Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for realizing mobile user data safety backup by distributed business

A distributed transaction and mobile user technology, applied in the directions of user identity/authority verification, communication between multiple stations, radio/inductive link selection arrangement, etc., can solve the problem that the system cannot be restored to a consistent state, standby VMSC has no data, no location area data, etc., to improve business processing capabilities, reduce information flow, and improve security

Inactive Publication Date: 2009-02-04
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The shortcoming of this scheme is: (1) when the user who was originally under the active VMSC was called, the standby VMSC first needs to restore the user's data from the HLR (home location register) where the user is located, and simultaneously because the standby VMSC does not When there is no location area data of the user, the standby VMSC has to initiate network-wide paging to find the user
[0008] The disadvantages of this solution are: (1) When the user under the primary VMSC is called, the standby VMSC can use the backup location area information to perform paging at first, which can avoid paging in the whole network, but because the standby VMSC There is no complete data, and many called services are triggered based on user data, such as called prepaid services, so the backup VMSC still has to restore the user data of the user
[0011] The disadvantage of this scheme is: using this method, for those users who can successfully complete the transaction, the data consistency between the active VMSC and the standby VMSC is guaranteed
However, due to the sudden failure of the active VMSC and the limited bandwidth of the signaling link between the active VMSC and the standby VMSC, there is a possibility that when the active VMSC fails, some user data may have already been used by the active VMSC. The interaction between the VMSC and the HLR, but the interaction between the backup VMSC and the active VMSC has not yet been completed. As a result, the backup VMSC has old user data, but the HLR has received the response from the active VMSC and believes that the data on the VMSC side has already get updated
In this case, once the active VMSC fails, the standby VMSC uses old user data for business processing, and it is difficult to avoid fraudulent users who have been shut down. What is more serious is that the standby VMSC has no way of judging which backup user data it owns is credible , which are untrustworthy, the system has no way to restore to a consistent state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing mobile user data safety backup by distributed business
  • Method and system for realizing mobile user data safety backup by distributed business

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0032] It is assumed that the backup of user location information in the active VMSC in the standby VMSC has been realized by implementing the aforementioned prior art solution (2) between the active VMSC and the standby VMSC. The implementation of this solution is relatively simple. When the user location area in the active VMSC changes, the location area information backup can be realized by sending the user ID and location area ID to the standby VMSC. The amount of transmitted data is small, so this solution is relatively easy to implement. The underlying transmission can choose traditional narrowband or broadband SS7 links, or use IP bearer (including but not limited to IP, TCP, UDP, SCTP, etc.).

[0033] The following discusses the processing method of subscriber information change. There are two methods, respectively corresponding to the signaling link with suf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: a) when the subscription data in the active visit mobile switch center varies, the active visit mobile switch center modifies the subscription data in its visit location register; b) the active visit mobile switch center initiates subscription data transaction request to the standby visit mobile switch center through an established signaling link; c) the standby visit mobile switch center sends the response of subscription data transaction request to mobile switch center; d) the active visit mobile switch center receives the response from the active visit mobile switch center. In the invention, when the active visit mobile switch center failures, after the standby visit mobile switch center takes over the network entity and users originally controlled by the active visit mobile switch center, the traffic of subscription user information between the standby visit mobile switch center and the home location register is remarkably decreased.

Description

technical field [0001] The invention relates to the field of communications, in particular to a method and system for realizing safe backup of mobile user data by using distributed transactions. Background technique [0002] With the advancement of information technology, chip processing capabilities are getting stronger and the integration of communication equipment is getting higher and higher. A single network entity such as VMSC (Visited MSC, Visited Mobile Switching Center) can handle more and more users. Entities often can only handle 200,000 users, and now they are developing towards 1 million, 2 million, and even larger capacity. When the capacity of a single network entity is getting larger and larger, the failure of a single network entity will also have a catastrophic impact. Therefore, backup based on the network entity level has become a trend. When a network entity fails, the backup network entity will be Take over the business of the failed network entity to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/38H04Q7/32H04B7/26H04L9/32H04W28/08H04W28/14H04W28/18
Inventor 钟颙金波朱浩鹏
Owner HUAWEI TECH CO LTD