tech-invite   World Map
3GPP     Specs     Glossaries     UICC       T+       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5     6     7     8     9     10
   11     12     13     14     15     16     17

 

 

5.3   Procedures at the I-CSCF
5.4   Procedures at the S-CSCF   PDF-p. 220
5.4.0   General [R8]
5.4.1   Registration and authentication
5.4.1.1   Introduction
5.4.1.2   Initial registration and user-initiated reregistration   PDF-p. 223      Up
5.4.1.2.1   Unprotected REGISTER
5.4.1.2.1A   Challenge with IMS AKA as security mechanism [R8]   PDF-p. 224
5.4.1.2.1B   Challenge with SIP digest as security mechanism [R8]   PDF-p. 225
5.4.1.2.1C   Challenge with SIP digest with TLS as security mechanism [R8]
5.4.1.2.1D   Initial registration and user-initiated reregistration for NASS-IMS bundled authentication [R8]
5.4.1.2.1E   Initial registration and user-initiated reregistration for GPRS-IMS-Bundled authentication [R8]   PDF-p. 226
5.4.1.2.2   Protected REGISTER with IMS AKA as a security mechanism   PDF-p. 228
5.4.1.2.2A   Protected REGISTER with SIP digest as a security mechanism [R8]   PDF-p. 231
5.4.1.2.2B   Protected REGISTER with SIP digest with TLS as a security mechanism [R8]   PDF-p. 235
5.4.1.2.2C   NASS-IMS bundled authentication as a security mechanism [R8]      Up
5.4.1.2.2D   GPRS-IMS-Bundled authentication as a security mechanism [R8]
5.4.1.2.2E   Protected REGISTER - Authentication already performed [R8]
5.4.1.2.2F   Successful registration [R8]   PDF-p. 237
5.4.1.2.3   Abnormal cases - general   PDF-p. 239
5.4.1.2.3A   Abnormal cases - IMS AKA as security mechanism [R8]   PDF-p. 240
5.4.1.2.3B   Abnormal cases - SIP digest as security mechanism [R8]   PDF-p. 241
5.4.1.2.3C   Abnormal cases - SIP digest with TLS as security mechanism [R8]
5.4.1.2.3D   Abnormal cases - NASS-IMS bundled authentication as security mechanism [R8]
5.4.1.2.3E   Abnormal cases - GPRS-IMS-Bundled authentication as security mechanism [R8]
5.4.1.3   Authentication and reauthentication      Up
5.4.1.4   User-initiated deregistration   PDF-p. 242
5.4.1.5   Network-initiated deregistration
5.4.1.6   Network-initiated reauthentication   PDF-p. 246
5.4.1.7   Notification of Application Servers about registration status   PDF-p. 247
5.4.1.7A   Including contents in the body of the third-party REGISTER request [R8]   PDF-p. 248      Up
5.4.1.8   Service profile updates [R7]   PDF-p. 249
5.4.2   Subscription and notification   PDF-p. 250
5.4.3   General treatment for all dialogs and standalone transactions excluding requests terminated by the SCSCF
5.4.4   Call initiation   PDF-p. 282
5.4.5   Call release   PDF-p. 284
5.4.6   Call-related requests
5.4.7   Void
5.4.7A   GRUU management [R7]
5.4.8   Emergency service [R7]

Up        Top        ToC