Method and system for sharing operator resources of terminal proxy

A technology of resource sharing and operators, which is applied in the resource sharing and system field of terminal agent operators, and can solve problems such as not signing roaming agreements

Active Publication Date: 2016-07-06
郭今戈
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of this, the embodiment of the present invention expects to propose a method and system for operator resource sharing as a terminal agent, aiming at the emergency scenario in which network coverage of A is better and network coverage of B is poor, but operators A and B have not signed a roaming agreement , the B-U terminal needs to access the network of operator A to use the communication service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for sharing operator resources of terminal proxy
  • Method and system for sharing operator resources of terminal proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the present invention.

[0034] likefigure 1 As shown, an implementation process of a method for sharing operator resources for a terminal proxy in an embodiment of the present invention includes the following steps:

[0035] Step 101, A operator network enables the function based on the terminal agent, and records the user number and the terminal of the agent in the home location register, and records the user number and the terminal of the terminal A-U to allow the agent;

[0036] Here, the home location register (HomeLocationRegister, HLR) refers to the network element responsible for the registration and managem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for sharing operator resources of terminal proxy. The method comprises the steps that an A operator network opens a function based on the terminal proxy, a B operator terminal B-U not signing a roaming protocol with the A operator sends a proxy request to a terminal A-U that signs a service protocol with the A operator network, the A-U accepts the proxy request of the B-U, the A-U sends the ID information of the B-U to an HSS / HLR of the network A for authorization, an application in the terminal B-U triggers the terminal B-U to omit network selection and access criterion limitations in an existing SIM card and starts to attempt to initiate a business request to the network A; and the terminal A-U and a terminal A-U2 belonging to the A operator and a terminal A-U2 system share traffics or other business of the terminal A-U by an A-U proxy or insurance mechanism. The invention further discloses a device for sharing operator resources of terminal proxy.

Description

technical field [0001] Mobile communication system wireless, core network field. Background technique [0002] In the existing cellular mobile communication system, the user and the operator are strictly bound through the information in the SIM card. For example, operators A and B are operators who have not signed a roaming agreement, and the terminal B-U belonging to operator B, although In terms of terminal capabilities, terminal B-U also supports operator A's network, but due to the restrictions of the access authentication protocol, even under certain conditions, such as A's network coverage is better, B's network coverage is not good, or even no coverage. B-U also cannot access the network of operator A. [0003] The tariff package set by the existing operator is for a single user. For example, two subscribers A-U and A-U2 of operator A, A-U’s monthly package usage is insufficient, and A-U2’s monthly package has exceeded or is about to exceed the limit. At this time, A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/20H04W12/06H04W4/24
CPCH04W4/24H04W8/205H04W12/06
Inventor 郭今戈
Owner 郭今戈
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products