Method of identity identification, cross-network communication and service transplantation as well as information intercommunication network architecture

A technology for identifying information and identity. It is applied in the field of network architecture to realize information exchange and can solve problems such as lack of clarity.

Active Publication Date: 2011-04-20
ZTE CORP
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the network-based identity and location separation framework, how to be compatible with IPV4/V6 services, so that the IPV4/V6 services in the existing Legacy IP network (traditional IP network) can

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of identity identification, cross-network communication and service transplantation as well as information intercommunication network architecture
  • Method of identity identification, cross-network communication and service transplantation as well as information intercommunication network architecture
  • Method of identity identification, cross-network communication and service transplantation as well as information intercommunication network architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0107] During the coexistence of the Legacy IP network and the network-based identity and location separation framework, the 32-bit suffix part adopts the IPV4 public network address. The interconnection and intercommunication of IP network; for the IPV4 terminal, it realizes the compatibility with the upper layer business.

[0108] The value of the extension header is a constant determined within the framework of identity identification and location separation. In this way, the extension header of the AID is removed and converted into the corresponding IP address, and the IP address is converted into the corresponding AID by adding the constant as the extension header.

[0109] In this embodiment, the setting rule of the extension header constant is a unique constant determined within the framework of separation of identity and location, so as to realize flexible conversion between the AID format and the IPV4 public network address. In a preferred embodiment of the present in...

Embodiment approach 2

[0118] After the traditional Legacy IP network evolves to a network based on the network-based identity and location separation framework, the value of the extension header EH is assigned by the identity and location separation framework as needed. After completing the historical task of network evolution and transition, in order to realize the expansion of AID address scale and support more user scale.

[0119] After the evolution transition phase is over, since there is no need for interworking with the Legacy IP network, AID does not need to follow the address allocation and occupancy specifications of the Legacy IP network when using a public network address. In the network-based identity and location separation framework, the use of AID can uniquely identify the communication peer, and the value of the extension header EH can be expanded from a constant to a variable, which is allocated by the identity and location separation framework as needed, greatly expanding the avai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an implementation method of identity identification, cross-network communication and service transplantation as well as a network architecture for implementing information intercommunication. The implementation method of the identity identification comprises the following step that: an identity identification and position separation architecture network distributes a unique identity identification (AID) to each accessed terminal, wherein the AID remains unchanged all the time in the moving process of the terminal and includes first identification information, and the first identification information is used for the identity identification of the terminal during the intercommunication of the identity identification and position separation architecture network and the traditional communication network or used for identifying the traditional network terminal accessed to the identity identification and position separation architecture network. The invention provides the implementation method of the specific identity identification on the basis of the identity identification and position separation architecture of the network, specifies the treatment carried out when each network element is compatible with application services, meets the requirements for the quantity of coding spaces and also implements the interconnection and the intercommunication with the traditional IPV4/V6 (Internet Protocol Version 4/Version 6) network and the compatibility on an upper application program of the IPV4/V6.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for realizing identity recognition, cross-network communication, and service transplantation, and a network architecture for realizing information intercommunication. Background technique [0002] In the TCP / IP (Transmission Control Protocol / Internet Protocol, Transmission Control Protocol / Internet Protocol) protocol widely used in the existing Internet, the IP address has dual functions. , which is also used as the identity of the network interface of the transport layer host. At the beginning of the TCP / IP protocol design, the movement of the host was not considered. However, when the host mobile becomes more and more common, the semantic overload defect of this IP address becomes more and more obvious. When the IP address of the host changes, not only the route will change, but also the host identity of the communication terminal will change, which will lead ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/26H04W40/02H04W80/04H04W92/02H04L29/12
CPCH04L69/08H04L29/06068H04L45/00
Inventor 吴强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products