP header in an SIP message to SCC AS B 502 B 510 .
- This SIP header may be part of an SIP message sent solely to convey this anchor information, or, alternatively, the header may simply be incorporated into an SIP message intended for a party other than SCC AS B 502 B.
- the header may be included in an SIP message to the WTRU served by SCC AS B 502 B. When it receives the message, SCC AS B 502 B may then remove the header information and, in its role as a proxy, convey the remainder of the SIP message to the WTRU it is serving.
- SCC AS A 502 A requests to transfer the anchor point to SCC AS B 502 B by including an SIP header in an SIP message to SCC AS B 502 B 520 .
- SCC AS B 502 B accepts the anchor point transfer by including an SIP header in an SIP message to SCC AS A 502 A 530 .
- SCC AS B 502 B becomes the anchor SCC AS 535 .
- SCC AS C 502 C then requests that the anchor point be transferred to itself from SCC AS B 502 B by including an SIP header in an SIP message to SCC AS B 502 B 540 .
- SCC AS B 502 B does not wish to relinquish the anchor point so it rejects the anchor point transfer request by including an SIP header in an SIP message to SCC AS C 502 B 550 , whereby SCC AS B 502 B remains the anchor SCC AS 555 .
- an SIP XML body may be utilized for anchor identification and transfer.
- An anchor SCC AS may identify itself as such to other SCC ASs by utilizing an XML body.
- An SCC AS may also include the type of action an SCC AS seeks to carry out, such as maintaining the anchor point or requesting anchor point transfer.
- the XML body may include the identity of the SCC AS to which anchor point transfer is desired or the identity of a non-anchor SCC AS seeking anchor transfer.
- an anchor SCC AS may identify itself as such in a Record-Route header. For instance, it may add a parameter, e.g. “anchor-point”, to its address in the Record-Route header of an SIP message. For example Record-Route: sccas1@example.com;anchor-point identifies SCC AS with the address sccas1@example.com as an anchor point.
- session control is maintained by a controller WTRU, while other WTRUs who are involved in the collaborative session are controllee WTRUs.
- a controller WTRU may identify itself as a collaborative session controller to an IMS network or other WTRUs that are involved in a collaborative session. Furthermore, a controller WTRU may transfer collaborative session control to another WTRU, making the WTRU receiving collaborative session control the new controller WTRU.
- SIP signaling may be used to indicate the identity of a collaborative session controller WTRU.
- SIP control signaling may be used to transfer collaborative session control.
- An SIP XML body may comprise information elements indicating the controller WTRU for a collaborative session.
- the XML body may be used in IMS control signaling for the purpose of transferring collaborative session control from one WTRU to another WTRU.
- a controller WTRU may use an SIP XML body to request that another WTRU assume collaborative session control.
- Collaborative session control may be accepted or rejected and the WTRU accepting or rejecting the transfer of collaborative session control may indicate so in an SIP XML body.
- a controllee WTRU may use an SIP XML body to request that collaborative session control be transferred to it from a controller WTRU.
- a controller WTRU in a collaborative session may include a parameter in the SIP Contact header field indicating whether it seeks to retain or transfer collaborative session control. For example, the presence of the parameter “controller” in the Contact header field informs the SCC AS and the IMS network that the WTRU seeks to maintain collaborative session control.
- a P-Header may be used for transferring collaborative session control.
- the P-Header may have a Controller parameter that identifies the collaborative session controller. It may also have an Action parameter that indicates a request by the controller WTRU to transfer collaborative session control to another WTRU or a request by a controllee WTRU to obtain collaborative session control from the controller WTRU.
- the P-Header may also have a parameter to indicate the WTRU to which the Action parameter relates.
- WTRU B may either accept or reject this request by including an SIP header in an SIP message to WTRU A.
- collaborative session control may be transferred by changing the contact address that the IMS network affiliates with the controller WTRU.
- collaborative session control transfer may be indicated by the IMS network receiving IMS signaling with a contact address for another controller WTRU, where both WTRUs are in a collaborative session.
- the change of contact address may be indicated together with the “controller” feature tag, which indicates that a device has controller capabilities.
- the presence of the feature tag in requests means a WTRU is the controller, while the absence of the feature tag means another WTRU with controller capabilities may take control of the collaborative session. Accordingly, the presence or absence of the controller feature tag may prompt the SCC AS to change the contact address that the IMS network identifies as the contact address for the controller WTRU.
- FIG. 6 shows an information flow for the transfer of IMS collaborative session control.
- WTRU A 601 A and WTRU B 601 B are engaged in a collaborative session with a remote party 605 .
- SCC AS A 602 A serves WTRU A 601 A
- SCC AS B 602 B serves WTRU B 601 B.
- WTRU A 601 A maintains collaborative session control.
- WTRU A 601 A is a controller WTRU
- WTRU B 601 B is a controllee WTRU
- SCC AS A 602 A is the anchor SCC AS for the collaborative session 610 .
- Each WTRU 601 A-B has a media flow with the remote party 605 520 .
- WTRU A 601 A maintains collaborative session control signaling with SCC AS A 602 A and the remote party 605 630 .
- WTRU A 601 A seeks to transfer collaborative session control to WTRU B 601 B.
- WTRU A 601 A sends an SIP request to WTRU B 601 B to transfer collaborative session control, in accordance with the embodiments described herein 640 .
- WTRU B 601 B accepts transfer of collaborative session control and sends an SIP message to WTRU A 601 A indicating its acceptance of collaborative session control, in accordance with the embodiments described herein 650 .
- WTRU B 601 B becomes the controller WTRU and WTRU A 601 A becomes the controllee WTRU for the collaborative session 660 .
- WTRU B 601 B maintains collaborative session control signaling with SCC AS A 602 A and the remote party 605 670 , where SCC AS A 602 A acts as an anchor SCC AS and SCC AS B 602 B proxies the messaging between WTRU B 601 B and SCC AS A 602 A.
- ROM read only memory
- RAM random access memory
- register cache memory
- semiconductor memory devices magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
- a processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
A method and apparatus are described for performing Internet Protocol (IP) Multimedia Subsystem (IMS) operation. A wireless transmit/receive unit (WTRU) registers an IMS service priority with an IMS network. The IMS service priority indicates the WTRU's priority in receiving IMS services. The WTRU may receive an IMS service from the IMS network based on the WTRU's IMS service priority. The IMS service priority may be indicated using a priority value and the WTRU may use Session Initiation Protocol (SIP) messaging to signal with the IMS network. The WTRU may register the service priority value using a q-value parameter in an SIP Contact field header. The WTRU may also register a public user identity with the IMS network and the public user identity may be shared with other IMS-capable WTRUs.
Description
- This application claims the benefit of U.S. provisional application No. 61/310,486, filed on Mar. 4, 2010; and U.S. provisional application No. 61/317,988, filed on Mar. 26, 2010, the contents of which are hereby incorporated by reference herein.
- This application is related to communications.
- Internet Protocol (IP) Multimedia Subsystem (IMS) is an architectural framework for providing multimedia services across a variety of access platforms. IMS facilitates multimedia service creation and deployment based on Internet protocols allowing IMS subscribers to access personalized interactive, multimedia services, on any device, and anywhere. IMS is access-agnostic, whereby service delivery is independent of the underlying access platform and the use of Internet protocols in IMS allows for interoperability among the access platforms. IMS also leads to savings in network infrastructure, administration and management. Further, IMS allows for the migration of Circuit Switched (CS) services like voice telephony to the Packet Switched (PS) domain by using separate control and bearer functions and featuring an overlay service delivery network on top of a packet switch network infrastructure.
- In IMS, media sessions may be directed to any one of multiple IMS-capable devices communicating via an IMS network. An IMS network may therefore face decisions regarding the routing of media sessions and how to signal such determinations. Additionally, multiple IMS-capable devices may be served by multiple IMS networks and the networks' functional entities, whereby the various networks may face decisions regarding the management of IMS sessions that they may seek to resolve without creating unnecessary signaling traffic.
- It is therefore desirable to have a method and apparatus for IMS-capable devices to indicate routing preferences to an IMS network. It is further desirable to have a method and apparatus for IMS networks and IMS-capable devices to efficiently identify and transfer their roles.
- A method and apparatus are described for performing Internet Protocol (IP) Multimedia Subsystem (IMS) operation. A wireless transmit/receive unit (WTRU) registers an IMS service priority with an IMS network. The IMS service priority indicates the WTRU's priority in receiving IMS services. The WTRU may receive an IMS service from the IMS network based on the WTRU's IMS service priority. The IMS service priority may be indicated using a priority value and the WTRU may use Session Initiation Protocol (SIP) messaging to signal with the IMS network. The WTRU may register the service priority value using a q-value parameter in an SIP Contact field header. The WTRU may also register a public user identity with the IMS network and the public user identity may be shared with other IMS-capable WTRUs.
- A more detailed understanding may be had from the following description, given by way of example in conjunction with the accompanying drawings wherein:
-
FIG. 1A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented; -
FIG. 1B is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 1C is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 2A shows a WTRU in an IMS session with a remote party; -
FIG. 2B shows functional entities within an IMS network; -
FIG. 2C shows multiple WTRUs served by a single IMS network in a collaborative IMS session; -
FIG. 3 shows an information flow for WTRU registration and IMS session routing in accordance with a described embodiment; and -
FIG. 4 shows multiple WTRUs served by multiple IMS networks in a IMS collaborative session; -
FIG. 5 shows an information flow for anchor Service Centralization and Continuity Application Server (SCC AS) identification and transferring in accordance with a described embodiment; and -
FIG. 6 shows an information flow for the transfer of IMS collaborative session control. -
FIG. 1A is a diagram of anexample communications system 100 in which one or more disclosed embodiments may be implemented. Thecommunications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users. Thecommunications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth. For example, thecommunications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), and the like. - As shown in
FIG. 1A , thecommunications system 100 may include wireless transmit/receive units (WTRUs) 102 a, 102 b, 102 c, 102 d, a radio access network (RAN) 104, acore network 106, a public switched telephone network (PSTN) 108, the Internet 110, andother networks 112, though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements. Each of the 102 a, 102 b, 102 c, 102 d may be any type of device configured to operate and/or communicate in a wireless environment. By way of example, the WTRUs 102 a, 102 b, 102 c, 102 d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a laptop, a netbook, a personal computer, a wireless sensor, consumer electronics, and the like.WTRUs - The
communications systems 100 may also include abase station 114 a and abase station 114 b. Each of the 114 a, 114 b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102 a, 102 b, 102 c, 102 d to facilitate access to one or more communication networks, such as thebase stations core network 106, the Internet 110, and/or thenetworks 112. By way of example, the 114 a, 114 b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While thebase stations 114 a, 114 b are each depicted as a single element, it will be appreciated that thebase stations 114 a, 114 b may include any number of interconnected base stations and/or network elements.base stations - The
base station 114 a may be part of the RAN 104, which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc. Thebase station 114 a and/or thebase station 114 b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may further be divided into cell sectors. For example, the cell associated with thebase station 114 a may be divided into three sectors. Thus, in one embodiment, thebase station 114 a may include three transceivers, i.e., one for each sector of the cell. In another embodiment, thebase station 114 a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell. - The
114 a, 114 b may communicate with one or more of thebase stations 102 a, 102 b, 102 c, 102 d over anWTRUs air interface 116, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). Theair interface 116 may be established using any suitable radio access technology (RAT). - More specifically, as noted above, the
communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, thebase station 114 a in theRAN 104 and the 102 a, 102 b, 102 c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish theWTRUs air interface 116 using wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA). - In another embodiment, the
base station 114 a and the 102 a, 102 b, 102 c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish theWTRUs air interface 116 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A). - In other embodiments, the
base station 114 a and the 102 a, 102 b, 102 c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1X, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.WTRUs - The
base station 114 b inFIG. 1A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like. In one embodiment, thebase station 114 b and the 102 c, 102 d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN). In another embodiment, theWTRUs base station 114 b and the 102 c, 102 d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN). In yet another embodiment, theWTRUs base station 114 b and the 102 c, 102 d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell. As shown inWTRUs FIG. 1A , thebase station 114 b may have a direct connection to theInternet 110. Thus, thebase station 114 b may not be required to access theInternet 110 via thecore network 106. - The
RAN 104 may be in communication with thecore network 106, which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the 102 a, 102 b, 102 c, 102 d. For example, theWTRUs core network 106 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown inFIG. 1A , it will be appreciated that theRAN 104 and/or thecore network 106 may be in direct or indirect communication with other RANs that employ the same RAT as theRAN 104 or a different RAT. For example, in addition to being connected to theRAN 104, which may be utilizing an E-UTRA radio technology, thecore network 106 may also be in communication with another RAN (not shown) employing a GSM radio technology. - The
core network 106 may also serve as a gateway for the 102 a, 102 b, 102 c, 102 d to access theWTRUs PSTN 108, theInternet 110, and/orother networks 112. ThePSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). TheInternet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite. Thenetworks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, thenetworks 112 may include another core network connected to one or more RANs, which may employ the same RAT as theRAN 104 or a different RAT. - Some or all of the
102 a, 102 b, 102 c, 102 d in theWTRUs communications system 100 may include multi-mode capabilities, i.e., the 102 a, 102 b, 102 c, 102 d may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, theWTRUs WTRU 102 c shown inFIG. 1A may be configured to communicate with thebase station 114 a, which may employ a cellular-based radio technology, and with thebase station 114 b, which may employ an IEEE 802 radio technology. -
FIG. 1B is a system diagram of anexample WTRU 102. As shown inFIG. 1B , theWTRU 102 may include aprocessor 118, atransceiver 120, a transmit/receiveelement 122, a speaker/microphone 124, akeypad 126, a display/touchpad 128,non-removable memory 106,removable memory 132, apower source 134, a global positioning system (GPS)chipset 136, andother peripherals 138. It will be appreciated that theWTRU 102 may include any sub-combination of the foregoing elements while remaining consistent with an embodiment. - The
processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. Theprocessor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables theWTRU 102 to operate in a wireless environment. Theprocessor 118 may be coupled to thetransceiver 120, which may be coupled to the transmit/receiveelement 122. WhileFIG. 1B depicts theprocessor 118 and thetransceiver 120 as separate components, it will be appreciated that theprocessor 118 and thetransceiver 120 may be integrated together in an electronic package or chip. - The transmit/receive
element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., thebase station 114 a) over theair interface 116. For example, in one embodiment, the transmit/receiveelement 122 may be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit/receiveelement 122 may be an emitter/detector configured to transmit and/or receive IR, ITV, or visible light signals, for example. In yet another embodiment, the transmit/receiveelement 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receiveelement 122 may be configured to transmit and/or receive any combination of wireless signals. - In addition, although the transmit/receive
element 122 is depicted inFIG. 1B as a single element, theWTRU 102 may include any number of transmit/receiveelements 122. More specifically, theWTRU 102 may employ MIMO technology. Thus, in one embodiment, theWTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over theair interface 116. - The
transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receiveelement 122 and to demodulate the signals that are received by the transmit/receiveelement 122. As noted above, theWTRU 102 may have multi-mode capabilities. Thus, thetransceiver 120 may include multiple transceivers for enabling theWTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example. - The
processor 118 of theWTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, thekeypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit). Theprocessor 118 may also output user data to the speaker/microphone 124, thekeypad 126, and/or the display/touchpad 128. In addition, theprocessor 118 may access information from, and store data in, any type of suitable memory, such as thenon-removable memory 106 and/or theremovable memory 132. Thenon-removable memory 106 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. Theremovable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, theprocessor 118 may access information from, and store data in, memory that is not physically located on theWTRU 102, such as on a server or a home computer (not shown). - The
processor 118 may receive power from thepower source 134, and may be configured to distribute and/or control the power to the other components in theWTRU 102. Thepower source 134 may be any suitable device for powering theWTRU 102. For example, thepower source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like. - The
processor 118 may also be coupled to theGPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of theWTRU 102. In addition to, or in lieu of, the information from theGPS chipset 136, theWTRU 102 may receive location information over theair interface 116 from a base station (e.g., 114 a, 114 b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that thebase stations WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment. - The
processor 118 may further be coupled toother peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. For example, theperipherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like. -
FIG. 1C is a system diagram of theRAN 104 and thecore network 106 according to an embodiment. As noted above, theRAN 104 may employ an E-UTRA radio technology to communicate with the 102 a, 102 b, 102 c over theWTRUs air interface 116. TheRAN 104 may also be in communication with thecore network 106. - The
RAN 104 may include eNode- 140 a, 140 b, 140 c, though it will be appreciated that theBs RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment. The eNode- 140 a, 140 b, 140 c may each include one or more transceivers for communicating with theBs 102 a, 102 b, 102 c over theWTRUs air interface 116. In one embodiment, the eNode- 140 a, 140 b, 140 c may implement MIMO technology. Thus, the eNode-Bs B 140 a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, theWTRU 102 a. - Each of the eNode-
140 a, 140 b, 140 c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown inBs FIG. 1C , the eNode- 140 a, 140 b, 140 c may communicate with one another over an X2 interface.Bs - The
core network 106 shown inFIG. 1C may include a mobility management gateway (MME) 142, a servinggateway 144, and a packet data network (PDN)gateway 146. While each of the foregoing elements are depicted as part of thecore network 106, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. - The
MME 142 may be connected to each of the eNode-Bs 142 a, 142 b, 142 c in theRAN 104 via an S1 interface and may serve as a control node. For example, theMME 142 may be responsible for authenticating users of the 102 a, 102 b, 102 c, bearer activation/deactivation, selecting a particular serving gateway during an initial attach of theWTRUs 102 a, 102 b, 102 c, and the like. TheWTRUs MME 142 may also provide a control plane function for switching between theRAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA. - The serving
gateway 144 may be connected to each of the 140 a, 140 b, 140 c in theeNode Bs RAN 104 via the S1 interface. The servinggateway 144 may generally route and forward user data packets to/from the 102 a, 102 b, 102 c. The servingWTRUs gateway 144 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the 102 a, 102 b, 102 c, managing and storing contexts of theWTRUs 102 a, 102 b, 102 c, and the like.WTRUs - The serving
gateway 144 may also be connected to thePDN gateway 146, which may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as theInternet 110, to facilitate communications between the 102 a, 102 b, 102 c and IP-enabled devices.WTRUs - The
core network 106 may facilitate communications with other networks. For example, thecore network 106 may provide the WTRUs 102 a, 102 b, 102 c with access to circuit-switched networks, such as thePSTN 108, to facilitate communications between the 102 a, 102 b, 102 c and traditional land-line communications devices. For example, theWTRUs core network 106 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between thecore network 106 and thePSTN 108. In addition, thecore network 106 may provide the WTRUs 102 a, 102 b, 102 c with access to thenetworks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers. -
FIG. 2A shows aWTRU 201 in an IMS session with aremote party 205. The IMS session is conducted over theIMS network 210. TheWTRU 201 may have any number of ongoing media sessions with the remote party. For example,FIG. 2A shows anaudio session 202 and avideo session 203. These sessions are exemplary and other multimedia sessions may be used. TheIMS network 210 hosts IMS services and provides session and media control. It manages a WTRU's service interactions and establishes, monitors, supports and releases multimedia sessions. - Further, the
WTRU 201 maintains IMS control signaling 204 with theIMS network 210. The WTRU may use the IMS control signaling 204 to exercise session control capabilities. IMS control signaling allows a WTRU to accept or reject an incoming request for the establishment of a media session from a remote party. TheWTRU 201 executes IMS control signaling on thecontrol path 204. TheIMS network 210 is on the recipient end of the WTRU's IMS control signaling 204. -
FIG. 2B shows functional entities of anIMS network 210. The Call Session Control Function (CSCF)entity 213 sits on the path of IMS control signaling amongst WTRUs, remote parties, and other IMS network entities. The CSCF entity may inspect the messaging of WTRUs, remote parties, and other IMS network entities. The CSCF entity decides to which application server (AS) control messaging is forwarded to provide for IMS services. The CSCF entity provides routing services and enforces the policies of network operators. The CSCF entity also handles WTRU registrations. - The IMS network may use one or more ASs. The one or more ASs are configured to host and execute IMS services and to interface with the
CSCF 213. Service Centralization and Continuity AS (SCC AS) 214 anchors IMS sessions and enables service continuity for media sessions including providing for and executing the transfer of media sessions amongst WTRUs, combining and dividing media flows, and the addition of media flows. Aside from the SCC AS 214, other ASs, such as AS 215 shown inFIG. 2B , may interface with theCSCF 213 to provide for other IMS-related services. -
WTRU 201, as shown inFIG. 2B , has control signaling with theIMS network 210, represented bycontrol path 212.WTRU 201 may also have any number of IMS media sessions that are collectively represented bymedia path 211.FIG. 2B also shows access and remote legs for an IMS session. An access leg is a control leg between a WTRU and the SCC AS and a remote leg is a control leg between the SCC AS and a remote party. - Multiple WTRUs may be engaged in a single collaborative IMS session with a remote party through an IMS network.
FIG. 2C shows multiple WTRUs served by a single IMS network in a collaborative IMS session. InFIG. 2C ,WTRUs 201A-C (collectively hereinafter referred to by the numeral alone, WTRUs 201) are involved in a collaborative IMS session with a remote party (not shown). EachWTRU 201 has acontrol path 212A-C and amedia path 211A-C. Themedia paths 211 represent the ongoing media sessions of theWTRUs 201. Thecontrol paths 212 represent the control signaling for theWTRUs 201. - While all of the
WTRUs 201 are involved in a collaborative IMS session, one of theWTRUs 201 functions as a controller WTRU for the collaborative session. InFIG. 2C ,WTRU A 201A functions as the controller WTRU for the collaborative session. As a controller,WTRU A 201A is able to execute Inter-Device Transfer (IDT) procedures by whichWTRU A 201A may add, transfer, duplicate, and remove media sessions on anyWTRU 201 involved in the collaborative session. Furthermore, the service profile of the controller WTRU in a collaborative session, such asWTRU A 201A, may determine the services available on the paths between the collaborative session and the remote party. - Although involved in a collaborative session with all
WTRUs 201, the remote party may not be aware that one or more of its media sessions are with controllee WTRUs, such asWTRU B 201B andWTRU C 201C. In a collaborative session, the remote party may only be aware of a controller WTRU,WTRU A 201A. Thecontroller WTRU A 201A usescontrol path 212A for collaborative session control messaging, as well as for control signaling associated with itsown media path 211. Within the collaborative session,controllee WTRUs B 201B andC 201C are engaged in media sessions viamedia paths 211B-C, respectively.Controllee WTRUs B 201B andC 201C also usecontrol paths 212B-C for control signaling. - Within a collaborative session, controllee WTRUs are subordinate to the controller WTRU for IDT procedures. For example, a controller WTRU may remove a media session from a controllee WTRU. Additionally, if a controllee WTRU seeks to establish a media session, the controllee WTRU may request such establishment from a controller WTRU and the controller WTRU may accept or reject this request.
- In
FIG. 2C , Service Centralization and Continuity Application Server (SCC AS) 214 serves as an anchor SCC AS, that manages session control signaling between the WTRUs and the remote party. Furthermore, SCC AS 214 enables service continuity for media sessions in the collaborative session and provides for and executes IDT procedures. While inFIG. 2C , only one SCC AS serves the collaborative session, in other scenarios multiple WTRUs in a collaborative session may each have their own SCC AS that acts as a proxy to an anchor SCC AS.FIG. 2C also shows IMSnetwork entities CSCF 213 and AS 215. - Control signaling via a control path in an IMS session, as shown in
FIGS. 2B-C , may utilize a signaling protocol such as Session Initiation Protocol (SIP). SIP, as known in the art, is a signaling protocol that allows for establishing, modifying, terminating, adding, and duplicating IMS multimedia sessions. SIP is a text-based protocol, where messages may take one of two forms: requests and responses. SIP requests include a REGISTER request, which may be used by a WTRU to register a Public User Identity (PUI) that is associated with the WTRU with the IMS network. Other examples of SIP requests include an INVITE request, which may be used to establish a media session between a WTRU and a remote party, and ACK request, which may be used to confirm that a response has been received. SIP response codes include a provisional response, i.e., 1xx, which may be used to indicate the request was received and is being processed and a success response, i.e., 2xx, which may be use to indicate the action was successfully received and accepted. - SIP headers may be used by WTRUs and the IMS network that is utilizing SIP messaging. Some SIP headers include “To” (the address of the intended recipient), “From” (the address of the sender), and “Contact” (address information that identifies the resource requested or the request originator, depending on whether it is a header for a request or a response).
- In IMS, a WTRU may be registered in the IMS network using a Public User Identity (PUI). A PUI may be a SIP Uniform Resource Identifier (URI), such as an e-mail address, or a Tel URI, such as a telephone number. An IMS network may contact a WTRU by addressing the WTRU's PUI. Multiple WTRUs may share the same PUI. For instance, an IMS subscriber may have multiple WTRUs sharing the same PUI under one IMS subscription.
- A WTRU may register its capabilities with the IMS network. A WTRU that is capable of controlling a collaborative session may register as a collaborative session controller WTRU with the IMS network. Furthermore, a WTRU that is capable of media control may register as such. A media controller WTRU, regardless of being a controller WTRU or a controllee WTRU of a collaborative session, may have certain defined media control privileges within a collaborative session. A WTRU may update or change its registered profile with the network at any time. To register its capabilities, a WTRU may use a feature tag within an SIP Contact header. For instance, a WTRU seeking to register collaborative session control capabilities may use a feature tag such as g.3gpp.iut=“controller” and a WTRU seeking to register media control capabilities may use a feature tag such as g.3gpp.iut=“media-controller”. A WTRU may include the feature tags indicating its IMS capabilities when utilizing the SIP REGISTER request to contact the IMS network.
- The IMS network may maintain a profile of a WTRU's capabilities. This profile may be influenced by the capabilities that the WTRU registered with the network or by other information within the network's knowledge. The network may rely upon the WTRU's registered capabilities or information within the service profile in providing IMS services, such as media session routing or determining whether a WTRU is permitted to perform IMS actions. For instance, within an IMS network, an SCC AS that is responsible for media session continuity may use registered WTRU capabilities or profile information to influence media session routing. In the event that it receives an incoming media session request, an SCC AS may indicate to a CSCF a preference for the session to be routed to a registered controller WTRU. A CSCF may then use this preference to route the media session to the controller registered WTRU.
- In SIP, an SCC AS may indicate routing preferences to a CSCF using IETF RFC 3841 headers and parameters. For instance, an SCC AS may add an Accept-Contact header field in an SIP request with a controller WTRU feature tag and an “explicit” parameter, thereby requiring that the request be routed to a WTRU registered with controller capabilities. Upon receiving the header field and controller feature tag in the SIP request, a CSCF routes the request to a WTRU with registered controller capabilities. If no WTRUs have registered controller capabilities, the request is routed to a WTRU that is not a registered controller. A SCC AS may also indicate routing preferences by adding an SIP Contact header field with a “require” parameter.
- A WTRU may register a priority value with the IMS network. The priority value may indicate to the IMS network a WTRU's priority in comparison to other WTRUs that may also be registered with the IMS network under the same PUI. The priority value may also indicate to the IMS network the WTRU's preference level for receiving IMS sessions. A priority value may be used by the IMS network in IMS management and providing IMS services, such as determining where to establish or route media sessions. A higher priority value associated with a WTRU may indicate to the network a greater preference for the establishment and routing of media sessions to that WTRU. For instance, if multiple WTRUs having the same PUI are registered as controllers with the IMS network, the CSCF within the IMS network may route an incoming media session to the WTRU with the higher priority value. In one embodiment, a WTRU may register a priority value with the IMS network using the q-value parameter in the SIP Contact header field.
-
FIG. 3 shows an information flow for WTRU registration and IMS session routing in accordance with this embodiment. InFIG. 3 , WTRU A 301, which is IMS-capable, seeks to register its capabilities and a priority value with the IMS network. WTRU A 301A sends anSIP REGISTER request 310 to anIMS CSCF 313. TheSIP REGISTER request 310 has a Contact header field that includes both a feature tag indicating a capability of WTRU A 301 and a q-value indicating a priority value associated withWTRU A 301A. InFIG. 3 , the feature tag indicating controller capability ofWTRU A 301A is g.3gpp.controller=“controller” and the q-value indicating a priority value associated withWTRU A 301A is q=0.5. -
CSCF 313 sends theSIP REGISTER request 310 to SCC AS 314 andCSCF 313 sends an SIP 200 (OK)response 310 toWTRU A 301A. SCC AS 314 also sends an SIP 200 (OK)response 310 toCSCF 313. As a result,WTRU A 301A has registered its capability and a priority value with the IMS network.WTRU B 301B andWTRU C 301C similarly register 320, 330 their capabilities and associated priority values with the IMS network.WTRUs A-C 301A-C are registered under the same PUI with the IMS network.WTRU B 301B registers a feature tag indicating controller capability and q-value of q=0.8, whileWTRU C 301C registers no feature tag indicating control capability, but registers a q-value of q=0.5. -
CSCF 313 receives anSIP INVITE request 340 from a remote party (not shown) for a media session. TheSIP INVITE request 340 is addressed to the PUI shared byWTRUs A-C 301A-C. CSCF 313 sends theSIP INVITE request 340 toSCC AS 314. SCC AS 314 prefers that the SIP INVITE request be routed to a controller WTRU. SCC AS 314 uses RFC 3841 procedures and adds an Accept-Contact 345 with a controller feature tag to indicate this preference in the SIP INVITE request. SCC AS 314 sends theSIP INVITE request 350 toCSCF 313. - WTRU A 301A and
WTRU B 301B have controller capabilities, whileWTRU C 301C does not have such capabilities.CSCF 313 may therefore send the SIP INVITE request to eitherWTRU A 301A orWTRU B 301B, but notWTRU C 301C.WTRU B 301B has a higher associated q-value thanWTRU A 301A, soCSCF 313 determines that the SIP INVITE request is directed to the controller WTRU with the higher q-value 355 and then sends theSIP INVITE request 360 toWTRU B 301B. Rather than forking, i.e., sending the SIP INVITE request to both WTRU A 301A andWTRU B 301B, theCSCF 313 sends the SIP INVITE request toWTRU B 301B. - Multiple SCC ASs may be involved in an IMS session, with each SCC AS serving one WTRU or multiple WTRUs. This may be the case where multiple WTRUs are involved in a collaborative IMS session and the WTRUs are served by multiple SCC ASs. For example, one SCC AS may be an anchor SCC AS for the collaborative session, and the remaining SCC ASs may proxy messages for the anchor SCC AS.
- The WTRUs involved in an IMS session may have different SCC ASs because the WTRUs are under different IMS subscriptions or are served by different IMS networks. The SCC AS serving the WTRU that initiated the IMS session may function as an anchor SCC AS until the anchor point is transferred to another SCC AS. The initiating WTRU may have involved other WTRUs in the IMS session (for example, by transferring, duplicating, or establishing IMS media sessions to these WTRUs). The SCC ASs serving the other WTRUs may, therefore, act as proxies to the SCC AS of the initiating WTRU.
-
FIG. 4 shows multiple WTRUs served by multiple IMS networks in an IMS collaborative session.WTRUs 401A-C (collectively hereinafter referred to by the numeral alone, WTRUs 401) are each served by SCC AS 402A-C, respectively, within their respective IMS networks. SCC AS A 402A is the anchor whose policies govern the IMS session. Further, the anchor SCC AS A 402A enables service continuity for media sessions amongst all WTRUs 401.SCC AS B 402B andSCC AS C 402C serveWTRU B 401B andWTRU C 402C, respectively, whereWTRU B 402B andWTRU C 402C may belong to different IMS subscriptions. In a collaborative session anchored at SCC AS A 402A,SCC AS B 402B andSCC AS C 402C as act proxies for messages betweenWTRU B 401B andWTRU C 401C, respectively, and SCC AS A 402A. - In
FIG. 4 , anaccess leg 407 is presented to anchor SCC AS A 402A and aremote leg 408 is presented to SCC AS A 402A from a remote party (not shown). WTRUs 401 each have a control path 405 with their respective SCC ASs 402 and a media path 406 with the remote party. Furthermore, each of the IMS networks has aCSCF 403A-C. - An SCC AS may use control signaling to identify itself as an anchor to other SCC ASs. Additionally, an anchor SCC AS may transfer the anchor point from itself to another SCC AS via control signaling or a non-anchor SCC AS may request the transfer of the anchor point from an anchor SCC AS via control signaling.
- Signaling between SCC ASs may be dedicated for the purposes of anchor identification and transfer or the signaling may be incorporated or contained within IMS signaling. For instance, an anchor SCC AS may identify itself as such by incorporating control signaling to that effect within an IMS control message that was routed through a non-anchor SCC AS but was intended for a WTRU served by the non-anchor SCC AS. Thereby, a non-anchor SCC AS routing a message to the WTRU it is serving may be informed of the identity of the anchor SCC AS via the message. A non-anchor may remove the signaling incorporated in the message and pass the message to its intended party, the WTRU. As a result, this anchor signaling may in a sense “ride” conventional IMS signaling.
- For security purposes, it may be preferable that only SCC ASs within IMS networks be aware of the anchor SCC AS. Accordingly, signaling for the purpose of anchor identification and transfer that is incorporated in IMS signaling may be removed by the SCC AS recipient before the IMS signaling is passed along to WTRUs.
- An SIP header may be utilized by SCC ASs to identify an anchor SCC AS and to transfer the anchor from one SCC AS to another SCC AS. A private header, or a P-Header, is one example of an SIP header field that may be utilized for these purposes. A P-Header labeled as P-Anchor-Point-ID may be used to identify an anchor point. For instance, P-Anchor-Point-ID: sccas1@example.com may be used to identify an anchor SCC AS by its address, sccas1@example.com, whereby, an anchor SCC AS may insert this header field in IMS SIP signaling to identify itself as an anchor SCC AS to other SCC ASs. Particularly, within a trusted network or domain, where it is unlikely that an SCC AS who is not an anchor will identify itself as such.
- In another embodiment, an SCC AS may request anchor transfer by changing the P-Anchor-Point-ID address from the address of the current anchor SCC AS to the address of the SCC AS to which anchor point transfer is sought.
- Parameters may be added to this header for transferring the SCC AS anchor. For example, transfer-anchor-point-to may be used by an anchor SCC AS to transfer the anchor point to another SCC AS identified by the parameter. For example, the P-Header P-Anchor-Point-ID: sccas1@example.com; transfer-anchor-to: sccas2@example.com may be inserted by an SCC AS in an SIP message to identify itself as an anchor point and to request transfer of the anchor point to another SCC AS (identified by its address, sccas2@example.com).
- In another embodiment, a header field utilized for the purpose of anchor identification or transfer may comprise multiple parameters. An inserted-by parameter may identify the SCC AS that inserted the header in the SIP message. An Action parameter may allow an SCC AS to notify other SCC ASs of the purpose of the header field. The Action header field may identify the anchor point, request anchor transfer to another SCC AS, request anchor transfer from the anchor SCC AS to another SCC AS, or reject a requested anchor transfer. Table 1 shows instances of Action parameter fields and their associated meanings.
-
TABLE 1 Action parameter fields Action Accompanied parameter Purpose by: anchor-point Identifies the anchor request-anchor Request anchor transfer request-To* from an anchor SCC AS transfer-anchor Request anchor transfer request-To* to another SCC AS reject-anchor Reject the request of anchor transfer *Identifies SCC AS the request is addressed to - Accordingly, if an anchor SCC AS with the address sccas1@example.com seeks to transfer the anchor point to another SCC AS with the address sccas2@example.com, the anchor SCC AS may utilize the header P-Anchor-Point-ID: inserted-by: sccas1@example.com Action: transfer-anchor request-to: sccas2@example.com. Then, if the non-anchor SCC AS with the address sccas2@example.com accepts the anchor point transfer, the non-anchor SCC AS may respond by utilizing the header P-Anchor-Point-ID: Inserted-by: sccas2@example.com Action: anchor-point. Alternatively, if the non-anchor SCC AS rejects the anchor point transfer, it may respond by utilizing the header P-Anchor-Point-ID: Inserted-by: sccas2@example.com Action: reject-anchor.
-
FIG. 5 shows an information flow for anchor SCC AS identification and transferring in accordance with this embodiment. InFIG. 5 , SCC AS A 502A is an anchor SCC AS 505 for an ongoing IMS session, whereasSCC AS B 502B andSSC AS C 502C are non-anchors. Each SCC AS 502A-C may serve IMS-capable WTRUs (not shown), withSCC AS B 502B andSCC AS C 502C acting as proxies for the IMS signaling between their respective WTRUs and anchor SCC AS A 502A. The WTRUs, which belong to different IMS networks, may be involved in a collaborative IMS session. SCC AS A 502A identifies itself as an anchor by including an SIP header in an SIP message toSCC 510. This SIP header may be part of an SIP message sent solely to convey this anchor information, or, alternatively, the header may simply be incorporated into an SIP message intended for a party other thanAS B 502BSCC AS B 502B. For instance, the header may be included in an SIP message to the WTRU served bySCC AS B 502B. When it receives the message,SCC AS B 502B may then remove the header information and, in its role as a proxy, convey the remainder of the SIP message to the WTRU it is serving. - SCC AS A 502A requests to transfer the anchor point to
SCC AS B 502B by including an SIP header in an SIP message toSCC 520.AS B 502BSCC AS B 502B accepts the anchor point transfer by including an SIP header in an SIP message to SCC AS A502 A 530. Thereby,SCC AS B 502B becomes theanchor SCC AS 535. SCC ASC 502C then requests that the anchor point be transferred to itself fromSCC AS B 502B by including an SIP header in an SIP message toSCC 540.AS B 502BSCC AS B 502B does not wish to relinquish the anchor point so it rejects the anchor point transfer request by including an SIP header in an SIP message toSCC 550, wherebyAS C 502BSCC AS B 502B remains theanchor SCC AS 555. - In another embodiment, an SIP XML body may be utilized for anchor identification and transfer. An anchor SCC AS may identify itself as such to other SCC ASs by utilizing an XML body. An SCC AS may also include the type of action an SCC AS seeks to carry out, such as maintaining the anchor point or requesting anchor point transfer. Additionally, the XML body may include the identity of the SCC AS to which anchor point transfer is desired or the identity of a non-anchor SCC AS seeking anchor transfer.
- In another embodiment, an SCC AS may identify itself as an anchor SCC AS by including its address in a Call-Info header of an SIP message, such as Call-Info: sccas1@example.com; purpose=anchor. In another embodiment, an anchor SCC AS may identify itself as such in a Record-Route header. For instance, it may add a parameter, e.g. “anchor-point”, to its address in the Record-Route header of an SIP message. For example Record-Route: sccas1@example.com;anchor-point identifies SCC AS with the address sccas1@example.com as an anchor point.
- In an IMS collaborative session, session control is maintained by a controller WTRU, while other WTRUs who are involved in the collaborative session are controllee WTRUs. A controller WTRU may identify itself as a collaborative session controller to an IMS network or other WTRUs that are involved in a collaborative session. Furthermore, a controller WTRU may transfer collaborative session control to another WTRU, making the WTRU receiving collaborative session control the new controller WTRU.
- In an IMS network, SIP signaling may be used to indicate the identity of a collaborative session controller WTRU. Furthermore, SIP control signaling may be used to transfer collaborative session control. An SIP XML body may comprise information elements indicating the controller WTRU for a collaborative session. Additionally, the XML body may be used in IMS control signaling for the purpose of transferring collaborative session control from one WTRU to another WTRU. For instance, a controller WTRU may use an SIP XML body to request that another WTRU assume collaborative session control. Collaborative session control may be accepted or rejected and the WTRU accepting or rejecting the transfer of collaborative session control may indicate so in an SIP XML body. Furthermore, a controllee WTRU may use an SIP XML body to request that collaborative session control be transferred to it from a controller WTRU.
- In another embodiment, a controller WTRU in a collaborative session may include a parameter in the SIP Contact header field indicating whether it seeks to retain or transfer collaborative session control. For example, the presence of the parameter “controller” in the Contact header field informs the SCC AS and the IMS network that the WTRU seeks to maintain collaborative session control.
- In another embodiment, a P-Header may be used for transferring collaborative session control. The P-Header may have a Controller parameter that identifies the collaborative session controller. It may also have an Action parameter that indicates a request by the controller WTRU to transfer collaborative session control to another WTRU or a request by a controllee WTRU to obtain collaborative session control from the controller WTRU. The P-Header may also have a parameter to indicate the WTRU to which the Action parameter relates. For instance, the SIP header P-Session-Control: Controller=wtruA@example.com; Action=transfer; Request-to=wtruB@example.com may be included by WTRU A in an SIP message such as REFER or Re-INVITE to request transfer of collaborative session control to WTRU B. WTRU B may either accept or reject this request by including an SIP header in an SIP message to WTRU A.
- In another embodiment, collaborative session control may be transferred by changing the contact address that the IMS network affiliates with the controller WTRU. In this embodiment, if the IMS network was previously receiving IMS signaling with a contact address for one controller WTRU, collaborative session control transfer may be indicated by the IMS network receiving IMS signaling with a contact address for another controller WTRU, where both WTRUs are in a collaborative session. The change of contact address may be indicated together with the “controller” feature tag, which indicates that a device has controller capabilities. The presence of the feature tag in requests means a WTRU is the controller, while the absence of the feature tag means another WTRU with controller capabilities may take control of the collaborative session. Accordingly, the presence or absence of the controller feature tag may prompt the SCC AS to change the contact address that the IMS network identifies as the contact address for the controller WTRU.
-
FIG. 6 shows an information flow for the transfer of IMS collaborative session control. InFIG. 6 ,WTRU A 601A andWTRU B 601B are engaged in a collaborative session with aremote party 605. SCC AS A 602A servesWTRU A 601A andSCC AS B 602B servesWTRU B 601B. For this collaborative session,WTRU A 601A maintains collaborative session control. WTRU A 601A is a controller WTRU,WTRU B 601B is a controllee WTRU, and SCC AS A 602A is the anchor SCC AS for thecollaborative session 610. EachWTRU 601A-B has a media flow with theremote party 605 520. - As a controller WTRU,
WTRU A 601A maintains collaborative session control signaling with SCC AS A 602A and theremote party 605 630. WTRU A 601A seeks to transfer collaborative session control toWTRU B 601B. WTRU A 601A sends an SIP request toWTRU B 601B to transfer collaborative session control, in accordance with the embodiments described herein 640.WTRU B 601B accepts transfer of collaborative session control and sends an SIP message toWTRU A 601A indicating its acceptance of collaborative session control, in accordance with the embodiments described herein 650. Thereby,WTRU B 601B becomes the controller WTRU andWTRU A 601A becomes the controllee WTRU for thecollaborative session 660. As a controller WTRU,WTRU B 601B maintains collaborative session control signaling with SCC AS A 602A and theremote party 605 670, where SCC AS A 602A acts as an anchor SCC AS andSCC AS B 602B proxies the messaging betweenWTRU B 601B and SCC AS A 602A. - Although features and elements are described above in particular combinations, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in any combination with the other features and elements. In addition, the methods described herein may be implemented in a computer program, software, or firmware incorporated in a computer-readable medium for execution by a computer or processor. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and computer-readable storage media. Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs). A processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
Claims (20)
1. A method, implemented for use in an Internet Protocol (IP) Multimedia Subsystem (IMS) capable wireless transmit/receive unit (WTRU), the method comprising:
registering an IMS service priority with an IMS network, wherein the IMS service priority indicates the WTRU's priority in receiving IMS services; and
receiving an IMS service from the IMS network based on the WTRU's IMS service priority.
2. The method as in claim 1 , wherein IMS service priority is indicated using a priority value.
3. The method as in claim 1 wherein the WTRU uses Session Initiation Protocol (SIP) messaging to signal with the IMS network.
4. The method as in claim 2 wherein the WTRU registers the service priority value using a q-value parameter in an SIP Contact field header.
5. The method as in claim 1 , further comprising:
registering a public user identity with the IMS network, wherein the public user identity is shared with other IMS-capable WTRUs.
6. The method as in claim 1 , further comprising:
registering an IMS service capability with the IMS network, wherein the IMS service capability indicates the WTRU's capability to perform specific IMS functions; and
receiving IMS service from the IMS network based on the WTRU's IMS service capability.
7. The method as in claim 6 wherein the WTRU registers IMS service capability using an SIP Contact field header feature tag.
8. The method as in claim 6 wherein the WTRU registers a controller capability with the IMS network.
9. A wireless transmit/receive unit (WTRU) for requesting transfer of Internet Protocol (IP) multimedia subsystem (IMS) collaborative session control, comprising:
a processor configured to generate a collaborative session control transfer request for requesting the transfer of control of an Internet Protocol (IP) multimedia subsystem (IMS) collaborative session, wherein the request is carried in an Extensible Markup Language (XML) body of an Session Initiation Protocol (SIP) message;
a transmitter, in communication with the processor, configured to transmit the SIP message requesting collaborative session control transfer to an IMS network.
10. The WTRU as in claim 9 further comprising:
a receiver, a receiver in communication with the processor, configured to receive a collaborative session control transfer response indicating that collaborative session control is transferred, wherein the response in carried in an SIP message.
11. The WTRU as in claim 9 , wherein the WTRU is participating in an IMS collaborative session with a remote party.
12. The WTRU as in claim 9 , wherein the XML body of the SIP request for collaborative session control transfer includes one or more of an identity of a collaborative session controller WTRU, an identity of the WTRU requesting collaborative session control transfer, or an identity of a WTRU to which collaborative session control is requested to be transferred.
13. The WTRU as in claim 10 , wherein the collaborative session control transfer response is carried in an XML body of an SIP message.
14. A method, implemented by an anchor Application Server (AS) for enabling service continuity in an Internet Protocol (IP) Multimedia Subsystem (IMS) network, the method comprising:
requesting a second AS to assume an anchor role for an IMS session, wherein the request is indicated in an SIP message; and
relinquishing anchor role for the IMS session to the second AS.
15. The method as in claim 14 wherein the AS identifies itself as an anchor AS to the second AS in a private header of an SIP message.
16. The method as in claim 14 wherein the AS requests transfer of the anchor role to the second AS in a parameter of an SIP private header.
17. The method as in claim 14 , further comprising:
receiving an answer from the second AS, wherein the answer indicates that the second AS accepts the anchor role or that the second AS rejects the anchor role.
18. The method as in claim 14 wherein the AS requests transfer of the anchor role to the second AS in an Extensible Markup Language (XML) body of an SIP message.
19. The method as in claim 14 wherein the second AS serves an IMS-capable device and proxies messages from the IMS-capable device to anchor AS.
20. The method as in claim 19 wherein the IMS-capable device is involved in an IMS collaborative session anchored at the AS.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/040,990 US20110216701A1 (en) | 2010-03-04 | 2011-03-04 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
| US14/723,238 US9560147B2 (en) | 2010-03-04 | 2015-05-27 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US31048610P | 2010-03-04 | 2010-03-04 | |
| US31798810P | 2010-03-26 | 2010-03-26 | |
| US13/040,990 US20110216701A1 (en) | 2010-03-04 | 2011-03-04 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/723,238 Division US9560147B2 (en) | 2010-03-04 | 2015-05-27 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20110216701A1 true US20110216701A1 (en) | 2011-09-08 |
Family
ID=43920152
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/040,990 Abandoned US20110216701A1 (en) | 2010-03-04 | 2011-03-04 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
| US14/723,238 Expired - Fee Related US9560147B2 (en) | 2010-03-04 | 2015-05-27 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/723,238 Expired - Fee Related US9560147B2 (en) | 2010-03-04 | 2015-05-27 | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions |
Country Status (8)
| Country | Link |
|---|---|
| US (2) | US20110216701A1 (en) |
| EP (1) | EP2543169A1 (en) |
| JP (2) | JP2013521721A (en) |
| KR (1) | KR101780843B1 (en) |
| CN (2) | CN102783116A (en) |
| IL (1) | IL221584A (en) |
| TW (2) | TWI565276B (en) |
| WO (1) | WO2011109722A1 (en) |
Cited By (54)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110289219A1 (en) * | 2010-05-19 | 2011-11-24 | Avaya Inc. | Sip anchor points to populate common communication logs |
| US20120137008A1 (en) * | 2010-08-13 | 2012-05-31 | Qualcomm Incorporated | Apparatus and methods for inter-user equipment transfers |
| US20120236842A1 (en) * | 2011-02-11 | 2012-09-20 | Interdigital Patent Holdings, Inc. | Method and apparatus for synchronizing mobile station media flows during a collaborative session |
| US8862181B1 (en) | 2012-05-29 | 2014-10-14 | Sprint Communications Company L.P. | Electronic purchase transaction trust infrastructure |
| US8863252B1 (en) | 2012-07-25 | 2014-10-14 | Sprint Communications Company L.P. | Trusted access to third party applications systems and methods |
| US8881977B1 (en) | 2013-03-13 | 2014-11-11 | Sprint Communications Company L.P. | Point-of-sale and automated teller machine transactions using trusted mobile access device |
| US8954588B1 (en) | 2012-08-25 | 2015-02-10 | Sprint Communications Company L.P. | Reservations in real-time brokering of digital content delivery |
| US8984592B1 (en) | 2013-03-15 | 2015-03-17 | Sprint Communications Company L.P. | Enablement of a trusted security zone authentication for remote mobile device management systems and methods |
| US8989705B1 (en) * | 2009-06-18 | 2015-03-24 | Sprint Communications Company L.P. | Secure placement of centralized media controller application in mobile access terminal |
| US9015068B1 (en) | 2012-08-25 | 2015-04-21 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
| US9021585B1 (en) | 2013-03-15 | 2015-04-28 | Sprint Communications Company L.P. | JTAG fuse vulnerability determination and protection using a trusted execution environment |
| US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
| US9049186B1 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone re-provisioning and re-use capability for refurbished mobile devices |
| US9049013B2 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone containers for the protection and confidentiality of trusted service manager data |
| US9066230B1 (en) | 2012-06-27 | 2015-06-23 | Sprint Communications Company L.P. | Trusted policy and charging enforcement function |
| US9069952B1 (en) | 2013-05-20 | 2015-06-30 | Sprint Communications Company L.P. | Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory |
| US9104840B1 (en) | 2013-03-05 | 2015-08-11 | Sprint Communications Company L.P. | Trusted security zone watermark |
| US9118655B1 (en) | 2014-01-24 | 2015-08-25 | Sprint Communications Company L.P. | Trusted display and transmission of digital ticket documentation |
| US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
| US9161227B1 (en) | 2013-02-07 | 2015-10-13 | Sprint Communications Company L.P. | Trusted signaling in long term evolution (LTE) 4G wireless communication |
| US9171243B1 (en) | 2013-04-04 | 2015-10-27 | Sprint Communications Company L.P. | System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device |
| US9185626B1 (en) | 2013-10-29 | 2015-11-10 | Sprint Communications Company L.P. | Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning |
| US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
| US9183606B1 (en) | 2013-07-10 | 2015-11-10 | Sprint Communications Company L.P. | Trusted processing location within a graphics processing unit |
| US9191388B1 (en) | 2013-03-15 | 2015-11-17 | Sprint Communications Company L.P. | Trusted security zone communication addressing on an electronic device |
| US9191522B1 (en) | 2013-11-08 | 2015-11-17 | Sprint Communications Company L.P. | Billing varied service based on tier |
| US9210576B1 (en) | 2012-07-02 | 2015-12-08 | Sprint Communications Company L.P. | Extended trusted security zone radio modem |
| US9208339B1 (en) | 2013-08-12 | 2015-12-08 | Sprint Communications Company L.P. | Verifying Applications in Virtual Environments Using a Trusted Security Zone |
| US9215180B1 (en) | 2012-08-25 | 2015-12-15 | Sprint Communications Company L.P. | File retrieval in real-time brokering of digital content |
| US20150365444A1 (en) * | 2010-10-04 | 2015-12-17 | Interdigital Patent Holdings, Inc | Inter-user equipment (ue) transfer (iut) for collaborative sessions that include media session information |
| US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
| US9230085B1 (en) | 2014-07-29 | 2016-01-05 | Sprint Communications Company L.P. | Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services |
| US9268959B2 (en) | 2012-07-24 | 2016-02-23 | Sprint Communications Company L.P. | Trusted security zone access to peripheral devices |
| US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
| US20160094397A1 (en) * | 2014-09-26 | 2016-03-31 | Verizon Patent And Licensing Inc. | Disbursement of registration information to application/service layer at time of registration with a network |
| US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
| US20160174191A1 (en) * | 2014-12-12 | 2016-06-16 | Apple Inc. | Mobile Terminated IMS Calls on Devices Which Support Wi-Fi and Cellular Radios |
| US9374363B1 (en) | 2013-03-15 | 2016-06-21 | Sprint Communications Company L.P. | Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device |
| US9443088B1 (en) | 2013-04-15 | 2016-09-13 | Sprint Communications Company L.P. | Protection for multimedia files pre-downloaded to a mobile device |
| US9454723B1 (en) | 2013-04-04 | 2016-09-27 | Sprint Communications Company L.P. | Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device |
| US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
| US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
| US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
| US9613208B1 (en) | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
| US20170111915A1 (en) * | 2015-10-16 | 2017-04-20 | Apple Inc. | Delivery of Messages in a Multi Device Configuration |
| US9674242B1 (en) * | 2012-06-28 | 2017-06-06 | Shoretel, Inc. | Mesh conferencing |
| US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
| US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
| US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
| US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
| US9838869B1 (en) | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
| US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
| US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
| US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI651979B (en) | 2016-07-07 | 2019-02-21 | 財團法人工業技術研究院 | Method of service differentiation at radio access network, radio network system and radio access network access node |
| US10079895B2 (en) * | 2016-07-08 | 2018-09-18 | American Megatrends, Inc. | Auto detecting remote session protocol for remote access |
| US20190149583A1 (en) * | 2017-11-13 | 2019-05-16 | Mediatek Singapore Pte. Ltd | Initial IMS Registration |
| CN111684829B (en) * | 2017-12-21 | 2023-08-11 | 诺基亚技术有限公司 | Method and apparatus for opportunistic and efficient spectrum sharing between prioritized access users and general access users |
| US20230309044A1 (en) * | 2020-08-06 | 2023-09-28 | Lenovo (Singapore) Pte. Ltd. | A factor for multiple device registrations |
| WO2022232564A1 (en) * | 2021-04-29 | 2022-11-03 | Interdigital Patent Holdings, Inc. | Methods and apparatus for terminal function distribution |
| US11799971B2 (en) | 2022-02-17 | 2023-10-24 | Bank Of America Corporation | Systems and methods for session migration between devices |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030145054A1 (en) * | 2001-07-09 | 2003-07-31 | Dyke John Jeffrey Van | Conferencing architecture employing media servers and enhanced session initiation protocol |
| US20090073938A1 (en) * | 2006-04-27 | 2009-03-19 | Huawei Technologies Co., Ltd. | Method, system and apparatus for optimizing call anchoring in voice call continuity |
| US20090191869A1 (en) * | 2008-01-24 | 2009-07-30 | At&T Labs | System and method of providing a user with a registration review in ims system |
| US20090190573A1 (en) * | 2008-01-24 | 2009-07-30 | At&T | System and method of providing ims services to users on terminating non ims devices |
| US20090313378A1 (en) * | 2008-08-06 | 2009-12-17 | Futurewei Technologies, Inc. | Remote Media IMS Sessions |
| US20090319691A1 (en) * | 2008-06-24 | 2009-12-24 | Research In Motion Limited | Method for indicating supported IP versions and reaching a device that supports compatible IP versions with SIP |
| US20100312841A1 (en) * | 2009-05-14 | 2010-12-09 | Serhad Doken | Controlling Media and Informing Controller Status in Collaborative Sessions |
| US20100312897A1 (en) * | 2009-05-04 | 2010-12-09 | Andrew Allen | System and method for implementing media and media transfer between devices |
Family Cites Families (73)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10242962A (en) | 1997-02-25 | 1998-09-11 | Nippon Telegr & Teleph Corp <Ntt> | Multicast gateway communication method and system on the Internet |
| JP2002176432A (en) | 2000-12-05 | 2002-06-21 | Sony Corp | Communication relay device, communication relay method, communication terminal device, and program storage medium |
| US7228414B2 (en) | 2001-11-02 | 2007-06-05 | General Instrument Corporation | Method and apparatus for transferring a communication session |
| US7496841B2 (en) | 2001-12-17 | 2009-02-24 | Workshare Technology, Ltd. | Method and system for document collaboration |
| US7035657B2 (en) | 2002-05-08 | 2006-04-25 | Qualcomm Inc. | Method and apparatus for supporting application-layer media multicasting |
| EP1540490B1 (en) | 2002-09-03 | 2007-03-14 | Interdigital Technology Corporation | A method and system for user initiated inter-device, inter-system, and inter-internet protocol address handoff |
| US7130282B2 (en) | 2002-09-20 | 2006-10-31 | Qualcomm Inc | Communication device for providing multimedia in a group communication network |
| GB0311006D0 (en) * | 2003-05-13 | 2003-06-18 | Nokia Corp | Registrations in a communication system |
| US8924464B2 (en) | 2003-09-19 | 2014-12-30 | Polycom, Inc. | Method and system for improving establishing of a multimedia session |
| CN1898660B (en) | 2003-12-01 | 2014-06-25 | 美商内数位科技公司 | User Initiated Handover Based on Session Initiation Protocol |
| US7667729B2 (en) | 2004-03-25 | 2010-02-23 | Nec Corporation | Multi-point conference system and multi-point conference device |
| CN1985489B (en) | 2004-07-09 | 2012-05-09 | 艾利森电话股份有限公司 | Method and arrangement for providing different services in multimedia communication system |
| WO2006027006A1 (en) | 2004-09-08 | 2006-03-16 | Telefonaktiebolaget L M Ericsson (Publ) | Sharing ongoing data session |
| CN1798222B (en) | 2004-12-22 | 2012-02-29 | 华为技术有限公司 | Method and device for controlling session |
| EP1848163A1 (en) | 2005-01-17 | 2007-10-24 | Sharp Kabushiki Kaisha | Communication network control system |
| US20060268781A1 (en) | 2005-05-02 | 2006-11-30 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for call handoff from packet data wireless network to circuit switched wireless network |
| US7499719B2 (en) | 2005-06-22 | 2009-03-03 | Mototola, Inc. | Method and apparatus for mixed mode multimedia conferencing |
| US7787443B2 (en) * | 2005-09-30 | 2010-08-31 | Alcatel-Lucent Usa Inc. | Method and apparatus for allowing peering relationships between telecommunications networks |
| JP4410748B2 (en) | 2005-10-03 | 2010-02-03 | パナソニック株式会社 | Communication terminal |
| US20070091848A1 (en) | 2005-10-03 | 2007-04-26 | Snehal Karia | Reducing data loss during handoffs in wireless communication |
| JP2007306317A (en) | 2006-05-11 | 2007-11-22 | Nec Corp | Media monitor system and media monitor method |
| US8166176B2 (en) | 2006-05-31 | 2012-04-24 | Alcatel Lucent | Context-aware migration of communication session |
| US8340673B2 (en) * | 2006-05-31 | 2012-12-25 | Alcatel Lucent | Call delivery to a dual mode wireless device |
| JP4967475B2 (en) | 2006-06-28 | 2012-07-04 | 富士通株式会社 | Group communication switching method |
| JP2008067083A (en) | 2006-09-07 | 2008-03-21 | Ntt Docomo Inc | Group call control system, group call control method, and mobile communication terminal |
| JP4890175B2 (en) * | 2006-09-20 | 2012-03-07 | 三菱電機株式会社 | Gateway apparatus and communication method |
| US20080084867A1 (en) | 2006-09-25 | 2008-04-10 | George Foti | Method and server for transferring a multimedia session from a first terminal to a second terminal |
| TW201536009A (en) | 2006-10-02 | 2015-09-16 | Interdigital Tech Corp | Horse channel quality indicator and precoding control information bit method and device |
| ATE518352T1 (en) | 2006-10-03 | 2011-08-15 | Research In Motion Ltd | METHOD AND DEVICES FOR CONTROLLING CALL CONTINUITY IN AN IMS NETWORK ENVIRONMENT USING SIP MESSAGES |
| US8289885B2 (en) * | 2006-10-27 | 2012-10-16 | Alcatel Lucent | Third party charging for SIP sessions |
| JP5011997B2 (en) | 2006-12-13 | 2012-08-29 | 日本電気株式会社 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD USED FOR THEM, AND PROGRAM THEREOF |
| CN101601204B (en) * | 2006-12-13 | 2014-01-22 | 日本电气株式会社 | Home network system and mobile anchor assignment method used in the home network system |
| RU2009130391A (en) | 2007-01-08 | 2011-02-20 | Интердиджитал Текнолоджи Корпорейшн (Us) | METHOD AND DEVICE FOR MULTI-BROADCASTING WITH FEEDBACK INFORMATION |
| CN101232389B (en) | 2007-01-22 | 2011-02-09 | 华为技术有限公司 | A method, device and system for providing multicast services |
| US7856226B2 (en) | 2007-04-17 | 2010-12-21 | Aylus Networks, Inc. | Systems and methods for IMS user sessions with dynamic service selection |
| US20080268847A1 (en) | 2007-04-25 | 2008-10-30 | Interdigital Technology Corporation | Method and apparatus for a server to obtain information about user preferences and subscriptions |
| FR2918075A1 (en) | 2007-06-29 | 2009-01-02 | Centre Nat Rech Scient | CONTROL OF THE FERTILITY OF A HUMAN SEX OF MALE SEX VIA SPATA16 |
| WO2009021549A1 (en) | 2007-08-10 | 2009-02-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Media switching in mobile communication systems |
| JP4931734B2 (en) | 2007-08-22 | 2012-05-16 | 富士通株式会社 | Communication control system, information processing apparatus, and communication control method |
| WO2009029583A1 (en) | 2007-08-24 | 2009-03-05 | Starent Networks, Corp | Providing virtual services with an enterprise access gateway |
| EP2061212B1 (en) | 2007-11-13 | 2018-06-20 | Cellular Communications Equipment Llc | Method, apparatus and program product for merging communication sessions in an IMS |
| CA2706733C (en) | 2007-12-07 | 2016-05-31 | Telefonaktiebolaget L M Ericsson (Publ) | Ip media streaming service delivery |
| CN101466155B (en) * | 2007-12-21 | 2011-05-04 | 华为软件技术有限公司 | Method and system for call connection between CS domain and IMS domain |
| JP4958174B2 (en) | 2007-12-28 | 2012-06-20 | 株式会社Kddi研究所 | Media switching method, session management server, terminal and program in group communication |
| US20090168985A1 (en) | 2007-12-31 | 2009-07-02 | Motorola, Inc. | Method and apparatus for an internet protocol multimedia subsystem-based three-way call |
| EP2083547A1 (en) | 2008-01-25 | 2009-07-29 | Hewlett-Packard Development Company, L.P. | Improvements in or relating to communications |
| JP5205990B2 (en) | 2008-01-30 | 2013-06-05 | 日本電気株式会社 | IMS network, IMS node device, and service providing method used therefor |
| DE602008000974D1 (en) | 2008-02-20 | 2010-05-20 | Research In Motion Ltd | Methods and systems for facilitating the transmission of sessions between user devices |
| WO2009122241A1 (en) * | 2008-04-02 | 2009-10-08 | Alcatel Lucent | A method and system for least cost routing when forking |
| US8111712B2 (en) | 2008-04-10 | 2012-02-07 | Nokia Siemens Networks Oy | Apparatus, method, system and program for communication |
| US8634381B2 (en) | 2008-04-22 | 2014-01-21 | Genband Us Llc | Session transfer between different access network types |
| US8948127B2 (en) * | 2008-04-24 | 2015-02-03 | Telefonaktiebolaget L M Ericsson (Publ) | Method, apparatus and computer program for supporting a session identifier in case of a transfer between different radio access networks |
| KR101457217B1 (en) | 2008-05-02 | 2014-10-31 | 삼성전자주식회사 | System and method for session transfer between multi-clients |
| US20100034168A1 (en) | 2008-08-08 | 2010-02-11 | Kaniz Mahdi | System and Method for Enabling SR-VCC with Shared IMPU |
| US8503391B2 (en) | 2008-09-18 | 2013-08-06 | Futurewei Technologies, Inc. | CS to IMS hand-back and hand-in for IMS systems for legacy CS UE with home node B access |
| US8358647B2 (en) | 2008-09-18 | 2013-01-22 | Futurewei Technologies, Inc. | System and method for provision of IMS based services for legacy CS UE with home node B access |
| CN101364874B (en) | 2008-09-27 | 2011-07-06 | 华为终端有限公司 | Medium transferring method, terminal and application server |
| CN101383765B (en) | 2008-09-28 | 2011-11-23 | 华为终端有限公司 | Method, apparatus and communication system for transferring media stream |
| WO2010034332A1 (en) | 2008-09-29 | 2010-04-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Correlation of sessions in case of session transfer in ims domain |
| US8943182B2 (en) * | 2008-10-01 | 2015-01-27 | Motorola Solutions, Inc. | Method and system for transferring a communication session |
| US7945622B1 (en) | 2008-10-01 | 2011-05-17 | Adobe Systems Incorporated | User-aware collaboration playback and recording |
| CN101577878B (en) * | 2008-11-05 | 2012-06-06 | 中兴通讯股份有限公司 | Method for processing voice service continuity switching failure |
| EP2387855B1 (en) | 2009-01-12 | 2023-12-20 | Cisco Technology, Inc. | Transferring sessions in a communications network |
| US9037734B2 (en) | 2009-04-17 | 2015-05-19 | Lg Electronics Inc. | Method for performing transfer of collaborative session control in wireless communication system based on internet protocol multimedia subsystem |
| JP2012526416A (en) | 2009-05-04 | 2012-10-25 | リサーチ イン モーション リミテッド | System and method for implementing media and / or media transfer between devices |
| KR101332709B1 (en) | 2009-05-04 | 2013-11-27 | 블랙베리 리미티드 | System and method for implementing media and media transfer between devices |
| US9641564B2 (en) | 2009-05-14 | 2017-05-02 | Qualcomm Incorporated | Maintaining controllee information in collaborative sessions |
| ES2809240T3 (en) | 2009-05-26 | 2021-03-03 | Alcatel Lucent | Procedure and devices for transferring sessions between access networks |
| WO2011009490A1 (en) | 2009-07-23 | 2011-01-27 | Telefonaktiebolaget L M Ericsson (Publ) | Method for transferring a communication session in a telecommunications network from a first connection to a second connection |
| CN101646256B (en) * | 2009-09-04 | 2012-06-27 | 华为技术有限公司 | Method, equipment and network system for switching voice in cross wireless access technology |
| WO2011056034A2 (en) | 2009-11-09 | 2011-05-12 | Lg Electronics Inc. | Method for controlling session and server using the same |
| MY158667A (en) * | 2009-11-10 | 2016-10-31 | Interdigital Patent Holdings Inc | Collaborative session control transfer and inter-device transfer in internet protocol multimedia subsystem |
| CN102440062A (en) | 2010-08-13 | 2012-05-02 | 华为技术有限公司 | Media flow control method and device in collaborative session |
-
2011
- 2011-03-04 JP JP2012556264A patent/JP2013521721A/en active Pending
- 2011-03-04 KR KR1020127025792A patent/KR101780843B1/en not_active Expired - Fee Related
- 2011-03-04 CN CN2011800121886A patent/CN102783116A/en active Pending
- 2011-03-04 CN CN201510431320.7A patent/CN105119904B/en not_active Expired - Fee Related
- 2011-03-04 EP EP11708173A patent/EP2543169A1/en not_active Withdrawn
- 2011-03-04 US US13/040,990 patent/US20110216701A1/en not_active Abandoned
- 2011-03-04 TW TW100107334A patent/TWI565276B/en not_active IP Right Cessation
- 2011-03-04 TW TW104133772A patent/TW201605213A/en unknown
- 2011-03-04 WO PCT/US2011/027215 patent/WO2011109722A1/en active Application Filing
-
2012
- 2012-08-22 IL IL221584A patent/IL221584A/en not_active IP Right Cessation
-
2015
- 2015-04-02 JP JP2015075579A patent/JP6105665B2/en not_active Expired - Fee Related
- 2015-05-27 US US14/723,238 patent/US9560147B2/en not_active Expired - Fee Related
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030145054A1 (en) * | 2001-07-09 | 2003-07-31 | Dyke John Jeffrey Van | Conferencing architecture employing media servers and enhanced session initiation protocol |
| US20090073938A1 (en) * | 2006-04-27 | 2009-03-19 | Huawei Technologies Co., Ltd. | Method, system and apparatus for optimizing call anchoring in voice call continuity |
| US20090191869A1 (en) * | 2008-01-24 | 2009-07-30 | At&T Labs | System and method of providing a user with a registration review in ims system |
| US20090190573A1 (en) * | 2008-01-24 | 2009-07-30 | At&T | System and method of providing ims services to users on terminating non ims devices |
| US20090319691A1 (en) * | 2008-06-24 | 2009-12-24 | Research In Motion Limited | Method for indicating supported IP versions and reaching a device that supports compatible IP versions with SIP |
| US20090313378A1 (en) * | 2008-08-06 | 2009-12-17 | Futurewei Technologies, Inc. | Remote Media IMS Sessions |
| US20100312897A1 (en) * | 2009-05-04 | 2010-12-09 | Andrew Allen | System and method for implementing media and media transfer between devices |
| US20100312841A1 (en) * | 2009-05-14 | 2010-12-09 | Serhad Doken | Controlling Media and Informing Controller Status in Collaborative Sessions |
Cited By (75)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8989705B1 (en) * | 2009-06-18 | 2015-03-24 | Sprint Communications Company L.P. | Secure placement of centralized media controller application in mobile access terminal |
| US20150120944A1 (en) * | 2010-05-19 | 2015-04-30 | Avaya Inc. | Sip anchor points to populate common communication logs |
| US9450989B2 (en) * | 2010-05-19 | 2016-09-20 | Avaya Inc. | SIP anchor points to populate common communication logs |
| US9521169B2 (en) * | 2010-05-19 | 2016-12-13 | Avaya Inc. | SIP anchor points to populate common communication logs |
| US20110289219A1 (en) * | 2010-05-19 | 2011-11-24 | Avaya Inc. | Sip anchor points to populate common communication logs |
| US20120137008A1 (en) * | 2010-08-13 | 2012-05-31 | Qualcomm Incorporated | Apparatus and methods for inter-user equipment transfers |
| US9094423B2 (en) * | 2010-08-13 | 2015-07-28 | Qualcomm Incorporated | Apparatus and methods for inter-user equipment transfers |
| US20150365444A1 (en) * | 2010-10-04 | 2015-12-17 | Interdigital Patent Holdings, Inc | Inter-user equipment (ue) transfer (iut) for collaborative sessions that include media session information |
| US20120236842A1 (en) * | 2011-02-11 | 2012-09-20 | Interdigital Patent Holdings, Inc. | Method and apparatus for synchronizing mobile station media flows during a collaborative session |
| US9544127B2 (en) | 2011-02-11 | 2017-01-10 | Interdigital Patent Holdings, Inc. | Method and apparatus for synchronizing mobile station media flows during a collaborative session |
| US9014170B2 (en) * | 2011-02-11 | 2015-04-21 | Interdigital Patent Holdings, Inc. | Method and apparatus for synchronizing mobile station media flows during a collaborative session |
| US10003933B2 (en) | 2011-02-11 | 2018-06-19 | Interdigital Patent Holdings, Inc. | Method and apparatus for synchronizing mobile station media flows during a collaborative session |
| US9906958B2 (en) | 2012-05-11 | 2018-02-27 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
| US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
| US8862181B1 (en) | 2012-05-29 | 2014-10-14 | Sprint Communications Company L.P. | Electronic purchase transaction trust infrastructure |
| US10154019B2 (en) | 2012-06-25 | 2018-12-11 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
| US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
| US9066230B1 (en) | 2012-06-27 | 2015-06-23 | Sprint Communications Company L.P. | Trusted policy and charging enforcement function |
| US20170272479A1 (en) * | 2012-06-28 | 2017-09-21 | Shoretel, Inc. | Mesh conferencing |
| US9674242B1 (en) * | 2012-06-28 | 2017-06-06 | Shoretel, Inc. | Mesh conferencing |
| US10506000B2 (en) | 2012-06-28 | 2019-12-10 | Mitel Networks, Inc. | Mesh conferencing |
| US9210576B1 (en) | 2012-07-02 | 2015-12-08 | Sprint Communications Company L.P. | Extended trusted security zone radio modem |
| US9268959B2 (en) | 2012-07-24 | 2016-02-23 | Sprint Communications Company L.P. | Trusted security zone access to peripheral devices |
| US8863252B1 (en) | 2012-07-25 | 2014-10-14 | Sprint Communications Company L.P. | Trusted access to third party applications systems and methods |
| US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
| US9811672B2 (en) | 2012-08-10 | 2017-11-07 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
| US9384498B1 (en) | 2012-08-25 | 2016-07-05 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
| US8954588B1 (en) | 2012-08-25 | 2015-02-10 | Sprint Communications Company L.P. | Reservations in real-time brokering of digital content delivery |
| US9015068B1 (en) | 2012-08-25 | 2015-04-21 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
| US9215180B1 (en) | 2012-08-25 | 2015-12-15 | Sprint Communications Company L.P. | File retrieval in real-time brokering of digital content |
| US9769854B1 (en) | 2013-02-07 | 2017-09-19 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
| US9161227B1 (en) | 2013-02-07 | 2015-10-13 | Sprint Communications Company L.P. | Trusted signaling in long term evolution (LTE) 4G wireless communication |
| US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
| US9104840B1 (en) | 2013-03-05 | 2015-08-11 | Sprint Communications Company L.P. | Trusted security zone watermark |
| US8881977B1 (en) | 2013-03-13 | 2014-11-11 | Sprint Communications Company L.P. | Point-of-sale and automated teller machine transactions using trusted mobile access device |
| US9613208B1 (en) | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
| US9049186B1 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone re-provisioning and re-use capability for refurbished mobile devices |
| US9049013B2 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone containers for the protection and confidentiality of trusted service manager data |
| US8984592B1 (en) | 2013-03-15 | 2015-03-17 | Sprint Communications Company L.P. | Enablement of a trusted security zone authentication for remote mobile device management systems and methods |
| US9021585B1 (en) | 2013-03-15 | 2015-04-28 | Sprint Communications Company L.P. | JTAG fuse vulnerability determination and protection using a trusted execution environment |
| US9191388B1 (en) | 2013-03-15 | 2015-11-17 | Sprint Communications Company L.P. | Trusted security zone communication addressing on an electronic device |
| US9374363B1 (en) | 2013-03-15 | 2016-06-21 | Sprint Communications Company L.P. | Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device |
| US9712999B1 (en) | 2013-04-04 | 2017-07-18 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
| US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
| US9454723B1 (en) | 2013-04-04 | 2016-09-27 | Sprint Communications Company L.P. | Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device |
| US9171243B1 (en) | 2013-04-04 | 2015-10-27 | Sprint Communications Company L.P. | System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device |
| US9838869B1 (en) | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
| US9443088B1 (en) | 2013-04-15 | 2016-09-13 | Sprint Communications Company L.P. | Protection for multimedia files pre-downloaded to a mobile device |
| US9069952B1 (en) | 2013-05-20 | 2015-06-30 | Sprint Communications Company L.P. | Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory |
| US9949304B1 (en) | 2013-06-06 | 2018-04-17 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
| US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
| US9183606B1 (en) | 2013-07-10 | 2015-11-10 | Sprint Communications Company L.P. | Trusted processing location within a graphics processing unit |
| US9208339B1 (en) | 2013-08-12 | 2015-12-08 | Sprint Communications Company L.P. | Verifying Applications in Virtual Environments Using a Trusted Security Zone |
| US9185626B1 (en) | 2013-10-29 | 2015-11-10 | Sprint Communications Company L.P. | Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning |
| US9191522B1 (en) | 2013-11-08 | 2015-11-17 | Sprint Communications Company L.P. | Billing varied service based on tier |
| US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
| US9118655B1 (en) | 2014-01-24 | 2015-08-25 | Sprint Communications Company L.P. | Trusted display and transmission of digital ticket documentation |
| US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
| US9230085B1 (en) | 2014-07-29 | 2016-01-05 | Sprint Communications Company L.P. | Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services |
| US20160094397A1 (en) * | 2014-09-26 | 2016-03-31 | Verizon Patent And Licensing Inc. | Disbursement of registration information to application/service layer at time of registration with a network |
| US10194000B2 (en) * | 2014-09-26 | 2019-01-29 | Verizon Patent And Licensing Inc. | Disbursement of registration information to application/service layer at time of registration with a network |
| US20160174191A1 (en) * | 2014-12-12 | 2016-06-16 | Apple Inc. | Mobile Terminated IMS Calls on Devices Which Support Wi-Fi and Cellular Radios |
| US10602483B2 (en) * | 2014-12-12 | 2020-03-24 | Apple Inc. | Mobile terminated IMS calls on devices which support Wi-Fi and cellular radios |
| US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
| US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
| US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
| US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
| US10187760B2 (en) * | 2015-10-16 | 2019-01-22 | Apple Inc. | Delivery of messages in a multi device configuration |
| US20170111915A1 (en) * | 2015-10-16 | 2017-04-20 | Apple Inc. | Delivery of Messages in a Multi Device Configuration |
| US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
| US10311246B1 (en) | 2015-11-20 | 2019-06-04 | Sprint Communications Company L.P. | System and method for secure USIM wireless network access |
| US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
| US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
| US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
| US12061677B2 (en) | 2018-11-15 | 2024-08-13 | The Research Foundation For The State University Of New York | Secure processor for detecting and preventing exploits of software vulnerability |
Also Published As
| Publication number | Publication date |
|---|---|
| US20150256629A1 (en) | 2015-09-10 |
| CN105119904A (en) | 2015-12-02 |
| WO2011109722A1 (en) | 2011-09-09 |
| TW201145941A (en) | 2011-12-16 |
| CN102783116A (en) | 2012-11-14 |
| TW201605213A (en) | 2016-02-01 |
| JP6105665B2 (en) | 2017-03-29 |
| EP2543169A1 (en) | 2013-01-09 |
| KR20130018745A (en) | 2013-02-25 |
| CN105119904B (en) | 2018-10-26 |
| US9560147B2 (en) | 2017-01-31 |
| JP2015159567A (en) | 2015-09-03 |
| TWI565276B (en) | 2017-01-01 |
| JP2013521721A (en) | 2013-06-10 |
| IL221584A (en) | 2016-06-30 |
| KR101780843B1 (en) | 2017-09-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9560147B2 (en) | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions | |
| US9832236B2 (en) | Collaborative session control transfer and inter-device transfer in internet protocol multimedia subsystem | |
| US9674833B2 (en) | Authorizing IUT replication and distinguishing requests for replication from transfers | |
| US20110182235A1 (en) | Method and apparatus for inter user-equipment transfer (iut), access transfer and fallback initiated by a service centralization and continuity application server (scc as) | |
| US20110116495A1 (en) | Method and apparatus for inter-device session transfer between internet protocol (ip) multimedia subsystem (ims) and h.323 based clients | |
| US20110173292A1 (en) | Push based inter-operator inter-device transfer | |
| US20170353507A1 (en) | Privacy for inter-user equipment transfer (iut) subscribers and for remote parties involved in sessions with iut subscribers | |
| US20110145419A1 (en) | Inter-device mobility session release | |
| US20110188449A1 (en) | Inter-device session duplication | |
| US20110205937A1 (en) | Pull based inter-operator inter-device transfer |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: INTERDIGITAL PATENT HOLDINGS, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PATEL, MILAN;SHAHEEN, KAMEL M.;SIGNING DATES FROM 20110812 TO 20110829;REEL/FRAME:026919/0428 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |