SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
1
Before the UE can request IM services, an appropriate IP-CAN bearer must be available
to carry IM Subsystem related signalling.
the P-CSCF discovery may be performed during or after the IP connectivity has been
established.
In the case where UE is aware of more than one P-CSCF address, the selection shall be
based on home operator configured policy to select the P-CSCF.
The DHCP relay agent may exist within the IP-Connectivity Access Network relays DHCP
messages between UE and the DHCP server. This is not illustrated in the above diagram.
2
Procedures:
1. After the UE has obtained IP connectivity, it can perform the IM registration. To do so, the
UE sends the Register information flow to the proxy;
2. Upon receipt of the register information flow, the P-CSCF shall examine the "home domain
name" to discover the entry point to the home network (i.e. the I-CSCF). The proxy shall
send the Register information flow to the I-CSCF;
3. The I-CSCF shall send the Cx-Query/Cx-Select-Pull information flow to the HSS;
4. Cx-Query Resp/Cx-Select-Pull Resp is sent from the HSS to the I-CSCF. It shall contain the
S-CSCF name, if it is known by the HSS, or the S-CSCF capabilities, if it is necessary to select a
new S-CSCF. When capabilities are returned, the I-CSCF shall construct a name from the
capabilities returned;
5. I-CSCF shall then send the register information flow to the selected S-CSCF;
6. The S-CSCF shall send Cx-Put/Cx-Pull to the HSS;
7. The HSS shall store the S-CSCF name for that user and return the information flow Cx-Put
Resp/Cx-Pull Resp (user information) to the S-CSCF;
8. Based on the filter criteria, the S-CSCF shall send register information to the service control
platform and perform whatever service control procedures are appropriate.
9. The AS shall return the 200 OK information flow to the S-CSCF if the 3rd Party registration is
successful;
10. The S-CSCF shall return the 200 OK information flow to the I-CSCF;
11. The I-CSCF shall send information flow 200 OK to the P-CSCF. Note: The I-CSCF shall release
all registration information after sending information flow 200 OK;
12. The P-CSCF shall store the home network contact information, and shall send information
flow 200 OK to the UE.
Note:
• 1, 2, 5 and 8 are SIP Register message;
• 3, 4, 6, and 7 are Diameter query and response message;
• 9, 10, 11 and 12 are SIP 200 OK message;
These flows do not take into account security features such as user authentication. The
description of the impact of IMS security features is done in TS 33.203.
3
The UE initiates a re-registration. For periodic registration, the UE initiates a re-
registration prior to expiry of the agreed registration timer.
When the UE wants to de-register from the IMS then the UE shall perform application
level de-registration. De-registration is accomplished by a registration with an expiration
time of zero s econds. De-registration follows the same path as defined.
4
5
If an ungraceful session termination occurs (e.g. flat battery or mobile leaves coverage), when a stateful
proxy server (such as the S-CSCF) is involved in a session, memory leaks and eventually server failure can
occur due to hanging state machines. To ensure stable S-CSCF operation and carrier grade service, a
mechanism to handle the ungraceful session termination issue is required. This mechanism should be at
the SIP protocol level in order to guarantee access independence for the IM CN subsystem.
Procedures
1. The registration timers in the P-CSCF and in the S-CSCF expire. The timers are assumed to be close
enough that no external synchronisation is required. The P-CSCF updates its internal databases to
remove the Public User Identity from being registered.
2. Based on the filter criteria, the S-CSCF shall send de-registration information to the service control
platform and perform whatever service control procedures are appropriate. Service control platform
removes all subscription information related to this specific Public User Identity.
3. S-CSCF can send Cx-Put to HSS and the HSS then can clear S-CSCF name for that IMPU according to
Cx-Put the request.
4. The HSS shall send Cx-Put Resp to the S-CSCF to acknowledge the sending of Cx-Put.
The IM CN subsystem can initiate a Network Initiated De-Registration procedures for the following
reasons:
1. Network Maintenance
• Forced re-registrations from users, e.g. in case of data inconsistency at node failure etc;
2. Network/traffic determined
• The IM CN subsystem must support a mechanism to avoid duplicate registrations or
inconsistent information storage. This case will occur when a user roams to a different
network without de-registering the previous one.
3. Application Layer determined
• The service capability offered by the IM CN Subsystem to the Application Layers may have
parameters specifying whether all IM CN subsystem registrations are to be removed, or only
those from one or a group of terminals from the user, etc.
4. Subscription Management
• The operator must be able to restrict user access to the IM CN subsystem upon detection of
contract expiration, removal of IM subscription, fraud detection, etc.
6
Procedure:
1. HSS initiates the de-registration, sending a Cx-Deregister (user identity) which may
include the reason for the de-registration;
2. Based on the filter criteria, the S-CSCF shall send de-registration information to the
service control platform and perform whatever service control procedures are
appropriate;
3. The S-CSCF issues a de-registration towards the P-CSCF for this user and updates its
internal database to remove the user from being registered. The reason for the de-
registration received from the HSS shall be included if available.
4. The P-CSCF informs the UE of the de-registration and without modification forwards
the reason for the de-registration, if available. Due to loss of contact with the
mobile, it might be possible that the UE does not receive the information of the de-
registration;
5. The P-CSCF sends a response to the S-CSCF and updates its internal database to
remove the user from being registered. If the P-CSCF has an active subscription to
notifications of the status of the IMS Signalling connectivity, the P-CSCF shall cancel
the subscription (see TS 23.203 [54] for more details);
6. When possible, the UE sends a response to the P-CSCF to acknowledge the de-
registration. A misbehaving UE or a UE that is out of P-CSCF coverage could not
answer properly to the de-registration request. The P-CSCF should perform the de-
registration in any case, e.g., after the timer for this request expires;
7. The S-CSCF returns a response to the entity that initiated the process.
If the UE does not perform automatic re-registration due to the de-registration the user
shall be informed about the de-registration and of the reason, if available
7
The scheme for authentication and key agreement in the IMS is called IMS AKA
The generation of the authentication vector AV that includes RAND, XRES, CK, IK and AUTN shall
be done in the same way as specified in TS 33.102
1st Registration Procedure:
6. Upon receiving the SIP REGISTER the S-CSCF CSCF shall use an Authentication Vector (AV) for
authenticating and agreeing a key with the user. If the S-CSCF has no valid AV then the
S-CSCF shall send a request for AV(s) to the HSS during the first registration process;
7. Upon receipt of a request from the S-CSCF, the HSS sends an ordered array of n
authentication vectors to the S-CSCF. The authentication vectors are ordered based on
sequence number. Each authentication vector consists of the following components: a
random number RAND, an expected response XRES, a cipher key CK, an integrity key IK and
an authentication token AUTN;
8. The S-CSCF sends a SIP 401 Unauthorized i.e. an authentication challenge towards the UE
including the challenge RAND, the authentication token AUTN. It also includes the integrity
key IK and the cipher key CK for the P-CSCF. The S-CSCF also stores the RAND sent to the UE
for use in case of a synchronization failure;
9. When the P-CSCF receives SM5 it shall store the key(s) and remove that information and
forward the rest of the message to the UE (IMPI, RAND, AUTN);
2nd Registration Procedure:
1. Upon receiving the challenge, the UE takes the AUTN, which includes a MAC and the SQN.
The UE calculates the XMAC and checks that XMAC=MAC and that the SQN is in the correct
range as in TS 33.102 [1]. If both these checks are successful the UE uses RES and some
other parameters to calculate an authentication response. This response is put into the
Authorization header and sent back to the registrar in second Registration. It should be
noted that the UE at this stage also computes the session keys CK and IK;
5. Upon receiving containing the response, the S-CSCF retrieves the active XRES for that user
and uses this to check the authentication response sent by the UE as described in RFC 3310.
If the check is successful then the user has been authenticated and the IMPU is registered in
the S-CSCF.
8
9

Weitere ähnliche Inhalte

Was ist angesagt?

IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMS
Inam Khosa
 

Was ist angesagt? (20)

VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
Ims conference-call
Ims conference-callIms conference-call
Ims conference-call
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia System
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
IMS Standards
IMS  StandardsIMS  Standards
IMS Standards
 
190937694 csfb-call-flows
190937694 csfb-call-flows190937694 csfb-call-flows
190937694 csfb-call-flows
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)IMS Signaling (Rev. 3)
IMS Signaling (Rev. 3)
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMS
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 

Ähnlich wie IMS Registration Flow

VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
Amit Deshmukh
 
C22 20090615-030 via csfb support
C22 20090615-030 via csfb supportC22 20090615-030 via csfb support
C22 20090615-030 via csfb support
karthick2007
 
SAIL INDIA Study Report
SAIL INDIA Study ReportSAIL INDIA Study Report
SAIL INDIA Study Report
SAKIB HUSSAIN
 
Test Guide Final SMS 2022_06 Test Guide Final SMS 2022
Test Guide Final SMS 2022_06 Test Guide Final SMS 2022Test Guide Final SMS 2022_06 Test Guide Final SMS 2022
Test Guide Final SMS 2022_06 Test Guide Final SMS 2022
kumaraperumal
 
NAAD_Final Project
NAAD_Final ProjectNAAD_Final Project
NAAD_Final Project
Udhav Pawar
 

Ähnlich wie IMS Registration Flow (20)

IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2 IMS Authentication with AKAv1 and AKAv2
IMS Authentication with AKAv1 and AKAv2
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
access control physical.doc
access control physical.docaccess control physical.doc
access control physical.doc
 
VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
Ims in ngn
Ims in ngnIms in ngn
Ims in ngn
 
IMS/RCS Technology
IMS/RCS TechnologyIMS/RCS Technology
IMS/RCS Technology
 
Pcc efort eng
Pcc efort engPcc efort eng
Pcc efort eng
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
Ericsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdfEricsson-IMS-call-flows-volte123_pdf.pdf
Ericsson-IMS-call-flows-volte123_pdf.pdf
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
C22 20090615-030 via csfb support
C22 20090615-030 via csfb supportC22 20090615-030 via csfb support
C22 20090615-030 via csfb support
 
SAIL INDIA Study Report
SAIL INDIA Study ReportSAIL INDIA Study Report
SAIL INDIA Study Report
 
Regulējošie tehniskie standarti stingrai autentifikācijai un drošai komunikāc...
Regulējošie tehniskie standarti stingrai autentifikācijai un drošai komunikāc...Regulējošie tehniskie standarti stingrai autentifikācijai un drošai komunikāc...
Regulējošie tehniskie standarti stingrai autentifikācijai un drošai komunikāc...
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
 
Unit 5 : wireless communication : GSM System operations
Unit 5 : wireless communication : GSM System operationsUnit 5 : wireless communication : GSM System operations
Unit 5 : wireless communication : GSM System operations
 
Fast Roaming 802.11r.docx
Fast Roaming 802.11r.docxFast Roaming 802.11r.docx
Fast Roaming 802.11r.docx
 
Test Guide Final SMS 2022_06 Test Guide Final SMS 2022
Test Guide Final SMS 2022_06 Test Guide Final SMS 2022Test Guide Final SMS 2022_06 Test Guide Final SMS 2022
Test Guide Final SMS 2022_06 Test Guide Final SMS 2022
 
NAAD_Final Project
NAAD_Final ProjectNAAD_Final Project
NAAD_Final Project
 
Cap interface
Cap interfaceCap interface
Cap interface
 
Psoc
PsocPsoc
Psoc
 

Mehr von Houman Sadeghi Kaji

Mehr von Houman Sadeghi Kaji (8)

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud Management
 
Ims naming identity
Ims naming identityIms naming identity
Ims naming identity
 
What is ims
What is imsWhat is ims
What is ims
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming Identity
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

IMS Registration Flow

  • 1. 1
  • 2. Before the UE can request IM services, an appropriate IP-CAN bearer must be available to carry IM Subsystem related signalling. the P-CSCF discovery may be performed during or after the IP connectivity has been established. In the case where UE is aware of more than one P-CSCF address, the selection shall be based on home operator configured policy to select the P-CSCF. The DHCP relay agent may exist within the IP-Connectivity Access Network relays DHCP messages between UE and the DHCP server. This is not illustrated in the above diagram. 2
  • 3. Procedures: 1. After the UE has obtained IP connectivity, it can perform the IM registration. To do so, the UE sends the Register information flow to the proxy; 2. Upon receipt of the register information flow, the P-CSCF shall examine the "home domain name" to discover the entry point to the home network (i.e. the I-CSCF). The proxy shall send the Register information flow to the I-CSCF; 3. The I-CSCF shall send the Cx-Query/Cx-Select-Pull information flow to the HSS; 4. Cx-Query Resp/Cx-Select-Pull Resp is sent from the HSS to the I-CSCF. It shall contain the S-CSCF name, if it is known by the HSS, or the S-CSCF capabilities, if it is necessary to select a new S-CSCF. When capabilities are returned, the I-CSCF shall construct a name from the capabilities returned; 5. I-CSCF shall then send the register information flow to the selected S-CSCF; 6. The S-CSCF shall send Cx-Put/Cx-Pull to the HSS; 7. The HSS shall store the S-CSCF name for that user and return the information flow Cx-Put Resp/Cx-Pull Resp (user information) to the S-CSCF; 8. Based on the filter criteria, the S-CSCF shall send register information to the service control platform and perform whatever service control procedures are appropriate. 9. The AS shall return the 200 OK information flow to the S-CSCF if the 3rd Party registration is successful; 10. The S-CSCF shall return the 200 OK information flow to the I-CSCF; 11. The I-CSCF shall send information flow 200 OK to the P-CSCF. Note: The I-CSCF shall release all registration information after sending information flow 200 OK; 12. The P-CSCF shall store the home network contact information, and shall send information flow 200 OK to the UE. Note: • 1, 2, 5 and 8 are SIP Register message; • 3, 4, 6, and 7 are Diameter query and response message; • 9, 10, 11 and 12 are SIP 200 OK message; These flows do not take into account security features such as user authentication. The description of the impact of IMS security features is done in TS 33.203. 3
  • 4. The UE initiates a re-registration. For periodic registration, the UE initiates a re- registration prior to expiry of the agreed registration timer. When the UE wants to de-register from the IMS then the UE shall perform application level de-registration. De-registration is accomplished by a registration with an expiration time of zero s econds. De-registration follows the same path as defined. 4
  • 5. 5
  • 6. If an ungraceful session termination occurs (e.g. flat battery or mobile leaves coverage), when a stateful proxy server (such as the S-CSCF) is involved in a session, memory leaks and eventually server failure can occur due to hanging state machines. To ensure stable S-CSCF operation and carrier grade service, a mechanism to handle the ungraceful session termination issue is required. This mechanism should be at the SIP protocol level in order to guarantee access independence for the IM CN subsystem. Procedures 1. The registration timers in the P-CSCF and in the S-CSCF expire. The timers are assumed to be close enough that no external synchronisation is required. The P-CSCF updates its internal databases to remove the Public User Identity from being registered. 2. Based on the filter criteria, the S-CSCF shall send de-registration information to the service control platform and perform whatever service control procedures are appropriate. Service control platform removes all subscription information related to this specific Public User Identity. 3. S-CSCF can send Cx-Put to HSS and the HSS then can clear S-CSCF name for that IMPU according to Cx-Put the request. 4. The HSS shall send Cx-Put Resp to the S-CSCF to acknowledge the sending of Cx-Put. The IM CN subsystem can initiate a Network Initiated De-Registration procedures for the following reasons: 1. Network Maintenance • Forced re-registrations from users, e.g. in case of data inconsistency at node failure etc; 2. Network/traffic determined • The IM CN subsystem must support a mechanism to avoid duplicate registrations or inconsistent information storage. This case will occur when a user roams to a different network without de-registering the previous one. 3. Application Layer determined • The service capability offered by the IM CN Subsystem to the Application Layers may have parameters specifying whether all IM CN subsystem registrations are to be removed, or only those from one or a group of terminals from the user, etc. 4. Subscription Management • The operator must be able to restrict user access to the IM CN subsystem upon detection of contract expiration, removal of IM subscription, fraud detection, etc. 6
  • 7. Procedure: 1. HSS initiates the de-registration, sending a Cx-Deregister (user identity) which may include the reason for the de-registration; 2. Based on the filter criteria, the S-CSCF shall send de-registration information to the service control platform and perform whatever service control procedures are appropriate; 3. The S-CSCF issues a de-registration towards the P-CSCF for this user and updates its internal database to remove the user from being registered. The reason for the de- registration received from the HSS shall be included if available. 4. The P-CSCF informs the UE of the de-registration and without modification forwards the reason for the de-registration, if available. Due to loss of contact with the mobile, it might be possible that the UE does not receive the information of the de- registration; 5. The P-CSCF sends a response to the S-CSCF and updates its internal database to remove the user from being registered. If the P-CSCF has an active subscription to notifications of the status of the IMS Signalling connectivity, the P-CSCF shall cancel the subscription (see TS 23.203 [54] for more details); 6. When possible, the UE sends a response to the P-CSCF to acknowledge the de- registration. A misbehaving UE or a UE that is out of P-CSCF coverage could not answer properly to the de-registration request. The P-CSCF should perform the de- registration in any case, e.g., after the timer for this request expires; 7. The S-CSCF returns a response to the entity that initiated the process. If the UE does not perform automatic re-registration due to the de-registration the user shall be informed about the de-registration and of the reason, if available 7
  • 8. The scheme for authentication and key agreement in the IMS is called IMS AKA The generation of the authentication vector AV that includes RAND, XRES, CK, IK and AUTN shall be done in the same way as specified in TS 33.102 1st Registration Procedure: 6. Upon receiving the SIP REGISTER the S-CSCF CSCF shall use an Authentication Vector (AV) for authenticating and agreeing a key with the user. If the S-CSCF has no valid AV then the S-CSCF shall send a request for AV(s) to the HSS during the first registration process; 7. Upon receipt of a request from the S-CSCF, the HSS sends an ordered array of n authentication vectors to the S-CSCF. The authentication vectors are ordered based on sequence number. Each authentication vector consists of the following components: a random number RAND, an expected response XRES, a cipher key CK, an integrity key IK and an authentication token AUTN; 8. The S-CSCF sends a SIP 401 Unauthorized i.e. an authentication challenge towards the UE including the challenge RAND, the authentication token AUTN. It also includes the integrity key IK and the cipher key CK for the P-CSCF. The S-CSCF also stores the RAND sent to the UE for use in case of a synchronization failure; 9. When the P-CSCF receives SM5 it shall store the key(s) and remove that information and forward the rest of the message to the UE (IMPI, RAND, AUTN); 2nd Registration Procedure: 1. Upon receiving the challenge, the UE takes the AUTN, which includes a MAC and the SQN. The UE calculates the XMAC and checks that XMAC=MAC and that the SQN is in the correct range as in TS 33.102 [1]. If both these checks are successful the UE uses RES and some other parameters to calculate an authentication response. This response is put into the Authorization header and sent back to the registrar in second Registration. It should be noted that the UE at this stage also computes the session keys CK and IK; 5. Upon receiving containing the response, the S-CSCF retrieves the active XRES for that user and uses this to check the authentication response sent by the UE as described in RFC 3310. If the check is successful then the user has been authenticated and the IMPU is registered in the S-CSCF. 8
  • 9. 9