Method for user accessing information in next generation network

An access information, next-generation technology, applied in access restriction, network data management, wireless communication, etc., can solve problems such as inability to determine the origination query message, inability to obtain user access information, etc.

Inactive Publication Date: 2008-12-10
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in this networking mode, the service provider operator cannot determine the service access request message sent by the user from which access operator according to the user's IP address (because in the actual network, the IP address There may not be strict unified planning, and user IP addresses in different access operators may be duplicated), so the access point in the service network cannot determine which access operator to use based on the user's IP address information The CLF in the NASS subsystem of the NASS subsystem initiates a query message for querying user access information to obtain the user's access location information and access authentication information, especially when the IP address allocated by the access operator to the user is private In the case of IP addresses, it may cause the IP addresses assigned to users by the two access operators to be duplicated. In this case, the access points in the service network cannot pass the IP addresses of the access users. The network segment is identified to find the corresponding access operator, so it is impossible to determine which CLF in the access network NASS to send a query message to, and it is also impossible to obtain the corresponding user access information
[0026] Correspondingly, the above two solutions also have the same disadvantages when the resource admission control subsystem RACS queries the user's access location information from the CLF through the e4 interface.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for user accessing information in next generation network
  • Method for user accessing information in next generation network
  • Method for user accessing information in next generation network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] The specific implementation of the method for acquiring user access information in the next generation network according to the present invention will be described in detail below with reference to various drawings.

[0087] image 3 For the implementation of the principle of the present invention, the main implementation process flow chart that only contains one CLF situation in NASS, its main implementation process is as follows:

[0088] Step S10, after the access user terminal is powered on, it initiates an access request to the network attachment subsystem NASS in the access network, and the NASS authenticates the access user according to the access request sent by the access user , after the authentication is passed, the NASS issues the service network access point address (for example, when the service network provides IMS services, the service network access point is the P-CSCF) and the access operator identifier (if available "@chinamobile" represents the conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for obtaining the user access information in Next Generation Network, includes: after Network Attachment Subsystem(NASS) authorizes the access user, it issues the configuration information containing the address of the service network access point and the identification of the access provider; the access user loads the access provider identification issued by NASS into the service access request message and then sends to the service network access point according to the address information of the service network access point; the service network access point determines the inquiring Connectivity Session Location Function(CLF) entity according to the loaded access provider identification in the service access request message, so as to obtain the access information of the access user. The invention enables the service network to determine accurately the inquiring Connectivity Session Location Function entity according to the user service access request message, thereby obtaining the user access information.

Description

technical field [0001] The present invention relates to next generation network (NGN, Next Generation Network) technology, in particular to a method for acquiring user access information in the next generation network. Background technique [0002] At present, the International Telecommunication Union-Telecommunications Standardization Organization (ITU-T, ITU-TelecommunicaitonStandardization Sector) and the European Telecommunications Standards Institute (ETSI, European Telecommunication Standard Institute), as the international and European telecommunications standard organizations, are developing the next generation network (NGN, Next Generation Network) network architecture, such as figure 1 As shown, it is the network architecture topology diagram of the NGN that is currently being formulated. The existing NGN network architecture is mainly divided into the following parts: [0003] The service control and application subsystem 10 is mainly composed of IP multimedia su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/38H04W4/00H04W8/26H04W74/00H04W88/08
CPCH04W4/00H04W8/26H04W48/16H04W64/00H04W74/00H04W88/08
Inventor 严军
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products