Network attachment method, gateway and user equipment
A technology of user equipment and gateway, which is applied in the field of communication and can solve problems such as the inability to perform VoWiFi registration procedures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0173] The network attachment request message is message 1, and the UE's network attachment procedure may include the following: Figure 6 Steps shown:
[0174] Step B1, UE sends IKE_SA_INIT-Request message to ePDG1.
[0175] Among them, the IKE_SA_INIT-Request message can be message 1, which carries the encryption algorithm supported by the UE and exchanges nonces, which is used to trigger the UE to interact with ePDG1 to complete the key exchange algorithm (Diffie_Hellman) exchange, and then prepare to establish IKE connect.
[0176] Step B2, when ePDG1 processes the IKE_SA_INIT-Request message abnormally, ePDG1 sends HO_REQUEST message to neighboring ePDG2.
[0177] Step B3. When ePDG1 receives the HO_ALLOW message sent by ePDG2, ePDG1 sends an IKE_SA_INIT-Request message to ePDG2, and sends an IKE_UPDATE message to the UE.
[0178] Wherein, the IKE_UPDATE message carries information such as the IP of the ePDG2, and is used to notify the UE to update the information of the...
example 2
[0206] The network attach request message is message 2, and the UE's network attach procedure may include the following: Figure 7 Steps shown:
[0207] Step C1, UE sends IKE_SA_INIT-Request message to ePDG1.
[0208] Among them, the IKE_SA_INIT-Request message carries the encryption algorithm supported by the UE and exchanges nonces, which is used to trigger the UE to interact with ePDG1 to complete the key exchange algorithm (Diffie_Hellman) exchange, and then prepare to establish an IKE connection.
[0209] Step C2, ePDG1 processes IKE_SA_INIT-Request, and sends IKE_SA_INIT-Answer message to UE.
[0210] Wherein, the IKE_SA_INIT-Answer message may be a network attachment response message, and the IKE_SA_INIT-Answer message carries information of the ePDG1.
[0211] In step C3, the UE sends an IKE_AUTH_Req message to the ePDG1, and performs an EAP algorithm negotiation process with the network side.
[0212] Among them, the IKE_AUTH_Req message in step C3 may carry SA inf...
example 3
[0240] The network attach request message is message 3, and the UE's network attach process may include the following: Figure 8 Steps shown:
[0241] Step D1, UE sends IKE_SA_INIT-Request message to ePDG1.
[0242] Among them, the IKE_SA_INIT-Request message carries the encryption algorithm supported by the UE and exchanges nonces, which is used to trigger the UE to interact with ePDG1 to complete the key exchange algorithm (Diffie_Hellman) exchange, and then prepare to establish an IKE connection.
[0243] Step D2, ePDG1 processes IKE_SA_INIT-Request, and sends IKE_SA_INIT-Answer message to UE.
[0244] Wherein, the IKE_SA_INIT-Answer message may be a network attachment response message, and the IKE_SA_INIT-Answer message carries information of the ePDG1.
[0245] In step D3, the UE sends an IKE_AUTH_Req message to the ePDG1, and performs an EAP algorithm negotiation process with the network side.
[0246] Among them, the IKE_AUTH_Req message in step C3 may carry SA infor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


