Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for accessing and obtaining context of UE (User Equipment) and identification of UE

A technology for user equipment and mobile user identification, applied in connection management, wireless communication, network data management and other directions, can solve the problems of new communication network not being able to select new CN nodes, unable to obtain UE context, RAT unable to correspond to CN nodes, etc. To achieve the effect of flexible application

Active Publication Date: 2012-10-31
SHANGHAI HUAWEI TECH CO LTD
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Since the identity of the mapped RAT is different from the identity of the real RAT, the identity of the mapped RAT may not correspond to the CN node, that is, it may not be possible to select a new CN node in the new communication network
[0008] In addition, due to different communication networks, if the new CN node cannot identify whether the current RAT identifier is the real RAT identifier or the mapped RAT identifier, it does not know what form of RAT to use to obtain the UE from the original CN node. Context, which may result in failure to obtain the UE context

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for accessing and obtaining context of UE (User Equipment) and identification of UE
  • Method and device for accessing and obtaining context of UE (User Equipment) and identification of UE
  • Method and device for accessing and obtaining context of UE (User Equipment) and identification of UE

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Embodiment 1. This embodiment provides a method for distinguishing between Location Area Code (LAC, Location Area Code) and MMEGI. For example, setting the value of the bit in LAC and the corresponding bit in MMEGI is different, so that LAC and MMEGI can be distinguished. For the specific setting method, for example, the first bit of MMEGI is 1, and the first bit of LAC is 0. This bit is called a flag bit for distinguishing MMEGI and LAC. Of course, other bits can also be used as distinguishing flag bits. In this way, when the UE accesses the eNodeB through the old RAI and P-TMSI in the 3G network, or the old RAI and the TLLI in the 2G communication network, and the mapped GUTI accesses the eNodeB, the eNodeB understands that the UE uses the real GUTI access through this distinction. For example, does the eNodeB obtain the GUTI allocated by the SAE, or use the mapped GUTI, as described above, the old RAI and P-TMSI (or old RAI and TLLI) mapped GUTI access. When the UE c...

Embodiment 2

[0095]Embodiment 2, the method described in Embodiment 1 is all carried out when the UE carries the 2G / 3G identity to access the SAE / LTE network, according to the fact that the cell where the UE is currently camping is not in the registered tracking area (TA, Tracking Area) For access, in the method described in Embodiment 1, if the cell the UE is currently camping on is in the registered TA, the NAS part of the RRC Connection Setup Complete message, such as the NAS of the TAU Request message part (hereinafter referred to as the NAS part of the RRC connection establishment complete message as the NAS message) may not carry UE identification (UE-id), such as GUTI or P-TMSI or IMSI and other information, that is, the UE can determine whether the currently accessed TA is in It determines whether to carry the UE identity in the NAS message in its own TA list (TA list).

[0096] That is to say, if the NAS message carries the UE ID, it is generally considered that the cell where the...

Embodiment 3

[0106]Embodiment 3. In this embodiment, LAC and MMEGI are distinguished by setting, for example, setting the bit in LAC and the corresponding bit in MMEGI to have different values, so that LAC and MMEGI can be distinguished. This embodiment proposes that when the UE accesses the MME through the GUTI, the specific access method may include attach or TAU. If the MME has a UE context (UE Context), the MME finds the UE through GUTI, otherwise, the MME finds the old MME through the GUMMEI in the GUTI, for example, it can find the old MME through the domain name resolution system (DNS, Domain Name System), and send the old MME to the old MME. The MME sends a Context Request, which contains GUTI or sends an Identification Request, which contains a GUTI, and the old MME finds the UE Context through the GUTI, and returns the UE Context or the IMSI information of the UE to the MME. When the UE accesses the MME through the GUTI mapped by old RAI / P-TMSI or TLLI, the MME or DNS needs to di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a device for accessing and obtaining a context of UE (User Equipment) and an identification of UE. An accessing method comprises the following steps: when the UE is accessed to an SAE (System Architecture Evolution) network, confirming that a GUMMEI (Global Unique Mobility Management Entity Identity) or MMEGI (Mobility Management Entity Group Identity) in the GUMMEI carried by the UE is distributed by SAE or mapped, by an evolution station eNodeB. According to the method and the device for accessing and obtaining the context of the UE and the identification of the UE, a carried temporary identification is confirmed as being distributed by a network side or mapped when the UE is accessed to the network side, so that different accessing methods are adopted for different temporary identifications and the flexible application of the temporary identification is realized.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for accessing and acquiring user equipment context and user equipment identification. Background technique [0002] In the existing communication network, there are traditional second generation (2G, Second Generation) communication network, third generation (3G, 3rd Generation) communication network, and Long Term Evolution (LTE, Long Term Evolution) / System Architecture Evolution (SAE, System Architecture Evolution) network. The communication network is generally composed of a radio access network (RAN, Radio Access Network) and a core network (CN, Core Network). Different communication networks will use different radio access technologies (RAT, Radio Access Technology) to enter the CN, that is, different The communication network of the communication network has different RANs, for example, the RAN of the 3G communication network is called Un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/06H04W8/26H04W76/02
CPCH04W36/0033H04W60/00H04W36/0022H04W8/10H04W60/04H04W88/005
Inventor 郭小龙
Owner SHANGHAI HUAWEI TECH CO LTD