Method for accessing mobile core network by utilizing fixed network

A mobile core network and core network technology, applied in connection management, security devices, data exchange through path configuration, etc., can solve the problems of potential safety hazards, vulnerability to attacks, and failure to solve user authentication and registration, etc., reaching the scope of terminals Extended effect

Inactive Publication Date: 2010-03-17
SHANGHAI DINGZHU COMM TECH
View PDF1 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the mobile communication network, this kind of authentication and authentication method has potential security risks, and because the broadband network is an open network, it is vulnerable to attacks
[0005] Currently, the soft phone software installed on the computer, such as skype, can only realize the IP voice service based on the broadband network
However, installing a mobile standard wireless data card on the computer and connecting to the mobile network through wireless methods such as GSM / CDMA... can only realize low-speed data services on the mobile network
The Chinese patent application No. 200610149383 titled "System and Method for Realizing Mobile Services Through Broadband Wireless Access" discloses a technical solution for realizing mobile services through fixed networks, but does not solve the problem of user authentication and registration question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing mobile core network by utilizing fixed network
  • Method for accessing mobile core network by utilizing fixed network
  • Method for accessing mobile core network by utilizing fixed network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0035] In the present invention, the method for obtaining business services through a soft terminal accessing a mobile core network through a fixed network, the implementation steps include:

[0036] First, obtain user identity and authentication information through the soft terminal;

[0037] The soft terminal sends a registration request message 1 to the core network access gateway through the fixed network access layer and the IP switching network (that is, the IP network), carrying user identity and authentication information;

[0038] The core network access gateway sends a registration request message 2 to the mobile core network, carrying user identity and authentication information;

[0039] The mobile core network returns the authentication request message 2 including the authentication parameter 2 to the core network access gatewa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for accessing a mobile core network by utilizing a fixed network (comprising a WLAN access network and a broadband IP exchange network) to obtain business service, comprising the following steps: a soft terminal obtains a user identity and authentication information; the soft terminal sends a registering request message I to a core network access gateway through a fixed network access layer and the IP exchange network, and the registering request message I carries the user identity and the authentication information; the core network access gateway sends a registering request message II to the mobile core network, and the registering request message II carries the user identity and the authentication information; the mobile core network echoes an authentication request message II containing authentication parameters II to the core network access gateway; and the core network access gateway echoes an authentication request message I containing authentication parameters to the soft terminal through the fixed access layer and the IP exchange network. By using a mobile user identification card (including an SIM card, a UIM card and a USIM card and the like) through a universal interface, the invention can realize businesses of mobile network voice, short message, data and the like simultaneously in a fixed broadband IP network, and has great advantage compared with other schemes which only realize business of the voice or the data singly.

Description

technical field [0001] The present invention relates to the field of basic telecommunications networks, in particular to a method for a soft terminal to access a mobile core network through a fixed network to obtain business services. Background technique [0002] The soft terminal described in the present invention refers to a kind of software or software and carrier installed on different types of hardware terminals such as PC, PDA, WiFi mobile phone, TV, etc. device) to implement services such as voice, SMS, and data. The soft terminal completes functions such as user registration and access (including authentication during the access process), session management, and media streaming. [0003] In the existing way of accessing the mobile core network, after the terminal searches for the wireless signal, it completes the registration, access and call process according to the signaling standard defined by the 3GPP or 3GPP2 organization. The base station bandwidth of mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W76/02H04W92/08H04L12/28
Inventor 付忠骞王明梅杨阳郭磊
Owner SHANGHAI DINGZHU COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products