Integrated identification network personal communication mobile management method based on double-proxy

A mobile management and identification network technology, which is applied in the field of personal communication mobile management based on a dual-agent integrated identification network, can solve the problems of poor compatibility between services, difficult control and management, poor scalability, etc., to ensure simplicity and effectiveness. , Low transmission distance and transmission delay, the effect of ensuring scalability

Inactive Publication Date: 2011-01-26
TSINGHUA UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there are problems such as poor compatibility, poor scalability, and difficult control and management among various services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated identification network personal communication mobile management method based on double-proxy
  • Integrated identification network personal communication mobile management method based on double-proxy
  • Integrated identification network personal communication mobile management method based on double-proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Embodiment 1: Establishment of two user service communication links

[0050] Establishing a user personalized service connection between two user terminal devices is called the establishment of a service communication link. The establishment of two user service communication links consists of 5 steps, which will be combined below Figure 4 Instructions are given step by step:

[0051] Step 1: User A's customer agent CAID_A selects a device terminal for its business (such as A 1 ) to initialize the communication process, and terminal A 1 Access ID AID_A 1 Sent to user B's customer agent CAID_B.

[0052] Step 2: After user B receives the connection request from user A, CAID_B selects a device terminal for user B (such as B 1 ) to respond; CAID_B will obtain the network agent ID NAID from the network, and then terminal A 1 and B 1 Access ID AID_A 1 and AID_B 1 Sent to the web proxy.

[0053] Step 3: CAID_B connects Terminal B 1 Access ID AID_B 1 and the selecte...

Embodiment 2

[0056] Embodiment 2: Service switching in an integrated identification network environment

[0057] In the communication process of the integrated identification network, the conversion of the same service between different terminals is called service switching. In this embodiment, the service switching in the communication process is divided into 6 steps, which will be combined below Figure 5 Give instructions:

[0058] In this embodiment, we assume that the steps in Embodiment 1 have been followed, and the terminal A is connected through the network proxy 1 and terminal B 1 A service communication link CID_1 is established for SID_1. Now user A wants to transfer SID_1 from terminal A 1 switch to terminal A 2 , where A 2 belongs to user A and is different from terminal A 1 another terminal.

[0059] Step 1: User A submits a switching request to CAID_A.

[0060] Step 2: CAID_A detects terminal A 1 and A 2 According to the working conditions and communication capabi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an integrated identification network personal communication mobile management method based on double-proxy, belonging to the technical field of personal mobile network communications. The method is characterized in that the separation of a user side and a network side is realized by utilizing a double-proxy structure under the condition of an integrated identification network system, and the separation of a user and terminal service is finished through from client proxy identification to access identification analyzing and mapping. The method comprises the working process of communication link establishment and service switching under the condition of the integrated identification network system; a client proxy, a network proxy and all modules inside the client proxy and the network client works together with respective specific task; and an access user, terminal equipment and service resources are under unified classified management . The invention not only can shorten routing and time delay, but also has favorable expandability and can effectively reduce the difficulty of network resource management.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and relates to a dual-agent-based integrated identification network personal communication mobile management method Background technique [0002] Information technology has become a huge driving force for the development of society today, and information network plays an important role in the economic and social development of various countries. According to different service content and scope, today's information network can be divided into Internet, radio and television network and telecommunication network. [0003] With the development of economy and society, today's information network is required to provide high-speed and efficient information services in any place, any time, and in any way. However, the original design idea of ​​the existing information network is a network to support a decoupling method of a main service. The evolution and development on this basis are difficul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 袁坚刘琪贺洪增司洪波山秀明王钺翟羽佳
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products