CN1859795A - Method for identifying identity of user terminal - Google Patents

Method for identifying identity of user terminal Download PDF

Info

Publication number
CN1859795A
CN1859795A CNA2006100585171A CN200610058517A CN1859795A CN 1859795 A CN1859795 A CN 1859795A CN A2006100585171 A CNA2006100585171 A CN A2006100585171A CN 200610058517 A CN200610058517 A CN 200610058517A CN 1859795 A CN1859795 A CN 1859795A
Authority
CN
China
Prior art keywords
sub
timer
identification
flow process
network element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100585171A
Other languages
Chinese (zh)
Other versions
CN100455127C (en
Inventor
陶传会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XFusion Digital Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006100585171A priority Critical patent/CN100455127C/en
Publication of CN1859795A publication Critical patent/CN1859795A/en
Application granted granted Critical
Publication of CN100455127C publication Critical patent/CN100455127C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention discloses making identification method to user terminal. It contains first sub-process and second sub-process used for identification, wherein first sub-process priority level being higher than second sub-process, configuring timer T3 having duration less than first sub-process protection timer T1 duration, when second net element originating first sub-process to first net element, simultaneously starting up timer T1 and timer T3, if before timer T3 overtime, not receiving first sub-process response message, then continue said sub-process, simultaneously second net element originating second sub-process to user terminal. Above-mentioned net element can be mobile switching center (MSC) or general grouping radio service (GPRS) supporting node (SGSN). The present invention can shorten making identity time through obtaining international mobile users identify code (IMSI) when user terminal in roaming, reducing location registration failing possibility.

Description

A kind of method of user terminal being carried out identification
Technical field
The present invention relates to the mobile communication technology field, particularly a kind of method that user terminal (UE) is carried out identification.
Background technology
Along with the continuous development of mobile communication technology, mobile communication system also should be supported ecommerce, E-Payment, stock exchange, Internet service etc. except traditional voice, data, multimedia service are provided.Along with the continuous expansion of mobile communication business, the safety of network and transmission information will become the matter of utmost importance of its development of restriction.The safety problem that mobile communication system faces mainly comprises: utilize the weakness of procotol and system, unauthorized access sensitive data, unauthorized processing sensitive data, interference or the service of abuse network or the like.
Third generation partner program (3GPP) has been worked out a whole set of safety precaution mechanism, to guarantee the fail safe of mobile communications network and institute's information transmitted.The third generation that 3GPP formulated (3G) network security logical construction is divided into five classes at different attack types, i.e. network access security, core net safety, user security, application safety, security feature observability and configurable ability.
It is the important means of guaranteeing network access security that UE is carried out identification, and its core content is: the network element of network side is discerned the identity of UE by the international mobile subscriber identity (IMSI) that obtains the user.
TS 24.008 that 3GPP formulates and TS 29.002 have defined the flow process of UE being carried out identification by mobile switching centre (MSC) initiation, comprise two sub-processes, be that MAP gets identification (Map SendIdentification, MSI) flow process and identification request (Identity Request) flow process, wherein the fail safe of MSI flow process is higher, therefore preferentially obtain IMSI generally speaking,, just obtain IMSI by the identification flow process if this flow process can not get access to IMSI by the MSI flow process.The flow process of being initiated by MSC that UE is carried out identification comprises the steps: as shown in Figure 1
Step 101:UE carries out the location registers flow process at a MSC, after the success, the VLR Visitor Location Register of the one MSC correspondence (VLR1) has the user data of UE, comprising IMSI, if VLR1 initiates the TMSI allocation flow, the TMSI that then comprises UE in the user data, and UE can receive temporary mobile station identification code (TMSI) that a MSC is distributed and corresponding lane place identification (LAI) information.
Step 102:UE roams into the zone of the 2nd MSC, and UE sends position register request to the 2nd MSC, and (Location Updating Request LUR), has carried TMSI and old LAI that a MSC is distributed, i.e. the LAI of a MSC correspondence in LUR.
Step 103: if described LAI is adjacent with the 2nd MSC, the 2nd MSC initiates the MSI flow process according to TMSI that is received and LAI, obtains the information such as IMSI of UE to a VLR place, and starts flow process protection startup timer T1; If described LAI and the 2nd MSC are non-conterminous, then irrelevant with content of the present invention, according to the flow processing of existing protocol regulation.
Step 104: the 2nd MSC judges whether to get the identification response overtime whether the receiving of T1, if receive response, then go to step 108; If do not get the identification response up to overtime the returning of timer T1, then execution in step 105; Wherein, the flow process protection timer T1 of the MSI of 3GPP TS 29.002 regulations is s, and the time of s is 3~10 seconds.
Step 105: the 2nd MSC initiates the identification flow process and sends identification message and start flow process protection timer T2 to UE.
Step 106: the 2nd MSC judges whether to receive the IMSI from UE before timer T2 is overtime; If then go to step 108; Otherwise execution in step 107.The identification timer T2 of 3GPP TS 24.008 regulations is T3270, and the time is 12 seconds.
Step 107: the 2nd MSC continues the follow-up flow process of executing location registration failure, process ends then after finishing.
Step 108: stop corresponding flow process protection timer T1 or T2 and carry out steps such as the follow-up authentication of identification, encryption, enter flow process after finishing in the location registers at the 2nd MSC place.
For general packet radio service (GPRS) system, 3GPP TS 23060 has defined the flow process of UE being carried out identification by Serving GPRS Support Node (SGSN) initiation, this flow process also comprises two sub-processes, be respectively to identity authentication request (Identification Request) sub-process of original SGSN initiation and the identification request sub-process of initiating to UE, and previous sub-process priority is higher.As shown in Figure 2, this flow process comprises the steps:
Step 201:UE carries out the location registers flow process at a SGSN, after the success, the one SGSN and UE have IMSI, grouping temporary mobile subscriber identity (P-TMSI), Routing Area Identifier (RAI) and the P-TMSI signature (P-TMSI signature) of UE, for convenience of description, above three is called as old P-TMSI, old RAI and old P-TMSI signature respectively.
Step 202:UE roams in the 2nd SGSN scope, and (Attach Request AR), comprises old RAI, old P-TMSI and old P-TMSI signature among the AR to adhere to request to the 2nd SGSN transmission user.
Step 203: the 2nd SGSN finds a SGSN according to old RAI among the receiving AR and old P-TMSI, and sends the identity authentication request to a SGSN, comprises old RAI, old P-TMSI, old P-TMSI signature in this request, starts timer T1 simultaneously; Stipulate among the 3GPP TS 24008 that this flow process protection timer T1 is T3370, duration is 6 seconds.
Step 204: the 2nd SGSN judges whether to receive the identity authentication response message from a SGSN before T1 is overtime, if then execution in step 208, otherwise execution in step 205.
Step 205: the 2nd SGSN sends the identification request and starts timer T2 to UE, and 3GPPTS 24.008 regulation T2 are T3270, and duration is 12 seconds.
Step 206: the 2nd SGSN judges whether to receive the identification response message from UE before T2 is overtime, if execution in step 208 then, otherwise execution in step 207.
Step 207: the 2nd SGSN continues the follow-up flow process of executing location registration failure, process ends after finishing.
Step 208: the 2nd SGSN stops corresponding flow process protection timer T1 or T2 and carries out steps such as the follow-up authentication of identification, encryption, enters the flow process of UE in the location registers of the 2nd SGSN after finishing.
In the flow process of above-mentioned two kinds of identifications, all to carry out first sub-process earlier, after the timer T1 of first sub-process is overtime, just start second sub-process.For example, for first kind of identification flow process, to initiate MAP earlier and get identification process, if this flow process does not obtain response, to wait until that then the timer T1 of MSI flow process just continues to initiate the identification flow process after overtime, may cause obtaining the required overlong time of IMSI like this, the time of timer T1 is 3~10 seconds, the time of timer T2 is 12 seconds, if just obtain IMSI in the identification flow process, then the time that is spent may reach tens seconds.In like manner, the problem of the required overlong time of IMSI also can appear obtaining in second kind of identification flow process.Therefore can cause following problem:
The time of the location registers timer T3210 of 3GPP TS 24.008 regulation is 20 seconds, if obtain the required overlong time of IMSI, the time of then leaving location registers flow process subsequent step for and causes the possibility of location registers failure to increase very little; Period of reservation of number is oversize simultaneously, to the satisfaction decline of the business that operator provided.
Summary of the invention
In view of this, the objective of the invention is to, propose a kind of method that UE is carried out identification, can shorten and obtain the time that IMSI spends.
This method comprises first sub-process and second sub-process that is used for identification, and wherein the first sub-process priority is higher than second sub-process, and the timer T3 of a duration less than first sub-process protection timer T1 duration is set, and this method comprises the steps:
A, user terminal move to the second network element zone from the first network element zone, and second network element is initiated first sub-process to first network element, and start timer T1 and timer T3 simultaneously;
Whether B, judgement receive the response message of first sub-process before timer T3 is overtime, if, then stop timer T1 and T3, finish the follow-up processing flow of first sub-process and existing identification flow process and withdraw from this flow process; Otherwise when continuing first sub-process, second network element is initiated second sub-process to user terminal.
Step B judges the response message of not receiving first sub-process, further comprises after step B:
The protection timer T2 of C, startup second sub-process;
In D,, a period of time that timer T1 is not overtime overtime at timer T3, if second network element is received the response message of arbitrary sub-process, then stop timer T1 and T2, finish the sub-process of response message correspondence of receiving and withdraw from another sub-process, have the follow-up flow process of identification flow process after being finished now and withdraw from this flow process; If do not receive any one response message in above-mentioned two sub-processes up to T1 is overtime, then finish first sub-process;
In E,, a period of time that timer T2 is not overtime overtime,, then stop timer T2, finish second sub-process and withdraw from this flow process if second network element is received the response message from second sub-process at timer T1; If up to the overtime response message of not receiving second sub-process of T2, then process ends.
If described first network element and second network element are mobile switching centre;
Then described first sub-process is that the MAP of third generation partner program standard 3GPP TS 24.008 defineds gets identification process, and described second sub-process is the identification flow process of 3GPP TS 29.002 defineds.
The described startup timer of steps A T1 is: the duration of stipulating among the startup 3GPP TS29.002 is 3~10 seconds timer s.
The described startup timer of steps A T3 is: the startup duration is 3 seconds timer T3.
Starting timer T2 described in the step C is: the duration of stipulating among the startup 3GPP TS24.008 is 12 seconds timer T3270.
If described first network element and second network element are general packet radio service Serving GPRS Support Node SGSN;
Then described first sub-process is the identity authentication flow process of 3GPP TS 23060 defineds, and described second sub-process is the identification flow process of 3GPP TS 23060 defineds.
The described startup timer of steps A T1 is: the duration that starts regulation among the 3GPP TS 23060 is 6 seconds timer T3370.
The described startup timer of steps A T3 is: start duration less than 6 seconds timer T3.
Starting timer T2 described in the step C is: the duration that starts regulation among the 3GPP TS 23060 is 12 seconds timer T3270.
As can be seen from the above technical solutions; when triggering first sub-process and be the higher sub-process of priority; when starting the original protection timer of first sub-process T1; start the timer T3 of a duration less than T1; overtime then when continuing first sub-process as T3, starting second sub-process is the lower sub-process of priority.So, realize obtaining by first sub-process user's IMSI on the one hand as far as possible, also will shorten to the duration of timer T3 from the duration of timer T1 on the other hand to the maximum latency of the first sub-process response message, obtain the time that IMSI spends thereby shortened, also reduced the possibility of location registers failure.
Description of drawings
Fig. 1 is the flow process of being initiated by MSC in the prior art to the UE identification;
Fig. 2 is the flow process of being initiated by SGSN in the prior art to the UE identification;
Fig. 3 is the flow process to the UE identification that the embodiment of the invention is initiated by MSC.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is further elaborated below in conjunction with accompanying drawing.
Core content of the present invention is: in the flow process of UE identification, comprise two sub-processes that are used for identification, wherein the priority of first sub-process is higher than second sub-process; When triggering first sub-process, when starting original timer T1, start timer T3, the duration of T3 is less than T1; T3 is overtime when timer, then when continuing to carry out first sub-process, starts second sub-process.So just shortened to waiting for the time that response message spent of first sub-process.
Flow process with MSC initiation UE identification is a specific embodiment below, and content of the present invention is elaborated.
In the present embodiment, the network element of initiating the identification flow process is MSC, and timer T1 defers to the regulation of 3GPP standard TS29.002, is set to 3~10 seconds, and correspondingly, timer T3 is set to 3 seconds; In actual applications, rule of thumb T3 is set to other values, and satisfies T3 less than T1; The present invention is not defined in above-mentioned number range with the value of timer T3.In the present embodiment, first sub-process is the MSI flow process.Second sub-process is the identification flow process.
The operation flow of present embodiment comprises the steps: as shown in Figure 3
Step 301:UE carries out the location registers flow process at a MSC, and after the success, the VLR1 of a MSC correspondence has the IMSI of UE, and UE receives TMSI and the LAI information that a MSC is distributed.
Step 302:UE roams into the zone of the 2nd MSC, and UE sends LUR to the 2nd MSC, has carried TMSI and LAI that a MSC is distributed in LUR.
Step 303: if described LAI is adjacent with the 2nd MSC, the 2nd MSC starts timer T1 and T3, and starts the MSI flow process according to TMSI that is received and LAI, obtains the IMSI of UE to VLR1, if successfully get access to IMSI, then goes to step 308; If up to the overtime IMSI that do not obtain of T3, promptly do not receive the response message of VLR1, then execution in step 304.In the present embodiment, T1 is 3GPPTS29.002 predetermined timing device s, and duration is 3~10 seconds, and the duration of T3 is set to 3 seconds, also can be set to any value less than the T1 duration.
Step 304: when the 2nd MSC continues the MSI flow process, start the identification flow process, and start identification flow process protection timer T2, in the present embodiment, T2 is the T3270 of defined among the 3GPP TS24.008, and duration is 12 seconds.
Step 305: do not reach overtime this section in the period at T1, may receive, receive any one in above-mentioned two message, then go to step 309 from the response message of the MSI flow process of VLR1 or from the identification response message of UE; If, then withdraw from the MSI flow process, and execution in step 306 up to overtime response message or the identification response message of not receiving the MSI flow process of T1.
Step 306: do not reach overtime this section in the period at the overtime and T2 of timer T1,, then go to step 310 if receive identification message; If up to the overtime identification message of not receiving of T2, then execution in step 307.
Step 307: finish the identification flow process, carry out the location registers flow process and the process ends of failure.
Step 308: stop timer T1 and timer T3 and finish the MSI flow process, go to step 311 after being finished.
Step 309: stop timer T1 and timer T2, completing steps 305 flow process of message correspondence of receiving also withdraws from another flow process.For example,, then finish the MSI flow process and withdraw from the identification flow process, the identification message of being received is not handled if receive identification message after receiving the response message of MSI flow process earlier; In like manner,, then finish the identification flow process and withdraw from the MSI flow process, the MSI message of being received is not handled if receive MSI message after receiving identification message earlier.After being finished, this step goes to step 311.
Step 310: stop timer T2 and finish the identification flow process, go to step 311 after being finished.
Step 311: withdraw from embodiment of the invention handling process and carry out the follow-up processing flow of existing identification flow process, i.e. authentication, encryption flow, and continue the executing location registering flow path.
In the UE identification flow process that SGSN initiates, the first included sub-process is an identity authentication request flow process, second sub-process is an identification request flow process, the protection timer T1 of regulation identity authentication request flow process is T3370 among the 3GPP TS 24008, duration is 6 seconds, so wherein set timer T3 duration was less than 6 seconds; 3GPP TS 24.008 regulation T2 are T3270, and duration is 12 seconds.Other each treatment step can provide with reference to flow process shown in Figure 3, therefore repeats no more.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of method of user terminal being carried out identification; comprise first sub-process and second sub-process that are used for identification; wherein the first sub-process priority is higher than second sub-process; it is characterized in that; the timer T3 of a duration less than first sub-process protection timer T1 duration is set, and this method comprises the steps:
A, user terminal move to the second network element zone from the first network element zone, and second network element is initiated first sub-process to first network element, and start timer T1 and timer T3 simultaneously;
Whether B, judgement receive the response message of first sub-process before timer T3 is overtime, if, then stop timer T1 and T3, finish the follow-up processing flow of first sub-process and existing identification flow process and withdraw from this flow process; Otherwise when continuing first sub-process, second network element is initiated second sub-process to user terminal.
2, method according to claim 1 is characterized in that, step B judges the response message of not receiving first sub-process, further comprises after step B:
The protection timer T2 of C, startup second sub-process;
In D,, a period of time that timer T1 is not overtime overtime at timer T3, if second network element is received the response message of arbitrary sub-process, then stop timer T1 and T2, finish the sub-process of response message correspondence of receiving and withdraw from another sub-process, have the follow-up flow process of identification flow process after being finished now and withdraw from this flow process; If do not receive any one response message in above-mentioned two sub-processes up to T1 is overtime, then finish first sub-process;
In E,, a period of time that timer T2 is not overtime overtime,, then stop timer T2, finish second sub-process and withdraw from this flow process if second network element is received the response message from second sub-process at timer T1; If up to the overtime response message of not receiving second sub-process of T2, then process ends.
3, method according to claim 1 and 2 is characterized in that, described first network element and second network element are mobile switching centre;
Described first sub-process is that the MAP of third generation partner program standard 3GPP TS 24.008 defineds gets identification process, and described second sub-process is the identification flow process of 3GPP TS 29.002 defineds.
According to the described method of claim 3, it is characterized in that 4, the described startup timer of steps A T1 is: the duration of stipulating among the startup 3GPP TS29.002 is 3~10 seconds timer s.
5, method according to claim 3 is characterized in that, the described startup timer of steps A T3 is: the startup duration is 3 seconds timer T3.
6, method according to claim 3 is characterized in that, starts timer T2 described in the step C to be: the duration of stipulating among the startup 3GPP TS24.008 is 12 seconds timer T3270.
7, method according to claim 1 and 2 is characterized in that, described first network element and second network element are general packet radio service Serving GPRS Support Node SGSN;
Described first sub-process is the identity authentication flow process of 3GPP TS 23060 defineds, and described second sub-process is the identification flow process of 3GPP TS 23060 defineds.
According to the described method of claim 7, it is characterized in that 8, the described startup timer of steps A T1 is: the duration that starts regulation among the 3GPP TS 23060 is 6 seconds timer T3370.
9, method according to claim 7 is characterized in that, the described startup timer of steps A T3 is: start duration less than 6 seconds timer T3.
10, method according to claim 7 is characterized in that, starts timer T2 described in the step C to be: the duration that starts regulation among the 3GPP TS 23060 is 12 seconds timer T3270.
CNB2006100585171A 2006-03-10 2006-03-10 Method for identifying identity of user terminal Active CN100455127C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100585171A CN100455127C (en) 2006-03-10 2006-03-10 Method for identifying identity of user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100585171A CN100455127C (en) 2006-03-10 2006-03-10 Method for identifying identity of user terminal

Publications (2)

Publication Number Publication Date
CN1859795A true CN1859795A (en) 2006-11-08
CN100455127C CN100455127C (en) 2009-01-21

Family

ID=37298645

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100585171A Active CN100455127C (en) 2006-03-10 2006-03-10 Method for identifying identity of user terminal

Country Status (1)

Country Link
CN (1) CN100455127C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767716A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Service request processing method and device
WO2019183858A1 (en) * 2018-03-28 2019-10-03 华为技术有限公司 Unmanned aerial vehicle identification method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3466015B2 (en) * 1996-01-31 2003-11-10 松下電器産業株式会社 Base station and mobile station
US5844890A (en) * 1997-03-25 1998-12-01 International Business Machines Corporation Communications cell scheduler and scheduling method for providing proportional use of network bandwith
BR9901010A (en) * 1998-03-16 2000-01-18 Ericsson Inc Process for registering a mobile station in a digital radio communication system and for determining whether or not to transmit a periodic registration signal from a mobile station to a base station, and a mobile communications device.
JP2005101897A (en) * 2003-09-25 2005-04-14 Vodafone Kk Mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767716A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Service request processing method and device
WO2015101341A1 (en) * 2014-01-03 2015-07-09 Tencent Technology (Shenzhen) Company Limited Method and device for processing service request
CN104767716B (en) * 2014-01-03 2018-05-25 腾讯科技(深圳)有限公司 Service request processing method and device
US11068964B2 (en) 2014-01-03 2021-07-20 Tencent Technology (Shenzhen) Company Limited Method and device for processing service request
WO2019183858A1 (en) * 2018-03-28 2019-10-03 华为技术有限公司 Unmanned aerial vehicle identification method and device

Also Published As

Publication number Publication date
CN100455127C (en) 2009-01-21

Similar Documents

Publication Publication Date Title
CN1199511C (en) Method for supporting handover between radio access networks
CN1127877C (en) Arranging control signallings in telecommunication system
CN1285224C (en) Method and system for authorization, routing, and delivery of transmission
CN103889023A (en) Access Admission Control Method And System For Mobile Communication System
CN1960567A (en) Communication method for terminal to enter to and exit from idle mode
US7565160B2 (en) System and method of handling prioritized wireless calls for mobile devices operating in an analog or TDMA mode
CN1961602A (en) Method and radio communication network for detecting the presence of fraudulent subscriber identity modules
CN1787656A (en) Aging processing apparatus and method in communications system
CN100576956C (en) Portable terminal identity protection by the attaching position register modification
CN101039312A (en) Method and apparatus for preventing service function entity of general authentication framework from attack
CN101060711A (en) A mobile communication terminal position updating method
CN1627746A (en) Method for realizing multimedia preperence operation
CN1802827A (en) Method and apparatus for supporting access network (AN) authentication
CN1497997A (en) Mobile communication system and method for controlling its operation and node used for the system
CN1893724A (en) Mobile exchanging center and called parner processing method
CN101047971A (en) Method for trigging intelligent service at attatching area when intelligent user roaming
CN1859795A (en) Method for identifying identity of user terminal
CN1279785C (en) A processing method after privacy information modification of object user equipment
CN1518372A (en) Method for renting local number in mobile communication
CN1852550A (en) Safety communication method
CN1886994A (en) Method and apparatus for efficient simultaneous re-activation of multiple dormant service instances in a CDMA2000 network
CN1255968C (en) System for radio telecommunication network
CN1859698A (en) Method for solving calling left user as non-success problem after core net node fault
CN1853435A (en) Method for maintaining a connection when a request is pending
CN1867187A (en) Method for realizing user call switching based on IU FLEX technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211223

Address after: 450046 Floor 9, building 1, Zhengshang Boya Plaza, Longzihu wisdom Island, Zhengdong New Area, Zhengzhou City, Henan Province

Patentee after: Super fusion Digital Technology Co.,Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: HUAWEI TECHNOLOGIES Co.,Ltd.