Method and system for monitoring mark transferring
A technology of identification and target, applied in the field of microwave access global interoperability system, which can solve the problems of inability to report the information of the controlled user, unable to complete the monitoring and collection of the information of the controlled user, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] Embodiment 1: The listener identifies the sender as Serving GW
[0053] In this embodiment, the above-mentioned triggering event is that the serving base station (Serving BS) initiates an ASN-anchored handover process, that is, this embodiment can be applied to an ASN-anchored handover process.
[0054] image 3 is a schematic diagram showing the processing flow under this embodiment, as image 3 As shown, the network environment that this embodiment is applicable to is a network where there is no interface between BSs, and messages between different BSs need to be relayed through the AGW. When a handover occurs in the MS, the last relay AGW (referred to as the last relay AGW in this paper) on the transmission path of the handover request message needs to intercept the handover request message, analyze the message, and report it to the LIS according to the analysis result, so the monitoring identification It needs to be passed to the relay network, that is, the listen...
Embodiment 2
[0066] Embodiment 2: The monitoring identifier transmitter is the original Anchor DP, and the Anchor DP and the authenticator are set in one
[0067] In this embodiment, the above trigger condition is that the original Anchor DP or the target Anchor DP initiates a CSN-anchored handover, that is, this embodiment can be applied to a CSN-anchored handover process. In this embodiment, since the initial Anchor DP and the Authenticator are co-established, the initial Anchor DP also obtains the interception ID, so the original Anchor DP serves as the interception ID sender. In addition, the switch of CSN anchoring will lead to the change of Anchor DP. Anchor DP, Dynamic Host Configuration Protocol Proxy (DHCPProxy), Dynamic Host Configuration Protocol Relay (DHCP Relay), and External Agent (FA) co-located with it need to be monitored and The controlled user information is collected, so the user monitoring ID needs to be passed to the switched Anchor DP, that is, the monitoring ID rec...
Embodiment 3
[0077] Embodiment 3: Listening identifies the sender as an authenticator (Authenticator)
[0078] In this embodiment, the triggering event is that the terminal or user equipment needs to enter the idle mode. When the user enters the idle mode, the user behavior management is transferred to the Anchor PC. The Anchor PC needs to monitor and collect the information of the controlled user, so the user monitoring identification needs to be transmitted to the Anchor PC, that is, in this embodiment, the Authenticator is used as the monitoring identification transmitter, and the Anchor PC is used as the monitoring identification receiver.
[0079] In this embodiment, the operation of the interception identifier transmitter transmitting the interception identifier to the interception identifier receiver is specifically: in response to the terminal state change request message sent by the MS / BS via the Anchor PC, the authenticator sends the terminal state change response message Carry ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 