Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for triggering safety tunnel establishment and device thereof

A security tunnel and security technology, which is applied in the field of triggering the establishment of a mobile network security tunnel, can solve the problems that the terminal equipment cannot choose whether to establish a mobile network security tunnel, it is difficult to apply to the network system, and it is impossible to choose whether to establish a mobile network security tunnel.

Active Publication Date: 2008-12-03
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, according to the method for establishing a mobile network security tunnel provided by the prior art, it is impossible for the terminal device to choose whether to establish a mobile network security tunnel according to the nature of the access network.
[0009] Therefore, during the creation process of the present invention, the inventor found that there are at least the following problems in the prior art: in the method for establishing a mobile network security tunnel provided by the prior art, a mobile network security tunnel establishment request is initiated directly after the access authentication is passed , it is impossible for users to choose whether to establish a mobile network security tunnel according to the nature of the access network, so it is difficult to apply to the network system where multiple access networks and 3GPP networks are integrated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for triggering safety tunnel establishment and device thereof
  • Method for triggering safety tunnel establishment and device thereof
  • Method for triggering safety tunnel establishment and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention provide a method for triggering establishment of a mobile network security tunnel, an authentication, authorization and accounting server, an access gateway device, and a terminal device. In order to make the technical solution of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0027] Please refer to figure 1 , which is a signaling flow chart of the first preferred embodiment of the method for triggering the establishment of a mobile network security tunnel in the present invention, the specific process of triggering the establishment of a mobile network security tunnel includes:

[0028] Step 101: The terminal device sends an access authentication request to the access gateway, the access authentication request carries access information parameters, and the access information parameters are used to indicate the access network a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and the device for triggering the establishment of a safe tunnel of a trigger mobile network. The method for triggering the establishment of the safe tunnel of the trigger mobile network includes the steps that: an access authentication response is fed back to terminal equipment after an access authentication request transmitted by the terminal equipment is received, the access authentication response carries information for establishing the safe tunnel of the mobile network; the terminal equipment triggers the establishment of the safe tunnel of the mobile network according to the information for establishing the safe tunnel of the mobile network. The invention also provides a device for triggering the establishment of the safe tunnel. The technical proposal provided by the embodiment of the invention can be applied to a system integrating different access networks and 3GPP networks.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method and device for triggering establishment of a mobile network security tunnel. Background technique [0002] At present, a typical wireless communication network defined by the 3rd Generation Partnership Project (3GPP, The 3rd Generation Partnership Project) standard organization is generally composed of a 3GPP radio access network and a 3GPP wireless core network. [0003] When the non-3GPP access network accesses the 3GPP core network, different heterogeneous access networks will be divided into trusted and untrusted access according to the strategy of the communication operator. For a trusted access network, generally a non-3GPP gateway device is connected to the service gateway device in the core network, and an Internet Protocol (IP, Internet Protocol) address assigned by the service gateway device in the core network is obtained. For accessing the packe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L12/66H04L12/46H04L29/06H04L9/32
Inventor 王珊珊胡颖
Owner HUAWEI TECH CO LTD