Access method and device, and method and device for acquiring user equipment context and user equipment identity
A technology of user equipment and context, which is applied in the field of communication, can solve the problems that the new communication network cannot select a new CN node, the RAT cannot correspond to the CN node, and the UE context cannot be obtained, so as to achieve the effect of flexible application
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] Embodiment 1. This embodiment provides a method for distinguishing between Location Area Code (LAC, Location Area Code) and MMEGI. For example, setting the value of the bit in LAC and the corresponding bit in MMEGI is different, so that LAC and MMEGI can be distinguished. For the specific setting method, for example, the first bit of MMEGI is 1, and the first bit of LAC is 0. This bit is called a flag bit for distinguishing MMEGI and LAC. Of course, other bits can also be used as distinguishing flag bits. In this way, when the UE accesses the eNodeB through the old RAI and P-TMSI in the 3G network, or the old RAI and the TLLI in the 2G communication network, and the mapped GUTI accesses the eNodeB, the eNodeB understands that the UE uses the real GUTI access through this distinction. For example, does the eNodeB obtain the GUTI allocated by the SAE, or use the mapped GUTI, as described above, the old RAI and P-TMSI (or old RAI and TLLI) mapped GUTI access. When the UE c...
Embodiment 2
[0095]Embodiment 2, the method described in Embodiment 1 is all carried out when the UE carries the 2G / 3G identity to access the SAE / LTE network, according to the fact that the cell where the UE is currently camping is not in the registered tracking area (TA, Tracking Area) For access, in the method described in Embodiment 1, if the cell the UE is currently camping on is in the registered TA, the NAS part of the RRC Connection Setup Complete message, such as the NAS of the TAU Request message part (hereinafter referred to as the NAS part of the RRC connection establishment complete message as the NAS message) may not carry UE identification (UE-id), such as GUTI or P-TMSI or IMSI and other information, that is, the UE can determine whether the currently accessed TA is in It determines whether to carry the UE identity in the NAS message in its own TA list (TA list).
[0096] That is to say, if the NAS message carries the UE ID, it is generally considered that the cell where the...
Embodiment 3
[0106]Embodiment 3. In this embodiment, LAC and MMEGI are distinguished by setting, for example, setting the bit in LAC and the corresponding bit in MMEGI to have different values, so that LAC and MMEGI can be distinguished. This embodiment proposes that when the UE accesses the MME through the GUTI, the specific access method may include attach or TAU. If the MME has a UE context (UE Context), the MME finds the UE through GUTI, otherwise, the MME finds the old MME through the GUMMEI in the GUTI, for example, it can find the old MME through the domain name resolution system (DNS, Domain Name System), and send the old MME to the old MME. The MME sends a Context Request, which contains GUTI or sends an Identification Request, which contains a GUTI, and the old MME finds the UE Context through the GUTI, and returns the UE Context or the IMSI information of the UE to the MME. When the UE accesses the MME through the GUTI mapped by old RAI / P-TMSI or TLLI, the MME or DNS needs to di...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 