WO2013037273A1 - Procédé et système de traitement de capacité d'équipements d'utilisateurs - Google Patents
Procédé et système de traitement de capacité d'équipements d'utilisateurs Download PDFInfo
- Publication number
- WO2013037273A1 WO2013037273A1 PCT/CN2012/081004 CN2012081004W WO2013037273A1 WO 2013037273 A1 WO2013037273 A1 WO 2013037273A1 CN 2012081004 W CN2012081004 W CN 2012081004W WO 2013037273 A1 WO2013037273 A1 WO 2013037273A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- key exchange
- packet data
- authentication
- evolved packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method and system for processing user equipment capabilities.
- the Evolved Packet System (EPS) in the 3rd Generation Partnership Project (3GPP) is evolved by the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network).
- E-UTRAN Mobility Management Entity
- S-GW Serving Gateway
- P-GW Packet Data Network Gateway
- HSS Home Subscriber Server
- PCRF Policy and Charging Rules Function
- the EPS system supports interworking with non-3GPP systems.
- the interworking with non-3GPP systems is implemented through the S2a/S2b/S2c interface, and the anchor point between the 3GPP and non-3GPP systems is the P-GW.
- Non-3GPP systems are classified into trusted non-3GPP IP access and untrusted non-3GPP IP access.
- the trusted non-3GPP IP access can be directly connected to the P-GW through the S2a interface; the untrusted non-3GPP IP access needs to be connected to the PDN GW through an Evolved Packet Data Gateway (ePDG), ePDG and PDN GW.
- ePDG Evolved Packet Data Gateway
- the interface between S2b and S2c provides user plane-related control and mobility support between the UE and the P-GW.
- the supported mobility management protocol is Mobile IPv6 Support for Dual Stack Hosts and Routers, referred to as DSMIPv6).
- the MME mobility management unit is responsible for control planes such as mobility management, non-access stratum signaling processing, and user mobility management context management; and the S-GW is an access gateway device connected to the E-UTRAN. Forwarding data between E-UTRAN and P-GW, and responsible for buffering paging waiting data; P-GW is EPS and packet data network (Packet Data Network, referred to as A border gateway for PDN), responsible for PDN access and forwarding data between EPS and PDN; PCRF is a policy and charging rule function entity that receives the interface Rx and the carrier network protocol (Internet Protocol, referred to as IP) The service network is connected to obtain the service information. In addition, it is connected to the gateway device in the network through the Gx/Gxa/Gxc interface, and is responsible for initiating the establishment of the IP bearer and ensuring the quality of service (QoS) of the service data. And charge control.
- QoS quality of service
- the UE needs to select an appropriate ePDG by connecting to the EPS system through the untrusted access system.
- the current technology UE selects an ePDG that is located close to the access system where the UE is located.
- the 3GPP AAA server may be based on the UE's IP address or the access network system.
- the information is selected by the UE, which is performed by the UE and the ePDG to establish an IKEv2 security association to establish an IPSec tunnel for authentication and authorization.
- the UE and the ePDG are required to support the IKEv2 redirection mechanism defined by the IETF (Redirect Mechanism for the IKEv2 in RFC5685).
- This mechanism can be used to redirect the IKEv2 server in the IKE SA INIT, IKE AUTH process or after the IKEv2 session is established.
- the ePDG can be used to initiate the UE redirection to another ePDG.
- the current problem is that the 3GPP AAA server does not know whether the UE has the capability of IKEv2 redirection (this capability of the UE is not mandatory). If the 3GPP AAA server finds that the ePDG closer to the UE will notify the current ePDG, If the current ePDG notifies the UE that does not support the IKEv2 redirection, the UE will not be able to identify the content of the message or even report the error. If the current ePDG ignores the redirection indication of the 3GPP AAA, the authentication and authorization process cannot be completed. An error occurred in establishing the authentication and authorization process for the entire IKEv2 tunnel. Summary of the invention
- the technical problem to be solved by the present invention is to provide a method and system for performing an evolved packet data gateway redirection decision, and solving the authentication authorization caused by the AAA server selecting a new ePDG for capability information without the Internet key exchange protocol redirection function. Process error problem.
- the present invention provides a method for processing user equipment capabilities, wherein, in the process of creating an Internet Key Exchange Protocol tunnel between a terminal and an evolved packet data gateway, the evolved packet data gateway will The capability information of the terminal having the Internet Key Exchange Protocol redirection function is notified to the authentication authorization accounting server, that is, the AAA server.
- the AAA server determines, according to the capability information, whether to reselect an evolved packet data gateway for the terminal.
- the above method may also have the following features:
- Determining, by the AAA server, whether to reselect the evolved packet data gateway for the terminal according to the capability information includes:
- the AAA server selects an evolved packet data gateway closest to the terminal for the terminal and performs an authentication process, which is selected by the authentication process.
- the identifier of the evolved packet data gateway is notified to the terminal;
- the AAA server directly performs an authentication process.
- the above method may also have the following features:
- the terminal notifies the evolved packet data gateway of capability information of whether the terminal has an Internet Key Exchange Protocol redirection function in a network key exchange security association initialization procedure with the evolved packet data gateway.
- the above method may also have the following features:
- the manner in which the evolved packet data gateway notifies the AAA server whether the terminal has the capability information of the Internet Key Exchange Protocol redirection function is one of the following modes:
- the terminal When the redirection capability identifier is sent in the extended authentication protocol response message sent to the AAA server, the terminal has the Internet key exchange protocol redirection function. When the redirection capability identifier is not carried, the terminal does not have the Internet key exchange protocol redirection.
- the extended authentication protocol response message sent to the AAA server carries a redirection capability, and the different values of the redirection capability identifier indicate that the terminal has or does not have the Internet Key Exchange Protocol redirection function.
- the present invention further provides a system for processing a user equipment capability, including a terminal, an evolved packet data gateway, and an authentication and authorization accounting server, that is, an AAA server, where the evolved packet data gateway includes an Internet secret.
- a system for processing a user equipment capability including a terminal, an evolved packet data gateway, and an authentication and authorization accounting server, that is, an AAA server, where the evolved packet data gateway includes an Internet secret.
- Key exchange redirection function module
- the Internet key exchange redirection function module is configured to: whether the terminal has an Intel The capability information of the network key exchange protocol redirection function is notified to the authentication function module.
- the AAA server includes an authentication function module.
- the authentication function module is configured to: determine, according to the capability information, whether to reselect an evolved packet data gateway for the terminal.
- the above system may also have the following characteristics:
- the authentication function module is further configured to: determine that the capability information indicates that the terminal has an Internet Key Exchange Protocol redirection function, select an evolved packet data gateway that is closest to the terminal for the terminal, and perform an authentication process, The authentication process notifies the selected identifier of the evolved packet data gateway to the terminal; and when the capability information indicates that the terminal does not have the Internet Key Exchange Protocol redirection function, the authentication process is directly executed.
- the above system may also have the following characteristics:
- the terminal is configured to: notify the evolved packet data gateway of the capability information of whether the terminal has the Internet Key Exchange Protocol redirection function in the network key exchange security association initialization procedure with the evolved packet data gateway.
- the present invention further provides an evolved packet data gateway, including an Internet key exchange redirection function module, where the Internet key exchange redirection function module is configured to: The capability information of the Internet Key Exchange Protocol Redirection function is notified to the Authentication Authorization Accounting Server.
- the present invention further provides an authentication and authorization accounting server, wherein the authentication and authorization accounting server includes an authentication function module; and the authentication function module is configured to: according to a terminal learned from an evolved packet data gateway. Whether the capability information of the Internet Key Exchange Protocol redirection function determines whether to reselect the evolved packet data gateway for the terminal; and when the capability information indicates that the terminal has the Internet Key Exchange Protocol redirection function, the terminal is Selecting an evolving packet data gateway that is closest to the terminal and performing an authentication process, notifying, by the authentication process, an identifier of the selected evolved packet data gateway to the terminal; determining that the capability information indicates that the terminal does not have an Internet key exchange When the protocol redirection function is performed, the authentication process is directly executed.
- the capability information of the terminal having the Internet Key Exchange Protocol redirection function is notified to the 3GPP AAA server, and the 3GPP AAA server determines, according to the capability information, whether to reselect the evolved packet data gateway for the terminal, that is, the 3GPP AAA server. Only for this ability The terminal selects a new ePDG, which can solve the problem that the AAA server selects a new ePDG for the authentication authorization process error problem for the capability information without the Internet Key Exchange Protocol redirection function.
- FIG. 1 is a schematic diagram of an interworking architecture between an EPS system and a non-3GPP system in the related art
- FIG. 2 is a schematic diagram of a method for processing user equipment capabilities
- FIG. 3 is a flowchart of a method for processing user equipment capabilities in a specific embodiment
- FIG. 4 is a specific flowchart of a WLAN as an access system in the first embodiment
- FIG. 5 is a flowchart of a method for processing a user equipment capability in a second embodiment
- FIG. 6 is a specific flowchart of a WLAN as an access system in the second embodiment.
- the system for processing the user equipment capability includes a terminal, an ePDG, and an authentication and authorization accounting server, that is, an AAA server, where the ePDG includes an Internet key exchange redirection function module.
- the Internet key exchange redirection function module is configured to notify the authentication function module whether the terminal has the capability information of the Internet key exchange protocol redirection function after receiving the Internet key exchange authentication request sent by the terminal.
- the AAA server includes an authentication function module.
- the authentication function module is configured to determine, according to the capability information, whether to reselect the ePDG for the terminal. Specifically, the authentication function module determines that the capability information indicates that the terminal has an Internet Key Exchange Protocol redirection function, selects an ePDG that is closest to the terminal for the terminal, and performs an authentication process, and selects through an authentication process. The identifier of the ePDG is notified to the terminal; and when the capability information indicates that the terminal does not have the Internet Key Exchange Protocol redirection function, the authentication process is directly executed.
- the terminal is configured to notify the ePDG of the capability information of whether the terminal has the Internet Key Exchange Protocol redirection function in the network key exchange security association initialization procedure with the ePDG.
- An evolved packet data gateway including an internet key exchange redirection function module, Medium,
- the Internet key exchange redirection function module is configured to: notify the authentication authorization charging server whether the terminal has capability information of the Internet Key Exchange Protocol redirection function.
- An authentication and authorization accounting server where the authentication and authorization accounting server includes an authentication function module
- the authentication function module is configured to: determine, according to capability information of the terminal that is obtained by the evolving packet data gateway, whether the terminal has the Internet Key Exchange Protocol redirection function, whether to reselect the evolved packet data gateway for the terminal; wherein, the capability information is determined
- the terminal selects an evolving packet data gateway that is closest to the terminal and performs an authentication process, and notifies the identifier of the selected evolving packet data gateway to the identifier through the authentication process.
- determining, by the terminal, that the capability information indicates that the terminal does not have an Internet Key Exchange Protocol redirection function, directly performing an authentication process.
- the method applied to the foregoing system includes: in an Internet Key Exchange Protocol tunnel process between a terminal and an ePDG, an ePDG that receives an Internet Key Exchange Authentication Request sent by a terminal whether the terminal has The capability information of the Internet Key Exchange Protocol Redirection function is notified to the AAA server.
- the AAA server determines, according to the capability information, whether to reselect the ePDG for the terminal. Specifically, the AAA server determines, according to the capability information, whether to reselect the ePDG finger for the terminal:
- the AAA server selects an ePDG that is closest to the terminal for the terminal and performs an authentication process, and the selected ePDG identifier is determined by the authentication process. Notifying to the terminal;
- the AAA server directly performs an authentication process.
- the terminal notifies the ePDG of the capability information of whether the terminal has the Internet Key Exchange Protocol redirection function in the network key exchange security association initialization procedure with the ePDG.
- the ePDG notifies the AAA server whether the terminal has an Internet Key Exchange Protocol redirection
- the way of functional capability information is one of the following:
- the terminal When the redirection capability identifier is carried in the extended authentication protocol response message sent to the AAA server, the terminal has the Internet key exchange protocol redirection function. When the redirection capability identifier is not carried, the terminal does not have the Internet key exchange protocol. Redirection function;
- the extended authentication protocol response message sent to the AAA server carries the redirection capability, and the different values of the redirection capability identifier indicate that the terminal has or does not have the Internet Key Exchange Protocol redirection function.
- the UE is connected to the untrusted non-3GPP access system.
- the ePDG In the EPS system, UE and ePDG, in the process of creating an Internet Key Exchange Protocol (IKEv2) tunnel, the ePDG notifies the 3GPP AAA server that the UE has IKEv2 redirection capability information, and the 3GPP AAA server reselects the ePDG according to the UE.
- IKEv2 Internet Key Exchange Protocol
- Step 301 The UE is connected to the non-3GPP access system, and optionally performs the authentication authorization of the non-3GPP access.
- the 3GPP AAA server may send the related policy information and the subscription information of the operator to the access network.
- Step 302 The UE and the ePDG exchange the first pair of messages IKE_SA_INIT to negotiate an encryption algorithm, perform random number exchange, etc., in this process, the UE notifies the IKEv2 redirection capability by the REDIRECT SUPPORTED message (defined by RFC5685) ePDG;
- Step 303 The UE performs the interaction of the identity authentication information by using the ePDG and the AAA server.
- IKE AUTH Internet Key Exchange Authentication
- EAP Extensible Authentication Protocol
- the ePDG is configured to respond to the authentication challenge received during the identity authentication interaction, and the UE may further include the identifier information of the access network as the location information in the message;
- Step 305 The ePDG sends an EAP-Response response message (with AKA challenge information) to
- the 3GPP AAA server and carries the identifier of the UE with the IKEv2 redirection capability in the message, or the flag position 1 used to indicate the UE capability information;
- Steps 306-307 After receiving the response message, the 3GPP AAA server learns that the UE has IKEv2 redirection capability, according to the location information of the current UE, a neighboring ePDG identifier (which may be an IPv4 or IPv6 address of the ePDG, or an FQDN) is included in the authentication response message and sent to the ePDG;
- a neighboring ePDG identifier which may be an IPv4 or IPv6 address of the ePDG, or an FQDN
- Step 308 The ePDG sends an Internet Key Exchange Authentication (IKE AUTH) response message to the UE through IKEv2.
- IKE AUTH response message includes the redirect indication information and the new ePDG identity information from the 3GPP AAA Server, which may be the IPv4 of the ePDG or IPv6 address, or FQDN;
- Step 309 The UE initiates an IKEv2 authentication to the new ePDG according to the redirection indication information to establish an IPSec tunnel.
- the WLAN system includes an Access Point (AP) such as a WiFi access point/Access Control Point (AC), a Residential Gateway (RG), and an access broadband access server (Broadband Remote).
- AP Access Point
- AC WiFi access point/Access Control Point
- RG Residential Gateway
- Broadband Remote Access broadband access server
- BRAS Broadband Network Gateway
- BNG Broadband Network Gateway
- Step 401 The user equipment establishes a wireless connection to the WLAN access system, establishes a three-layer connection, and the BRAS/BNG allocates an IP address to the user equipment.
- Step 402 The UE performs authentication for non-3GPP access through the WLAN access system.
- the 3GPP AAA server may send the relevant policy information and subscription information of the operator to the BRAS/BNG, and the 3GPP AAA Server may also The location information of the WLAN access system is obtained at the BNG/BRAS.
- Step 403 The UE and the ePDG exchange the first pair of messages IKE_SA_INIT to negotiate an encryption algorithm, perform random number exchange, etc., in this process, the UE notifies the IKEv2 redirection capability by REDIRECT SUPPORTED (defined by RFC5685) ePDG.
- Step 404 The UE performs the interaction of the identity authentication information by using the ePDG and the AAA server.
- Step 405 The UE sends an Internet Key Exchange Authentication (IKE AUTH) request message containing an EAP message to the ePDG to the ePDG in response to the authentication challenge received during the identity authentication interaction.
- Step 406 The ePDG sends an EAP-Response response message (with AKA challenge information) to the 3GPP AAA server, and carries the identifier of the UE with the IKEv2 redirection capability, or the flag position 1 for indicating the UE capability information.
- IKE AUTH Internet Key Exchange Authentication
- Steps 407-408 After receiving the foregoing response message, the 3GPP AAA server learns that the UE has the IKEv2 redirection capability, and selects a neighboring ePDG identifier according to the location information of the current UE (which may be an IPv4 or IPv6 address of the ePDG, or may be an FQDN). The information is sent to the ePDG in the authentication reply message.
- the 3GPP AAA server learns that the UE has the IKEv2 redirection capability, and selects a neighboring ePDG identifier according to the location information of the current UE (which may be an IPv4 or IPv6 address of the ePDG, or may be an FQDN).
- the information is sent to the ePDG in the authentication reply message.
- Step 409 The ePDG sends an Internet Key Exchange Authentication (IKE AUTH) response message to the UE through the IKEv2, where the IKE-AUTH response message includes the redirection indication information and the new ePDG identity information received from the 3GPP AAA server.
- IKE AUTH Internet Key Exchange Authentication
- Step 410 The UE initiates an IKEv2 authentication to the new ePDG to establish an IPSec tunnel.
- the UE connects to the EPS system through the untrusted non-3GPP access system, and the UE and the ePDG notify the 3GPP AAA server of the UE during the creation of the Internet Key Exchange Protocol (IKEv2) tunnel. Without the IKEv2 redirection capability information, the 3GPP AAA server does not reselect the ePDG for the UE.
- IKEv2 Internet Key Exchange Protocol
- Step 501 The UE is connected to the non-3GPP access system, and optionally performs the authentication authorization of the non-3GPP access.
- the 3GPP AAA server may send the related policy information and the subscription information of the operator to the access network.
- Step 502 The UE and the ePDG exchange the first pair of messages IKE_SA_INIT to negotiate an encryption algorithm, perform random number exchange, etc., in this process, the UE not supports the IKEv2 redirection capability by the REDIRECT SUPPORTED message (defined by RFC5685).
- the REDIRECT SUPPORTED message defined by RFC5685.
- Step 503 The UE performs the interaction of the identity authentication information by using the ePDG and the AAA server.
- the Internet Key Exchange Authentication (IKE AUTH) request message of the protocol (EAP) message is sent to the ePDG to respond to the authentication challenge received during the identity authentication interaction, and the UE may also include the identification information of the access network as the location information.
- the ePDG sends an EAP-Response response message (with AKA challenge information) to the 3GPP AAA server, and does not carry the IKEv2 redirection capability identifier of the UE, or the flag position 0 used to indicate the UE capability information.
- Steps 506-507 After receiving the foregoing response message, the 3GPP AAA server learns that the UE does not have the IKEv2 redirection capability, and continues the subsequent authentication and authorization;
- Step 508 The ePDG sends an Internet Key Exchange Authentication (IKE AUTH) response message to the UE through IKEv2.
- IKE AUTH Internet Key Exchange Authentication
- Step 509 The UE and the ePDG complete the subsequent IKEv2 authentication process to establish an IPSec tunnel.
- the WLAN system is used as a special case of a non-trusted non-3GPP access system, and the foregoing execution process is specifically described.
- the specific processes include:
- Step 601 The user equipment establishes a wireless connection to the WLAN access system, establishes a three-layer connection, and the BRAS/BNG allocates an IP address to the user equipment.
- Step 602 The UE performs authentication for non-3GPP access through the WLAN access system.
- the 3GPP AAA server may send the relevant policy information and subscription information of the operator to the BRAS/BNG, and the 3GPP AAA Server may also The location information of the WLAN access system is obtained at the BNG/BRAS.
- Step 603 The UE and the ePDG exchange the first pair of messages IKE_SA_INIT to negotiate an encryption algorithm, perform random number exchange, and the like, in this process, the UE notifies the IKEv2 redirection capability by REDIRECT SUPPORTED (defined by RFC5685) ePDG.
- Step 604 The UE sends an Internet key exchange authentication including an EAP message to the ePDG.
- IKE AUTH Requests a message to the ePDG in response to the authentication challenge received during the identity authentication interaction.
- Step 605 The ePDG sends an EAP-Response response message (with AKA challenge information) to the 3GPP AAA server, where the message does not carry the IKEv2 redirection capability identifier of the UE, or the flag position 0 indicating the UE capability information is used;
- Step 606-607 After receiving the foregoing response message, the 3GPP AAA server learns that the UE does not have the 3GPP AAA server.
- the IKEv2 redirection capability continues the subsequent authentication and authorization process.
- Step 608 The ePDG sends an Internet Key Exchange Authentication (IKE AUTH) response message to the UE through IKEv2.
- Step 609 The UE and the ePDG complete the subsequent IKEv2 authentication process to establish an IPSec tunnel.
- the ePDG notifies the capability of the UE to the 3GPP AAA server, and is not limited to the IKEv2 redirection capability of the UE, and may also be whether the UE has the gateway capability.
- the 3GPP AAA server determines whether to perform the corresponding operation according to the capability of the UE.
- the capability information of the terminal having the Internet Key Exchange Protocol redirection function is notified to the 3GPP AAA server, and the 3GPP AAA server determines, according to the capability information, whether to reselect the evolved packet data gateway for the terminal, that is, The 3GPP AAA server only selects a new ePDG for the terminal with this capability, which can solve the problem of the authentication authorization process error caused by the AAA server selecting the new ePDG for the capability information without the Internet Key Exchange Protocol redirection function.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé de traitement de capacité d'équipements d'utilisateurs, comportant les étapes consistant à : pendant l'établissement d'un tunnel sous protocole d'échange de clés Internet entre un terminal et une passerelle évoluée de données par paquets, ladite passerelle évoluée de données par paquets notifie à un serveur d'authentification, d'autorisation et de comptabilité (AAA) des informations de capacité indiquant si le terminal est doté de la fonction de redirection sous protocole d'échange de clés Internet.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110269720.4 | 2011-09-13 | ||
| CN201110269720.4A CN103002429B (zh) | 2011-09-13 | 2011-09-13 | 一种对用户设备能力进行处理的方法和系统 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013037273A1 true WO2013037273A1 (fr) | 2013-03-21 |
Family
ID=47882606
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2012/081004 Ceased WO2013037273A1 (fr) | 2011-09-13 | 2012-09-05 | Procédé et système de traitement de capacité d'équipements d'utilisateurs |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN103002429B (fr) |
| WO (1) | WO2013037273A1 (fr) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107682895A (zh) * | 2016-08-01 | 2018-02-09 | 大唐移动通信设备有限公司 | 一种重定向方法及装置 |
| CN109428852A (zh) * | 2017-07-18 | 2019-03-05 | 中兴通讯股份有限公司 | 通信隧道端点地址分离方法、终端、ePDG及存储介质 |
| US10237795B2 (en) | 2015-10-11 | 2019-03-19 | Qualcomm Incorporated | Evolved packet data gateway (EPDG) reselection |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP6386554B2 (ja) | 2013-11-01 | 2018-09-05 | 華為技術有限公司Huawei Technologies Co.,Ltd. | パケットデータネットワークとの接続を確立する装置、デバイスおよび方法 |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101282287A (zh) * | 2007-04-02 | 2008-10-08 | 华为技术有限公司 | 协商移动性管理协议的方法及其装置 |
| CN101351019A (zh) * | 2007-07-20 | 2009-01-21 | 华为技术有限公司 | 接入网关、终端及建立数据连接的方法和系统 |
| CN101483922A (zh) * | 2008-01-09 | 2009-07-15 | 华为技术有限公司 | 控制接入的方法、接入网关和鉴权服务器 |
| CN101998442A (zh) * | 2009-08-10 | 2011-03-30 | 北京三星通信技术研究有限公司 | 一种远程接入方法和系统 |
| CN102045811A (zh) * | 2009-10-12 | 2011-05-04 | 中兴通讯股份有限公司 | 接入网信息获取方法、接入网发现和选择功能单元及终端 |
| CN102056154A (zh) * | 2009-10-30 | 2011-05-11 | 华为技术有限公司 | Ike认证方法、系统、ike响应设备和ike发起设备 |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101064938A (zh) * | 2006-04-28 | 2007-10-31 | 华为技术有限公司 | 移动终端在3gpp与非3gpp接入系统之间切换时应用mip的方法 |
| US8249551B2 (en) * | 2008-06-05 | 2012-08-21 | Bridgewater Systems Corp. | Long-term evolution (LTE) policy control and charging rules function (PCRF) selection |
-
2011
- 2011-09-13 CN CN201110269720.4A patent/CN103002429B/zh not_active Expired - Fee Related
-
2012
- 2012-09-05 WO PCT/CN2012/081004 patent/WO2013037273A1/fr not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101282287A (zh) * | 2007-04-02 | 2008-10-08 | 华为技术有限公司 | 协商移动性管理协议的方法及其装置 |
| CN101351019A (zh) * | 2007-07-20 | 2009-01-21 | 华为技术有限公司 | 接入网关、终端及建立数据连接的方法和系统 |
| CN101483922A (zh) * | 2008-01-09 | 2009-07-15 | 华为技术有限公司 | 控制接入的方法、接入网关和鉴权服务器 |
| CN101998442A (zh) * | 2009-08-10 | 2011-03-30 | 北京三星通信技术研究有限公司 | 一种远程接入方法和系统 |
| CN102045811A (zh) * | 2009-10-12 | 2011-05-04 | 中兴通讯股份有限公司 | 接入网信息获取方法、接入网发现和选择功能单元及终端 |
| CN102056154A (zh) * | 2009-10-30 | 2011-05-11 | 华为技术有限公司 | Ike认证方法、系统、ike响应设备和ike发起设备 |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10237795B2 (en) | 2015-10-11 | 2019-03-19 | Qualcomm Incorporated | Evolved packet data gateway (EPDG) reselection |
| CN107682895A (zh) * | 2016-08-01 | 2018-02-09 | 大唐移动通信设备有限公司 | 一种重定向方法及装置 |
| CN109428852A (zh) * | 2017-07-18 | 2019-03-05 | 中兴通讯股份有限公司 | 通信隧道端点地址分离方法、终端、ePDG及存储介质 |
| CN109428852B (zh) * | 2017-07-18 | 2023-09-15 | 中兴通讯股份有限公司 | 通信隧道端点地址分离方法、终端、ePDG及存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN103002429B (zh) | 2017-04-26 |
| CN103002429A (zh) | 2013-03-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8510455B2 (en) | Method and apparatus for IP mobility management selection | |
| US20100048161A1 (en) | Method, system and apparatuses thereof for realizing emergency communication service | |
| WO2013189217A1 (fr) | Procédé pour mettre à jour des informations d'identité au sujet d'une passerelle de paquets, serveur aaa et passerelle de paquets | |
| US9973338B2 (en) | Configuration of liveness check using internet key exchange messages | |
| WO2012152185A1 (fr) | Procédé et dispositif de sélection de passerelle | |
| CN101606372A (zh) | 支持无uicc呼叫 | |
| WO2013063783A1 (fr) | Procédé et dispositif de gestion de canal de sécurité de données | |
| WO2011003313A1 (fr) | Procédé et système permettant à une fonction de découverte et de sélection de réseau d'accès (andsf) de fournir une fonction pour sélectionner un protocole de réseau d'accès | |
| US20110271117A1 (en) | User equipment (ue), home agent node (ha), methods, and telecommunications system for home network prefix (hnp) assignment | |
| JP2018537927A (ja) | 認証されていないユーザのための3gpp進化型パケットコアへのwlanアクセスを介した緊急サービスのサポート | |
| WO2005039110A1 (fr) | Analyse du traitement d'acces a un service selectionne dans un reseau local radio | |
| WO2011127774A1 (fr) | Procédé et appareil pour contrôler un mode d'accès d'un terminal utilisateur à internet | |
| WO2009000124A1 (fr) | Procede de selection de passerelle dans un reseau sans fil | |
| WO2012167500A1 (fr) | Procédé d'établissement d'un canal de données de sécurité destiné à un tunnel | |
| WO2009152676A1 (fr) | Serveur aaa, p-gw, pcrf, procédé et système d'obtention de l'identifiant d'un équipement utilisateur | |
| EP1693995B1 (fr) | Procédé d'application d'une authentification d'accès d'un utilisateur wlan | |
| WO2012003760A1 (fr) | Procédé et système de transmission d'informations | |
| WO2010069202A1 (fr) | Procédé de négociation d'authentification et système associé, passerelle de sécurité, noeud local b | |
| WO2009046598A1 (fr) | Procédé pour établir une porteuse dédiée pour un terminal utilisateur | |
| WO2016011832A1 (fr) | Procédé et dispositif pour mettre en œuvre un déclenchement de mobilité de flux, et support d'informations | |
| WO2014063530A1 (fr) | Procédé et système pour qu'un utilisateur mobile accède à un réseau fixe | |
| WO2014106318A1 (fr) | Procédé, dispositif et système de sélection de passerelle de paquets | |
| WO2013037273A1 (fr) | Procédé et système de traitement de capacité d'équipements d'utilisateurs | |
| WO2014048197A1 (fr) | Procédé, système et dispositif permettant à un équipement d'utilisateur de sélectionner un réseau mobile terrestre public visité | |
| WO2014048191A1 (fr) | Procédé et système de sélection de vplmn et de passerelle de réseau de données en paquets |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12831324 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12831324 Country of ref document: EP Kind code of ref document: A1 |