Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method for obtaining terminal access identification and identity information server

A technology for accessing identification and identity information, which is applied in wireless communication, network data management, electrical components, etc., and can solve problems such as inability to access the network and inability of terminals to obtain AID

Active Publication Date: 2019-01-04
苏州医疗器械产业发展集团有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in the above-mentioned method based on identity and location separation, when a terminal roams, even if there is a roaming agreement between its home operator and the current visited operator, the terminal cannot obtain the AID of the terminal user. network access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for obtaining terminal access identification and identity information server
  • A method for obtaining terminal access identification and identity information server
  • A method for obtaining terminal access identification and identity information server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Figure 4 Shown is the first embodiment of this implementation mode, which is a process in which a terminal accesses the network and obtains the access identification (AID) of the terminal from the network, specifically including the following steps:

[0079]Step 401: The terminal roams to the visited operator, accesses the network of the visited operator, and attaches to its Access Service Router (ASR). At this time, the ASR is the service ASR of the terminal (namely, the visited service ASR);

[0080] Generally speaking, in this step, the serving ASR acquires the identifier used by the terminal for access authentication, such as the above-mentioned IMSI, NAI, or User Name (User Name). Based on the above user name, the network first performs access authentication on the terminal user, and then executes subsequent procedures after the access authentication is passed.

[0081] Step 402: The above-mentioned ASR (located at the operator in the visited place) queries the ...

Embodiment 2

[0106] Image 6 Shown is the second embodiment of the present invention, and it is still assumed that the terminal accesses the network at the visited operator, that is, the current service ASR of the terminal is located at the visited operator.

[0107] Step 601: The correspondent node (Correspondent Node, CN for short) of the terminal sends a data message to the terminal, the destination IP address of the data message is set to the AID of the terminal, and the data message first arrives at the service ASR (CN-ASR) of the CN;

[0108] Step 602: When the CN-ASR cannot find the terminal's location information locally, query the terminal's location information from the ILR in the operator's domain where the CN-ASR is located, and the query message carries the terminal's AID;

[0109] It is assumed that the operator where the CN-ASR is located is not the home operator of the terminal.

[0110] Step 603: Assuming that the ILR in the operator's domain where the CN-ASR is located c...

Embodiment 3

[0117] Figure 7 Shown is the third embodiment of the present invention, and it is still assumed that the terminal accesses the network at the visited operator, that is, the current service ASR of the terminal is located at the visited operator. When the terminal exits the network, it is necessary to clear the location information of the terminal stored in the terminal's home ILR, which specifically includes the following steps.

[0118] Step 701: The current service ASR of the terminal receives an instruction that the terminal withdraws from the network or releases the IP address;

[0119] Step 702: The above-mentioned ASR sends a message to the ILR (Visited ILR) in the local domain (that is, the domain of the terminal's visited operator) to delete the location information of the terminal, which includes the AID of the terminal and preferably also carries the information used by the terminal to connect to the terminal. logon of authentication;

[0120] Step 703: After recei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for acquiring terminal access identifiers and an identity information server, comprising: setting an identity information server (IIS) in the network, initially storing the access identifiers (AID) of the terminals in the network in the IIS, And establish the mutual connection between each IIS; when the terminal roams and accesses from the visited network, the visited IIS queries the terminal's home IIS when the terminal's visited service access service router (ASR) queries the terminal's AID The AID of the terminal; the AID of the terminal that is returned by the IIS of the visited site after receiving the query from the home IIS of the terminal. The present invention saves the AID of the terminal by setting the identity information server, and connects the identity information servers to each other so as to carry out the interaction of the AID of the terminal, so that in the method based on identity location separation, when the terminal roams, the AID of the terminal can be obtained , so that the terminal can access the network of the foreign destination.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method for acquiring an access identifier of a terminal and an identity information server. Background technique [0002] As we all know, in the IP Internet, if a terminal wants to access the IP Internet, it must apply for a valid IP address from the network. The IP address has dual attributes, which not only represent the identity of the user but also represent the network topology position of the user. After a user obtains an IP address at a topological location (for example, under a certain access gateway), the IP address can only be used at the topological location (for example, it can only be used within the jurisdiction of an access gateway). This is certainly no problem for fixed terminals, but for mobile terminals, when the terminal moves from the range under the jurisdiction of one access gateway to the range under the jurisdiction of another access gateway, the ab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/02
CPCH04W8/12
Inventor 骆文孙默
Owner 苏州医疗器械产业发展集团有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More