SlideShare a Scribd company logo
1 of 8
Download to read offline
1
2
Source: TS 23.228
• The Private User Identity shall be permanently allocated to a user's subscription (it is not a
dynamic identity), and is valid for the duration of the user's subscription with the home
network.
• The Private User Identity is used to identify the user's information (for example
authentication information) stored within the HSS (for use for example during Registration).
• The Private User Identity may be present in charging records based on operator policies.
• The Private User Identity is authenticated only during registration of the user, (including re-
registration and de-registration).
Source: RFC 4282
• nai = username
• nai =/ "@" realm
• nai =/ username "@" realm
• realm = domain
• =/ means Incremental Alternatives
Source: TS23.003
• It is possible for a representation of the IMSI to be contained within the NAI for the private
identity.
• For 3GPP systems, if there is no ISIM application, the private user identity is not known. If the
private user identity is not known, the private user identity shall be derived from the IMSI.
The following steps show how to build the private user identity out of the IMSI:
1. Use the whole string of digits as the username part of the private user identity; and
2. Convert the leading digits of the IMSI, i.e. MNC and MCC, into a domain name, as
described in subclause 13.2.
• The result will be a private user identity of the form
"<IMSI>@ims.mnc<MNC>.mcc<MCC>.3gppnetwork.org". For example: If the IMSI is
234150999999999 (MCC = 234, MNC = 15), the private user identity then takes the form
"234150999999999@ims.mnc015.mcc234.3gppnetwork.org".
3
The Public User Identity shall take the form as defined in TS 23.003 [24].
Public User Identities are not authenticated by the network during registration.
Public User Identities are stored in the HSS. A distinct Public User Identity
contains the Public User Identity that is used in routing and it is explicitly
provisioned in the HSS.
4
Only one service profile shall be associated with a Public User Identity at the
S-CSCF at a given time. Multiple service profiles may be defined in the HSS for a
subscription. Each Public User Identity is associated with one and only one
service profile. Each service profile is associated with one or more Public User
Identities.
Public User Identities with different Service Profiles may belong to the same
Implicit Registration Set.
The IMS Service Profile is a collection of service and user related data. The IMS
service profile is defined and maintained in the HSS and its scope is limited to IM
CN Subsystem. The service profile is downloaded from the HSS to the S-CSCF.
5
Public User Identities may be shared across multiple Private User Identities
within the same IMS subscription. Hence, a particular Public User Identity may be
simultaneously registered from multiple UEs that use different Private User
Identities and different contact addresses.
All Service Profiles of a user shall be stored in the same HSS, even if the user has
one or more shared Public User Identities.
6
7
8

More Related Content

Viewers also liked

10 Step Guide to Analytics
10 Step Guide to Analytics10 Step Guide to Analytics
10 Step Guide to AnalyticsXtage Labs
 
Enhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysEnhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysDepartment of Sport and Recreation
 
Laporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiLaporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiYusuf Saktian
 
Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Feni Prasetiya
 
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimEasy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimIsabelle Girard
 
Laporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahLaporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahYusuf Saktian
 
Manajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanManajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanIndependent
 
Manajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenManajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenFeni Prasetiya
 

Viewers also liked (9)

10 Step Guide to Analytics
10 Step Guide to Analytics10 Step Guide to Analytics
10 Step Guide to Analytics
 
Enhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathwaysEnhancing the capacity and capability of talent development pathways
Enhancing the capacity and capability of talent development pathways
 
Laporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - HalusinasiLaporan Pendahuluan Jiwa - Halusinasi
Laporan Pendahuluan Jiwa - Halusinasi
 
Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren Asli manajemen pengelolaan pesantren
Asli manajemen pengelolaan pesantren
 
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSimEasy thermodynamics calculations with Simulis Thermodynamics from ProSim
Easy thermodynamics calculations with Simulis Thermodynamics from ProSim
 
Laporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri RendahLaporan Pendahuluan Jiwa - Harga Diri Rendah
Laporan Pendahuluan Jiwa - Harga Diri Rendah
 
Manajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia PendidikanManajemen Sumber Daya Manusia Pendidikan
Manajemen Sumber Daya Manusia Pendidikan
 
Manajemen pengelolaan pesantren
Manajemen pengelolaan pesantrenManajemen pengelolaan pesantren
Manajemen pengelolaan pesantren
 
Harga diri (Self-Esteem) presentation from PsikologiHore.com
Harga diri (Self-Esteem) presentation from PsikologiHore.comHarga diri (Self-Esteem) presentation from PsikologiHore.com
Harga diri (Self-Esteem) presentation from PsikologiHore.com
 

Similar to IMS Naming Identity

IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming IdentityKent Loh
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id conceptsMostafa El Lathy
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Identity Management Standardization in the cloud computing
Identity Management Standardization in the cloud computingIdentity Management Standardization in the cloud computing
Identity Management Standardization in the cloud computingOmerZia11
 
Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...CSCJournals
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET Journal
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 

Similar to IMS Naming Identity (20)

IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming Identity
 
1.ims concepts
1.ims concepts1.ims concepts
1.ims concepts
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Presentation
PresentationPresentation
Presentation
 
Null talk
Null talkNull talk
Null talk
 
Identity Management Standardization in the cloud computing
Identity Management Standardization in the cloud computingIdentity Management Standardization in the cloud computing
Identity Management Standardization in the cloud computing
 
Devi
DeviDevi
Devi
 
Complete document
Complete documentComplete document
Complete document
 
Implementation modules
Implementation modulesImplementation modules
Implementation modules
 
Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...Certification Authority Monitored Multilevel and Stateful Policy Based Author...
Certification Authority Monitored Multilevel and Stateful Policy Based Author...
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 

More from Houman Sadeghi Kaji

More from Houman Sadeghi Kaji (12)

Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019Connect us iranecosystem-v1g4-2019
Connect us iranecosystem-v1g4-2019
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Smart City Strategic Growth Map
Smart City Strategic Growth MapSmart City Strategic Growth Map
Smart City Strategic Growth Map
 
Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018Digital strategy for a successful smart city initiative world gov-summit-2018
Digital strategy for a successful smart city initiative world gov-summit-2018
 
LotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud ManagementLotusCom Revenue assurance & Fraud Management
LotusCom Revenue assurance & Fraud Management
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
IMS ENUM & DNS Mechanism
IMS ENUM & DNS MechanismIMS ENUM & DNS Mechanism
IMS ENUM & DNS Mechanism
 
Ims naming identity
Ims naming identityIms naming identity
Ims naming identity
 
What is ims
What is imsWhat is ims
What is ims
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

IMS Naming Identity

  • 1. 1
  • 2. 2
  • 3. Source: TS 23.228 • The Private User Identity shall be permanently allocated to a user's subscription (it is not a dynamic identity), and is valid for the duration of the user's subscription with the home network. • The Private User Identity is used to identify the user's information (for example authentication information) stored within the HSS (for use for example during Registration). • The Private User Identity may be present in charging records based on operator policies. • The Private User Identity is authenticated only during registration of the user, (including re- registration and de-registration). Source: RFC 4282 • nai = username • nai =/ "@" realm • nai =/ username "@" realm • realm = domain • =/ means Incremental Alternatives Source: TS23.003 • It is possible for a representation of the IMSI to be contained within the NAI for the private identity. • For 3GPP systems, if there is no ISIM application, the private user identity is not known. If the private user identity is not known, the private user identity shall be derived from the IMSI. The following steps show how to build the private user identity out of the IMSI: 1. Use the whole string of digits as the username part of the private user identity; and 2. Convert the leading digits of the IMSI, i.e. MNC and MCC, into a domain name, as described in subclause 13.2. • The result will be a private user identity of the form "<IMSI>@ims.mnc<MNC>.mcc<MCC>.3gppnetwork.org". For example: If the IMSI is 234150999999999 (MCC = 234, MNC = 15), the private user identity then takes the form "234150999999999@ims.mnc015.mcc234.3gppnetwork.org". 3
  • 4. The Public User Identity shall take the form as defined in TS 23.003 [24]. Public User Identities are not authenticated by the network during registration. Public User Identities are stored in the HSS. A distinct Public User Identity contains the Public User Identity that is used in routing and it is explicitly provisioned in the HSS. 4
  • 5. Only one service profile shall be associated with a Public User Identity at the S-CSCF at a given time. Multiple service profiles may be defined in the HSS for a subscription. Each Public User Identity is associated with one and only one service profile. Each service profile is associated with one or more Public User Identities. Public User Identities with different Service Profiles may belong to the same Implicit Registration Set. The IMS Service Profile is a collection of service and user related data. The IMS service profile is defined and maintained in the HSS and its scope is limited to IM CN Subsystem. The service profile is downloaded from the HSS to the S-CSCF. 5
  • 6. Public User Identities may be shared across multiple Private User Identities within the same IMS subscription. Hence, a particular Public User Identity may be simultaneously registered from multiple UEs that use different Private User Identities and different contact addresses. All Service Profiles of a user shall be stored in the same HSS, even if the user has one or more shared Public User Identities. 6
  • 7. 7
  • 8. 8