Method for recognizing abuse of emergent carrier resource and carrier control IP gateway in network
An emergency bearer and bearer control technology, applied in the field of communication, can solve problems such as abuse of emergency bearer resources, and achieve the effect of avoiding abuse and simple application
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention will be further described in detail below in conjunction with the drawings.
[0046] The main idea of the present invention is to prevent the emergency bearer resources from being abused. For this reason, the method provided by the present invention is to set a filter rule for the emergency bearer resource on the access side bearer control IP gateway, and the filter rule only allows the emergency service to be included. The IP packet of the IP contact method used for emergency services in the functional entity directly connected to the UE through the IP is used. During the call, the access side bearer control IP gateway receives the IP packet transmitted using the emergency bearer resource and determines the IP Whether the IP contact information in the packet belongs to the IP contact information allowed in the filtering rules, if it is, continue the normal processing, otherwise it is determined that the emergency bearer resource is abused.
[0047] T...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 