Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for monitoring mark transferring

A technology of identification and target, applied in the field of microwave access global interoperability system, which can solve the problems of inability to report the information of the controlled user, unable to complete the monitoring and collection of the information of the controlled user, etc.

Inactive Publication Date: 2009-06-17
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But as mentioned above, only the Authenticator knows the CUI as the monitoring identifier. If the Anchor DP and the Authenticator are set up together when the user initially accesses, the user's initial Anchor DP can also obtain the CUI, and other functional entities cannot obtain the CUI. Therefore, the monitoring and collection of the accused user's information cannot be completed, and the information of the accused user cannot be reported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring mark transferring
  • Method and system for monitoring mark transferring
  • Method and system for monitoring mark transferring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1: The listener identifies the sender as Serving GW

[0053] In this embodiment, the above-mentioned triggering event is that the serving base station (Serving BS) initiates an ASN-anchored handover process, that is, this embodiment can be applied to an ASN-anchored handover process.

[0054] image 3 is a schematic diagram showing the processing flow under this embodiment, as image 3 As shown, the network environment that this embodiment is applicable to is a network where there is no interface between BSs, and messages between different BSs need to be relayed through the AGW. When a handover occurs in the MS, the last relay AGW (referred to as the last relay AGW in this paper) on the transmission path of the handover request message needs to intercept the handover request message, analyze the message, and report it to the LIS according to the analysis result, so the monitoring identification It needs to be passed to the relay network, that is, the listen...

Embodiment 2

[0066] Embodiment 2: The monitoring identifier transmitter is the original Anchor DP, and the Anchor DP and the authenticator are set in one

[0067] In this embodiment, the above trigger condition is that the original Anchor DP or the target Anchor DP initiates a CSN-anchored handover, that is, this embodiment can be applied to a CSN-anchored handover process. In this embodiment, since the initial Anchor DP and the Authenticator are co-established, the initial Anchor DP also obtains the interception ID, so the original Anchor DP serves as the interception ID sender. In addition, the switch of CSN anchoring will lead to the change of Anchor DP. Anchor DP, Dynamic Host Configuration Protocol Proxy (DHCPProxy), Dynamic Host Configuration Protocol Relay (DHCP Relay), and External Agent (FA) co-located with it need to be monitored and The controlled user information is collected, so the user monitoring ID needs to be passed to the switched Anchor DP, that is, the monitoring ID rec...

Embodiment 3

[0077] Embodiment 3: Listening identifies the sender as an authenticator (Authenticator)

[0078] In this embodiment, the triggering event is that the terminal or user equipment needs to enter the idle mode. When the user enters the idle mode, the user behavior management is transferred to the Anchor PC. The Anchor PC needs to monitor and collect the information of the controlled user, so the user monitoring identification needs to be transmitted to the Anchor PC, that is, in this embodiment, the Authenticator is used as the monitoring identification transmitter, and the Anchor PC is used as the monitoring identification receiver.

[0079] In this embodiment, the operation of the interception identifier transmitter transmitting the interception identifier to the interception identifier receiver is specifically: in response to the terminal state change request message sent by the MS / BS via the Anchor PC, the authenticator sends the terminal state change response message Carry ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for transferring monitoring marks and a system for transferring the monitoring marks. The method comprises: responding to trigger events, transferring the monitoring marks to a monitoring mark receiver by a monitoring mark transmitter, wherein the monitoring mark transmitter comprises one of the followings: a right judging device, an anchor data passage functional entity, an access service gateway or an access service network. The problem that a monitoring point can not obtain the monitoring marks is overcome through the method, and thereby each monitoring point can use obtained monitoring marks to accurately report controlled user information.

Description

technical field [0001] The present invention relates to a Worldwide Interoperability for Microwave Access (WiMAX for short) system in the field of communication, and in particular relates to a method and a system for transferring an interception identifier. Background technique [0002] WiMAX (Worldwide Interoperability for Microwave Access) is a broadband wireless access technology based on the IEEE 802.16 standard, which can effectively use limited wireless spectrum resources to provide large air interface bandwidth (up to 70Mbps data transmission capacity ). [0003] figure 1 shows the WiMAX network reference model, as figure 1 As shown, it includes Network Access Provider (NAP), Home Network Service Provider (H-NSP), and Visited Network Service Provider (V-NSP). [0004] Wherein, a Network Access Provider (NAP for short) is a business unit that provides a WiMAX wireless access architecture for one or more WiMAX Network Service Providers (NSP for short). The NAP inclu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W36/14H04W88/16
Inventor 霍玉臻朱戈刘俊羿
Owner ZTE CORP