Alias management method and device

ABSTRACT

Embodiments of this application relate to the communications field, and describe an alias management method and device. One example method includes receiving, by a mission critical service server, a first call request message from a first client determining, by the mission critical service server based on the identity of the calling user, that the calling user has an alias call right receiving, by the mission critical service server from a functional alias management entity, activating user information corresponding to the identity of the alias requested to be called; calling, by the mission critical service server, a user in the activating user information based on the activating user information corresponding to the identity of the alias requested to be called; and sending, by the mission critical service server, a first call response message to the first client.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/742,306, filed on Jan. 14, 2020, which is a continuation ofInternational Application No. PCT/CN2018/086754, filed on May 14, 2018,which claims priority to Chinese Patent Application No. 201710583363.6,filed on Jul. 17, 2017. All of the afore-mentioned patent applicationsare hereby incorporated by reference in their entireties.

TECHNICAL FIELD

Embodiments of this application relate to the communications field, andin particular, to an alias management method and device.

BACKGROUND

The 3rd Generation Partnership Project (3GPP) has standardized a groupof mission critical services based on a 3GPP Long Term Evolution (LTE)system to support trunking communication in a public security scenario.The mission critical services may include basic services such as amission critical push to talk (MCPTT) service, a mission critical data(MCData) service, and a mission critical video (MCVideo) service. Otherservices such as a railway application and an enterprise application canalso be created based on the basic services.

In an existing mission critical service system based on the 3GPP LTEsystem, each user has an identity that is used to uniquely identify theuser. For different services, a same user may use a same identity, ormay use different identities. Each identity of the user may correspondto one or more aliases. As a name of a person, a thing, an object, or aservice other than an official legal name or a standard name, an aliasmay be used in a written language, or may be used in an oral language.The alias may also be referred to as a nickname. In the prior art, analias may be a name of a user other than an identity. For example, itmay be an alias in a phone number format, for example, +86 130 xxxxxxxx, or may be an alias in a uniform resource identifier (URI) format,for example, username@domain, or may be an alias formed by characters orsymbols that can be recognized and remembered by a natural personeasily. Specifically, an alias may be specified with reference toinformation such as an identity, an employer, or a location of a user,for example, a chief conductor on train G20, a conductor on G20, or adispatcher at Beijing South Railway Station.

In the prior art, the alias is preconfigured in a user configurationfile during system deployment. When alias management, for example,registration, activation, deactivation, or takeover needs to beperformed, the user configuration file in which the alias is configuredto be first processed correspondingly. Consequently, alias managementefficiency is low, and system processing load is heavy. For example,when the user needs to register a new alias, the user modifies the userconfiguration file or configure a new user configuration file tocomplete alias registration.

SUMMARY

Embodiments of this application provide an alias management method anddevice to resolve a problem of low alias management efficiency and heavysystem processing load.

To achieve the foregoing objective, the embodiments of this applicationuse the following technical solutions.

According to a first aspect, an embodiment of this application providesan alias management method, including:

receiving, by a functional alias management entity, a registrationrequest message sent by a first client, where the registration requestmessage includes an identity of a user and a name of an alias requestedto be registered; and sending, by the functional alias managemententity, a registration response message to the first client when theuser has an alias registration right, where the registration responsemessage includes the identity of the user, a name of an alias that issuccessfully registered, and an identity of the alias that issuccessfully registered.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives theregistration request message sent by the first client and including theidentity of the user and the name of the alias requested to beregistered; and when the user has the alias registration right, thefunctional alias management entity sends, to the first client, theregistration response message including the identity of the user, thename of the alias that is successfully registered, and the identity ofthe alias that is successfully registered. After the functional aliasmanagement entity receives the registration request message sent by thefirst client, when determining that the requester that requests toregister the alias has the alias registration right, the functionalalias management entity returns, to the first client, the registrationresponse message including the identity of the requester, the name ofthe alias that is successfully registered, and the identity of the aliasthat is successfully registered, without correspondingly processing auser configuration file in which the alias is configured. Therefore,alias registration can be implemented, and a problem of low aliasmanagement efficiency and heavy system processing load is resolved.

With reference to the first aspect, in a possible implementation, beforethe sending, by the functional alias management entity, a registrationresponse message to the first client, the alias management method mayfurther include: obtaining, by the functional alias management entity,subscription information of the user based on the identity of the user,where the subscription information includes indication information, andthe indication information is used to indicate that the user has thealias registration right; or obtaining, by the functional aliasmanagement entity, policy information, and determining, based on theobtained policy information, that the user has the alias registrationright, where the policy information includes an identity of a user thathas the alias registration right.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the user does not have the aliasregistration right, sending, by the functional alias management entity,a failure response message to the first client, where the failureresponse message may carry a failure cause, and the failure cause isused to indicate that authorization check on the user fails.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, before the sending,by the functional alias management entity, a registration responsemessage to the first client, the alias management method may furtherinclude: when the name of the alias requested to be registered is notregistered, allocating, by the functional alias management entity, theidentity to the alias requested to be registered, where the alias thatis successfully registered is the alias requested to be registered.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the name of the alias requested to beregistered is already registered, sending, by the functional aliasmanagement entity, a failure response message to the first client, wherethe failure response message may carry a failure cause, and the failurecause is used to indicate that the alias requested to be registered isalready registered.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, the registrationrequest message may further include at least one of the following: aservice type of the alias requested to be registered, an attribute ofthe alias requested to be registered, an application scope of the aliasrequested to be registered, and a valid time of the alias requested tobe registered.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: sending, by the functional alias managemententity, a notification message to a second client, where thenotification message may include the name of the alias that issuccessfully registered, and the identity of the alias that issuccessfully registered.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, when the functionalalias management entity is not disposed in a mission critical serviceserver, the alias management method may further include: sending, by thefunctional alias management entity, a notification message to themission critical service server, where the notification message mayinclude the name of the alias that is successfully registered, and theidentity of the alias that is successfully registered.

With reference to the first aspect or the foregoing possibleimplementation, in another possible implementation, the notificationmessage may further include at least one of the following: a servicetype of the alias that is successfully registered, an attribute of thealias that is successfully registered, an application scope of the aliasthat is successfully registered, and a valid time of the alias that issuccessfully registered.

According to a second aspect, an embodiment of this application providesan alias management method, including:

receiving, by a functional alias management entity, an activationrequest message sent by a first client, where the activation requestmessage includes an identity of a user and an identity of an aliasrequested to be activated; and sending, by the functional aliasmanagement entity, an activation response message to the first clientwhen the user has an alias activation right, where the activationresponse message includes the identity of the user and an identity of analias that is successfully activated.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives theactivation request message sent by the first client and including theidentity of the user and the identity of the alias requested to beactivated; and when the user has the alias activation right, thefunctional alias management entity sends, to the first client, theactivation response message including the identity of the user and theidentity of the alias that is successfully activated. After thefunctional alias management entity receives the activation requestmessage sent by the first client, when determining that the requesterthat requests to activate the alias has the alias activation right, thefunctional alias management entity returns, to the first client, theactivation response message including the identity of the requester andthe identity of the alias that is successfully activated, withoutcorrespondingly processing a user configuration file in which the aliasis configured. Therefore, alias activation can be implemented, and aproblem of low alias management efficiency and heavy system processingload is resolved.

With reference to the second aspect, in a possible implementation,before the sending, by the functional alias management entity, anactivation response message to the first client, the alias managementmethod may further include: obtaining, by the functional aliasmanagement entity, subscription information of the user based on theidentity of the user, where the subscription information includesindication information, and the indication information is used toindicate that the user has the alias activation right; or obtaining, bythe functional alias management entity, policy information, anddetermining, based on the obtained policy information, that the user hasthe alias activation right, where the policy information includes anidentity of a user that has the alias activation right.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the user does not have the aliasactivation right, sending, by the functional alias management entity, afailure response message to the first client, where the failure responsemessage may carry a failure cause, and the failure cause is used toindicate that authorization check on the user fails.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, when the aliasrequested to be activated is not an alias that a plurality of users areallowed to simultaneously activate, and the alias requested to beactivated is not activated, the alias that is successfully activated isthe alias requested to be activated; or when the alias requested to beactivated is an alias that a plurality of users are allowed tosimultaneously activate, and a quantity of users who successfullyactivate the alias requested to be activated is greater than 0 and lessthan a maximum activation quantity, the alias that is successfullyactivated is the alias requested to be activated; or when the aliasrequested to be activated is not an alias that a plurality of users areallowed to simultaneously activate, the alias requested to be activatedis not activated, and a service type of the alias requested to beactivated is the same as a service type corresponding to the identity ofthe user, the alias that is successfully activated is the aliasrequested to be activated; or when the alias requested to be activatedis an alias that a plurality of users are allowed to simultaneouslyactivate, a quantity of users who successfully activate the aliasrequested to be activated is greater than 0 and less than a maximumactivation quantity, and a service type of the alias requested to beactivated is the same as a service type corresponding to the identity ofthe user, the alias that is successfully activated is the aliasrequested to be activated. The activation request message may furtherinclude the service type of the alias requested to be activated.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the alias requested to be activated isnot an alias that a plurality of users are allowed to simultaneouslyactivate, but the alias requested to be activated is already activated,sending, by the functional alias management entity, a failure responsemessage to the first client, where the failure response message maycarry a failure cause, and the failure cause is used to indicate thatthe alias requested to be activated is already activated; or when thealias requested to be activated is an alias that a plurality of usersare allowed to simultaneously activate, but a quantity of users whosuccessfully activate the alias requested to be activated is greaterthan a maximum activation quantity, sending, by the functional aliasmanagement entity, a failure response message to the first client, wherethe failure response message may carry a failure cause, and the failurecause is used to indicate that the quantity of users who successfullyactivate the alias requested to be activated already reaches the maximumactivation quantity.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: storing, by the functional alias managemententity, an association relationship between the identity of the user andthe alias that is successfully activated.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: sending, by the functional alias managemententity, a notification message to a second client, where thenotification message is used to notify the second client that the usersuccessfully activates the alias that is successfully activated.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, the activationresponse message may further include a service type of the alias that issuccessfully activated.

With reference to the second aspect or the foregoing possibleimplementation, in another possible implementation, when the functionalalias management entity is not disposed in a mission critical serviceserver, the alias management method may further include: sending, by thefunctional alias management entity, an activation notification messageto the mission critical service server, where the activationnotification message includes the identity of the user and the identityof the alias that is successfully activated.

According to a third aspect, an embodiment of this application providesan alias management method, including:

receiving, by a functional alias management entity, a deactivationrequest message sent by a first client, where the deactivation requestmessage includes an identity of a user and an identity of an aliasrequested to be deactivated; and sending, by the functional aliasmanagement entity, a deactivation response message to the first clientwhen the user has an alias deactivation right, where the deactivationresponse message includes the identity of the user and an identity of analias that is successfully deactivated.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives thedeactivation request message sent by the first client and including theidentity of the user and the identity of the alias requested to bedeactivated; and when the user has the alias deactivation right, thefunctional alias management entity sends, to the first client, thedeactivation response message including the identity of the user and theidentity of the alias that is successfully deactivated. After thefunctional alias management entity receives the deactivation requestmessage sent by the first client, when determining that the requesterthat requests to deactivate the alias has the alias deactivation right,the functional alias management entity returns, to the first client, thedeactivation response message including the identity of the requesterand the identity of the alias that is successfully deactivated, withoutcorrespondingly processing a user configuration file in which the aliasis configured. Therefore, alias deactivation can be implemented, and aproblem of low alias management efficiency and heavy system processingload is resolved.

With reference to the third aspect, in a possible implementation, beforethe sending, by the functional alias management entity, a deactivationresponse message to the first client, the alias management method mayfurther include: obtaining, by the functional alias management entity,subscription information of the user based on the identity of the user,where the subscription information includes indication information, andthe indication information is used to indicate that the user has thealias deactivation right; or obtaining, by the functional aliasmanagement entity, policy information, and determining, based on theobtained policy information, that the user has the alias deactivationright, where the policy information includes an identity of a user thathas the alias deactivation right.

With reference to the third aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the user does not have the aliasdeactivation right, sending, by the functional alias management entity,a failure response message to the first client, where the failureresponse message may carry a failure cause, and the failure cause isused to indicate that authorization check on the user fails.

With reference to the third aspect or the foregoing possibleimplementation, in another possible implementation, when a service typeof the alias requested to be deactivated is the same as a service typecorresponding to the identity of the user, the alias that issuccessfully deactivated is the alias requested to be deactivated. Thedeactivation request message may further include the service type of thealias requested to be deactivated.

With reference to the third aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: deleting, by the functional alias managemententity, an association relationship between the identity of the user andthe identity of the alias that is successfully deactivated.

With reference to the third aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: sending, by the functional alias managemententity, a notification message to a second client, where thenotification message is used to notify the second client that the usersuccessfully deactivates the alias that is successfully deactivated.

With reference to the third aspect or the foregoing possibleimplementation, in another possible implementation, the deactivationresponse message may further include a service type of the alias that issuccessfully deactivated.

With reference to the third aspect or the foregoing possibleimplementation, in another possible implementation, when the functionalalias management entity is not disposed in a mission critical serviceserver, the alias management method may further include: sending, by thefunctional alias management entity, a deactivation notification messageto the mission critical service server, where the deactivationnotification message includes the identity of the user and the identityof the alias that is successfully deactivated.

According to a fourth aspect, an embodiment of this application providesan alias management method, including:

receiving, by a functional alias management entity, a takeover requestmessage sent by a first client, where the takeover request messageincludes an identity of a user and an identity of an alias requested tobe taken over; and sending, by the functional alias management entity, atakeover response message to the first client when the user has an aliastakeover right, where the takeover response message includes theidentity of the user and an identity of an alias that is successfullytaken over.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives thetakeover request message sent by the first client and including theidentity of the user and the identity of the alias requested to be takenover; and when the user has the alias takeover right, the functionalalias management entity sends, to the first client, the takeoverresponse message including the identity of the user and the identity ofthe alias that is successfully taken over. After the functional aliasmanagement entity receives the takeover request message sent by thefirst client, when determining that the requester that requests to takeover the alias has the alias takeover right, the functional aliasmanagement entity returns, to the first client, the takeover responsemessage including the identity of the requester and the identity of thealias that is successfully taken over, without correspondinglyprocessing a user configuration file in which the alias is configured.Therefore, alias takeover can be implemented, and a problem of low aliasmanagement efficiency and heavy system processing load is resolved.

With reference to the fourth aspect, in a possible implementation,before the sending, by the functional alias management entity, atakeover response message to the first client, the alias managementmethod may further include: obtaining, by the functional aliasmanagement entity, subscription information of the user based on theidentity of the user, where the subscription information includesindication information, and the indication information is used toindicate that the user has the alias takeover right; or obtaining, bythe functional alias management entity, policy information, anddetermining, based on the obtained policy information, that the user hasthe alias takeover right, where the policy information includes anidentity of a user that has the alias takeover right.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the user does not have the aliastakeover right, sending, by the functional alias management entity, afailure response message to the first client, where the failure responsemessage may carry a failure cause, and the failure cause is used toindicate that authorization check on the user fails.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, when the aliasrequested to be taken over is an alias allowed to be taken over, thealias that is successfully taken over is the alias requested to be takenover; or when the alias requested to be taken over is an alias allowedto be taken over, and a service type of the alias requested to be takenover is the same as a service type corresponding to the identity of theuser, the alias that is successfully taken over is the alias requestedto be taken over. The takeover request message may further include theservice type of the alias requested to be taken over.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: when the alias requested to be taken over isnot an alias allowed to be taken over, sending, by the functional aliasmanagement entity, a failure response message to the first client, wherethe failure response message may carry a failure cause, and the failurecause is used to indicate that the alias requested to be taken over isnot an alias allowed to be taken over.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: deleting, by the functional alias managemententity, an association relationship between the identity of the aliasthat is successfully taken over and an identity of a user using a secondclient, and sending a notification message to the second client, wherethe notification message is used to notify the second client that theuser using the first client successfully takes over the alias that issuccessfully taken over, or used to instruct the second client todeactivate the alias that is successfully taken over, where the userusing the second client is a user successfully activating the alias thatis successfully taken over.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, the takeoverresponse message may further include a service type of the alias that issuccessfully taken over.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: sending, by the functional alias managemententity, a takeover notification message to a mission critical serviceserver, where the takeover notification message includes the identity ofthe user and the identity of the alias that is successfully taken over.

With reference to the fourth aspect or the foregoing possibleimplementation, in another possible implementation, the alias managementmethod may further include: sending, by the functional alias managemententity, a deactivation notification message to a mission criticalservice server, where the deactivation notification message includes theidentity of the alias that is successfully taken over and the identityof the user.

According to a fifth aspect, an embodiment of this application providesa functional alias management entity, including: a receiving unit,configured to receive a registration request message sent by a firstclient, where the registration request message includes an identity of auser and a name of an alias requested to be registered; and a sendingunit, configured to send a registration response message to the firstclient when the user has an alias registration right, where theregistration response message includes the identity of the user, a nameof an alias that is successfully registered, and an identity of thealias that is successfully registered.

With reference to the fifth aspect, in a possible implementation, thefunctional alias management entity may further include: an obtainingunit, configured to obtain subscription information of the user based onthe identity of the user that is received by the receiving unit, wherethe subscription information includes indication information, and theindication information is used to indicate that the user has the aliasregistration right; or an obtaining unit, configured to obtain policyinformation, and a determining unit, configured to determine, based onthe policy information obtained by the obtaining unit, that the user hasthe alias registration right, where the policy information includes anidentity of a user that has the alias registration right.

With reference to the fifth aspect or the foregoing possibleimplementation, in another possible implementation, the functional aliasmanagement entity may further include: an allocation unit, configuredto: when the name of the alias requested to be registered is notregistered, allocate the identity to the alias requested to beregistered, where the alias that is successfully registered is the aliasrequested to be registered.

With reference to the fifth aspect or the foregoing possibleimplementation, in another possible implementation, the registrationrequest message further includes at least one of the following: aservice type of the alias requested to be registered, an attribute ofthe alias requested to be registered, an application scope of the aliasrequested to be registered, and a valid time of the alias requested tobe registered.

With reference to the fifth aspect or the foregoing possibleimplementation, in another possible implementation, the sending unit isfurther configured to send a notification message to a second client,where the notification message includes the name of the alias that issuccessfully registered, and the identity of the alias that issuccessfully registered.

With reference to the fifth aspect or the foregoing possibleimplementation, in another possible implementation, the notificationmessage further includes at least one of the following: a service typeof the alias that is successfully registered, an attribute of the aliasthat is successfully registered, an application scope of the alias thatis successfully registered, and a valid time of the alias that issuccessfully registered.

According to a sixth aspect, an embodiment of this application providesa functional alias management entity, including: a receiving unit,configured to receive an activation request message sent by a firstclient, where the activation request message includes an identity of auser and an identity of an alias requested to be activated; and asending unit, configured to send an activation response message to thefirst client when the user has an alias activation right, where theactivation response message includes the identity of the user and anidentity of an alias that is successfully activated.

With reference to the sixth aspect, in a possible implementation, thefunctional alias management entity may further include: an obtainingunit, configured to obtain subscription information of the user based onthe identity of the user that is received by the receiving unit, wherethe subscription information includes indication information, and theindication information is used to indicate that the user has the aliasactivation right; or an obtaining unit, configured to obtain policyinformation, and a determining unit, configured to determine, based onthe policy information obtained by the obtaining unit, that the user hasthe alias activation right, where the policy information includes anidentity of a user that has the alias activation right.

With reference to the sixth aspect or the foregoing possibleimplementation, in another possible implementation, when the aliasrequested to be activated is not an alias that a plurality of users areallowed to simultaneously activate, and the alias requested to beactivated is not activated, the alias that is successfully activated isthe alias requested to be activated; or when the alias requested to beactivated is an alias that a plurality of users are allowed tosimultaneously activate, and a quantity of users who successfullyactivate the alias requested to be activated is greater than 0 and lessthan a maximum activation quantity, the alias that is successfullyactivated is the alias requested to be activated; or when the aliasrequested to be activated is not an alias that a plurality of users areallowed to simultaneously activate, the alias requested to be activatedis not activated, and a service type of the alias requested to beactivated is the same as a service type corresponding to the identity ofthe user, the alias that is successfully activated is the aliasrequested to be activated; or when the alias requested to be activatedis an alias that a plurality of users are allowed to simultaneouslyactivate, a quantity of users who successfully activate the aliasrequested to be activated is greater than 0 and less than a maximumactivation quantity, and a service type of the alias requested to beactivated is the same as a service type corresponding to the identity ofthe user, the alias that is successfully activated is the aliasrequested to be activated.

With reference to the sixth aspect or the foregoing possibleimplementation, in another possible implementation, the functional aliasmanagement entity may further include: a storage unit, configured tostore an association relationship between the identity of the user andthe alias that is successfully activated.

With reference to the sixth aspect or the foregoing possibleimplementation, in another possible implementation, the sending unit isfurther configured to send a notification message to a second client,where the notification message is used to notify the second client thatthe user successfully activates the alias that is successfullyactivated.

According to a seventh aspect, an embodiment of this applicationprovides a functional alias management entity, including: a receivingunit, configured to receive a deactivation request message sent by afirst client, where the deactivation request message includes anidentity of a user and an identity of an alias requested to bedeactivated; and a sending unit, configured to send a deactivationresponse message to the first client when the user has an aliasdeactivation right, where the deactivation response message includes theidentity of the user and an identity of an alias that is successfullydeactivated.

With reference to the seventh aspect, in a possible implementation, thefunctional alias management entity may further include: an obtainingunit, configured to obtain subscription information of the user based onthe identity of the user, where the subscription information includesindication information, and the indication information is used toindicate that the user has the alias deactivation right; or an obtainingunit, configured to obtain policy information, and a determining unit,configured to determine, based on the policy information obtained by theobtaining unit, that the user has the alias deactivation right, wherethe policy information includes an identity of a user that has the aliasdeactivation right.

With reference to the seventh aspect or the foregoing possibleimplementation, in another possible implementation, when a service typeof the alias requested to be deactivated is the same as a service typecorresponding to the identity of the user, the alias that issuccessfully deactivated is the alias requested to be deactivated.

With reference to the seventh aspect or the foregoing possibleimplementation, in another possible implementation, the functional aliasmanagement entity may further include: a deletion unit, configured todelete an association relationship between the identity of the user andthe identity of the alias that is successfully deactivated.

With reference to the seventh aspect or the foregoing possibleimplementation, in another possible implementation, the sending unit isfurther configured to send a notification message to a second client,where the notification message is used to notify the second client thatthe user successfully deactivates the alias that is successfullydeactivated.

According to an eighth aspect, an embodiment of this applicationprovides a functional alias management entity, including: a receivingunit, configured to receive a takeover request message sent by a firstclient, where the takeover request message includes an identity of auser and an identity of an alias requested to be taken over; and asending unit, configured to send a takeover response message to thefirst client when the user has an alias takeover right, where thetakeover response message includes the identity of the user and anidentity of an alias that is successfully taken over.

With reference to the eighth aspect, in a possible implementation, thefunctional alias management entity may further include: an obtainingunit, configured to obtain subscription information of the user based onthe identity of the user that is received by the receiving unit, wherethe subscription information includes indication information, and theindication information is used to indicate that the user has the aliastakeover right; or an obtaining unit, configured to obtain policyinformation, and a determining unit, configured to determine, based onthe policy information obtained by the obtaining unit, that the user hasthe alias takeover right, where the policy information includes anidentity of a user that has the alias takeover right.

With reference to the eighth aspect or the foregoing possibleimplementation, in another possible implementation, when the aliasrequested to be taken over is an alias allowed to be taken over, thealias that is successfully taken over is the alias requested to be takenover; or when the alias requested to be taken over is an alias allowedto be taken over, and a service type of the alias requested to be takenover is the same as a service type corresponding to the identity of theuser, the alias that is successfully taken over is the alias requestedto be taken over.

With reference to the eighth aspect or the foregoing possibleimplementation, in another possible implementation, the functional aliasmanagement entity may further include: a deletion unit, configured todelete an association relationship between the identity of the aliasthat is successfully taken over and an identity of a user using a secondclient, where the user using the second client is a user successfullyactivating the alias that is successfully taken over; where the sendingunit is further configured to send a notification message to the secondclient, where the notification message is used to notify the secondclient that the user using the first client successfully takes over thealias that is successfully taken over, or used to instruct the secondclient to deactivate the alias that is successfully taken over.

According to a ninth aspect, an embodiment of this application providesa functional alias management entity, including at least one processorand a memory, where the memory is configured to store a computerprogram, and when executing the computer program, the at least oneprocessor implements the alias management method in any one of the firstaspect or the possible implementations of the first aspect, or thesecond aspect or the possible implementations of the second aspect, orthe third aspect or the possible implementations of the third aspect, orthe fourth aspect or the possible implementations of the fourth aspect.

According to a tenth aspect, an embodiment of this application providesa computer readable storage medium, configured to store a computerprogram, where the computer program includes an instruction used toperform the alias management method in any one of the first aspect orthe possible implementations of the first aspect, or the second aspector the possible implementations of the second aspect, or the thirdaspect or the possible implementations of the third aspect, or thefourth aspect or the possible implementations of the fourth aspect.

According to an eleventh aspect, an embodiment of this applicationprovides a chip system, where the chip system includes a processor,configured to support a functional alias management entity inimplementing the functions in the foregoing aspects, for example,generating or processing data and/or information in the foregoingmethods. In a possible design, the chip system further includes amemory, where the memory is configured to store a program instructionand data required by the functional alias management entity. The chipsystem may be formed by chips, or may include a chip and other discretecomponents.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic diagram of an architecture of a mission criticalservice application layer based on a 3GPP LTE system according to theprior art;

FIG. 2 is a simplified schematic diagram of a system architectureaccording to an embodiment of this application;

FIG. 3 is a schematic composition diagram of a functional aliasmanagement entity according to an embodiment of this application;

FIG. 4 is a flowchart of an alias management method according to anembodiment of this application;

FIG. 5 is a flowchart of another alias management method according to anembodiment of this application;

FIG. 6 is a flowchart of another alias management method according to anembodiment of this application;

FIG. 7 is a flowchart of another alias management method according to anembodiment of this application;

FIG. 8 is a flowchart of an alias-based addressing call method accordingto an embodiment of this application;

FIG. 9 is a schematic composition diagram of another functional aliasmanagement entity according to an embodiment of this application; and

FIG. 10 is a schematic composition diagram of another functional aliasmanagement entity according to an embodiment of this application.

DESCRIPTION OF EMBODIMENTS

An architecture of a mission critical service application layer based ona 3GPP LTE system is shown in FIG. 1 . A mission critical service userdatabase (MC service user database) stores a user configuration file,and the user configuration file includes an identity of a user and oneor more aliases corresponding to the identity. The alias is a name otherthan an official legal name or a standard name. For different services,a same user may use a same identity, or may use different identities.The identity of the user is bound with the alias corresponding to theidentity of the user, and is stored in the user configuration file. Forexample, for an MCPTT service, the identity of the user is bound withthe alias corresponding to the identity of the user; for an MCDataservice, the identity of the user is bound with the alias correspondingto the identity of the user. The user can use the alias only when a userconfiguration file including the alias is delivered by a systemadministrator by using a configuration management server (CMS) and aconfiguration management client (CMC) to a terminal used by the user. Inaddition, when management such as registration, activation,deactivation, or takeover needs to be performed on the alias, the userconfiguration file including the alias must be first processedcorrespondingly. For example, when an alias is registered dynamicallyand temporally in a system, alias registration can be completed onlywhen the user configuration file is modified first or a new userconfiguration file is configured first.

In addition, the alias further has some information describing featuresof the alias, for example, uniqueness of the alias in the system,simultaneous use of the alias allowed for a plurality of users, and theidentity of the user corresponding to the alias. In a railwayapplication, information about an alias is specifically as follows:

1. An alias is an alias that may be selected by a user, and is boundwith a duty or a mission of the user.

2. One user may simultaneously activate one or more aliases. Eachactivated alias is unique, and may be used as a service identity of theuser for communicating with and addressing the user corresponding to thealias, that is, can support a routing function. For example, an alias isused to identify a driver of a specific train. For example, if there aretwo drivers on train TRAIN29, where an alias of a driver 1 isDriver1_TRAIN29, and an alias of a driver 2 is Driver2_TRAIN29, afterthe alias Drive1_TRAIN29 is successfully activated, the driver 1 on thetrain TRAIN29 can be addressed, and after the alias Driver2_TRAIN29 issuccessfully activated, the driver 2 on the train TRAIN29 can beaddressed.

3. One alias may be allocated to a plurality of users based on servicemanagement configurations, or may be taken over by another authorizeduser based on service management configurations. The two requirementsare mutually exclusive. To be specific, if an alias is allocated to aplurality of users, the alias cannot be taken over.

4. An authorized user may register a new alias.

In conclusion, based on the information describing alias features in therailway application, the following may be obtained: It is required thata user should be able to select an alias in the railway applicationfreely; and the alias can be flexibly activated and deactivated, cansupport the routing function, can be taken over, and can be registered.Therefore, if the prior art is still used to preconfigure the alias in auser configuration file during system deployment, alias managementefficiency is low, and system processing load is heavy.

To resolve a problem of low alias management efficiency and heavy systemprocessing load, the embodiments of this application provide an aliasmanagement method. A basic principle of the alias management method isas follows: A functional alias management entity receives a managementrequest message sent by a first client, where the management requestmessage includes an identity of a user and information about an aliasrequested to be managed; and the functional alias management entitysends a management response message to the first client when the userhas an alias management right, where the management response messageincludes the identity of the user, and information about an alias thatis successfully managed. The management may be one or more ofregistration, activation, deactivation, takeover, and the like. Afterthe functional alias management entity receives the management requestmessage sent by the first client, when determining that the requesterthat requests to manage the alias has the alias management right, thefunctional alias management entity returns, to the first client, themanagement response message including the identity of the requester, andthe information about the alias that is successfully managed, withoutcorrespondingly processing a user configuration file in which the aliasis configured. Therefore, alias management can be implemented, and theproblem of low alias management efficiency and heavy system processingload is resolved.

It should be noted that, in the embodiments of this application, thealias may also be referred to as a functional alias. In addition, “aplurality of” in the embodiments of this application may be two or more.

The following describes the embodiments of this application in detailwith reference to the accompanying drawings.

FIG. 2 is a simplified schematic diagram of a system architecture towhich an embodiment of this application may be applied. As shown in FIG.2 , the system architecture may include a functional alias managementserver, a functional alias management client, and functional entities inthe architecture shown in FIG. 1 .

In a specific implementation, the functional alias management entity inthis embodiment of this application may be integrated in any one of amission critical service server (MC Service Server/MC server), a groupmanagement server, a configuration management server, an identitymanagement server, a key management server, and a location managementserver included in the architecture shown in FIG. 1 , or may beintegrated in a functional alias management server.

In a specific implementation, the first client in this embodiment ofthis application may be integrated in any one of a mission criticalservice client MC Service Client/MC client), a group management client,a configuration management client, an identity management client, a keymanagement client, and a location management client included in thearchitecture shown in FIG. 1 , or may be integrated in a functionalalias management client.

In this embodiment of this application, the functional alias managemententity can store and maintain alias information of a system. The aliasinformation may include one or a combination of the following: a name ofan alias, an identity of the alias, an attribute of the alias, anidentity of a user associated with the alias, a service type of thealias, an application scope of the alias, a valid time of the alias, andthe like. The functional alias management entity may be configured toreceive or reject operations initiated by the user, for example, aliasregistration, alias activation, alias deactivation, and alias takeover,and may be further configured to notify the user of a status change ofthe alias of the user, authorize the user to operate the alias, maintainan association relationship between the alias and the identity of theuser, and the like. The first client is configured to initiate operationrequests such as registration, activation, deactivation, and takeover ofthe alias to the functional alias management entity, and is furtherconfigured to receive a message for notifying the status change of thealias from the functional alias management entity.

In addition, the mission critical service server is mainly responsiblefor call control and media control, and is a logical entity. In aspecific implementation, the mission critical service server may be anMCPTT server, an MCVideo server, an MCData server, or the like. Themission critical service client is a peer application layer entity ofthe mission critical service server, and is mainly responsible forprocessing an application layer transaction.

The group management server is mainly responsible for management of agroup and maintenance of group information in the system, for example,creating or dissolving a group, changing a group member, or the like.The group management client is a peer application layer entity of thegroup management server, and is mainly responsible for initiating groupcreation or dissolving, group member operations, group informationupdating, and the like.

The configuration management server is mainly responsible forconfiguring service information and user information in the system, forexample, delivering a user configuration file to a terminal used by theuser. The configuration management client is a peer application layerentity of the configuration management server, and is mainly responsiblefor receiving configuration information delivered by the configurationmanagement server.

The identity management server is configured to authorize andauthenticate the identity of the user, determine whether the user is avalid user, and distribute a service access token to the identitymanagement client. The identity management client is a peer applicationlayer entity of the identity management server, and is configured toreceive the service access token when the identity management serverauthorizes and authenticates the user.

The key management server is mainly responsible for managing a securitykey, for example, generating, distributing, or updating a security key.The key management client is a peer application layer entity of the keymanagement server, and is mainly responsible for receiving and updatingthe security key, and the like.

The location management server is mainly responsible for managing alocation of the user, for example, receiving and storing locationinformation of the user, and providing the location information of theuser for other authorized users for use. The location management clientis a peer application layer entity of the location management server,and is mainly responsible for reporting the location information of theuser, and obtaining location information of other users from thelocation management server.

The functional alias management server is mainly responsible formaintaining and updating information about aliases in the system, forexample, adding an alias, removing an alias, updating an alias,retrieving an alias, and delivering an alias to the user. The functionalalias management client is mainly responsible for retrieving an alias inthe system, and receiving an alias delivered by the functional aliasmanagement server.

The mission critical service server and the mission critical serviceclient use an MCX-1 interface to perform communication, where the MCX-1interface, corresponding to different services, may be an MCPTT-1interface or an MCVideo-1 interface or an MCData-1 interface. Acorresponding CSC interface may be used for communication betweenfunctional entities. For example, the location management server and thelocation management client use a CSC-14 to perform communication; thealias management server and the alias management client use a CSC-xx toperform communication; the alias management server may further use aCSC-yy to perform communication with the mission critical serviceserver.

It should be noted that, in this embodiment of this application, thesystem shown in FIG. 2 may be a system based on a mission criticalservice system. In addition, this embodiment of this application isapplicable to an MCPTT service, an MCData service, an MCVideo service, arailway application service, or other similar services. This notspecifically limited herein in this embodiment of this application.

FIG. 3 is a schematic composition diagram of a functional aliasmanagement entity according to an embodiment of this application. Asshown in FIG. 3 , the functional alias management entity may include atleast one processor 21, a memory 22, a communications interface 23, anda communications bus 24.

The following describes each component of the functional aliasmanagement entity in detail with reference to FIG. 3 :

The processor 21 is a control center of the functional alias managemententity, and may be a processor, or may be a collective term for aplurality of processing components. For example, the processor 21 is acentral processing unit (CPU), or may be an application specificintegrated circuit (ASIC), or is one or more integrated circuitsconfigured to implement this embodiment of this application, forexample, one or more microprocessors (DSP), or one or more fieldprogrammable gate arrays (FPGA).

The processor 21 may perform various functions of the functional aliasmanagement entity by running or executing a software program stored inthe memory 22 and invoking data stored in the memory 22.

In a specific implementation, in an embodiment, the processor 21 mayinclude one or more CPUs, for example, a CPU 0 and a CPU 1 shown in FIG.3 .

In a specific implementation, in an embodiment, the functional aliasmanagement entity may include a plurality of processors, for example,the processor 21 and a processor 25 in FIG. 3 . Each of the processorsmay be a single-core (single-CPU) processor, or may be a multi-core(multi-CPU) processor. The processor herein may be one or more devices,circuits, and/or processing cores used for processing data (for example,a computer program instruction).

The memory 22 may be a read-only memory (ROM) or another type of staticstorage device capable of storing static information and instructions, arandom access memory (RAM) or another type of dynamic storage devicecapable of storing information and instructions, or may be anelectrically erasable programmable read-only memory (EEPROM), a compactdisc read-only memory (CD-ROM), or other compact disc storage or opticaldisc storage (including a compressed optical disc, a laser disc, anoptical disc, a digital versatile disc, a blue-ray optical disc, and thelike), a magnetic disk storage medium or another magnetic storagedevice, or any other medium capable of carrying or storing expectedprogram code in a form of instructions or data structures and capable ofbeing accessed by a computer, but is not limited thereto. The memory 22may exist independently, and is connected to the processor 21 by thecommunications bus 24. The memory 22 may also be integrated with theprocessor 21.

The memory 22 is configured to store a software program used to executethe solution of this application, where the software program is executedunder control of the processor 21.

The communications interface 23 is a type of apparatus using anytransceiver, and is configured to communicate with another device or acommunications network, for example, an Ethernet, a radio access network(RAN), or a wireless local area network (WLAN). The communicationsinterface 23 may include a receiving unit for implementing a receivingfunction and a sending unit for implementing a sending function.

The communications bus 24 may be an industry standard architecture (ISA)bus, a peripheral component interconnect (PCI) bus, an extended industrystandard architecture (EISA) bus, or the like. The bus may becategorized as an address bus, a data bus, a control bus, or the like.For ease of indicating, the bus in FIG. 3 is indicated by only a boldline. However, this does not mean that only one bus or one type of busexists.

A structure of the device shown in FIG. 3 does not constitute alimitation on the functional alias management entity. A quantity ofcomponents included may be greater or less than that shown in thefigure, or some components are combined, or component arrangements aredifferent.

It should be noted that, the alias management method provided by thisembodiment of this application may be applied to management operationssuch as registration, activation, deactivation, and takeover of thealias. For ease of understanding by a person skilled in the art, thealias management method is specifically described by using the followingembodiments.

FIG. 4 to FIG. 7 are flowcharts of alias management methods according toembodiments of this application. FIG. 4 is an alias management methodfor requesting to register an alias according to an embodiment of thisapplication. As shown in FIG. 4 , the method may include the followingsteps.

301. A functional alias management entity receives a registrationrequest message sent by a first client.

The registration request message may include an identity of a user and aname of an alias requested to be registered. The registration requestmessage is used to request to register the alias.

The user is a user using the first client.

It should be noted that, the user may be an authorized user. To bespecific, the user has an alias registration right; otherwise, insubsequent authorization check, an authorization check failure iscaused, and a registration procedure is terminated.

The identity of the user is any combination of a letter and/or a numeraland/or a special character, for uniquely identifying the user. Forexample, the identity of the user is an MC service ID, an MCPTT ID, anMCVideo ID, or an MCData ID.

For example, when the user needs to register a new alias, the firstclient used by the user may send, to the functional alias managemententity, a registration request message carrying the identity of the userand a name of the alias requested to be registered, to request toregister the alias.

It should be noted that, the first client may directly send theregistration request message to the functional alias management entity,or may indirectly send the registration request message to thefunctional alias management entity by using another functional entity.In other words, the functional alias management entity may directlyreceive the registration request message sent by the first client, ormay indirectly receive the registration request message sent by thefirst client. This is not specifically limited herein.

In a specific implementation, a registration request message may carryone or more identities of the user. Different identities correspond todifferent service types, for example, basic service types such as anMCPTT service, an MCData service, and an MCVideo service, and otherservice types such as a railway application and an enterpriseapplication. A registration request message may also carry a name of oneor more aliases requested to be registered. When a registration requestmessage carries names of a plurality of aliases requested to beregistered, the first client may request to register the plurality ofaliases by sending one registration request message.

Further, the registration request message may include at least one ofthe following: a service type of the alias requested to be registered,an attribute of the alias requested to be registered, an applicationscope (apply scope) of the alias requested to be registered, and a validtime of the alias requested to be registered.

The service type of the alias is used to identify a service type thatthe alias is applicable, for example, an MCPTT service, an MCVideoservice, an MCData service, and a railway application service.Generally, the service type of the alias and a service typecorresponding to the identity of the user are the same, but may also bedifferent.

The attribute of the alias may include at least one or a combination ofthe following: an indication about whether a plurality of users areallowed to simultaneously perform activation, a maximum quantity ofusers that are allowed to simultaneously perform activation, and anindication about whether takeover is allowed.

The application scope of the alias is used to identify the applicationscope of the alias, for example, which users can activate the alias. Ina specific implementation, the application scope of the alias may be auser list, or may be a user role list, for example, a train driver or atrain conductor. Certainly, when the registration request message doesnot include the application scope parameter of the alias, it mayindicate that the alias is applicable only to the requester itself, ormay indicate that the alias is applicable to all users in a system. Whenthis parameter is absent, a specific application scope may be specifiedby a system operator.

The valid time of the alias is used to identify a valid time of thealias. In a specific implementation, the valid time of the alias may beimplemented by using a timer, or may be an infinitely long time, thatis, is valid permanently. When the registration request message does notinclude the valid time parameter of the alias, it may indicate that thevalid time of the alias is infinitely long, that is, is validpermanently.

For example, specific examples of the name of the alias, the identity ofthe alias, the attribute of the alias, the service type of the alias,the application scope of the alias, and the valid time of the alias areshown in Table 1.

TABLE 1 Name of the alias Chief driver on train G20 Identity of thealias 049 + 2 + 0279 + 01 Attribute of the >Whether a plurality of usersare allowed to alias simultaneously perform activation: Y >>Maximumquantity of users that are allowed to simultaneously perform activation:3 >Whether takeover is allowed: Y Service type of the MCPTT service,MCVideo service, and MCData alias service Application scope User list,such as user000@mcptt.fire, of the alias user 099@mcptt.fire, . . . ,user100@mcvideo.fire, and user199@mcvideo.fire; or user role list, suchas driver Valid time of the 20170101-20180101 alias

The name of the alias may be any combination of a letter, a Chinesecharacter, a numeral, a special character, and the like that the usereasily recognizes, understands, and remembers, for example, the chiefdriver on train G20 in Table 1.

The identity of the alias may be the name of the alias, or a combinationof a numeral and/or a letter and/or a special symbol in a specificformat. For example, the identity of the alias may include aninternational code, a functional address, and a functional code; theinternational code is used to indicate a network that the user currentlysubscribes, for example, China 086 or France 033. The functional addressincludes a call type and a user number. The call type is a prefix, andis used to distinguish between different types of user numbers. For anetwork, the call type is also an indication about how to interpret areceived number, for example, consider that the number corresponds to atrain number, or a control room number, or an engine number. Thefunctional code indicates a role associated with the functional address.The identity of the alias may be used for communicating with andaddressing a user. For example, Identity of the alias=Internationalcode+Functional address (Call type+User number)+Functionalcode=049+2+0279+01. International code=049 (049 represents German), Calltype=2 (2 represents a train), User number=0279 (0279 represents a trainnumber), Functional code=01 (01 represents a chief driver).

302. The functional alias management entity sends a registrationresponse message to the first client when a user has an aliasregistration right.

The registration response message may include the identity of the user,a name of an alias that is successfully registered, and an identity (ID)of the alias that is successfully registered.

For example, after receiving the registration response message, when thefirst client needs to use the alias, the first client may activate thealias that is successfully registered, so that the user using the firstclient can be addressed based on the identity of the alias that issuccessfully activated.

It should be noted that, when the name of the alias is unique in thewhole system, the name of the alias may be used as the identity of thealias, or an identity that is unique in the whole system and canidentify the alias may be allocated to the alias.

When the name of the alias requested to be registered is not registered,the alias that is successfully registered may be the alias requested tobe registered.

For example, when a quantity of aliases requested to be registered is 1,and the alias requested to be registered is not registered, thefunctional alias management entity registers the alias for the user, andin this case, the alias requested to be registered is the alias that issuccessfully registered; or when a quantity of aliases requested to beregistered is greater than 1, and at least one non-registered aliasexists in the aliases requested to be registered, the functional aliasmanagement entity activates the at least one alias for the user, and inthis case, the at least one non-registered alias is the alias that issuccessfully registered.

Further, the registration response message may further include a servicetype of the alias that is successfully registered.

An identity of the alias that is successfully registered may bepreallocated by the system to the alias. To be specific, an associationrelationship between the name of the alias and the identity of the aliasis prestored in the functional alias management entity. The identity ofthe alias may alternatively be allocated by the functional aliasmanagement entity to the alias, for example, allocated when thefunctional alias management entity determines that the user has thealias registration right, so that the user is addressed based on theidentity of the alias.

In step 302, the functional alias management entity may determine, inthe following manners, that the user has the alias registration right,but this is not limited.

In a first possible implementation, an attribute of the user is whetherthe user has the alias registration right, and an associationrelationship exists between the attribute and the identity of the user.After receiving the registration request message, the functional aliasmanagement entity may know, based on the identity of the user carried inthe registration request message, whether the user has the aliasregistration right.

In a second possible implementation, before step 302, the method mayfurther include: the functional alias management entity may performauthorization check on the user.

Specifically, before step 302, the method may further include: thefunctional alias management entity obtains alias right relatedinformation based on the identity of the user, and determines, based onthe alias right related information, whether the user has the aliasregistration right. The alias right related information may besubscription information of the user, or may be policy informationlocally stored by the functional alias management entity.

In a possible specific implementation, the functional alias managemententity obtains the subscription information of the user based on theidentity of the user, where the subscription information of the userincludes indication information, and the indication information is usedto indicate whether the user has the alias registration right. Thefunctional alias management entity may determine, based on thesubscription information of the user, whether the user has the aliasregistration right. When the indication information included in thesubscription information is used to indicate that the user has the aliasregistration right, the functional alias management entity may determinethat the user has the alias registration right; or when the indicationinformation included in the subscription information is used to indicatethat the user does not have the alias registration right, the functionalalias management entity may determine that the user does not have thealias registration right.

For example, in the subscription information, one bit may be used toindicate whether the user has the alias registration right. For example,“1” indicates that the user has the alias registration right, and “0”indicates that the user does not have the alias registration right. Inaddition, the subscription information may not only indicate whether theuser has the alias registration right, but also indicate, when the userhas the alias registration right, which alias (one or more aliases) theuser has the alias registration right for. For example, only “1” in thesubscription information is used to indicate that the user has the aliasregistration right. In this case, it may implicitly indicate that theuser has the alias registration right for all aliases. For anotherexample, the subscription information includes only a list of aliasesthat the user is allowed to register. In this case, it indicates thatthe user has the alias registration right, and has the aliasregistration right for only the aliases in the alias list.

In another possible specific implementation, the functional aliasmanagement entity obtains the policy information, and determines, basedon the policy information, whether the user has the alias registrationright, where the policy information includes an identity of a user thathas the alias registration right.

Specifically, the functional alias management entity may obtain thelocally stored policy information, where the policy information includesan identity of one or more users that have the alias registration right,and then the functional alias management entity may determine, bydetermining whether the identity of the user included in theregistration request message is included in the policy information,whether the user has the alias registration right. When the identity ofthe user is included in the policy information, the functional aliasmanagement entity determines that the user has the alias registrationright; or when the identity of the user is not included in the policyinformation, the functional alias management entity determines that theuser does not have the alias registration right.

For example, the policy information may include only identities of usersto indicate which users have the alias registration right. Certainly,the policy information may further indicate for which alias (one or morealiases) the user has the alias registration right. For example, thepolicy information includes only an identity list of users that have thealias registration right. In this case, it may implicitly indicate thatthe users have the alias registration right for all aliases. For anotherexample, the policy information includes a list of aliases and anidentity list of users corresponding to the aliases and having the aliasregistration right, to indicate that the users have the aliasregistration right for only the aliases in the alias list.

It should be noted that, in this embodiment of this application,authorization check may be further performed on the user based on boththe subscription information of the user and the policy informationlocally stored by the functional alias management entity.

In a third possible implementation, before step 302, the method mayfurther include: the functional alias management entity may performauthorization check on the user, and determine whether the aliasrequested to be registered is not registered.

Specifically, before step 302, the method may further include: when aquantity of aliases requested to be registered is 1, the functionalalias management entity performs authorization check on the user, anddetermines whether the alias requested to be registered is notregistered.

For example, if authorization check on the user succeeds and the aliasrequested to be registered is not registered, step 302 is performed; orwhen a quantity of names of aliases requested to be registered isgreater than 1, the functional alias management entity performsauthorization check on the user, determines whether at least onenon-registered alias exists in the aliases requested to be registered,and if authorization check on the user succeeds and at least onenon-registered alias exists in the aliases requested to be registered,performs step 302.

It should be noted that, an execution sequence between authorizationcheck and determining whether the alias requested to be registered isnot registered is random and not specifically limited herein. Inaddition, a specific implementation of performing authorization check onthe user in the third implementation is similar to that in the secondimplementation, and is not described again herein.

In addition, when the subscription information or the policy informationof the user not only indicates whether the user has the aliasregistration right, but also indicates which aliases the user has thealias registration right for, the functional alias management entityperforms step 302 when determining that the user has the aliasregistration right for an alias requested to be registered and that thealias requested to be registered is not registered; or when thefunctional alias management entity determines that the user does nothave the alias registration right for an alias requested to beregistered or that the alias requested to be registered is alreadyregistered, it indicates that the alias requested to be registered isnot allowed to be registered, and in this case, a failure responsemessage may be returned to the first client.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives theregistration request message sent by the first client and including theidentity of the user and the name of the alias requested to beregistered; and when the user has the alias registration right, thefunctional alias management entity sends, to the first client, theregistration response message including the identity of the user, thename of the alias that is successfully registered, and the identity ofthe alias that is successfully registered. After the functional aliasmanagement entity receives the registration request message sent by thefirst client, when determining that the requester that requests toregister the alias has the alias registration right, the functionalalias management entity returns, to the first client, the registrationresponse message including the identity of the requester, the name ofthe alias that is successfully registered, and the identity of the aliasthat is successfully registered, without correspondingly processing auser configuration file in which the alias is configured. Therefore,alias registration can be implemented, and a problem of low aliasmanagement efficiency and heavy system processing load is resolved. Inaddition, the alias requested to be registered has no bindingrelationship with the service type, and can be flexibly operated.

Optionally, in an implementation scenario of the foregoing embodiment,before the functional alias management entity sends the registrationresponse message to the first client in step 302, the method furtherincludes:

when the name of the alias requested to be registered is not registered,the functional alias management entity allocates an identity to thealias requested to be registered.

For example, when the name of the alias requested to be registered isnot registered, the functional alias management entity may generate anidentity for the alias requested to be registered, and allocate theidentity to the alias requested to be registered. When generating theidentity for the alias requested to be registered, the functional aliasmanagement entity may generate the identity based on composition of theidentity. For example, the identity of the alias includes three parts:an international code, a functional address, and a functional code. Itshould be noted that, for descriptions about the international code, thefunctional address, and the functional code, refer to the descriptionsin step 301. Details are not described again herein.

For example, when a quantity of names of aliases requested to beregistered is 1, and the alias requested to be registered is notregistered, the functional alias management entity allocates theidentity to the alias requested to be registered; or when a quantity ofnames of aliases requested to be registered is greater than 1, and atleast one non-registered alias exists in the aliases requested to beregistered, the functional alias management entity allocates theidentity to the at least one non-registered alias.

In this case, the alias that is successfully registered in step 302 isthe alias requested to be registered.

Optionally, in another implementation scenario of the foregoingembodiment, after step 302, the method may further include: thefunctional alias management entity sends a notification message to asecond client.

The notification message may include the name of the alias that issuccessfully registered, and the identity of the alias that issuccessfully registered.

For example, the functional alias management entity sends, to the secondclient, the notification message including the name of the alias that issuccessfully registered, and the identity of the alias that issuccessfully registered, to notify the second client that the usersuccessfully registers the alias that is successfully registered.

The second client may be a client used by all users in the system, ormay be a client used by a user in an application scope of the alias thatis successfully registered. The application scope may be carried in theregistration request message, or may be allocated by the functionalalias management entity to the alias.

For example, when the application scope of the alias is a user list, thefunctional alias management entity may directly send a notificationmessage to a second client used by a user in the user list; when theapplication scope of the alias is a user role list, the functional aliasmanagement entity may send, by using another functional entity such as amission critical service server, a notification message to a secondclient used by a user corresponding to a role in the user role list.

Optionally, when the functional alias management entity is notconfigured in the mission critical service server, the functional aliasmanagement entity may further send, to the mission critical serviceserver, a notification message including the name of the alias that issuccessfully registered, and the identity of the alias that issuccessfully registered, so that the mission critical service server cansubsequently recognize the alias that is successfully registered, andfurther address a user that activates the alias.

Further, the notification message may further include at least one ofthe following: the service type of the alias that is successfullyregistered, an attribute of the alias that is successfully registered,the application scope of the alias that is successfully registered, anda valid time of the alias that is successfully registered. Theparameters may be received by the first client, or may be allocated bythe functional alias management entity. This is not specifically limitedherein.

In an alternative solution of the foregoing embodiment, a step forreplacing step 302 includes:

when the user does not have the alias registration right, the functionalalias management entity returns a failure response message to the firstclient; or when the user has the alias registration right, and the nameof the alias requested to be registered is already registered, thefunctional alias management entity returns a failure response message tothe first client.

Further, the failure response message may include a failure cause. Forexample, when the user does not have the alias registration right, thefailure cause is that authorization check fails. When the first clientreceives the failure response message carrying the failure cause thatauthorization check fails, the first client may request a higher right,so as to register the alias. For another example, when the user has thealias registration right, and the name of the alias requested to beregistered is already registered, the failure cause is that the name ofthe alias requested to be registered is already registered. When thefirst client receives the failure cause that the name of the aliasrequested to be registered is already registered, the first client mayrequest to register another alias.

It should be noted that, for terms used in this application, mutualreference may be made in different embodiments.

FIG. 5 is an alias management method for requesting to activate an aliasaccording to an embodiment of this application. As shown in FIG. 5 , themethod may include the following steps.

401. A functional alias management entity receives an activation requestmessage sent by a first client.

The activation request message may include an identity of a user and anidentity of an alias requested to be activated. The activation requestmessage is used to request to activate the alias.

The user is a user using the first client.

For example, when the user needs to use the alias, the first client usedby the user may send, to the functional alias management entity, theactivation request message carrying the identity of the user and theidentity of the alias requested to be activated, to request to activatethe alias.

It should be noted that, the first client may directly send theactivation request message to the functional alias management entity, ormay indirectly send the activation request message to the functionalalias management entity by using another functional entity. In otherwords, the functional alias management entity may directly receive theactivation request message sent by the first client, or may indirectlyreceive the activation request message sent by the first client. This isnot specifically limited herein.

In a specific implementation, an activation request message may carryone or more identities of the user. Different identities correspond todifferent service types, for example, basic service types such as anMCPTT service, an MCData service, and an MCVideo service, and otherservice types such as a railway application and an enterpriseapplication. An activation request message may also carry an identity ofone or more aliases requested to be activated. When an activationrequest message carries identities of a plurality of aliases requestedto be activated, the first client may request, by sending one activationrequest message, to activate the plurality of aliases.

Further, the activation request message may further include a servicetype of the alias.

402. The functional alias management entity sends an activation responsemessage to the first client when a user has an alias activation right.

The activation response message may include the identity of the user andan identity of an alias that is successfully activated.

For example, when the user has the alias activation right, thefunctional alias management entity may send, to the first client, theactivation response message carrying the identity of the user and theidentity of the alias that is successfully activated, so that the userusing the first client can be addressed based on the identity of thealias that is successfully activated.

Further, the registration response message may further include a servicetype of the alias that is successfully activated.

For example, when the alias requested to be activated is not an aliasthat a plurality of users are allowed to simultaneously activate, andthe alias requested to be activated is not activated, the functionalalias management entity activates the alias for the user, and in thiscase, the alias requested to be activated is the alias that issuccessfully activated; or when the alias requested to be activated isan alias that a plurality of users are allowed to simultaneouslyactivate, and a quantity of users who successfully activate the aliasrequested to be activated is greater than 0 and less than a maximumactivation quantity, the functional alias management entity activatesthe alias for the user, and in this case, the alias requested to beactivated is the alias that is successfully activated; or when the aliasrequested to be activated is not an alias that a plurality of users areallowed to simultaneously activate, the alias requested to be activatedis not activated, and the service type of the alias requested to beactivated is the same as a service type corresponding to the identity ofthe user, the functional alias management entity activates the alias forthe user, and in this case, the alias requested to be activated is thealias that is successfully activated; or when the alias requested to beactivated is an alias that a plurality of users are allowed tosimultaneously activate, a quantity of users who successfully activatethe alias requested to be activated is greater than 0 and less than amaximum activation quantity, and the service type of the alias requestedto be activated is the same as a service type corresponding to theidentity of the user, the functional alias management entity activatesthe alias for the user, and in this case, the alias requested to beactivated is the alias that is successfully activated.

In step 402, the functional alias management entity may determine, inthe following manners, that the user has the alias activation right, butthis is not limited.

In a first possible implementation, an attribute of the user is whetherthe user has the alias activation right, and an association relationshipexists between the attribute and the identity of the user. Afterreceiving the activation request message, the functional aliasmanagement entity may know, based on the identity of the user carried inthe activation request message, whether the user has the aliasactivation right.

In a second possible implementation, before step 402, the method mayfurther include: the functional alias management entity may performauthorization check on the user.

Specifically, before step 402, the method may further include: thefunctional alias management entity obtains alias right relatedinformation based on the identity of the user, and determines, based onthe alias right related information, whether the user has the aliasactivation right. The alias right related information may besubscription information of the user, or may be policy informationlocally stored by the functional alias management entity.

In a possible specific implementation, the functional alias managemententity obtains the subscription information of the user based on theidentity of the user, where the subscription information of the userincludes indication information, and the indication information is usedto indicate whether the user has the alias activation right. Thefunctional alias management entity may determine, based on thesubscription information of the user, whether the user has the aliasactivation right. When the indication information included in thesubscription information is used to indicate that the user has the aliasactivation right, the functional alias management entity may determinethat the user has the alias activation right; or when the indicationinformation included in the subscription information is used to indicatethat the user does not have the alias activation right, the functionalalias management entity may determine that the user does not have thealias activation right.

In another possible specific implementation, the functional aliasmanagement entity obtains the policy information, and determines, basedon the policy information and the identity of the user, whether the userhas the alias activation right, where the policy information includes anidentity of a user that has the alias activation right. When theidentity of the user is included in the policy information, thefunctional alias management entity determines that the user has thealias activation right; or when the identity of the user is not includedin the policy information, the functional alias management entitydetermines that the user does not have the alias activation right.

It should be noted that, in this embodiment of this application,authorization check may be further performed on the user based on boththe subscription information of the user and the policy informationlocally stored by the functional alias management entity.

In a third possible implementation, before step 402, the method mayfurther include: the functional alias management entity may performauthorization check on the user; and after the authorization checksucceeds, the functional alias management entity may determine whetherthe alias requested to be activated is an alias that a plurality ofusers are allowed to simultaneously activate, and determine whether thealias requested to be activated is not activated.

For example, if the alias requested to be activated is not an alias thata plurality of users are allowed to simultaneously activate, and thealias requested to be activated is not activated, step 402 is performed;or if the alias requested to be activated is an alias that a pluralityof users are allowed to simultaneously activate, and a quantity of userswho successfully activate the alias requested to be activated is greaterthan 0 and less than the maximum activation quantity, step 402 may alsobe performed.

Further, when the activation request message includes the service typeof the alias requested to be activated, it may be further determinedthat the service type of the alias requested to be activated is the sameas the service type corresponding to the identity of the user.

For example, if the alias requested to be activated is not an alias thata plurality of users are allowed to simultaneously activate, the aliasrequested to be activated is not activated, and the service type of thealias requested to be activated is the same as the service typecorresponding to the identity of the user, step 402 is performed; or ifthe alias requested to be activated is an alias that a plurality ofusers are allowed to simultaneously activate, a quantity of users whosuccessfully activate the alias requested to be activated is greaterthan 0 and less than the maximum activation quantity, and the servicetype of the alias requested to be activated is the same as the servicetype corresponding to the identity of the user, step 402 is performed.

A specific implementation of performing authorization check on the userin the third implementation is similar to that in the second manner, andis not described again herein.

It should be noted that, when the activation request message includesidentities of two or more aliases requested to be activated, afterauthorization check succeeds, the foregoing determining operation may beperformed on an identity of each alias requested to be activated, andstep 402 is performed when the foregoing determining operation isperformed on the identity of each alias requested to be activated and atleast one alias requested to be activated is an alias that issuccessfully activated. In addition, if no alias that is successfullyactivated exists in the aliases requested to be activated, a failureresponse message may be returned to the first client.

For example, whether the alias requested to be activated is an aliasthat a plurality of users are allowed to simultaneously activate, andwhen the alias requested to be activated is an alias that a plurality ofusers are allowed to simultaneously activate, a maximum activationquantity allowed to perform activation is included in an attribute ofthe alias requested to be activated. In addition, the functional aliasmanagement entity may locally maintain a piece of activating userinformation dynamically to learn of a quantity of users that activatethe alias at a current moment, for example, may locally store a list ofactivating users. For example, as shown in Table 2, identities of userswho successfully activate an alias whose identity is xxx are a userservice ID 1, a user service ID 2, and a user service ID 3, andidentities of users who successfully activate an alias whose identity isyyy are a user service ID 7, a user service ID 9, and a user service ID10.

TABLE 2 Identity of the alias List of activating users xxx user serviceID 1, user service ID 2, and user service ID 3 yyy user service ID 7,user service ID 9, and user service ID 10

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives theactivation request message sent by the first client and including theidentity of the user and the identity of the alias requested to beactivated; and when the user has the alias activation right, thefunctional alias management entity sends, to the first client, theactivation response message including the identity of the user and theidentity of the alias that is successfully activated. After thefunctional alias management entity receives the activation requestmessage sent by the first client, when determining that the requesterthat requests to activate the alias has the alias activation right, thefunctional alias management entity returns, to the first client, theactivation response message including the identity of the requester andthe identity of the alias that is successfully activated, withoutcorrespondingly processing a user configuration file in which the aliasis configured. Therefore, alias activation can be implemented, and aproblem of low alias management efficiency and heavy system processingload is resolved. In addition, because the alias requested to beactivated is not bound with the user configuration file, no necessaryrelationship exists between activation of the alias and activation ofthe user configuration file, and flexibility of the alias operation isimproved.

Optionally, in an implementation scenario of the foregoing embodiment,after step 402, the method may further include: the functional aliasmanagement entity stores an association relationship between theidentity of the user and the alias that is successfully activated.

Specifically, when the functional alias management entity determinesthat the user has the alias activation right, the functional aliasmanagement entity may further store the association relationship betweenthe identity of the user and the alias that is successfully activated,indicating that the user successfully activates the alias. For example,the functional alias management entity may store the identity of theuser in activating user information corresponding to the alias. Forexample, the identity of the alias that the user requests to activate isxxx, and the identity of the user is a user service ID 4; when the aliasrequested to be activated is successfully activated, the functionalalias management entity may add the identity user service ID 4 of theuser to a corresponding position in the activation list shown in Table2.

Optionally, in another implementation scenario of the foregoingembodiment, after step 402, the method may further include: thefunctional alias management entity sends a notification message to asecond client.

Specifically, when the alias requested to be activated is successfullyactivated, and another user also successfully activates the aliassimultaneously, the functional alias management entity may send thenotification message to the second client, to notify the second clientthat the user successfully activates the alias, and may further addressthe user.

The second client may be a client used by the user who successfullyactivates the alias. The user successfully activating the alias may be auser that currently still keeps a state of activating the alias, and isnot a user that previously activated the alias and subsequentlydeactivated the alias. For example, the second client may be a clientused by a user corresponding to an identity of another user that isincluded in the activating user information corresponding to the alias.

Further, when the functional alias management entity is not configuredin a mission critical service server, the functional alias managemententity may send an activation notification message to the missioncritical service server.

The activation notification message may include the identity of thealias that is successfully activated and the identity of the user, andan association relationship exists between the identity of the aliasthat is successfully activated and the identity of the user, so that themission critical service server can route a message and address the usersubsequently.

When the functional alias management entity is not configured in afunctional alias management server, the functional alias managemententity may send an activation notification message to the functionalalias management server, so that the alias management server maintainsand updates alias information based on the received activationnotification message. The activation notification message is similar tothe activation notification message sent by the functional aliasmanagement entity to the mission critical service server when thefunctional alias management entity is not configured in the missioncritical service server, and is not described again herein.

In an alternative solution of the foregoing embodiment, the followingstep is used to replace step 402:

When the user does not have the alias activation right, the functionalalias management entity returns a failure response message to the firstclient; or when the user has the alias activation right, and no aliasthat is successfully activated exists in the alias requested to beactivated, the functional alias management entity returns a failureresponse message to the first client.

For example, when the alias requested to be activated is not an aliasthat a plurality of users are allowed to simultaneously activate, andthe alias requested to be activated is already activated, the aliasrequested to be activated is an alias that is not successfullyactivated.

Further, the failure response message may include a failure cause. Forexample, when the user does not have the alias activation right, thefailure cause is that authorization check fails. When the first clientreceives the failure response message carrying the failure cause thatauthorization check fails, the first client may request a higher right,so as to activate the alias. For another example, when the user has thealias activation right, the alias requested to be activated is not analias that a plurality of users are allowed to simultaneously activate,and the alias requested to be activated is already activated, thefailure cause is that the alias requested to be activated is not analias that a plurality of users are allowed to simultaneously activate,and that the alias requested to be activated is already activated. Whenthe first client receives the failure cause that the alias requested tobe activated is not an alias that a plurality of users are allowed tosimultaneously activate, and that the alias requested to be activated isalready activated, the first client may request to take over the aliasrequested to be activated, to implement activation of the alias. Foranother example, when the user has the alias activation right, the aliasrequested to be activated is an alias that a plurality of users areallowed to simultaneously activate, and a quantity of users whosuccessfully activate the alias requested to be activated is greaterthan the maximum activation quantity, the failure cause is that thequantity of users who successfully activate the alias requested to beactivated is greater than the maximum activation quantity. When thefirst client receives the failure cause that the quantity of users whosuccessfully activate the alias requested to be activated is greaterthan the maximum activation quantity, the first client may request ahigher alias priority right, and further achieve a purpose ofsuccessfully activating the alias requested to be activated.

It should be noted that, for detailed descriptions in this embodiment ofthis application, reference may be made to detailed descriptions ofcorresponding content in the embodiment shown in FIG. 4 , and adifference lies only in that “register” is correspondingly replaced with“activate”. Details are not described again in this embodiment of thisapplication.

It should be noted that, the embodiment shown in FIG. 5 may be based onthe alias preconfigured by the system, or based on a newly registeredalias shown in FIG. 4 . When the user needs to use the alias, the usermay activate the alias.

FIG. 6 is an alias management method for requesting to deactivate analias according to an embodiment of this application. As shown in FIG. 6, the method may include the following steps.

501. A functional alias management entity receives a deactivationrequest message sent by a first client.

The deactivation request message may include an identity of a user andan identity of an alias requested to be deactivated. The deactivationrequest message is used to request to deactivate the alias.

The user is a user using the first client.

For example, when the user needs to deactivate the alias, the firstclient used by the user may send, to the functional alias managemententity, the deactivation request message carrying the identity of theuser and the identity of the alias requested to be deactivated, torequest to deactivate the alias.

In a specific implementation, a deactivation request message may carryone or more identities of the user. A deactivation request message mayalso carry an identity of one or more aliases requested to bedeactivated. Further, the deactivation request message may furtherinclude a service type of the alias requested to be deactivated.

502. The functional alias management entity sends a deactivationresponse message to the first client when a user has an aliasdeactivation right.

The deactivation response message may include the identity of the userand an identity of an alias that is successfully deactivated.

For example, when the deactivation request message includes identitiesof a plurality of aliases requested to be deactivated, the deactivationresponse message includes identities of all aliases that aresuccessfully deactivated in the plurality of aliases requested to bedeactivated. Further, the deactivation response message may furtherinclude a service type of the alias that is successfully deactivated.

For example, when the user has the alias deactivation right, thefunctional alias management entity may send, to the first client, thedeactivation response message carrying the identity of the user and theidentity of the alias that is successfully deactivated, so that thefirst client knows that the alias requested to be deactivated is alreadysuccessfully deactivated.

In step 502, the functional alias management entity may determine, inthe following manners, that the user has the alias deactivation right,but this is not limited.

In a first possible implementation, an attribute of the user is whetherthe user has the alias deactivation right, and an associationrelationship exists between the attribute and the identity of the user.After receiving the deactivation request message, the functional aliasmanagement entity may know, based on the identity of the user carried inthe deactivation request message, whether the user has the aliasdeactivation right.

In a second possible implementation, before step 502, the method mayfurther include: the functional alias management entity may performauthorization check on the user.

Specifically, before step 502, the method may further include: thefunctional alias management entity obtains alias right relatedinformation based on the identity of the user, and determines, based onthe alias right related information, whether the user has the aliasdeactivation right. The alias right related information may besubscription information of the user, or may be policy informationlocally stored by the functional alias management entity.

In a possible implementation, the functional alias management entityobtains the subscription information of the user based on the identityof the user, where the subscription information of the user includesindication information, and the indication information is used toindicate whether the user has the alias deactivation right. Thefunctional alias management entity may determine, based on thesubscription information of the user, whether the user has the aliasdeactivation right. When the indication information included in thesubscription information is used to indicate that the user has the aliasdeactivation right, the functional alias management entity may determinethat the user has the alias deactivation right; or when the indicationinformation included in the subscription information is used to indicatethat the user does not have the alias deactivation right, the functionalalias management entity may determine that the user does not have thealias deactivation right.

In another possible specific implementation, the functional aliasmanagement entity obtains the policy information, and determines, basedon the policy information and the identity of the user, whether the userhas the alias deactivation right, where the policy information includesan identity of a user that has the alias deactivation right. When theidentity of the user is included in the policy information, thefunctional alias management entity determines that the user has thealias deactivation right; or when the identity of the user is notincluded in the policy information, the functional alias managemententity determines that the user does not have the alias deactivationright.

It should be noted that, in this embodiment of this application,authorization check may be further performed on the user based on boththe subscription information of the user and the policy informationlocally stored by the functional alias management entity.

In a third possible implementation, when the deactivation requestmessage further includes the service type of the alias requested to bedeactivated, before step 502, the method may further include: thefunctional alias management entity may perform authorization check onthe user; and after the authorization check succeeds, the functionalalias management entity determines whether the service type of the aliasrequested to be deactivated is the same as a service type correspondingto the identity of the user. For example, when the service type of thealias requested to be deactivated is the same as the service typecorresponding to the identity of the user, the alias requested to bedeactivated is the alias that is successfully deactivated.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives thedeactivation request message sent by the first client and including theidentity of the user and the identity of the alias requested to bedeactivated; and when the user has the alias deactivation right, thefunctional alias management entity sends, to the first client, thedeactivation response message including the identity of the user and theidentity of the alias that is successfully deactivated. After thefunctional alias management entity receives the deactivation requestmessage sent by the first client, when determining that the requesterthat requests to deactivate the alias has the alias deactivation right,the functional alias management entity returns, to the first client, thedeactivation response message including the identity of the requesterand the identity of the alias that is successfully deactivated, withoutcorrespondingly processing a user configuration file in which the aliasis configured. Therefore, alias deactivation can be implemented, and aproblem of low alias management efficiency and heavy system processingload is resolved.

Optionally, in an implementation scenario of the foregoing embodiment,after step 502, the method further includes: the functional aliasmanagement entity deletes an association relationship between theidentity of the user and the identity of the alias that is successfullydeactivated.

Specifically, when the functional alias management entity determinesthat the user has the alias deactivation right, the functional aliasmanagement entity may delete the association relationship between theidentity of the user and the identity of the alias that is successfullydeactivated, that is, successfully deactivate the alias for the user.For example, the functional alias management entity may delete theidentity of the user from activating user information corresponding tothe alias that is successfully deactivated. For example, if the identityof the alias that the user requests to deactivate is xxx, and theidentity of the user is a user service ID 1, the user service ID 1 inTable 2 shown in another embodiment of this application may be deleted.

Optionally, in another implementation scenario of the foregoingembodiment, after step 502, the method further includes: the functionalalias management entity sends a notification message to a second client.

For example, when the alias that is successfully deactivated issuccessfully deactivated by another user, the functional aliasmanagement entity may send the notification message to the secondclient, to notify the second client that the user successfullydeactivates the alias that is successfully deactivated.

The second client may be a client used by another user who successfullyactivates the alias that is successfully deactivated. The usersuccessfully activating the alias that is successfully deactivated maybe a user that currently still keeps a state of activating the alias,and is not a user that previously activated the alias and subsequentlydeactivated the alias. For example, the second client may be a clientused by a user corresponding to an identity of another user that isincluded in activating user information corresponding to the alias thatis successfully deactivated, and the activating user information isactivating user information at a current moment.

Further, when the functional alias management entity is not configuredin a mission critical service server, the functional alias managemententity may send a deactivation notification message to the missioncritical service server. For example, after receiving the deactivationnotification message, the mission critical service server may performcall control and media control based on the deactivation notificationmessage.

The deactivation notification message may include the identity of theuser and the identity of the alias that is successfully deactivated. Anassociation relationship exists between the identity of the alias thatis successfully deactivated and the identity of the user.

When the functional alias management entity is not configured in afunctional alias management server, the functional alias managemententity may send a deactivation notification message to the functionalalias management server, so that the alias management server maintainsand updates alias information based on the received deactivationnotification message. The deactivation notification message is similarto the deactivation notification message sent by the functional aliasmanagement entity to the mission critical service server when thefunctional alias management entity is not configured in the missioncritical service server, and is not described again herein.

In an alternative solution of the foregoing embodiment, the followingstep may be used to replace step 502:

When the user does not have the alias deactivation right, the functionalalias management entity returns a failure response message to the firstclient.

Further, the failure response message may include a failure cause. Forexample, when the functional alias management entity determines that theuser does not have the alias deactivation right, the failure cause isthat authorization check fails. When the first client receives thefailure response message carrying the failure cause that authorizationcheck fails, the first client may request a higher right, so as todeactivate the alias. For another example, when the functional aliasmanagement entity determines that the user has the alias deactivationright, and the alias requested to be deactivated is not allowed to bedeactivated, the failure cause is that the alias requested to bedeactivated is not allowed to be deactivated.

It should be noted that, for detailed descriptions in this embodiment ofthis application, reference may be made to detailed descriptions ofcorresponding content in the embodiment shown in FIG. 5 , and adifference lies only in that “activate” is replaced with “deactivate”.Details are not described again in this embodiment of this application.

It should be noted that, when the user needs to deactivate an alias, themethod shown in FIG. 6 may be used to perform a deactivation operationon the alias. The deactivation method may be performed on a basis of themethod shown in FIG. 5 , and is not limited.

In an embodiment of this application, when a user needs to take over analias, a takeover operation may be performed on the alias.

FIG. 7 is an alias management method for requesting to take over analias according to an embodiment of this application. As shown in FIG. 7, the method may include the following steps.

601. A functional alias management entity receives a takeover requestmessage sent by a first client.

The takeover request message may include an identity of a user and anidentity of an alias requested to be taken over. The takeover requestmessage is used to request to take over the alias.

The user is a user using the first client.

For example, when the user needs to take over the alias, the firstclient used by the user may send, to the functional alias managemententity, the takeover request message carrying the identity of the userand the identity of the alias requested to be taken over, to request totake over the alias.

It should be noted that, the first client may directly send the takeoverrequest message to the functional alias management entity, or mayindirectly send the takeover request message to the functional aliasmanagement entity by using another functional entity. In other words,the functional alias management entity may directly receive the takeoverrequest message sent by the first client, or may indirectly receive thetakeover request message sent by the first client. This is notspecifically limited herein.

In a specific implementation, a takeover request message may carry oneor more identities of the user. Different identities correspond todifferent service types, for example, basic service types such as anMCPTT service, an MCData service, and an MCVideo service, and otherservice types such as a railway application and an enterpriseapplication. A takeover request message may also carry an identity ofone or more aliases requested to be taken over.

Further, the takeover request message may further include a service typeof the alias requested to be taken over.

602. The functional alias management entity sends a takeover responsemessage to the first client when a user has an alias takeover right.

The takeover response message may include the identity of the user andan identity of an alias that is successfully taken over.

For example, when the takeover request message includes identities of aplurality of aliases requested to be taken over, the takeover responsemessage includes identities of all aliases that are successfully takenover in the plurality of aliases requested to be taken over.

For example, when the user has the alias takeover right, the functionalalias management entity may send, to the first client, the takeoverresponse message carrying the identity of the user and the identity ofthe alias that is successfully taken over, so that the first clientknows that the alias requested to be taken over is already successfullytaken over, and subsequently may address, based on the identity of thealias that is successfully taken over, the user using the first client.

Further, the takeover response message may further include a servicetype of the alias that is successfully taken over.

For example, when the alias requested to be taken over is an aliasallowed to be taken over, the alias requested to be taken over is thealias that is successfully taken over; or when the alias requested to betaken over is an alias allowed to be taken over and the service type ofthe alias requested to be taken over is the same as a service typecorresponding to the identity of the user, the alias requested to betaken over is the alias that is successfully taken over.

In step 602, the functional alias management entity may determine, inthe following manners, that the user has the alias takeover right, butthis is not limited.

In a first possible implementation, an attribute of the user is whetherthe user has the alias takeover right, and an association relationshipexists between the attribute and the identity of the user. Afterreceiving the takeover request message, the functional alias managemententity may know, based on the identity of the user carried in thetakeover request message, whether the user has the alias takeover right.

In a second possible implementation, before step 602, the method furtherincludes: the functional alias management entity may performauthorization check on the user.

Specifically, before step 602, the method may further include: thefunctional alias management entity obtains alias right relatedinformation based on the identity of the user, and determines, based onthe alias right related information, whether the user has the aliastakeover right. The alias right related information may be subscriptioninformation of the user, or may be policy information locally stored bythe functional alias management entity.

In a possible specific implementation, the functional alias managemententity obtains the subscription information of the user based on theidentity of the user, where the subscription information of the userincludes indication information, and the indication information is usedto indicate whether the user has the alias takeover right. Thefunctional alias management entity may determine, based on thesubscription information of the user, whether the user has the aliastakeover right. When the indication information included in thesubscription information is used to indicate that the user has the aliastakeover right, the functional alias management entity may determinethat the user has the alias takeover right; or when the indicationinformation included in the subscription information is used to indicatethat the user does not have the alias takeover right, the functionalalias management entity may determine that the user does not have thealias takeover right.

In another possible specific implementation, the functional aliasmanagement entity obtains the policy information, and determines, basedon the policy information and the identity of the user, whether the userhas the alias takeover right, where the policy information includes anidentity of a user that has the alias takeover right. When the identityof the user is included in the policy information, the functional aliasmanagement entity determines that the user has the alias takeover right;or when the identity of the user is not included in the policyinformation, the functional alias management entity determines that theuser does not have the alias takeover right.

In a third possible implementation, before step 602, the method furtherincludes: the functional alias management entity performs authorizationcheck on the user, and determines whether the alias requested to betaken over is an alias allowed to be taken over.

Specifically, before step 602, the method may further include: when aquantity of identities of aliases requested to be taken over is 1, thefunctional alias management entity performs authorization check on theuser, and determines whether the alias requested to be taken over is analias allowed to be taken over, and if authorization check on the usersucceeds, and the alias requested to be taken over is an alias allowedto be taken over, performs step 602; or

when a quantity of identities of aliases requested to be registered isgreater than 1, the functional alias management entity performsauthorization check on the user, determines whether at least one aliasallowed to be taken over exists in the aliases requested to be takenover, and if authorization check on the user succeeds and at least onealias allowed to be taken over exists in the aliases requested to betaken over, performs step 602.

It should be noted that, an execution sequence between authorizationcheck and determining whether the alias requested to be taken over is analias allowed to be taken over is random and not specifically limitedherein. In addition, a specific implementation of performingauthorization check on the user in the third implementation is similarto that in the second implementation, and is not described again herein.

Further, when the takeover request message further includes the servicetype of the alias requested to be taken over, the functional aliasmanagement entity may further determine whether the service type of thealias requested to be taken over is the same as the service typecorresponding to the identity of the user.

For example, when the alias requested to be taken over is an aliasallowed to be taken over, and the service type of the alias requested tobe taken over is the same as the service type corresponding to theidentity of the user, step 602 is performed.

It should be noted that, when the takeover request message includesidentities of two or more aliases requested to be taken over, afterauthorization check succeeds, the foregoing determining operation may beperformed on an identity of each alias requested to be taken over, andstep 602 is performed when the foregoing determining operation isperformed on the identity of each alias requested to be taken over andat least one alias requested to be taken over is an alias that issuccessfully taken over. In addition, if no alias that is successfullytaken over exists in the aliases requested to be taken over, a failureresponse message may be returned to the first client.

For example, an attribute of the alias requested to be taken over mayinclude indication information used to indicate whether the aliasrequested to be taken over is an alias allowed to be taken over.

In the alias management method provided by this embodiment of thisapplication, the functional alias management entity receives thetakeover request message sent by the first client and including theidentity of the user and the identity of the alias requested to be takenover; and when the user has the alias takeover right, the functionalalias management entity sends, to the first client, the takeoverresponse message including the identity of the user and the identity ofthe alias that is successfully taken over. After the functional aliasmanagement entity receives the takeover request message sent by thefirst client, when determining that the requester that requests to takeover the alias has the alias takeover right, the functional aliasmanagement entity returns, to the first client, the takeover responsemessage including the identity of the requester and the identity of thealias that is successfully taken over, without correspondinglyprocessing a user configuration file in which the alias is configured.Therefore, alias takeover can be implemented, and a problem of low aliasmanagement efficiency and heavy system processing load is resolved.

Optionally, in an implementation scenario of the foregoing embodiment,after step 602, the method further includes: the functional aliasmanagement entity deletes an association relationship between theidentity of the alias that is successfully taken over and an identity ofa user using a second client.

The user using the second client may be a user successfully activatingthe alias that is successfully taken over.

Specifically, when the functional alias management entity determinesthat the user has the alias takeover right, if the alias that issuccessfully taken over is activated by another user (a client used bythe another user is the second client), the functional alias managemententity may delete an association relationship between the identity ofthe alias that is successfully taken over and the identity of the user.For example, the functional alias management entity may delete theidentity of the another user activating the alias, from activating userinformation corresponding to the alias that is successfully taken over.In addition, the association relationship between the identity of theuser and the alias that is successfully taken over may be stored. Inaddition, when the alias requested to be taken over is not activated,the alias management method shown in FIG. 5 may be performed to activatethe alias.

For example, when the functional alias management entity determines thatthe user has the alias takeover right, when the alias that issuccessfully taken over is activated by another user, the functionalalias management entity may delete the identity of the user activatingthe alias, from the activating user information. The user may be a userthat activates the alias earliest or latest based on time ordering, or auser that activates the alias and has a lowest user priority based onpriorities of users. To be specific, the identity of the user is deletedfrom the activating user information. Specifically, an algorithm is usedto specify the priority of the user. This is not limited in the presentinvention.

Optionally, in another implementation scenario of the foregoingembodiment, after step 602, the method may further include: thefunctional alias management entity sends a notification message to thesecond client.

The notification message is used to notify the second client that theuser using the first client successfully takes over the alias that issuccessfully taken over or used to instruct the second client todeactivate the alias that is successfully taken over. For example, afterreceiving the notification message, the second client may deactivate thealias that is successfully taken over.

The second client may be a client used by the user that alreadyactivates the alias. The user that already activates the alias may be auser that currently still keeps a state of activating the alias, and isnot a user that previously activated the alias and subsequentlydeactivated the alias.

Specifically, the functional alias management entity sends, to thesecond client, the notification message used to notify that the usersuccessfully takes over the alias that is successfully taken over, orthe notification message used to instruct the second client todeactivate the alias that is successfully taken over, so that the secondclient can deactivate the alias by performing the alias managementmethod shown in FIG. 6 . The notification message may be a cause code ormay be a plaintext character string in a specific implementation.

Further, when the functional alias management entity is not configuredin a mission critical service server, the functional alias managemententity may send a takeover notification message to the mission criticalservice server.

The takeover notification message may include the identity of the userand the identity of the alias that is successfully taken over. Anassociation relationship exists between the identity of the alias thatis successfully taken over and the identity of the user. The identity ofthe user corresponding to the identity of the alias that is successfullytaken over may be an identity of one or more users.

When the functional alias management entity is not configured in themission critical service server, the functional alias management entitymay further send a deactivation notification message to the missioncritical service server. The deactivation notification message includesthe identity of the user and an identity of an alias that issuccessfully deactivated.

For example, after receiving the takeover notification message and/orthe deactivation notification message, the mission critical serviceserver may perform corresponding call control and media control.

When the functional alias management entity is not configured in afunctional alias management server, the functional alias managemententity may send a takeover notification message and a deactivationnotification message to the functional alias management server, so thatthe alias management server maintains and updates corresponding aliasinformation, where the takeover notification message and thedeactivation notification message are respectively similar to thetakeover notification message and the deactivation notification messagesent by the functional alias management entity to the mission criticalservice server when the functional alias management entity is notconfigured in the mission critical service server. Details are notdescribed again herein.

It should be noted that, specific content to be sent in the twonotification messages may be implemented by using one message. Forexample, the functional alias management entity sends a notificationmessage to the mission critical service server, where the notificationmessage includes the identity of the alias that is successfully takenover and the identity of the user, and further includes the identity ofthe alias that is successfully deactivated and the identity of the user.Certainly, indication information may be used to indicate which aliasesare taken over and which aliases are deactivated.

Generally, the alias allowed to be taken over is not allowed to besimultaneously activated by a plurality of users. However, if the aliasallowed to be taken over is an alias allowed to be simultaneouslyactivated by a plurality of users, and at a current moment, another usersuccessfully activates the alias allowed to be taken over, whether totake over aliases of all other users or take over an alias of a user,and how to select an alias of a user to take over may be implemented, oran operator itself may specify a rule.

In an alternative solution of the foregoing embodiment, the followingstep may be used to replace step 602:

When the user does not have the alias takeover right, the functionalalias management entity returns a failure response message to the firstclient. Alternatively, when the user has the alias takeover right, andthe alias requested to be taken over is an alias not allowed to be takenover, the functional alias management entity returns a failure responsemessage to the first client.

Further, the failure response message may include a failure cause. Forexample, when the user does not have the alias takeover right, thefailure cause is that authorization check fails. When the first clientreceives the failure response message carrying the failure cause thatauthorization check fails, the first client may request a higher right,so as to take over the alias. For another example, when the user has thealias takeover right, and the alias requested to be taken over is analias not allowed to be taken over, the failure cause is that the aliasrequested to be taken over is an alias not allowed to be taken over.

It should be noted that, for detailed descriptions in this embodiment ofthis application, reference may be made to detailed descriptions ofcorresponding content in the embodiment shown in FIG. 4 , and adifference lies only in that “register” is replaced with “take over”.Details are not described again in this embodiment of this application.

It should be noted that, the activation notification message, thedeactivation notification message, and the takeover notification messagein the embodiments of this application may be distinguished by usingdifferent types of notification messages. Alternatively, a same type ofnotification message may be used, but in this case, a piece ofindication information needs to be carried in the notification message,where the indication information is used to indicate the type of themessage. For example, three bits may be used to indicate the type of thenotification message. For example, “001” indicates the activationnotification message, “010” indicates the deactivation notificationmessage, and “011” indicates the takeover notification message. Forexample, if a notification message includes an identity of a user 1 andan identity of an alias 1, and indication information is 001, itindicates that the notification message is used to notify that the user1 successfully activates the alias 1.

FIG. 8 is a flowchart of an alias-based addressing call method accordingto an embodiment of this application. As shown in FIG. 8 , the methodmay include the following steps.

701. A mission critical service server receives a call request messagesent by a first client.

The call request message includes an identity of a calling user and anidentity of an alias requested to be called.

The identity of the calling user may be an identity of a usercorresponding to the first client originating a call.

The alias requested to be called may be an alias of a called party, thealias requested to be called may be activated by one or more users, andall users activating the alias requested to be called are invited tojoin a call. The identity of the alias requested to be called is a nameor an identity that can uniquely identify the alias.

In this embodiment of this application, to implement alias addressingand calling functions, the identity of the alias should include a domainname, similar to a group identity.

702. The mission critical service server determines, based on anidentity of a calling user, that the calling user has an alias callright.

The mission critical service server may determine, in the followingimplementations, that the calling user has the alias call right:

Manner 1: The mission critical service server obtains subscriptioninformation of the calling user based on the identity of the callinguser, where the subscription information of the calling user includesindication information, and the indication information is used toindicate whether the user has the alias call right. The mission criticalservice server determines, based on the subscription information of thecalling user, that the calling user has the alias call right.

For example, when the indication information included in thesubscription information is used to indicate that the calling user hasthe alias call right, the mission critical service server may determinethat the calling user has the alias call right; or when the indicationinformation included in the subscription information is used to indicatethat the calling user does not have the alias call right, the missioncritical service server may determine that the calling user does nothave the alias call right.

Manner 2: The mission critical service server obtains policyinformation, where the policy information includes an identity of a userthat has an alias call right. The mission critical service serverdetermines, based on the policy information and the identity of thecalling user, whether the calling user has the alias call right.

For example, when the identity of the calling user is included in thepolicy information, the mission critical service server determines thatthe calling user has the alias call right; or when the identity of thecalling user is not included in the policy information, the missioncritical service server determines that the user does not have the aliascall right.

Authorization check may be further performed on the user with referenceto manner 1 and manner 2.

703. The mission critical service server obtains, from a functionalalias management entity, activating user information corresponding to anidentity of an alias requested to be called.

The activating user information includes an identity of a user thatactivates the alias requested to be called. The mission critical serviceserver may send, to the functional alias management entity, a requestmessage including the identity of the alias requested to be called, sothat the functional alias management entity returns, to the missioncritical service server, the activating user information correspondingto the identity of the alias requested to be called. For example, asshown in Table 2 in another embodiment of this application, when theidentity of the alias is xxx, the returned activating user informationis: a user service ID 1, a user service ID 2, and a user service ID 3.

704. The mission critical service server calls a user in the activatinguser information based on the activating user information correspondingto the identity of the alias requested to be called.

According to the example in step 703, the mission critical serviceserver may call clients used by users whose user identities are the userservice ID 1, the user service ID 2, and the user service ID 3.

For example, when the calling user and a called user are served bydifferent mission critical service servers, for each called user in theactivating user information, assuming that the calling user is served bya mission critical service server 1, and that the called user is servedby a mission critical service server 2, the mission critical serviceserver 1 sends a call request message to the mission critical serviceserver 2, where the call request message may include the identity of thecalling user, an identity of the called user, and the identity of thealias; then the mission critical service server 2 sends the call requestmessage to a client used by the called user, where the identity of thealias in the call request message is optional, and is used to indicatethat the call is a call made by using the alias. If the called userreceives the call, the client used by the called user may send a callresponse message to the mission critical service server 1 by using themission critical service server 2, to indicate that the call isaccepted. Certainly, when the calling user and the called user areserved by a same mission critical service server, assuming that both thecalling user and the called user are served by the mission criticalservice server 1, the mission critical service server 1 may directlysend the call request message to the client used by the called user.

705. The mission critical service server sends a call response messageto the first client.

The call response message may include the identity of the calling user,an identity of an alias that is successfully called, and an identity ofa user that is successfully called and corresponds to the identity ofthe alias that is successfully called.

In the alias-based addressing call method provided by this embodiment ofthis application, the mission critical service server receives the callrequest message sent by the first client, where the call request messageincludes the identity of the calling user and the identity of the aliasrequested to be called; and when the calling user has the alias callright, the mission critical service server calls, based on theactivating user information corresponding to the alias requested to becalled, the user that activates the alias requested to be called. Afterreceiving the call request message sent by the first client andincluding the identity of the calling user and the identity of the aliasrequested to be called, the mission critical service server determinesthat the calling user has the alias call right, and then the missioncritical service server calls the user corresponding to the aliasrequested to be called and activating the alias, thereby implementing analias-based addressing call.

It should be noted that, when a user needs to make an alias-basedaddressing call, the method shown in FIG. 8 may be performed. The methodmay be performed on a basis of activating the alias in the method shownin FIG. 5 .

The solutions provided by the embodiments of this application aredescribed above from a perspective of interaction between networkelements. It may be understood that, each network element, for example,the functional alias management entity or the client, includes acorresponding hardware structure and/or software module for performingeach function to implement the foregoing functions. A person skilled inthe art should be easily aware that, algorithm steps in the examplesdescribed with reference to the embodiments disclosed in thisapplication may be implemented by hardware or a combination of hardwareand computer software in this application. Whether a function isperformed by hardware or hardware driven by computer software depends onparticular applications and design constraints of the technicalsolutions. A person skilled in the art may use different methods toimplement the described functions for each particular application, butit should not be considered that the implementation goes beyond thescope of this application.

In the embodiments of this application, functional modules in thefunctional alias management entity may be obtained through divisionaccording to the foregoing method examples. For example, each functionalmodule corresponding to each function may be obtained through division,or two or more functions may be integrated in one processing module. Theintegrated module may be implemented in a form of hardware, or may beimplemented in a form of a software functional module. It should benoted that, division of modules in the embodiments of this applicationis merely an example, and is merely division of logical functions. Otherdivision manners may be used in actual implementations.

When each functional module corresponding to each function is obtainedthrough division, FIG. 9 is a possible schematic composition diagram ofthe functional alias management entity used in the foregoingembodiments. As shown in FIG. 9 , the functional alias management entitymay include a receiving unit 81 and a sending unit 82.

The receiving unit 81 is configured to support the functional aliasmanagement entity in performing step 301 in the alias management methodshown in FIG. 4 , step 401 in the alias management method shown in FIG.5 , step 501 in the alias management method shown in FIG. 6 , and step601 in the alias management method shown in FIG. 7 .

The sending unit 82 is configured to support the functional aliasmanagement entity in performing step 302 in the alias management methodshown in FIG. 4 , step 402 in the alias management method shown in FIG.5 , step 502 in the alias management method shown in FIG. 6 , and step602 and/or other sending operations in the alias management method shownin FIG. 7 .

In this embodiment of this application, the functional alias managemententity may further include an obtaining unit 83 and a determining unit84.

The obtaining unit 83 is configured to support the functional aliasmanagement entity in performing the obtaining operations in the aliasmanagement methods shown in FIG. 4 to FIG. 7 . The determining unit 84is configured to support the functional alias management entity inperforming the determining operations and/or judging operations in thealias management methods shown in FIG. 4 to FIG. 7 .

In this embodiment of this application, the functional alias managemententity may further include an allocation unit 85 or a storage unit 86 ora deletion unit 87.

The allocation unit 85 is configured to support the functional aliasmanagement entity in performing the allocation operation in the aliasmanagement method shown in FIG. 4 .

The storage unit 86 is configured to support the functional aliasmanagement entity in performing the storage operation in the aliasmanagement method shown in FIG. 5 .

The deletion unit 87 is configured to support the functional aliasmanagement entity in performing the deletion operations in the aliasmanagement methods shown in FIG. 6 and FIG. 7 .

It should be noted that, all related content of each step used in theforegoing method embodiments may be cited in function descriptions ofcorresponding functional modules. Details are not described againherein.

The functional alias management entity provided by this embodiment ofthis application is configured to perform the foregoing alias managementmethods, thereby achieving a same effect as the foregoing aliasmanagement methods.

When an integrated unit is used, FIG. 10 is another possible schematiccomposition diagram of the functional alias management entity used inthe foregoing embodiments. As shown in FIG. 10 , the functional aliasmanagement entity may include a processing module 91 and acommunications module 92.

The processing module 91 is configured to control and manage actions ofthe functional alias management entity and/or other processes in thetechnology described in the specification. For example, the processingmodule 91 is configured to support the functional alias managemententity in performing the obtaining operations in the alias managementmethods shown in FIG. 4 to FIG. 7 , the determining operations and/orthe judging operations in the alias management methods shown in FIG. 4to FIG. 7 , and the allocation operation in the alias management methodshown in FIG. 4 . The communications module 92 is configured to supportcommunication between the functional alias management entity and anothernetwork entity, for example, communication with a functional entity or anetwork entity shown in FIG. 1 and FIG. 2 . Specifically, for example,the communications module 92 is configured to support the functionalalias management entity in performing step 301 and step 302 in the aliasmanagement method shown in FIG. 4 , step 401 and step 402 in the aliasmanagement method shown in FIG. 5 , step 501 and step 502 in the aliasmanagement method shown in FIG. 6 , and step 601 and step 602 in thealias management method shown in FIG. 7 . A functional alias managemententity may further include a storage module 93, configured to storeprogram code and data of the functional alias management entity, and isfurther configured to support the functional alias management entity inperforming a storage operation.

The processing module 91 may be a processor or a controller. Theprocessing module may implement or execute various example logicalblocks, modules, and circuits described with reference to contentdisclosed in this application. The processor may also be a combinationfor implementing a computing function, for example, a combinationincluding one or more microprocessors, or a combination of a DSP and amicroprocessor. The communications module 92 may be a transceiver, atransceiver circuit, or a communications interface. The storage module93 may be a memory.

When the processing module 91 is a processor, the communications module92 is a communications interface, and the storage module 93 is a memory,the functional alias management entity used in this embodiment of thisapplication may be the functional alias management entity shown in FIG.3 .

In addition, an embodiment of this application further provides a chipsystem, where the chip system may include a processor, configured tosupport the functional alias management entity in implementing thefunctions in any one of the methods in FIG. 4 to FIG. 8 . Furtheroptionally, the chip system may further include a memory, where thememory is configured to store a program instruction and data required bythe functional alias management entity.

The foregoing descriptions about implementations allow a person skilledin the art to understand that, for the purpose of convenient and briefdescription, division of the foregoing functional modules is taken as anexample for illustration. In actual application, the foregoing functionscan be allocated to different modules and implemented according to arequirement, that is, an inner structure of an apparatus is divided intodifferent functional modules to implement all or part of the functionsdescribed above.

In the several embodiments provided in this application, it should beunderstood that the disclosed apparatus and method may be implemented inother manners. For example, the described apparatus embodiment is merelyan example. For example, the module or unit division is merely logicalfunction division and may be other division in actual implementation.For example, a plurality of units or components may be combined orintegrated into another apparatus, or some features may be ignored ornot performed. In addition, the displayed or discussed mutual couplingsor direct couplings or communication connections may be implemented byusing some interfaces. The indirect couplings or communicationconnections between the apparatuses or units may be implemented inelectronic, mechanical, or other forms.

The units described as separate parts may or may not be physicallyseparate, and parts displayed as units may be one or more physicalunits, may be located in one place, or may be distributed on differentplaces. Some or all of the units may be selected according to actualneeds to achieve the objectives of the solutions of the embodiments.

In addition, functional units in the embodiments of this application maybe integrated into one processing unit, or each of the units may existalone physically, or two or more units are integrated into one unit. Theintegrated unit may be implemented in a form of hardware, or may beimplemented in a form of a software functional unit.

When the integrated unit is implemented in the form of a softwarefunctional unit and sold or used as an independent product, theintegrated unit may be stored in a readable storage medium. Based onsuch an understanding, the technical solutions in the embodiments ofthis application essentially, or the part contributing to the prior art,or all or some of the technical solutions may be implemented in the formof a software product. The software product is stored in a storagemedium and includes several instructions for instructing a device (whichmay be a single-chip microcomputer, a chip or the like) or a processorto perform all or some of the steps of the methods described in theembodiments of this application. The foregoing storage medium includes:any medium that can store program code, such as a USB flash drive, aremovable hard disk, a ROM, a RAM, a magnetic disk, or an optical disc.

The foregoing descriptions are merely specific embodiments of thisapplication, but are not intended to limit the protection scope of thisapplication. Any variation or replacement within the technical scopedisclosed in this application shall fall within the protection scope ofthis application. Therefore, the protection scope of this applicationshall be subject to the protection scope of the claims.

1. An alias-based addressing call method, comprising: receiving, by amission critical service server, a first call request message from afirst client, wherein the first call request message comprises anidentity of a calling user and an identity of an alias requested to becalled, and the identity of the calling user is an identity of a usercorresponding to the first client; determining, by the mission criticalservice server based on the identity of the calling user, that thecalling user has an alias call right; receiving, by the mission criticalservice server from a functional alias management entity, activatinguser information corresponding to the identity of the alias requested tobe called, wherein the activating user information comprises an identityof a user that activates the alias requested to be called; calling, bythe mission critical service server, a user in the activating userinformation based on the activating user information corresponding tothe identity of the alias requested to be called; and sending, by themission critical service server, a first call response message to thefirst client.
 2. The method according to claim 1, wherein the aliasrequested to be called is an alias of a called party, or the aliasrequested to be called is activated by one or more users.
 3. The methodaccording to claim 1, wherein the first call response message comprises:the identity of the calling user, an identity of an alias that issuccessfully called, and an identity of a user that is successfullycalled and corresponds to the identity of the alias that is successfullycalled.
 4. The method according to claim 1, wherein the determining, bythe mission critical service server based on the identity of the callinguser, that the calling user has an alias call right comprises:obtaining, by the mission critical service server, subscriptioninformation of the calling user based on the identity of the callinguser, wherein the subscription information of the calling user comprisesindication information, and the indication information indicates thatthe calling user has the alias call right.
 5. The method according toclaim 1, wherein the determining, by the mission critical service serverbased on the identity of the calling user, that the calling user has analias call right comprises: obtaining, by the mission critical serviceserver, policy information, wherein the policy information comprises anidentity of a user that has an alias call right; and determining, by themission critical service server based on the policy information and theidentity of the calling user, that the calling user has the alias callright.
 6. The method according to claim 1, wherein the activating userinformation comprises an identity of a user which is corresponding to asecond client, and the calling, by the mission critical service server,a user in the activating user information based on the activating userinformation corresponding to the identity of the alias requested to becalled comprises: sending, by the mission critical service server, asecond call request message to the second client.
 7. The methodaccording to claim 6, wherein the sending, by the mission criticalservice server, a second call request message to the second clientcomprises: sending, by the mission critical service server by using asecond mission critical service server, the second call request messageto the second client.
 8. The method according to claim 6, furthercomprises: receiving, by the mission critical service server from thesecond client, a second call response message indicating that a callmade by using the alias is accepted.
 9. The method according to claim 1,further comprises: sending, by the functional alias management entity,the activating user information.
 10. An alias-based addressing callmethod, comprising: sending, by a first client, a first call requestmessage to a mission critical service server, wherein the first callrequest message comprises an identity of a calling user and an identityof an alias requested to be called, and the identity of the calling useris an identity of a user corresponding to the first client; andreceiving, by the first client, a first call response message from themission critical service server.
 11. The method according to claim 10,wherein the first call response message comprises: the identity of thecalling user, an identity of an alias that is successfully called, andan identity of a user that is successfully called and corresponds to theidentity of the alias that is successfully called.
 12. An apparatus foralias-based addressing call, comprising at least one processor and amemory, wherein the memory stores a computer program, and when executingthe computer program, the at least one processor implements thefollowing operations: receiving a first call request message from afirst client, wherein the first call request message comprises anidentity of a calling user and an identity of an alias requested to becalled, and the identity of the calling user is an identity of a usercorresponding to the first client; determining, based on the identity ofthe calling user, that the calling user has an alias call right;obtaining, from a functional alias management entity, activating userinformation corresponding to the identity of the alias requested to becalled, wherein the activating user information comprises an identity ofa user that activates the alias requested to be called; calling a userin the activating user information based on the activating userinformation corresponding to the identity of the alias requested to becalled; and sending a first call response message to the first client.13. The apparatus according to claim 12, wherein the alias requested tobe called is an alias of a called party, or the alias requested to becalled is activated by one or more users.
 14. The apparatus according toclaim 12, wherein the first call response message comprises: theidentity of the calling user, an identity of an alias that issuccessfully called, and an identity of a user that is successfullycalled and corresponds to the identity of the alias that is successfullycalled.
 15. A system for alias-based addressing call, comprising: amission critical service server and a functional alias managemententity, wherein the mission critical service server is configured to:receive a first call request message from a first client, wherein thefirst call request message comprises an identity of a calling user andan identity of an alias requested to be called, and the identity of thecalling user is an identity of a user corresponding to the first client;and determine, based on the identity of the calling user, that thecalling user has an alias call right; the functional alias managemententity is configured to send activating user information correspondingto the identity of the alias requested to be called, wherein theactivating user information comprises an identity of a user thatactivates the alias requested to be called; and the mission criticalservice server is further configured to: receive the activating userinformation, call a user in the activating user information based on theactivating user information corresponding to the identity of the aliasrequested to be called; and send a first call response message to thefirst client.
 16. The system according to claim 15, wherein the aliasrequested to be called is an alias of a called party, or the aliasrequested to be called is activated by one or more users.
 17. The systemaccording to claim 15, wherein the first call response messagecomprises: the identity of the calling user, an identity of an aliasthat is successfully called, and an identity of a user that issuccessfully called and corresponds to the identity of the alias that issuccessfully called.
 18. The system according to claim 15, wherein themission critical service server is further configured to obtain policyinformation, wherein the policy information comprises an identity of auser that has an alias call right; and determine, based on the policyinformation and the identity of the calling user, that the calling userhas the alias call right.
 19. The system according to claim 15, whereinthe activating user information comprises an identity of a user which iscorresponding to a second client, and the mission critical serviceserver is further configured to send a second call request message tothe second client.
 20. The system according to claim 15, furthercomprises the first client, wherein the first client is configured to:send the first call request message; and receive the first call responsemessage from the mission critical service server.