Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method, equipment and system for enabling access points to access mobile core network

A mobile core network and access point technology, applied in the field of network communication, can solve the problems of SIM card or USIM card theft, SIM card or USIM card security issues, waste of mobile core network bandwidth, etc.

Active Publication Date: 2012-05-23
SHANGHAI HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Each AP needs to establish an IPSec tunnel through the enterprise gateway or campus gateway and the SeGW, resulting in multiple IPSec tunnels between the enterprise gateway or campus gateway and the SeGW, wasting the egress bandwidth of the enterprise gateway or campus gateway
Local calls and local data interaction between multiple APs or between APs and other devices must be implemented through AG transfer, which wastes mobile core network bandwidth and requires the use of mobile core network resources. Therefore, such local calls and local Data interaction is not free
In addition, the enterprise network or campus network needs AP networking to provide a large range of continuous coverage, and the switching function between APs is implemented by AG, which wastes mobile core network resources.
Since each AP has a SIM card or USIM card, and multiple APs are distributed in the buildings of enterprises or schools, it is easy to cause the SIM card or USIM card to be stolen, and there is no guarantee in terms of security.
[0008] It can be seen that when multiple APs of an enterprise or campus access the mobile core network through the enterprise gateway or campus gateway, not only the resources of the mobile core network are wasted, but also the SIM card or USIM card carried by each AP also has security issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for enabling access points to access mobile core network
  • Method, equipment and system for enabling access points to access mobile core network
  • Method, equipment and system for enabling access points to access mobile core network

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example approach

[0031] see image 3 , based on the method flowchart of the first embodiment of the present invention.

[0032] In this embodiment, an AP is used as an example to illustrate the process of AP accessing the AG through the AP aggregation entity.

[0033] 101. The AP aggregation entity establishes an IPSec tunnel with the SeGW by using the IP address of the SeGW.

[0034] The AP aggregation entity may have the IP address of the SeGW, so that the IPSec tunnel with the SeGW can be directly established by the IP address of the SeGW.

[0035] When the AP aggregation entity does not have the IP address of the SeGW, the AP aggregation entity can resolve the IP address corresponding to the SeGW's fully qualified domain name (FQDN, Fully Qualified Domain Name) through the Domain Name System (DNS, Domain Name System) server on the IP transmission network .

[0036] There may be one or two IPSec tunnels between the AP convergence entity and the SeGW. When there is one IPSec tunnel, the ...

Embodiment 2

[0053] see Figure 4 , based on the method flowchart of the second embodiment of the present invention.

[0054] The difference between the second embodiment and the first embodiment is that the AP aggregation entity does not have the IP addresses of the SeGW and the AG. There is no dedicated connection link between the AP and the AP aggregation entity.

[0055] 201. The AP convergence entity resolves the IP address of the SeGW.

[0056] If the AP aggregation entity has the FQDN of the SeGW, or the AP aggregation entity can deduce the FQDN of the SeGW, the AP aggregation entity can resolve the IP address corresponding to the FQDN of the SeGW through the DNS server on the IP transmission network.

[0057] 202. The AP aggregation entity establishes an IPSec tunnel with the SeGW.

[0058] There may be one or two IPSec tunnels between the AP aggregation entity and the SeGW. When there is one IPSec tunnel, the IPSec tunnel is used for voice service and data service. When there...

Embodiment 3

[0073] see Figure 5 , based on the flow chart of the AP aggregation entity receiving AP access in the present invention.

[0074] 301. The AP sends a DHCP discovery message to the AP convergence entity.

[0075] 302. The AP converging entity checks whether the AP is legal, and if it is legal, execute step 303.

[0076] The AP aggregation entity can check the legitimacy of the AP in the following three ways:

[0077] 1) The AP aggregation entity checks whether the MAC address of the AP is legal through the source MAC address of the DHCP discovery message;

[0078] 2) Check whether the AP accesses from the configured link by receiving the link identifier corresponding to the link of the DHCP discovery message;

[0079] 3) Check whether the AP is legal through the device identification contained in the DHCP discovery message.

[0080] 303. The AP aggregation entity sends a DHCP offer message to the AP.

[0081] 304. The AP sends a DHCP request message to the AP convergence ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for enabling access points to access a mobile core network, which comprises the following steps: establishing an IP network security protocol tunnel between security gateways by IP addresses of the security gateways; accessing an access gateway of the mobile core network by an IP address of the access gateway through the IP network security protocol tunnel; receiving the access of at least one access point; and transferring the access point to the access gateway of the mobile core network. An AP aggregation entity receives the access of a plurality of APs, accesses the AG of the mobile core network through an IPSec tunnel and transfers the APs to the AG of the mobile core network. Because of adding the AP aggregation entity, each AP is prevented from establishing the IPSec tunnel with SeGWs, and outlet bandwidth of a local area network is saved; and the APs simultaneously do not need to carry an SIM or USIM card so as to prevent each AP distributed to buildings of enterprises or schools from easily causing the problem of stealing the SIM or USIM card by people.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method, device and system for an access point to access a mobile core network. Background technique [0002] An access point (AP, Access Point) is a network device that provides wireless access services for homes, small offices, and home offices (SOHO, Small Office and Home Office) based on a fixed Internet Protocol (IP, Internet Protocol) transmission network. [0003] see figure 1 , which is a structural diagram of an AP applied to a home network. [0004] The user equipment (UE, User Equipment) accesses the AP through the air interface, and the AP accesses the IP transmission network through the home gateway (HGW, Home Gateway), and then connects to the security gateway (SeGW, Security Gateway) in the mobile core network through the IP transmission network , and then connect to the access gateway (AG, AccessGateway). The HGW can be integrated on the AP, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L29/06H04L12/66
CPCH04W92/14H04L63/164H04W80/04H04W12/02H04L63/0428H04W12/03
Inventor 曹文利
Owner SHANGHAI HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More