A method, system and device for sending trigger information
A technology of triggering information and server, applied in security devices, transmission systems, wireless communication, etc., can solve the problem of sending triggering information without regulations, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] Figure 4 It is a schematic flowchart of Embodiment 1 of the method for sending trigger information in the present invention, and it is a scenario where MTC-IWF obtains the IP address of the MTC UE and sends trigger information through the user plane, such as Figure 4 As shown, the method includes the following steps:
[0071] Step 401, the MTC server sends trigger information to the MTC-IWF;
[0072] Specifically, the MTC server sets the content of the trigger information, uses the external identifier ext-ID of the MTC UE to query the IP address of the MTC-IWF from the DNS, and sends the trigger information to the MTC-IWF through the Tsp interface according to the IP address.
[0073] Step 402, MTC-IWF authenticates the MTC server, if the authentication is passed, execute step 303, otherwise, discard the trigger information;
[0074] Specifically, after the MTC-IWF receives the trigger information, it authenticates the MTC server that sent the trigger information. I...
Embodiment 2
[0083] Figure 5 It is a schematic flow diagram of Embodiment 2 of the method for sending trigger information in the present invention, and it is aimed at the scenario where the MTC-IWF does not obtain the IP address of the MTC UE and sends the trigger information through the T5 interface, such as Figure 5 As shown, the method includes the following steps:
[0084] Step 501, the MTC server sends trigger information to the MTC-IWF;
[0085] Specifically, the MTC server sets the content of the trigger information, uses the external identifier ext-ID of the MTC UE to query the IP address of the MTC-IWF from the DNS, and sends the trigger information to the MTC-IWF through the Tsp interface according to the IP address.
[0086] Step 502, the MTC-IWF authenticates the MTC server, if the authentication is passed, execute step 503, otherwise, discard the trigger information;
[0087] Specifically, after the MTC-IWF receives the trigger information, it authenticates the MTC server ...
Embodiment 3
[0101] Figure 6 It is a schematic flowchart of Embodiment 3 of the method for sending trigger information in the present invention, and it is aimed at the scenario where the MTC-IWF does not obtain the IP address of the MTC UE and sends the trigger information through the T4 interface, such as Figure 6 As shown, the method includes the following steps:
[0102] Step 601, the MTC server sends trigger information to the MTC-IWF;
[0103] Specifically, the MTC server sets the content of the trigger information, uses the external identifier ext-ID of the MTC UE to query the IP address of the MTC-IWF from the DNS, and sends the trigger information to the MTC-IWF through the Tsp interface according to the IP address.
[0104] Step 602, MTC-IWF authenticates the MTC server, if the authentication is passed, execute step 603, otherwise, discard the trigger information;
[0105] Specifically, after the MTC-IWF receives the trigger information, it authenticates the MTC server that se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



