Data flow transmission method and related equipment and system
A data stream transmission and data stream technology, applied in the field of communication, can solve problems such as inability to guarantee service quality and inflexible distribution, and achieve the effect of improving service quality assurance and flexible distribution
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] Embodiment 1, UE authentication method 1 in WLAN:
[0081] In the embodiment of the present invention, the authentication of the UE in the WLAN mainly has the following two purposes:
[0082] 1. Identify user identity and prevent illegal user access;
[0083] 2. After the identity of the user is identified, the link of the same user in the WLAN can be associated with the link in the LTE.
[0084] Wherein, the authentication method of the UE in the WLAN given in Embodiment 1 is described as follows:
[0085] 1) If the network side (such as eNB) considers that authentication is required, it can initiate an authentication command (Authentication Command) to the UE to trigger the authentication process of the UE;
[0086] 2) The UE initiates an authentication request (AuthenticationRequest) to the network side (such as eNB) in the WLAN, wherein the authentication request carries the C-RNTI and Cell ID of the UE to identify its identity;
[0087]3) After receiving the abo...
Embodiment 2
[0094] Embodiment 2, UE authentication method 2 in WLAN:
[0095] In the second embodiment, the authentication method of the UE in the WLAN may adopt the existing 802.1x authentication method in the WLAN, wherein the authentication method is based on EAP-AKA. The second embodiment will not be described in detail here.
[0096] Since the authentication method of the UE in the LTE network is similar to the authentication method of the UE in the WLAN in Embodiment 2 and is independent of each other, after the WLAN link and the LTE link are established between the UE and the network side, You can associate WLAN links with LTE links in the following ways:
[0097] 1) Determine a unified user ID, which can be used to identify a user in both WLAN and LTE, such as the user's IMSI.
[0098] 2), the authentication process of UE in WLAN is a process independent of LTE authentication, but after the authentication is passed and the WLAN link is established, the user ID needs to be stored...
Embodiment 3
[0104] Embodiment 3, UE authentication method 3 in WLAN:
[0105] In the third embodiment, under the condition that the WLAN module and the LTE module of the UE are inseparable, the authentication process of the LTE is used to realize the authentication of the UE in the WLAN. The specific method is as follows:
[0106] 1), UE reports whether it supports WLAN in LTE, and the WLAN MAC Address; wherein, these WLAN information can be sent to the network side (such as eNB) through the Radio Capabilities procedure, or sent to the network side through any other feasible LTE Procedure ( such as eNB);
[0107] 2) When the UE establishes an LTE link, the network side (such as eNB) can obtain the WLAN capability supported by the UE and the WLAN MAC Address through LTE, and then scan the existing WLAN link according to the WLAN MAC Address. If found, the WLAN The link is associated with the LTE link, so as to start the scheduling strategy negotiation and data flow offloading process;
...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com