An ID mapping method and device, and a policy control method and system
A mapping method and mapping relationship technology, applied in the field of communication, can solve the problem of inability to fix device policy control, and achieve the effect of policy control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0099] Embodiment 1. The mapping relationship between the fixed ID and the mobile ID is stored on the BBFAAA server, that is, the BBFAAA server realizes the ID mapping of the fixed device;
[0100] Specifically, after the fixed device accesses the fixed broadband network, the authentication process will be triggered. The authentication process involves the interaction between the fixed device, the IP border gateway and the BBFAAA server. The fixed device sends an authentication request to the IP border gateway. During the authentication process, the IP border gateway, as an access node, does not process the authentication request, but directly sends the authentication request to the BBFAAA server. Since the BBFAAA server has the function of identity mapping, it receives the IP border gateway After receiving the authentication request, query the mobile identity corresponding to the fixed identity carried in the authentication request from the saved mapping relationship, and retu...
Embodiment 2
[0107] Embodiment 2. The mapping relationship between the fixed identifier and the mobile identifier is stored on the 3GPPAAA server, that is, the 3GPPAAA server realizes the identifier mapping of the fixed device;
[0108] Specifically, after the fixed device accesses the fixed broadband network, the authentication process will be triggered. The authentication process involves the interaction between the fixed device, the IP border gateway and the BBFAAA server. The fixed device sends an authentication request to the IP border gateway. During the authentication process, the IP border gateway, as an access node, does not process the authentication request, but directly sends the authentication request to the BBFAAA server. Since the 3GPPAAA server has the function of identity mapping, the BBFAAA server receives the IP border After the authentication request sent by the gateway, send an identification request to the 3GPPAAA server, wherein the identification request carries a fi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com