CN1567863A - A method for controlling external network accessing - Google Patents

A method for controlling external network accessing Download PDF

Info

Publication number
CN1567863A
CN1567863A CN 03142529 CN03142529A CN1567863A CN 1567863 A CN1567863 A CN 1567863A CN 03142529 CN03142529 CN 03142529 CN 03142529 A CN03142529 A CN 03142529A CN 1567863 A CN1567863 A CN 1567863A
Authority
CN
China
Prior art keywords
network
address
data
tunnel
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 03142529
Other languages
Chinese (zh)
Other versions
CN1567863B (en
Inventor
李志明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SnapTrack Inc
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 03142529 priority Critical patent/CN1567863B/en
Publication of CN1567863A publication Critical patent/CN1567863A/en
Application granted granted Critical
Publication of CN1567863B publication Critical patent/CN1567863B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The invention discloses an external network access controlling method, applied to the condition that under the circumstance of wireless local-area network-the third-generation partner plan (WLAN-3GPP) network intercommunication, external network transmits data to internal network composed of WLAN and 3GGP network, including: building data list to store network identifications, and in the course that the internal network and external network build a communication tunnel, according to safety policy, selecting corresponding network identification to store in the data list; as the data packet transmitted by the external network to the internal network reaches the gateway of the external gateway, checking if the network identification information in the data packet is contained in the data list: if it is, allow the data to pass and otherwise discard the data packet. It filters the illegal and invalid data packets, thus assuring network safety and making network resources effectively utilized.

Description

A kind of control method to outside network insertion
Technical field
The present invention relates to control technology, be meant in WLAN (wireless local area network) and third generation partner program (WLAN-3GPP) network interworking control method especially outside network insertion to outside network insertion.
Background technology
Rise and development along with the WLAN technology, WLAN and wireless mobile communication network comprise that the fusion of networks such as global system for mobile communications (GSM), code division multiple access (CDMA), Wideband Code Division Multiple Access (WCDMA) (WCDMA), TD SDMA (TD-SCDMA) and CDMA 2000 is just becoming the emphasis of current research.Wherein, GSM, CDMA, WCDMA, TD-SCDMA have brought 3GPP into, and CDMA 2000 belongs to 3GPP2.
3GPP TS23.234 is defined as for WLAN-3GPP intercommunication scene 3: after UE passes through the service authorization of 3GPP home network, carry out tunnel establishment procedure between UE and the PDG, store CAMEL-Subscription-Information, tunnel information and other relevant information of UE this moment in PDG, this process is Mobile Origination (MO) process.
Referring to shown in Figure 1, under the non-roaming situation of WLAN and 3GPP network interworking scene 3.WLAN Access Network 102 directly is connected with external the Internet (internet) or Intranet (intranet) 104, and, subscriber equipment (UE) 101 by WLAN Access Network 102 respectively with the 3GPP authentication and authorization charging server (AS of 3GPP home network (3GPP Home Network), 3GPP AAAServer) 103 and packet data gateway (PDG, Packet Data Gateway) 105 connect, PDG105 is connected to the packet data network (PDN, PacketData Network) that belongs to the external network part by the Wi interface.Generally, when UE 101 hope directly insert Internet/Intranet104 by WLAN Access Network 102, can be to the business of 3GPP home network application intercommunication scene 2.If UE 101 also wishes to insert 3GPP packet switching (PS) territory business, by the WLAN-3GPP network insertion to PDN, can be further to the business of 3GPP home network application intercommunication scene 3.It is UE101 initiates service authorization process request from intercommunication scene 3 to the AS103 of 3GPP home network, the AS103 of 3GPP home network carries out service authentication and mandate to service request, if success, then AS103 sends access grant message to the user, AS103 distributes corresponding PDG105 to UE101, sets up the tunnel between the PDG105 of UE101 and distribution.And the 107a/ of charging gateway (CGw) 107a/ charging information collecting system (CCF) Online Charging System (OCS) 107b is according to the network operating position recording gauge charge information of UE101.The tunnel of setting up for non-roaming situation is UE-WLAN-PDG.At this moment, UE101 just can insert 3GPPPS territory business, UE101 can by and the tunnel of PDG105 and belonging between the PDN of external network exchange visits, PDN comprises all packet data network beyond the mobile networks such as Internet, Intranet.
The WLAN Access Network is similar to non-roaming situation to the roaming condition in the 3GPP intercommunication scene 3, and it simplifies network configuration referring to shown in Figure 2.Under roaming condition, WLAN Access Network 102 links to each other with the 3GPP home network by 3GPP accesses network (3GPP Visited Network).WLAN Access Network 102 links to each other with wireless access gateway (WAG) 202 with UE101,3GPP aaa server agency (AS Proxy) 201, Internet/Intranet 104.UE101 can arrive Internet/Intranet 104 to 3GPP access network application intercommunication scene 2 service accesses by the 3GPP accesses network.If UE101 also wishes to apply for intercommunication scene 3 business, be linked into 3GPP PS territory business, UE101 need initiate the service authorization process to the 3GPP home network by the 3GPP accesses network, this process is carried out between the AS103 of UE101 and 3GPP home network equally, after authorizing successfully, AS103 distributes corresponding ownership PDG105 to UE101, sets up the tunnel between the PDG105 of UE101 by WAG in the 3GPP accesses network 202 and distribution.For roaming condition, the tunnel of being set up is UE-WLAN-WAG-PDG.At this moment, the 3GPP PS territory business that UE101 can access belonging network.
After the tunnel was set up, UE can insert the PS territory business of 3GPP by PDG, and the data that UE sends are after the tunnel arrives PDG, and PDG carries out decapsulation to data, then data is sent to external network by the Wi interface.When external network when UE sends data, after PDG encapsulated data, the tunnel that passes through to be set up sent to UE, UE carries out decapsulation and receives data.But because the Wi interface is an open interface, therefore, after the tunnel was set up, legal external network and illegal external network can send data to UE by this interface.If illegal malicious attacker gets access to the address informations such as IP address of UE by illegal means, send hash to UE then, will influence UE and insert normal business; Perhaps illegal malicious attacker sends hash not obtaining under the situation of UE address in a large number to PDG, if PDG does not screen and filters packet, will cause professional the obstruction or the waste Internet resources.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method to outside network insertion control.External network is filtered to the inner data that send of WLAN-3GPP intercommunication network, and the packet of the illegal external network of filtering only allows legal external network data to enter, thereby guarantees that the UE access is professional normally and network is unimpeded.
A kind of control method of the present invention to outside network insertion, be applied to the internal network that external network under WLAN (wireless local area network) and third generation partner program (WLAN-3GPP) the network interworking scene forms to WLAN and 3GPP network and transmit data conditions, may further comprise the steps:
A) set up the tables of data that is used for the storage networking distinguishing identifier, select corresponding network distinguishing identifier to deposit this tables of data in according to security strategy;
When b) packet that sends to inner network user device when external network arrives the outer net gateway, check whether network distinguishing identifier information is included in the tables of data in this packet, if, then allow these data to pass through, otherwise with this data packet discarding.
The network distinguishing identifier of the described different choice according to security strategy of this method is a user device address, or the wireless local network connecting point name of subscriber equipment, or the combination of above situation.
If described subscriber equipment and the outer net gateway at internal network of this method set up communication tunnel, then the network distinguishing identifier of selecting according to security strategy is to set up the outside network address in tunnel, or set up the user device address in tunnel, or set up the target UE address in tunnel and the mapping relations of tunnel attribute, or set up the outside network address in tunnel and the mapping relations of tunnel attribute, or the combination of above situation.
If described subscriber equipment and the outer net gateway at internal network of this method set up communication tunnel, purpose station address in the packet adopts the IPV6 form, and purpose subscriber equipment and external network support stream, during traffic identifier non-zero in the packet, the described network distinguishing identifier of selecting according to security strategy is the destination user device address, or set up the outside network address in tunnel, the user device address of setting up the tunnel and traffic identifier mapping relations, or the combination of above situation.
Further comprise customer equipment identification in the described tables of data of this method, and set up the mapping relations of customer equipment identification and network distinguishing identifier.
The described address of this method is IP address, tcp port number or their combination.
The described address of this method is IP address, udp port number, wireless local network connecting point name (W-APN) or above combination.
The described tunnel attribute of this method comprises Tunnel Identifier at least.
The described outer net gateway of this method is a packet data gateway.
The described subscriber equipment of this method is the subscriber equipment of WLAN Access Network.
From such scheme as can be seen, the inventive method is kept at tables of data by setting up in the tunneling process at user and external network with user attaching address information, and when externally the packet that sends to the user of network arrives the outer net gateway, check whether contained address information is included in the tables of data in the packet, make the packet that only includes institute's recording address information in the tables of data arrive internal network by the outer net gateway, thereby filter out useless, illegal packet, ensure network security, realized effective utilization of Internet resources.
Description of drawings
Fig. 1 is the structural representation under WLAN and the 3GPP network interworking scene 3 non-roaming situations;
Fig. 2 is the structural representation under WLAN and 3GPP network interworking scene 3 roaming conditions;
Fig. 3 adopts UDP/IP encapsulation format schematic diagram for the IPV6 packet;
Fig. 4 adopts UDP/IP encapsulation format schematic diagram for the IPV4 packet;
Fig. 5 adopts TCP/IP encapsulation format schematic diagram for the IPV6 packet;
Fig. 6 adopts TCP/IP encapsulation format schematic diagram for the IPV4 packet;
Fig. 7 is the data representation intention of the preferable embodiment of the present invention.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
When the present invention is used to receive the outer net gateway of external network data at the packet arrival WLAN-3GPP intercommunication network that sends from external network,, discern and the illegal packet of filtering by analyzing the network distinguishing identifier in the packet.
According to existing 3GPP TS23.234 standard, finish the service authorization that inserts external network as UE, with the outer net gateway, be after PDG sets up the tunnel, the wireless local network connecting point name (W-APN) of this UE sign of storage, UE home address information, tunnel attribute information and UE waits other relevant information in PDG.As UE during by PDG and Wi interface and external network communication, PDG can further be known address informations such as the IP address, udp port number of UE or tcp port number, address information such as the IP address of this external network, udp port number or tcp port number; In addition, this external network also will be known IP address, udp port number or the tcp port number of UE, and information such as tunnel attribute.More than these information, be called the network distinguishing identifier among the present invention and be used for mutual differentiation between the network equipment or the tunnel, and can be further used for discerning legal data and invalid data by the tunnel.
At this point, the present invention sets up the tables of data that is used for storing intercommunication network network distinguishing identifier in the outer net gateway.The level of security that content in the tables of data is taked according to network is determined.Usually, operator can wait according to user, business, external network and network carrying ability and decide the network security rank that is adopted in its sole discretion, perhaps selects the access whether external network is controlled in measure safe in utilization.
And further set up the safety filtering functional module, at the subscriber equipment and the external network of each internal network, promptly the outer net gateway is set up in the process in tunnel, deposits corresponding network distinguishing identifier in tables of data.Externally whether network is included in the tables of data by checking the network distinguishing identifier information that is comprised in the packet when the packet of inner network user's transmission arrives the outer net interface gateway, filters out illegal packet.
Safety filtering functional module of the present invention and tables of data also can be based upon outside the outer net gateway device, and the network distinguishing identifier derives from the outer net gateway, and the packet that arrives the outer net gateway is checked.
Network distinguishing identifier that the present invention preserves in tables of data and corresponding with it safety filtering strategy can have following several scheme:
(1) source address that adopts packet is as network distinguishing identifier, i.e. outside network address:
The IP address of corresponding external network or tcp port number or IP address and tcp port number are kept at tables of data; If external network adopts the UDP/IP agreement, then accordingly the IP address of external network or udp port number or IP address and udp port number are kept in the tables of data, as legal source address.
Behind the packet arrival outer net gateway that external network is sent, check whether source address is included in the tables of data source address list in the packet, if, then allow it to pass through, otherwise, with this data packet discarding.
(2) destination address that adopts packet is as the network distinguishing identifier, i.e. the UE address:
User device IP address or tcp port number or W-APN or above combination are kept at tables of data; If internal network adopts the UDP/IP agreement, then accordingly the IP address of external network or udp port number or W-APN or above combination are kept in the tables of data, as legal source address.
Behind the packet arrival outer net gateway that external network is sent, check whether destination address is included in the tables of data destination address list in the packet, if, then allow it to pass through, otherwise, with this data packet discarding.
(3) adopt the mapping relations of destination address and tunnel attribute, or destination address, source address and tunnel attribute three's mapping relations are as the network distinguishing identifier:
If only set up the mapping relations of destination address and tunnel attribute, the address and the tunnel attribute of subscriber equipment is kept in the tables of data, and sets up between them mapping relations one to one, in tunnel attribute, include Tunnel Identifier at least.
Behind the packet arrival outer net gateway that external network is sent, the address of checking UE in the packet and packet between the outer net gateway that will pass through and the UE tunnel mapping relations whether with tables of data in the mapping relations that comprise mate, if then allow it to pass through, otherwise, with this data packet discarding.
For the situation of destination address, source address and tunnel attribute three's mapping relations by that analogy.
(4) adopt the IPV6 form for the purpose station address in the packet, and purpose subscriber equipment and external network are supported stream format, during traffic identifier non-zero in the packet, except can adopting (1), (2) dual mode network distinguishing identifier to be set to source address or the destination address, but also the setting network distinguishing identifier is the mapping relations of source address, destination address and traffic identifier:
The address and the traffic identifier of outside network address, subscriber equipment are kept in the tables of data, and set up mapping relations between them.
Behind the packet arrival outer net gateway that external network is sent, check whether outside network address, the address of subscriber equipment and the mapping relations of traffic identifier are included in the tables of data, if, then allow it to pass through, otherwise, with this data packet discarding.
In addition, for filtering useless data to a greater extent, preferred implementation of the present invention is that above-mentioned four kinds of scheme combination are used, and make up in twos as scheme (1), (2), (3), or three schemes is used jointly; Adopt the IPV6 form for the purpose station address in the packet, scheme (1), (2), (4) can make ups in twos, or common use.
For example, by in outer net gateway and the external network that internal network is communicated by letter, the encapsulation format of following several packets is arranged:
A) IPV6 form, packet adopts the UDP/IP encapsulation format, referring to shown in Figure 3;
B) IPV4 form, packet adopts the UDP/IP encapsulation format, referring to shown in Figure 4;
C) IPV6 form, packet adopts the TCP/IP encapsulation format, referring to shown in Figure 5;
D) IPV4 form, packet adopts the TCP/IP encapsulation format, referring to shown in Figure 6.
In PDG, set up the tables of data that comprises UE sign, UEIP address, UE and PDG tunnel attribute information, outside network address, referring to shown in Figure 7.Wherein, at the IPV4 form, set up the mapping relations of tunnel attribute, UE address and outside network address; And, set up the mapping relations of traffic identifier, UE address and outside network address at the IPV6 form, flow identification information only is applicable to the IPV6 form.
After UE and PDG set up the tunnel, UE address, outside network address and this tunnel attribute are recorded in the tables of data at every turn;
When the packet of IPV4 form arrives PDG, check whether source address, destination address in the packet have been recorded in the tables of data, if, the attribute in the tunnel that further this packet of inspection will pass through and source address, destination address mapping relations, whether consistent with the mapping relations in being kept at tables of data, if consistent, then allow this packet pass through, otherwise with this data packet discarding.
Similarly when the packet of IPV4 form arrives PDG, then can check traffic identifier in the packet and source address, destination address, whether consistent with mapping relations in being kept at tables of data.
Scheme in this example also will be considered the factors such as disposal ability of user, business, external network situation and outer net gateway in specific implementation, appropriate design tables of data content and safety filtering mechanism.
In addition, the present invention program also can be applicable to after UE and HPLMN signature traffic contract permission access 3GPP PS territory business, but when UE and outer net gateway are not set up the tunnel as yet, when external network sends packet arrival outer net gateway to UE, the outer net gateway also can adopt the present invention program to judge earlier whether this packet is legal, whether sets up the tunnel with decision and receives this packet.In such cases, can according to security strategy in tables of data, store above-mentioned except that tunnel attribute as one or more network distinguishing identifier information of the wireless local network connecting point name (W-APN) of the IP address of this UE, the UDP/TCP port numbers of UE, user ID, UE etc.The outer net gateway filters packet according to canned data in the tables of data again.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of control method to outside network insertion, be applied to the internal network that external network under WLAN (wireless local area network) and third generation partner program (WLAN-3GPP) the network interworking scene forms to WLAN and 3GPP network and transmit data conditions, it is characterized in that, may further comprise the steps:
A) set up the tables of data that is used for the storage networking distinguishing identifier, select corresponding network distinguishing identifier to deposit this tables of data in according to security strategy;
When b) packet that sends to inner network user device when external network arrives the outer net gateway, check whether network distinguishing identifier information is included in the tables of data in this packet, if, then allow these data to pass through, otherwise with this data packet discarding.
According to the described method of claim 1, it is characterized in that 2, the network distinguishing identifier of described different choice according to security strategy is a user device address, or the wireless local network connecting point name of subscriber equipment, or the combination of above situation.
3, according to the described method of claim 1, it is characterized in that, if described subscriber equipment and outer net gateway at internal network set up communication tunnel, then the network distinguishing identifier of selecting according to security strategy is to set up the outside network address in tunnel, or set up the user device address in tunnel, or set up the target UE address in tunnel and the mapping relations of tunnel attribute, or set up the outside network address in tunnel and the mapping relations of tunnel attribute, or the combination of above situation.
4, according to the described method of claim 1, it is characterized in that, if described subscriber equipment and outer net gateway at internal network set up communication tunnel, purpose station address in the packet adopts the IPV6 form, and purpose subscriber equipment and external network support stream, during traffic identifier non-zero in the packet, the described network distinguishing identifier of selecting according to security strategy is the destination user device address, or set up the outside network address in tunnel, the user device address of setting up the tunnel and traffic identifier mapping relations, or the combination of above situation.
5, according to the described method of claim 1, it is characterized in that, further comprise customer equipment identification in the described tables of data, and set up the mapping relations of customer equipment identification and network distinguishing identifier.
According to claim 2,3 or 4 described methods, it is characterized in that 6, described address is IP address, tcp port number or their combination.
According to claim 2,3 or 4 described methods, it is characterized in that 7, described address is IP address, udp port number, wireless local network connecting point name (W-APN) or above combination.
According to the described method of claim 3, it is characterized in that 8, described tunnel attribute comprises Tunnel Identifier at least.
According to the described method of claim 1, it is characterized in that 9, described outer net gateway is a packet data gateway.
According to the described method of claim 1, it is characterized in that 10, described subscriber equipment is the subscriber equipment of WLAN Access Network.
CN 03142529 2003-06-17 2003-06-17 A method for controlling external network accessing Expired - Fee Related CN1567863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03142529 CN1567863B (en) 2003-06-17 2003-06-17 A method for controlling external network accessing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03142529 CN1567863B (en) 2003-06-17 2003-06-17 A method for controlling external network accessing

Publications (2)

Publication Number Publication Date
CN1567863A true CN1567863A (en) 2005-01-19
CN1567863B CN1567863B (en) 2010-04-07

Family

ID=34471125

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03142529 Expired - Fee Related CN1567863B (en) 2003-06-17 2003-06-17 A method for controlling external network accessing

Country Status (1)

Country Link
CN (1) CN1567863B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100426777C (en) * 2006-06-02 2008-10-15 华为技术有限公司 System and method for accessing 3GPP deductive network by non-3GPP technology
WO2008134985A1 (en) * 2007-04-30 2008-11-13 Huawei Technologies Co., Ltd. Method, system and device for making security control
CN101127652B (en) * 2006-08-17 2011-04-27 华为技术有限公司 A method, device and system for identifying access anchor of user terminal to external network
CN103416025A (en) * 2010-12-28 2013-11-27 思杰系统有限公司 Systems and methods for VLAN tagging via cloud bridge
CN104081863A (en) * 2011-11-04 2014-10-01 瑞典爱立信有限公司 Method and apparatus for establishing and using PDN connections

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1177439C (en) * 2002-03-08 2004-11-24 华为技术有限公司 Method of acting address analytic protocol Ethernet Switch in application
CN1175621C (en) * 2002-03-29 2004-11-10 华为技术有限公司 Method of detecting and monitoring malicious user host machine attack

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100426777C (en) * 2006-06-02 2008-10-15 华为技术有限公司 System and method for accessing 3GPP deductive network by non-3GPP technology
CN101127652B (en) * 2006-08-17 2011-04-27 华为技术有限公司 A method, device and system for identifying access anchor of user terminal to external network
WO2008134985A1 (en) * 2007-04-30 2008-11-13 Huawei Technologies Co., Ltd. Method, system and device for making security control
CN103416025A (en) * 2010-12-28 2013-11-27 思杰系统有限公司 Systems and methods for VLAN tagging via cloud bridge
CN103416025B (en) * 2010-12-28 2016-11-02 思杰系统有限公司 For adding the system and method for VLAN tag via cloud bridge
CN104081863A (en) * 2011-11-04 2014-10-01 瑞典爱立信有限公司 Method and apparatus for establishing and using PDN connections

Also Published As

Publication number Publication date
CN1567863B (en) 2010-04-07

Similar Documents

Publication Publication Date Title
CN1266891C (en) Method for user cut-in authorization in wireless local net
JP4270888B2 (en) Service and address management method in WLAN interconnection
CN116389176A (en) Session management function and policy control function for charging control of non-public network
CN1666544A (en) System and method for a universal wireless acces gateaway
CN1720757A (en) Method and apparatus for packet data service discovery
CN1315302C (en) Method of route inquiry under condition of wireless local area network and mobile network intercommunication
CN1711728A (en) Data group filtration at the network gate as execution point based on business strategy (SBLP)
CN1627842A (en) Method of selecting gateway of data packets by users in wireless local area network
CN1610319A (en) Analytic switch-in processing method for selecting business in radio local area network
CN1172489C (en) Data communication system and method between networks
CN1270481C (en) Access gate wireless local area network and implementation for guaranteeing network safety
US8521161B2 (en) System and method for communications device and network component operation
CN101043735A (en) Roaming user equipment accessing method of mobile communication network and system thereof
US20140010203A1 (en) Access Control Method and Apparatus for User Equipment
CN1567895A (en) Method for receiving external network data by target user equipment
CN1567863A (en) A method for controlling external network accessing
CN100346615C (en) Method for receiving external network data by target user equipment
CN100344199C (en) System of radio local network mobility management and its method
US9264885B2 (en) Method and system for message transmission control, method and system for register/update
CN1411223A (en) Method and device for realizing virtual GGSN of enterprise inserting business
CN1642076A (en) Method for obtaiing user identification by packet data gate for wireless LAN
CN1801821A (en) Method for crossing firewall under mobile environment
CN1612539A (en) Method for establishing service connection in wireless LAN
CN1604555A (en) Method for implementing intercommunication between WLAN and GSM/GPRS system
CN1213626C (en) Method through GPRS to support intelligent service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160422

Address after: American California

Patentee after: Snaptrack, Inc.

Address before: 518057 Guangdong city of Shenzhen province science and Technology Park of HUAWEI Road Service Building

Patentee before: Huawei Technologies Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100407

Termination date: 20180617