Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for realizing user equipment authentication

A user equipment and authentication technology, applied in the field of communication, can solve the problem of large average delay of UE access to the network, and achieve the effect of reducing the average delay

Active Publication Date: 2018-07-10
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method, device and system for implementing UE authentication, which are used to solve the problem in the prior art that the average time delay of UE accessing the network is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing user equipment authentication
  • Method, device and system for realizing user equipment authentication
  • Method, device and system for realizing user equipment authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach A

[0124] The TDF pre-configures event subscription rules, and the event subscription rules may be configured based on the UE's access attributes, for example: a UE whose access point name (APN, Access Point Name) is "iptv.net" subscribes to the RAT -Type-Change event.

[0125] Such as Figure 3a Shown:

[0126] The TSR message in step S102 of the method 100 provided by Embodiment 1 of the present invention also includes the access attribute of the UE, and the access attribute of the UE included in the TSR message is the same as the CCR- The access attribute of the UE included in the I message will not be described again.

[0127] The method 100 provided in Embodiment 1 of the present invention may further include steps S10M and S10N after S102.

[0128] Step S10M: After receiving the TSR message in step S102, the TDF determines the event that needs to be subscribed according to the access attribute of the UE and the event subscription rule, for example: RAT-Type-Change event,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for realizing UE authentication. The method comprises the following steps of receiving a CCR-I message used for requesting the authentication ofthe UE from a PCEF by a PCRF; according to a UE identification, determining that the UE signs a contract, and sending a TSR message to a TDF; and when the TDF is determined not to be required to participate in an authentication process corresponding to the CCR-I message, before a TSA message returned by the TDF is received, returning a CCA-I message used for expressing authentication passing to the PCEF. Therefore, the processing process and the processing result of the TDF do not influence the authentication process so that average time delay for the UE to access a network is effectively reduced.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for realizing user equipment authentication. Background technique [0002] Telecom operators plan networks according to the standards of the 3rd Generation Partnership Project (3GPP), among which the policy and charging control (Policy and Charging Control, PCC) standard TS23.203 is one of the important 3GPP standards. [0003] The basic PCC architecture includes Policy and Charging Rules Function (Policy and Charging Rules Function, PCRF), Policy and Charging Enforcement Function (Policy and Charging Enforcement Function, PCEF) and Traffic Detection Function (Traffic Detection Function, TDF). [0004] When user equipment (User Equipment, UE) wants to access the network, PCC authentication needs to be performed on the UE. First, the UE sends an access request signaling to the PCEF, and the PCEF allocates an IP address for the UE after r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W48/16
CPCH04W12/06H04W48/16
Inventor 马智勇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products