Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, system and device for sending trigger information

A technology of triggering information and server, applied in security devices, transmission systems, wireless communication, etc., can solve the problem of sending triggering information without regulations, etc.

Inactive Publication Date: 2017-11-21
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] During the research and practice of the existing technology, it is found that the existing technology has the following problems: When MTC-IWF chooses the method of sending trigger information, how to choose the user plane or the control plane method has not been clearly stipulated. For the control plane method, the specific There is no regulation on which interface to send the trigger information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system and device for sending trigger information
  • A method, system and device for sending trigger information
  • A method, system and device for sending trigger information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Figure 4 It is a schematic flowchart of Embodiment 1 of the method for sending trigger information in the present invention, and it is a scenario where MTC-IWF obtains the IP address of the MTC UE and sends trigger information through the user plane, such as Figure 4 As shown, the method includes the following steps:

[0071] Step 401, the MTC server sends trigger information to the MTC-IWF;

[0072] Specifically, the MTC server sets the content of the trigger information, uses the external identifier ext-ID of the MTC UE to query the IP address of the MTC-IWF from the DNS, and sends the trigger information to the MTC-IWF through the Tsp interface according to the IP address.

[0073] Step 402, MTC-IWF authenticates the MTC server, if the authentication is passed, execute step 303, otherwise, discard the trigger information;

[0074] Specifically, after the MTC-IWF receives the trigger information, it authenticates the MTC server that sent the trigger information. I...

Embodiment 2

[0083] Figure 5 It is a schematic flow diagram of Embodiment 2 of the method for sending trigger information in the present invention, and it is aimed at the scenario where the MTC-IWF does not obtain the IP address of the MTC UE and sends the trigger information through the T5 interface, such as Figure 5 As shown, the method includes the following steps:

[0084] Step 501, the MTC server sends trigger information to the MTC-IWF;

[0085] Specifically, the MTC server sets the content of the trigger information, uses the external identifier ext-ID of the MTC UE to query the IP address of the MTC-IWF from the DNS, and sends the trigger information to the MTC-IWF through the Tsp interface according to the IP address.

[0086] Step 502, the MTC-IWF authenticates the MTC server, if the authentication is passed, execute step 503, otherwise, discard the trigger information;

[0087] Specifically, after the MTC-IWF receives the trigger information, it authenticates the MTC server ...

Embodiment 3

[0101] Figure 6 It is a schematic flowchart of Embodiment 3 of the method for sending trigger information in the present invention, and it is aimed at the scenario where the MTC-IWF does not obtain the IP address of the MTC UE and sends the trigger information through the T4 interface, such as Figure 6 As shown, the method includes the following steps:

[0102] Step 601, the MTC server sends trigger information to the MTC-IWF;

[0103] Specifically, the MTC server sets the content of the trigger information, uses the external identifier ext-ID of the MTC UE to query the IP address of the MTC-IWF from the DNS, and sends the trigger information to the MTC-IWF through the Tsp interface according to the IP address.

[0104] Step 602, MTC-IWF authenticates the MTC server, if the authentication is passed, execute step 603, otherwise, discard the trigger information;

[0105] Specifically, after the MTC-IWF receives the trigger information, it authenticates the MTC server that se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for sending trigger information, comprising: MTC-IWF authenticates the MTC server after receiving the trigger information of the MTC server; after the authentication is passed, MTC-IWF obtains the IP address of the MTC UE and obtains the MTC When the IP address of the UE is obtained, MTC‑IWF sends trigger information to the MTC UE through the user plane network node device according to the obtained IP address of the MTC UE; when the IP address of the MTC UE is not obtained, the MTC‑IWF sends the trigger information to the The MTC UE sends the trigger information; the MTC-IWF sends the trigger information transmission report to the MTC server; the present invention also provides a system and device for sending the trigger information. According to the technical solution of the present invention, the sending of trigger information can be realized.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a method, system and device for sending trigger information. Background technique [0002] Machine to machine (M2M, Machine to Machine) refers to all technologies and means for establishing connections between machines. The concept of M2M appeared in the 1990s, but it only stayed at the theoretical stage. After 2000, with the development of mobile communication technology, it became possible to realize the networking of machines with mobile communication technology. M2M communication appeared in the market around 2002, and developed rapidly in the following years, becoming the focus of attention of many communication equipment manufacturers and telecom operators. At present, the number of machines in the world is much larger than the number of people, so it is foreseeable that the M2M technology will have a good market prospect. [0003] The research on the applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04W4/14H04W4/70
CPCH04W12/06H04W88/16H04L61/106H04W4/70H04W76/12H04W4/14
Inventor 许辉
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More