5.1.1.1A Parameters contained in the ISIM...............................................................................................................54
5.1.1.1B Parameters provisioned to a UE without ISIM or USIM............................................................................55
5.1.1.1B.1 Parameters provisioned in the IMC..........................................................................................................55
5.1.1.1B.2 Parameters when UE does not contain ISIM, USIM or IMC...................................................................55
5.1.1.2 Initial registration...........................................................................................................................................55
5.1.1.2.1 General 55
5.1.1.2.2 Initial registration using IMS AKA.............................................................................................................57
5.1.1.2.3 Initial registration using SIP digest without TLS........................................................................................58
5.1.1.2.4 Initial registration using SIP digest with TLS.............................................................................................59
5.1.1.2.5 Initial registration using NASS-IMS bundled authentication.....................................................................59
5.1.1.2.6 Initial registration using GPRS-IMS-Bundled authentication....................................................................60
5.1.1.3 Subscription to the registration-state event package......................................................................................60
5.1.1.3A Subscription to the debug event package....................................................................................................61
5.1.1.4 User-initiated reregistration and registration of an additional public user identity........................................62
5.1.1.4.1 General 62
5.1.1.4.2 IMS AKA as a security mechanism............................................................................................................64
5.1.1.4.3 SIP digest without TLS as a security mechanism.......................................................................................64
5.1.1.4.4 SIP digest with TLS as a security mechanism............................................................................................65
5.1.1.4.5 NASS-IMS bundled authentication as a security mechanism.....................................................................65
5.1.1.4.6 GPRS-IMS-Bundled authentication as a security mechanism....................................................................65
5.1.1.5 Authentication................................................................................................................................................66
5.1.1.5.1 IMS AKA - general.....................................................................................................................................66
5.1.1.5.2 Void 67
5.1.1.5.3 IMS AKA abnormal cases..........................................................................................................................67
5.1.1.5.4 SIP digest without TLS – general...............................................................................................................68
5.1.1.5.5 SIP digest without TLS – abnormal procedures.........................................................................................68
5.1.1.5.6 SIP digest with TLS – general....................................................................................................................68
5.1.1.5.7 SIP digest with TLS – abnormal procedures...............................................................................................69
5.1.1.5.8 NASS-IMS bundled authentication – general.............................................................................................69
5.1.1.5.9 NASS-IMS bundled authentication – abnormal procedures.......................................................................69
5.1.1.5.10 GPRS-IMS-Bundled authentication – general..........................................................................................69
5.1.1.5.11 GPRS-IMS-Bundled authentication – abnormal procedures....................................................................69
5.1.1.5.12 Abnormal procedures for all security mechanisms...................................................................................69
5.1.1.5A Network-initiated re-authentication............................................................................................................69
5.1.1.5B Change of IPv6 address due to privacy.......................................................................................................70
5.1.1.6 User-initiated deregistration...........................................................................................................................70
5.1.1.6.1 General 70
5.1.1.6.2 IMS AKA as a security mechanism............................................................................................................71
5.1.1.6.3 SIP digest without TLS as a security mechanism.......................................................................................72
5.1.1.6.4 SIP digest with TLS as a security mechanism............................................................................................72
5.1.1.6.5 NASS-IMS bundled authentication as a security mechanism.....................................................................73
5.1.1.6.6 GPRS-IMS-Bundled authentication as a security mechanism....................................................................73
5.1.1.7 Network-initiated deregistration....................................................................................................................73
5.1.2 Subscription and notification............................................................................................................................74
5.1.2.1 Notification about multiple registered public user identities.........................................................................74
5.1.2.2 General SUBSCRIBE requirements..............................................................................................................75
5.1.2A Generic procedures applicable to all methods excluding the REGISTER method........................................75
5.1.2A.1 UE-originating case.....................................................................................................................................75
5.1.2A.1.1 General 75
5.1.2A.1.2 Structure of Request-URI.........................................................................................................................79
5.1.2A.1.3 UE without dial string processing capabilities.........................................................................................79
5.1.2A.1.4 UE with dial string processing capabilities..............................................................................................80
5.1.2A.1.5 Setting the "phone-context" tel URI parameter........................................................................................80
5.1.2A.1.6 Abnormal cases........................................................................................................................................81
5.1.2A.2 UE-terminating case....................................................................................................................................81
5.1.3 Call initiation - UE-originating case.................................................................................................................83
5.1.3.1 Initial INVITE request...................................................................................................................................83
5.1.4 Call initiation - UE-terminating case................................................................................................................85
5.1.4.1 Initial INVITE request...................................................................................................................................85
5.1.5 Call release........................................................................................................................................................86
5.1.6 Emergency service............................................................................................................................................86
3GPP
评论0