Method for user accessing information in next generation network
An access information, next-generation technology, applied in access restriction, network data management, wireless communication, etc., can solve problems such as inability to determine the origination query message, inability to obtain user access information, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0086] The specific implementation of the method for acquiring user access information in the next generation network according to the present invention will be described in detail below with reference to various drawings.
[0087] image 3 For the implementation of the principle of the present invention, the main implementation process flow chart that only contains one CLF situation in NASS, its main implementation process is as follows:
[0088] Step S10, after the access user terminal is powered on, it initiates an access request to the network attachment subsystem NASS in the access network, and the NASS authenticates the access user according to the access request sent by the access user , after the authentication is passed, the NASS issues the service network access point address (for example, when the service network provides IMS services, the service network access point is the P-CSCF) and the access operator identifier (if available "@chinamobile" represents the conf...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com