Fixed network perception user access method and system thereof

A technology that perceives users and fixed networks, applied in the field of communication, can solve problems such as non-support, lower user satisfaction, and unfavorable smooth progress of user services

Active Publication Date: 2012-05-16
ZTE CORP
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for BBF fixed network equipment, because it does not support the 3GPP-based access authentication mechanism, when the UE accesses the EPS network through the BBF fixed network, all 3GPP-based authentication messages are transparently transmitted in the BBF network, so The BBF fixed network equipme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fixed network perception user access method and system thereof
  • Fixed network perception user access method and system thereof
  • Fixed network perception user access method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] The UE accesses through the fixed network WLAN, and the mobile operator regards the fixed network access as untrustworthy access, and deploys ePDG in the mobile network to ensure the security of data transmission. When the UE establishes an IP-Sec tunnel to the ePDG, the ePDG authenticates to the 3GPP AAA. After passing the authentication, the 3GPP AAA establishes a session with the BBF AAA to notify the BBF AAA of user access. The message used for notification carries user access information, and the message may also indicate that the UE has passed authentication in the mobile network. BBF AAA sends user access information to BPCF through BRAS / BNG. BPCF discovers PCRF according to the user ID, and establishes S9 with PCRF * session. The specific implementation process is as image 3 Shown:

[0098] 301. The UE accesses the EPC network through the untrusted BBF network. The 3GPP-based Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) acc...

Embodiment 2

[0113] The UE access scenario in the second embodiment is the same as that in the first embodiment, the main difference is that after the access authentication is completed, the ePDG provides the user access information to the 3GPP AAA through the P-GW. The specific implementation process is as Figure 4 Shown:

[0114] 401. For the process of UE accessing the network, performing access authentication, and allocating an IP address for the UE, refer to steps 301 to 302 of Embodiment 1.

[0115] 402. The UE starts the IKEv2 authentication process, and performs an authentication procedure between the ePDG and the 3GPP AAA. After passing the authentication, an IP-Sec tunnel is established between the UE and the ePDG.

[0116] 403. The ePDG sends a Proxy Binding Update message to the P-GW to request PMIP registration. The message also includes user access information, and the user access information includes user identifiers (such as IMSI / NAI), IP-Sec tunnel information, and the...

Embodiment 3

[0125] The UE accesses through the fixed network WLAN, and the mobile operator regards the fixed network access as trusted access. The UE and the P-GW establish a DSMIP tunnel, the P-GW transmits user access information to the 3GPP AAA, the 3GPP AAA establishes a session with the BBF AAA, and notifies the BBF AAA of user access. The message used for notification carries user access information, and the message may also indicate that the UE has passed authentication in the mobile network. BBFAAA uses the session established between the user and the BRAS / BNG during the fixed network authentication phase to pass the user access information to the BRAS / BNG. The BRAS / BNG further discovers the BPCF according to the IP address and the configuration relationship, and transmits the user access information to the BPCF. BPCF discovers PCRF according to the user ID, and establishes S9 with PCRF * session. The specific implementation process is as Figure 5 Shown:

[0126] 501. The UE...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fixed network perception user access method and a system thereof. The method is characterized in that: based on an authentication process phase of a mobile network to user equipment, authentication authorization and accounting (AAA) of a 3rd generation partnership project (3GPP) acquires user access information and further transmits to the AAA of a broadband forum (BBF); the AAA of the BBF provides the user access information to a broadband policy control function (BPCF); the BPCF discovers a policy and charging rules function (PCRF) which are served for the user according to the received user access information and initiates session establishment to the PCRF. By using the method and the system of the invention, fixed network equipment can identify user access according to the user access information so as to support and implement admission control to the service which is developed for the user.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and system for fixed network sensing user access. Background technique [0002] The Evolved Packet System (EPS, Evolved Packet System) developed by the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) is developed by the Evolved Universal Mobile Telecommunications System Terrestrial Radio Access Network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network) , Mobility Management Entity (MME, Mobility Management Entity), Serving Gateway (S-GW, ServingGateway), Packet Data Network Gateway (P-GW or PDN GW, Packet Data Network Gateway), Home Subscriber Server (HSS, Home Subscriber Server), 3GPP Authentication, Authorization and Accounting (AAA, Authentication, Authorization and Accounting) server, Policy and Charging Rules Function (PCRF, Policy and Charging Rules Function) entity and other supporting nodes. figure 1 The Evolved Packet S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W48/08H04W76/02H04L12/28
Inventor 毛玉欣芮通宗在峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products