WO2008009227A1 - Procédé destiné à un terminal utilisateur accédant à un système de télécommunication, et système de télécommunication correspondant - Google Patents
Procédé destiné à un terminal utilisateur accédant à un système de télécommunication, et système de télécommunication correspondant Download PDFInfo
- Publication number
- WO2008009227A1 WO2008009227A1 PCT/CN2007/070252 CN2007070252W WO2008009227A1 WO 2008009227 A1 WO2008009227 A1 WO 2008009227A1 CN 2007070252 W CN2007070252 W CN 2007070252W WO 2008009227 A1 WO2008009227 A1 WO 2008009227A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user equipment
- 3gpp
- core network
- anchor
- pdg
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
Definitions
- the present invention relates to the field of communications, and in particular, to a hybrid networking of a 3rd Generation Partnership Project (“3GPP”) system and a non-3GPP system.
- 3GPP 3rd Generation Partnership Project
- 3GPP Considering the rapid development of broadband wireless communication technologies such as WiMAX, 3GPP needs to propose its own standards, participate in the competition of broadband wireless communication technologies, and ensure the competitiveness of 3GPP systems in the next 10 years or even longer. 3GPP officially established the Long Term Evolution (LTE) research project in December 2004. The goal of the clear research project is to develop 3GPP wireless access technologies toward "high data rate, low latency and optimized packet data applications.” "The direction of evolution.
- LTE Long Term Evolution
- SAE System Architecture Evolution
- the evolved network architecture Several principles related to the present invention that need to be satisfied by the evolved network architecture are as follows: 1. In the initialization phase of the terminal access network, the basic IP connection needs to be established in the evolved network; 2. The evolved network architecture must be the user. The delay of data is minimized. Third, the definition of each functional module in the evolved network architecture should avoid overlapping or duplication of functions to avoid unnecessary signaling interaction and delay.
- the Evolved Packet Core mainly includes a Mobility Management Entity (MME), a User Plane Entity (UPE), and an 3GPP Anchor. ) and SAE Anchor four logic function modules.
- MME Mobility Management Entity
- UPE User Plane Entity
- 3GPP Anchor 3GPP Anchor
- the MME is responsible for the mobility management of the control plane, including user context and mobility state management. Temporary identity, security function, etc., which corresponds to the current universal mobile communication system (Universal Mobile
- UMTS Telecommunications System
- SGSN Serving GPRS Support Node
- the UPE is responsible for initiating paging for downlink data in idle state, managing and storing IP bearer parameters and routing information in the network, etc., which corresponds to the data plane portion of the SGSN within the current UMTS system.
- 3GPP Anchor is a user plane anchor point between different access systems in the 3GPP system
- SAE Anchor is the user plane anchor between the 3GPP access system and the non-3GPP system in SAE.
- SAE Anchor and 3GPP Anchor are collectively referred to as user plane anchors between different access systems (Inter Access
- Inter AS Anchor I "IASA”
- ⁇ 1 30??1?8 ⁇ refers to various access systems based on 1?, and not defined by the 3GPP organization, which may be WiMax, ADSL, and the like.
- the SAE standard requires that user-side data routing in the roaming area can take two forms: “Home routed” routing and “Local Breakout” routing.
- the SAE roaming framework of the "Local Breakout" routing method is shown in Figure 3. With this routing method, the user's data can directly enter the PDN network from the visited place.
- Wireless Local Area Network is a widely-used wireless access system, which refers to the application of wireless communication technology to interconnect computer devices to form a network system that can communicate with each other and realize resource sharing. . It uses radio frequency (Radio Frequency) technology to replace the local area network of old twisted-pair copper wires.
- the wireless LAN no longer uses a communication cable to connect the computer to the network, but wirelessly makes the construction of the network and the movement of the terminal more flexible.
- WLAN provides 11 Mbps, which is 200 times higher than fixed dial-up Internet access (56K). It can perform WWW browsing, sending and receiving EMAIL, enjoy online movies, download files and work.
- IWLAN Interworking Wireless Local Area Network
- the mission of the IWLAN project is to study the interworking between WLAN and 3GPP systems, aiming to enable users of 3GPP systems to access 3GPP systems via WLAN.
- the architecture is applicable not only to WLAN access systems, but also to any IP-based access such as WiMAX and Asymmetric Digital Subscriber Line (ADSL). the way.
- Figure 4 shows the architecture of the IWLAN system.
- the present invention provides a communication system and a method for a user equipment to access a communication system, so that a user accessing from a non-3GPP access system can also obtain an "always on" function.
- the present invention provides a method for a user equipment to access a communication system, including: the user equipment accesses a 3GPP core network through a non-3rd generation partner project 3GPP access system, and the 3GPP core network performs the user equipment Registering, and establishing a default bearer for the user equipment accessed through the non-3GPP access system during the registration process.
- the step of establishing a default bearer for the user equipment in the registration process includes the following sub-steps: the user equipment initiates authentication to the authentication device of the 3GPP core network by using the gateway of the non-3GPP access system Authentication request;
- the anchor device in the 3GPP core network establishes a default bearer for the user equipment between the gateway device and the gateway.
- the anchor device in the home 3GPP core network establishes a defect for the user equipment.
- Independent bearer if the user equipment directly accesses the home 3GPP core network through the gateway of the non-3GPP access system, the anchor device in the home 3GPP core network establishes a defect for the user equipment.
- the anchor device in the 3GPP core network establishes a default bearer for the user equipment, or establishes a default bearer for the user equipment by the anchor device in the visited 3GPP core network and the anchor device in the home 3GPP core network.
- the user equipment directly accesses the visited 3GPP core network through the gateway of the non-3GPP access system, and accesses the service in the visited 3GPP core network, it is visited by the 3GPP core network.
- the anchor device establishes a default bearer for the user equipment.
- the method further includes the following steps:
- the 3GPP core network determines whether the non-3GPP access system can be trusted in the registration process, and if not trusted, establishes a security tunnel between the gateway of the non-3GPP access system and the anchor device, the default The bearer transmits data through the secure tunnel.
- the method further includes the following steps:
- a service address is assigned to the user equipment.
- the device for assigning a service address to the user equipment is one of: a gateway in the non-3GPP access system, a home subscription subscriber server/authentication authorization and accounting server, or an anchor device.
- the method further includes the following steps:
- the user equipment After the registration process ends, the user equipment initiates an IP multimedia subsystem registration process through the default bearer.
- the present invention further provides a communication system, including a user equipment and a network side, where the network side further includes: a non-3GPP access system, configured to access the user equipment;
- the 3GPP core network is configured to register a user equipment accessed by the non-3GPP access system, and establish a default bearer for the user equipment in the registration process.
- the non-3GPP access system further includes a gateway, configured to initiate an authentication authentication request to the authentication device of the 3GPP core network when the user equipment accesses the non-3GPP access system.
- the gateway further includes means for establishing a secure tunnel between the gateway and an anchor device of the 3GPP core network when the non-3GPP access system is not trusted by the 3GPP core network, the secure tunnel is used for carrying The default bearer.
- the 3GPP core network also includes:
- An authentication device configured to authenticate the user equipment according to the authentication request of the gateway; and the anchor device is configured to: after the authentication device is successfully authenticated, the anchor device and the A default bearer is established between the gateways for the user equipment.
- the user equipment includes means for initiating an IP Multimedia Subsystem registration procedure through the default bearer after the registration process is completed.
- a default bearer is established for the UE.
- the UE can obtain the function of "always online” in all access systems of the SAE, including the access system of 3GPP and the access system of non-3GPP.
- the default bearer can be established by the SAE Anchor in different networks for UEs accessing from non-3GPP access systems.
- the default bearer is established by the SAE Anchor of the home network.
- the default bearer is established by the SAE Anchor of the home network, or the SAE Anchor of the home network and the SAE Anchor of the visited network cooperate to construct a default bearer.
- the default bearer is built by the SAE Anchor of the visited network. By selecting the most suitable SAE Anchor to establish a default bearer, the route carrying the route is shorter, and the UE is served with higher efficiency.
- the non-3GPP access system is not trustworthy, a security tunnel needs to be established between the gateway of the non-3GPP access system and the SAE Anchor at the time of registration, and the default bearer is placed in the secure tunnel for transmission, or the default bearer.
- the data is encapsulated and transmitted in a secure tunnel to ensure the security of the communication information.
- the UE In the registration process, the UE needs to be assigned a service address to ensure that the UE can use the service normally.
- the UE can also register with the Internet Multimedia Subsystem (IMS) by using the established default bearer, so that the services provided by the IMS can be used.
- IMS Internet Multimedia Subsystem
- FIG. 4 is a schematic diagram of an IWLAN system architecture in the prior art
- FIG. 6 is a system structural diagram of a UE accessing a communication network in a non-roaming scenario according to the inventive principle
- FIG. 7 is a schematic diagram of a UE accessing a communication network in a non-roaming scenario according to the inventive principle
- FIG. 8 is a structural diagram of a system when a UE accesses a SAE system through a home network in a scenario of "Home Routed” roaming according to the principles of the present invention
- FIG. 9 is a schematic diagram of a UE accessing a SAE system through a home network in a "Home Routed” roaming scenario according to the inventive principle;
- FIG. 11 is a schematic diagram of a UE accessing a SAE system through a visited network in a "Home Routed” roaming scenario according to the inventive principle;
- FIG. 12 is a structural diagram of a system when a UE accesses a SAE system through a visited network in a scenario of "Local Breakout" roaming according to the inventive principle;
- FIG. 13 is a schematic diagram of a UE accessing a SAE system through a visited network in a "Local Breakout" roaming scenario according to the inventive principle;
- FIG. 14 is a system structural diagram of a UE accessing a communication network according to a first embodiment of the present invention.
- 15 is a flowchart of a method for a UE to access a communication network according to a first embodiment of the present invention
- 16 is a flowchart of a method for a UE to access a communication network according to a second embodiment of the present invention.
- FIG. 17 is a flowchart of a method for a UE to access a communication network according to a third embodiment of the present invention.
- FIG. 18 is a flowchart of a method for a UE to access a communication network according to a fourth embodiment of the present invention.
- FIG. 19 is a flowchart of a method for a UE to access a communication network according to a fifth embodiment of the present invention.
- FIG. 20 is a flowchart of a method for a UE to access a communication network according to a sixth embodiment of the present invention.
- 21 is a system structural diagram of a UE accessing a communication network according to a seventh embodiment of the present invention.
- FIG. 22 is a flowchart of a method for a UE to access a communication network according to a seventh embodiment of the present invention.
- FIG. 23 is a flowchart of a method for a UE to access a communication network according to an eighth embodiment of the present invention.
- FIG. 24 is a flowchart of a method for a UE to access a communication network according to a ninth embodiment of the present invention.
- 25 is a flowchart of a method for a UE to access a communication network according to a tenth embodiment of the present invention.
- 26 is a flowchart of a method for a UE to access a communication network according to an eleventh embodiment of the present invention.
- FIG. 27 is a flowchart of a method for a UE to access a communication network according to a twelfth embodiment of the present invention.
- FIG. 28 is a system structural diagram of a UE accessing a communication network according to a thirteenth embodiment of the present invention.
- 29 is a flowchart of a method for a UE to access a communication network according to a thirteenth embodiment of the present invention.
- FIG. 30 is a flowchart of a method for a UE to access a communication network according to a fourteenth embodiment of the present invention.
- FIG. 31 is a flowchart of a method for a UE to access a communication network according to a fifteenth embodiment of the present invention.
- FIG. 32 is a flowchart of a method for a UE to access a communication network according to a sixteenth embodiment of the present invention.
- FIG. 33 is a flowchart of a method for a UE to access a communication network according to a seventeenth embodiment of the present invention.
- FIG. 34 is a flowchart of a method for a UE to access a communication network according to an eighteenth embodiment of the present invention.
- 35 is a system structural diagram of a UE accessing a communication network according to a nineteenth embodiment of the present invention.
- FIG. 36 is a flowchart of a method for a UE to access a communication network according to a nineteenth embodiment of the present invention
- 37 is a flowchart of a method for a UE to access a communication network according to a twentieth embodiment of the present invention
- FIG. 38 is a flowchart of a method for a UE to access a communication network according to a twenty-first embodiment of the present invention
- FIG. 40 is a flowchart of a method for a UE to access a communication network according to a twenty-third embodiment of the present invention
- FIG. 5 is a second diagram of a method for accessing a communication network by a UE according to a twenty-third embodiment of the present invention
- the network side can register it and establish a default bearer.
- the present invention is applicable to registering and establishing a default bearer for a UE accessing the SAE network through a system defined by the non-3GPP in different scenarios. The following descriptions are made according to different scenarios:
- the UE accesses the network through a non-3GPP defined system, and then accesses the SAE system through the GW.
- the system architecture is shown in FIG. 6.
- the access system defined by the non-3GPP is connected to the evolved packet core network in the SAE system through the S2 interface. If the non-3GPP access system is trusted for the SAE system, the S2 interface is considered to be secure; The 3GPP access system is untrustworthy for the ⁇ system, and the S2 interface is considered to be insecure. A secure tunnel needs to be established between the GW and the SAE Anchor before establishing the default bearer. Among them, how the combination of MME, UPE, 3GPP Anchor and SAE Anchor is undecided in the figure.
- step 701 the UE first accesses the access system defined by the non-3GPP.
- step 702 the UE queries the address of the available GW.
- the specific query method is the same as that in the prior art, and details are not described herein again.
- step 703 the UE initiates a bearer setup request to the available GW.
- step 704 after receiving the request, the GW initiates an authentication authentication request to the HSS/Authentication ⁇ Authorization, Account ("AAA") instead of the UE.
- AAA HSS/Authentication ⁇ Authorization, Account
- the HSS/AAA performs authentication authentication on the UE according to the authentication authentication request, and returns the result to G ⁇ , and returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after the registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- step 706 If the non-3GPP access system is untrustworthy for the SAE system, then proceed to step 706 to build
- the SAE system establishes a default bearer between the GW and the SAE Anchor, and sends the QoS parameters of the default bearer of the UE to each node.
- the UE is also assigned a service address, which may be allocated by the GW, allocated by the HSS/AAA Server, or allocated by the SAE Anchor.
- step 708 the GW sends a bearer setup response to the UE, and carries the service address allocated to the UE in step 707 in the response. If the system confirms in step 705 that the UE needs to perform IMS registration after the registration is completed and obtains from the HSS/AAA. The address of the P-CSCF is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE then proceeds to step 709 after the SAE registration is completed, initiates an IMS registration process through the address of the P-CSCF, and registers in the IMS.
- the UE has two ways to access the SAE system through the non-3GPP access system: one way is to access the SAE system directly through the home network to access the services in the home network; It accesses the SAE system through the visited network, and then accesses the services in the home network through the home network.
- the UE accesses the SAE system through the home network
- its system structure is as shown in FIG. 8.
- the UE accesses the SAE Anchor in the home network through the GW from the S2 interface. If the non-3GPP defined access system in which the UE is located is trusted for the SAE system, the S2 interface is considered to be secure; if the non-3GPP defined access system is untrustworthy for the SAE system, then The S2 interface is insecure. Before establishing the default bearer, you need to establish a secure tunnel between the GW and the SAE Anchor in the home network. Among them, how the combination of MME, UPE, 3GPP Anchor and SAE Anchor is undecided.
- step 901 the UE first accesses the access defined by the non-3GPP. system.
- step 902 the UE queries the address of the available GW.
- step 903 the UE initiates a bearer setup request to the queried available GW.
- the GW initiates an authentication authentication request to the HSS/AAA server (HSS/AAA Server) in the home network by using the AAA Service Proxy in the visited network instead of the UE.
- HSS/AAA server HSS/AAA Server
- the HSS/AAA server in the home network authenticates the UE, and returns the result to the GW through the AAA Server Proxy in the visited network, and returns the default bearer of the UE to the GW.
- QoS related information If the system requires the UE to perform IMS registration after registration is complete, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- step 906 if the non-3GPP defined access system is untrustworthy for the SAE system, establishing a secure tunnel from the GW to the SAE Anchor in the home network; if the non-3GPP access system is for the SAE system If it is trustworthy, you can omit this step. Since the establishment process of the security tunnel is independent of the process of establishing a default bearer by the UE, the step may also be performed during the establishment of the bearer between the UE and the GW, or after the process of establishing the bearer.
- the process proceeds to step 907, and the default bearer between the GW and the SAE anchor in the home network is established, and the QoS parameters of the default bearer of the UE are sent to each node.
- the UE is also assigned a service address, which may be allocated by the GW, allocated by the AAA Server Proxy in the visited network, or allocated by the S AE Anchor in the home network.
- step 908 the GW sends a bearer setup response to the UE, where the response carries the service address allocated to the UE in step 907. If the system confirms in step 905 that the UE needs to perform IMS registration after the registration is completed and obtains from the HSS/AAA. The address of the P-CSCF is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE then proceeds to step 909 after the SAE registration is completed, initiates an IMS registration process through the address of the P-CSCF, and registers in the IMS.
- the UE accessing the access system defined by the non-3GPP defined in the visited network accesses the SAE Anchor in the visited network from the S2 through the GW, and then accesses the SAE Anchor in the home network.
- the system structure is as shown in FIG. 10. Shown: The combination of MME, UPE, 3GPP Anchor and SAE Anchor is undecided.
- the S2 interface is considered to be secure; if the non-3GPP access system is untrustworthy for the SAE system, the S2 interface is considered to be Insecure, a secure tunnel needs to be established between the GW and the SAE Anchor in the visited network before establishing the default bearer.
- step 1101 the process of the UE registering and establishing the default bearer is as shown in FIG. 11.
- step 1101 the UE accesses the non-3GPP access system.
- the UE queries the address of the available GW.
- step 1103 the UE initiates a bearer setup request to the available GW.
- the GW replaces the UE by accessing the AAA Server Proxy in the network to the home network.
- the HSS/AAA Server initiates an authentication authentication request.
- the HSS/AAA Server in the home network authenticates the UE, and returns the result to the GW through the AAA Server Proxy in the visited network, and also returns the QoS related information that the UE carries by default.
- the ijHSS/AAA also needs to return the address of the P-CSCF, and uses the corresponding standard bit to indicate that IMS registration is required.
- step 1106 if the non-3GPP defined access system is untrustworthy for the SAE system, establishing a secure tunnel from the GW to the SAE Anchor in the visited network; if the non-3GPP access system is for the SAE system If the process of establishing a secure tunnel is independent of the process of establishing a default bearer by the UE, the step may also be performed during the bearer establishment process of the UE and the GW, or may be established in the bearer process. After the process is carried out.
- the process proceeds to step 1107, and the default bearer between the SAE anchor in the visited network and the SAE anchor in the home network is established, and the QoS parameters of the default bearer of the UE are sent to each node.
- the UE is also assigned a service address, which may be allocated by the GW, allocated by the AAA Server Proxy in the visited network, or allocated by the S AE Anchor in the home network.
- step 1108 the GW sends a bearer setup response to the UE, where the response carries the service address allocated to the UE in step 1107. If the system confirms in step 1105 that the UE needs to perform IMS registration after the registration is completed and obtains from the HSS/AAA The address of the P-CSCF is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE then proceeds to step 1109 after the SAE registration is completed, initiates an IMS registration process through the address of the P-CSCF, and registers in the IMS.
- the UE accesses the SAE Ancho in the visited network through the access system defined by the non-3GPP to access the services in the visited network.
- the system architecture is shown in Figure 12.
- the non-3GPP-defined access system where the UE is located is connected to the SAE Anchor in the visited network through the GW from the S2 interface. If the non-3GPP defined access system is trustworthy for the SAE system, the S2 interface is considered to be secure; if the non-3GPP defined access system is untrustworthy for the SAE system, the S2 interface is considered It is not secure, then a secure tunnel needs to be established between the GW and the SAE Anchor in the visited network before establishing the default bearer.
- step 1301 the UE accesses the access system defined by the non-3GPP.
- step 1302 the UE queries the address of the available GW.
- the UE initiates a bearer setup request to the available GW.
- the GW initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- the HSS/AAA Server in the home network authenticates the UE, and returns the result to the GW through the AAA Server Proxy in the visited network, and returns the QoS related to the default bearer of the UE. information. If the system requires the UE to perform IMS registration after the registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- step 1306 if the non-3GPP defined access system is untrustworthy for the SAE system, establishing a secure tunnel from the GW to the SAE Anchor in the home network; if the non-3GPP access system is for the SAE system If it is trustworthy, you can omit this step. Since the establishment process of the security tunnel is independent of the process of establishing a default bearer by the UE, the step may also be performed during the establishment of the bearer between the UE and the GW, or after the process of establishing the bearer.
- the process proceeds to step 1307, and the default bearer between the GW and the SAE anchor in the visited network is established, and the QoS parameters of the default bearer of the UE are sent to each node.
- the UE is also assigned a service address, which may be allocated by the GW, allocated by the AAA Server Proxy in the visited network, or allocated by the S AE Anchor in the visited network.
- step 1308 the GW sends a bearer setup response to the UE, where the response carries the service address allocated to the UE in step 1307. If the system confirms in step 1305 that the UE needs to perform IMS registration after the registration is completed and obtains from the HSS/AAA. The address of the P-CSCF is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE then proceeds to step 1309 after the SAE registration is completed, and initiates an IMS registration process through the address of the P-CSCF to register in the IMS.
- the UE is in a non-roaming scenario
- the accessed non-3GPP access system is an IWLAN
- the IWLAN is trusted for the SAE system
- the GW connected to the IWLAN is a PDG
- the service address of the UE is from the PDG. provide.
- step 1501 the UE accesses the IWLAN access system. Then, the process proceeds to step 1502.
- the specific query method is the same as that in the prior art, and details are not described herein again.
- step 1503 the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA instead of the UE.
- the HSS/AAA authenticates the UE, and returns the result to the PDG, and returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after registration is complete, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bits to indicate that IMS registration is required.
- the PDG locally allocates a service address to the UE.
- the PDG sends a bearer setup request to the SAE Anchor, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor sends a bearer setup response to the PDG indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, where the response carries the service address allocated for the UE. If the system confirms in step 1505 that the UE needs to perform IMS registration after registration is completed and the address of the P-CSCF is obtained from HSS/AAA, the address is carried in the response.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE proceeds to step 1510 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 1506, in the IMS. registered.
- the second embodiment of the present invention is substantially the same as the first embodiment, except that in the first embodiment, the service address of the UE is provided by the PDG. In the embodiment, the service address of the UE is used by the HHS/AAA Server. provide.
- the steps 1601 to 1605 are similar to the steps 1501 to 1505, and are not described herein again.
- step 1606 the PDG interacts with the HHS/AAA Server, and the HHS/AAA Server allocates the UE's service address.
- Steps 1607 to 1610 are similar to steps 1507 to 1510, and are not described herein again.
- the third embodiment of the present invention is substantially the same as the first embodiment, except that in the first embodiment, the service address of the UE is provided by the PDG; and in the embodiment, the service address of the UE is provided by the SAE Anchor.
- step 1701 - step 1705 is similar to step 1501 - step 1505, and details are not described herein again.
- the PDG sends a bearer setup request to the SAE Anchor, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor allocates the service address of the UE. Then, in step 1708, the SAE anchor sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 1709 and step 1710 are similar to steps 1509 and 1510, and are not described herein again.
- the application scenario of the fourth embodiment of the present invention is substantially the same as that of the first embodiment.
- the UE is also in a non-roaming scenario, and the non-3GPP access system is also an IWLAN.
- the IWLAN is untrustworthy for the SAE system, and the gateway is also a PDG.
- the service address of the UE is provided by the PDG.
- the system architecture of this embodiment is the same as that of the first embodiment, as shown in FIG. 14, in which how the combinations of MME, UPE, PDG, 3GPP Anchor and SAE Anchor are undecided.
- step 1801 the UE accesses the IWLAN access system.
- step 1802 the UE queries the address of the available PDG.
- step 1803 the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA instead of the UE.
- the HSS/AAA performs authentication authentication on the UE, and returns the result to the PDG, and returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after the registration is completed, Then the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- step 1806 the PDG locally allocates a service address to the UE.
- step 1807 proceed to step 1807 to establish a secure tunnel from the PDG to the SAE Anchor.
- the PDG sends a bearer setup request to the SAE Anchor, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor sends a bearer setup response to the PDG indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, where the response carries the service address allocated for the UE. If the system confirms in step 1805 that the UE needs to perform IMS registration after the registration is completed and the address of the P-CSCF is obtained from the HSS/AAA, the address is also carried in the response.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE proceeds to step 1811 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 1806, and performs the IMS registration process in the IMS. registered.
- the fifth embodiment of the present invention is substantially the same as the fourth embodiment, except that in the fourth embodiment, the service address of the UE is provided by the PDG. In the embodiment, the service address of the UE is used by the HHS/AAA Server. provide.
- step 1901 to step 1905 are similar to steps 1801 to 1805, and are not described herein again.
- step 1906 the PDG interacts with the HHS/AAA Server, and the HHS/AAA Server allocates the UE's service address.
- Steps 1907 to 1911 are similar to steps 1807 to 1811, and are not described herein again.
- the sixth embodiment of the present invention is substantially the same as the fourth embodiment, except that in the fourth embodiment, the service address of the UE is provided by the PDG; and in the embodiment, the service address of the UE is provided by the SAE Anchor.
- step 2001-step 2005 is similar to step 1801 to step 1805, and is not described here.
- step 2006 a secure tunnel is established between the PDG and the SAE Anchor.
- step 2007, the PDG sends a bearer setup request to the SAE Anchor, where the QoS parameters of the default bearer of the UE are carried.
- step 2008 after receiving the bearer setup request, the SAE Anchor allocates the service address of the UE.
- step 2009 the SAE anchor sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Steps 2010 and 2011 are similar to steps 1810 and 1811, and are not described here.
- the UE is in a "Home Routed" roaming scenario, the UE accesses the SAE system through the home network, and the non-3GPP defined access system currently accessed by the UE is IWLAN, and the IWLAN is trusted for the SAE system.
- the GW connected to the IWLAN is a PDG, and the service address of the UE is provided by the PDG.
- step 2201 the UE accesses the IWLAN access system.
- step 2202 the UE queries the address of the available PDG.
- the specific query method is the same as that in the prior art, and details are not described herein again.
- the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- the HSS/AAA server in the home network authenticates the UE, and returns the result to the PDG through the AAA Server Proxy in the visited network, and also returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- the PDG allocates a service address to the UE.
- the PDG sends a bearer setup request to the SAE Anchor in the home network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the home network sends a bearer setup response to the PDG indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, and carries the service address allocated for the UE in the response. If the system confirms in step 2205 that the UE needs to perform IMS registration after the registration is completed and the address of the P-CSCF is obtained from the HSS/AAA, the address is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE proceeds to step 2210 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 2206, and performs the IMS registration process in the IMS. registered.
- the eighth embodiment of the present invention is substantially the same as the seventh embodiment, except that in the seventh embodiment, the service address of the UE is provided by the PDG. In the embodiment, the service address of the UE is used by the HHS/AAA Server. provide.
- steps 2301 to 2305 are similar to steps 2201 to 2205, and are not described herein again.
- step 2306 the PDG communicates with the AAA Server Proxy in the visited network, and the service address of the UE is allocated by the AAA Server Proxy in the visited network.
- Step 2307 - Step 2310 is similar to Step 2207 - Step 2210, and details are not described herein again.
- the ninth embodiment of the present invention is substantially the same as the seventh embodiment except that in the seventh embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is provided by the SAE Anchor.
- steps 2401 to 2405 are similar to steps 2201 to 2205, and are not described herein again.
- step 2406 the PDG sends a bearer setup request to the SAE Anchor in the home network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the home network allocates the service address of the UE. Then, in step 2408, the SAE anchor in the home network sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 2409 and step 2410 are similar to steps 2209 and 2210, and are not described herein again.
- the application scenario of the tenth embodiment of the present invention is substantially the same as that of the seventh embodiment.
- the UE is also in the "Home Routed" roaming scenario.
- the UE also accesses the SAE system through the home network.
- the non-3GPP access system is also the IWLAN, and the gateway is also the PDG.
- the service address of the UE is also provided by the PDG, the difference being that the IWLAN is untrustworthy for the SAE system.
- the system architecture of this embodiment is the same as that of the seventh embodiment, as shown in FIG. 21, in which how the combinations of MME, UPE, PDG, 3GPP Anchor and SAE Anchor are undecided.
- step 2501 the UE accesses the IWLAN access system.
- the UE queries the address of the available PDG.
- step 2503 the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- the HSS/AAA server in the home network authenticates the UE, and returns the result to the PDG through the AAA Server Proxy in the visited network, and returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- the PDG allocates a service address to the UE.
- step 2507 proceed to establish a secure tunnel from the PDG to the SAE Anchor in the home network.
- step 2508 the PDG sends a bearer setup request to the SAE Anchor in the home network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the home network sends a bearer setup response to the PDG indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, where the response carries the service address allocated for the UE. If the system confirms in step 2505 that the UE needs to perform IMS registration after the registration is completed and the address of the P-CSCF is obtained from the HSS/AAA, the address is carried in the response at the same time.
- the UE After the UE receives the bearer setup response from the GW, if the IMS registration is still required, the UE proceeds to step 2511 after the SAE registration is completed, and initiates the IMS registration process for the UE to allocate the service address in step 2506, and performs the IMS registration process in the IMS. registered.
- the eleventh embodiment of the present invention is substantially the same as the tenth embodiment, except that in the tenth embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is HHS/AAA. Server provided.
- steps 2601 to 2605 are similar to steps 2501 to 2505, and are not described herein again.
- step 2606 the PDG communicates with the AAA Server Proxy in the visited network, and the service address of the UE is allocated by the AAA Server Proxy in the visited network.
- Step 2607 - Step 2611 is similar to step 2507 - step 2511, and details are not described herein again.
- the twelfth embodiment of the present invention is substantially the same as the tenth embodiment, except that in the tenth embodiment, the service address of the UE is provided by the PDG; and in the embodiment, the service address of the UE is provided by SAE Anchor. .
- steps 2701 to 2705 are similar to steps 2501 to 2505, and are not described herein again.
- step 2706 a secure tunnel is established from the PDG to the SAE Anchor in the home network.
- the PDG sends a bearer setup request to the SAE Anchor in the home network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the home network allocates the service address of the UE.
- step 2709 the SAE anchor in the home network sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 2710, step 2711 is similar to step 2510 and step 2511, and details are not described herein again.
- the thirteenth embodiment of the present invention is substantially the same as the seventh embodiment, except that in the seventh embodiment, the UE accesses the SAE system through the home network. In the embodiment, the UE accesses the SAE system through the visited network.
- step 2901 the UE accesses the IWLAN access system.
- step 2902 the process proceeds to step 2902, and the UE queries the address of the available PDG.
- the specific query method is the same as that in the prior art, and details are not described herein again.
- the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- the HSS/AAA Server in the home network authenticates the UE, and returns the result to the PDG through the AAA Server Proxy in the visited network, and also returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- the PDG allocates a service address to the UE.
- the PDG sends a bearer setup request to the SAE Anchor in the home network by using the S AE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the home network sends a bearer setup response to the PDG through the SAE Anchor in the visited network, indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, and the service address assigned by the downlink network to the UE. If the system confirms in step 2905 that the UE needs to perform IMS registration after the registration is completed and the address of the P-CSCF is obtained from the HSS/AAA, the address is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE proceeds to step 2910 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 2906, in the IMS. registered.
- the fourteenth embodiment of the present invention is substantially the same as the thirteenth embodiment, except that in the thirteenth embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is provided by the HHS. /AAA Server is available.
- steps 3001 to 3005 are similar to steps 2901 to 2905, and are not described herein again.
- step 3006 the PDG interacts with the AAA Server Proxy in the visited network, and is visited by the visited network.
- the AAA Server Proxy allocates the service address of the UE.
- Steps 3007 to 3010 are similar to steps 2907 to 2910, and are not described herein again.
- the fifteenth embodiment of the present invention is substantially the same as the thirteenth embodiment, except that in the thirteenth embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is determined by the SAE. Provided by Anchor.
- steps 3101 to 3105 are similar to steps 2901 to 2905, and are not described herein again.
- step 3106 the PDG sends a bearer setup request to the S AE Anchor in the home network through the S AE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried. Then, proceeding to step 3107, after receiving the bearer setup request, the SAE Anchor in the home network allocates the service address of the UE.
- step 3108 the SAE anchor in the home network sends a bearer setup response to the PDG through the SAE Anchor in the visited network, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 3109 and step 3110 are similar to steps 2909 and 2910, and are not described herein again.
- the application scenario of the sixteenth embodiment of the present invention is substantially the same as that of the thirteenth embodiment.
- the UE is also in the "Home Routed" roaming scenario, and the UE also accesses the SAE system through the visited network.
- the non-3GPP access system is also IWLAN, and the gateway is the same.
- PDG the service address of the UE is also provided by the PDG, the difference being that the IWLAN is untrustworthy for the SAE system.
- the system architecture of this embodiment is the same as that of the thirteenth embodiment, as shown in FIG. 28, in which how the combinations of MME, UPE, PDG, 3GPP Anchor, and SAE Anchor are undecided.
- step 3201 the UE accesses the IWLAN access system.
- the UE queries the address of the available PDG.
- the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- the HSS/AAA Server in the home network authenticates the UE, and returns the result to the PDG through the AAA Server Proxy in the visited network, and also returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after the registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- the PDG allocates a service address to the UE.
- step 3207 proceed to establish a secure tunnel from the PDG to the SAE Anchor in the visited network.
- step 3208 the PDG sends a bearer setup request to the SAE Anchor in the home network by using the S AE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the home network sends a bearer setup response to the PDG through the SAE Anchor in the visited network, indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, where the response carries the service address allocated for the UE. If the system confirms in step 3205 that the UE needs to perform IMS registration after registration is completed and the address of the P-CSCF is obtained from HSS/AAA, then the address is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE proceeds to step 3211 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 3206, and performs the IMS registration process in the IMS. registered.
- the seventeenth embodiment of the present invention is substantially the same as the sixteenth embodiment, except that in the sixteenth embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is provided by the HHS. /AAA Server is available.
- steps 3301 to 3305 are similar to steps 3201 to 3205, and are not described herein again.
- step 3306 the PDG interacts with the AAA Server Proxy in the visited network, and is visited by the visited network.
- the AAA Server Proxy allocates the service address of the UE.
- Step 3307 - Step 3311 is similar to Step 3207 - Step 3211, and details are not described herein again.
- the eighteenth embodiment of the present invention is substantially the same as the sixteenth embodiment, except that in the sixteenth embodiment, the service address of the UE is provided by the PDG.
- the service address of the UE is SAE. Provided by Anchor.
- steps 3401 to 3405 are similar to steps 3201 to 3205, and are not described herein again.
- step 3406 a secure tunnel is established from the PDG to the SAE Anchor in the visited network.
- the PDG sends a bearer setup request to the SAE Anchor in the home network by using the S AE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- step 3408 after receiving the bearer setup request, the SAE Anchor in the home network allocates the service address of the UE.
- step 3409 the SAE anchor in the home network sends a bearer setup response to the PDG through the SAE anchor in the visited network, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 3410, step 3411 is similar to step 3210 and step 3211, and details are not described herein again.
- the UE is in a "Local Breakout" roaming scenario, and the non-3GPP defined access system currently accessed by the UE is an IWLAN, and the IWLAN is trusted for the SAE system, and the GW connected to the IWLAN is a PDG.
- the service address of the UE is provided by the PDG.
- step 3601 the UE accesses the IWLAN access system.
- step 3602 the process proceeds to step 3602, and the UE queries the address of the available PDG.
- the specific query method is the same as that in the prior art, and details are not described herein again.
- step 3603 the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- step 3605 the HSS/AAA Server in the home network authenticates the UE, and returns the result to the PDG through the AAA Server Proxy in the visited network, and also returns the QoS related information that the UE carries by default. If the system requires the UE to perform IMS registration after the registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- step 3606 the PDG allocates a service address to the UE.
- the PDG sends a bearer setup request to the SAE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the visited network sends a bearer setup response to the PDG indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, where the response carries the service address allocated for the UE. If the system confirms in step 3605 that the UE needs to perform IMS registration after the registration is completed and the address of the P-CSCF is obtained from the HSS/AAA, the address is carried in the response at the same time.
- the UE After receiving the bearer setup response from the GW, if the UE still needs to perform IMS registration, the UE proceeds to step 3610 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 3606, in the IMS. registered.
- the twentieth embodiment of the present invention is substantially the same as the nineteenth embodiment, except that in the nineteenth embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is provided by the HHS. /AAA Server is available.
- steps 3701 to 3705 are similar to steps 3601 to 3605, and are not described herein again.
- step 3706 the PDG communicates with the AAA Server Proxy in the visited network, and the service address of the UE is allocated by the AAA Server Proxy in the visited network.
- Step 3707 - Step 3710 is similar to Step 3607 - Step 3610, and details are not described herein again.
- the twenty-first embodiment of the present invention is substantially the same as the nineteenth embodiment, except that in the nineteenth embodiment, the service address of the UE is provided by the PDG. In the present embodiment, the service address of the UE is Provided by SAE Anchor.
- steps 3801 to 3805 are similar to steps 3601 to 3605, and are not described herein again.
- step 3806 the PDG sends a bearer setup request to the SAE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- step 3807 after receiving the bearer setup request, the SAE Anchor in the visited network allocates the service address of the UE.
- step 3808 the SAE anchor in the visited network sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 3809 and step 3810 are similar to steps 3609 and 3610, and are not described herein again.
- the application scenario of the twenty-second embodiment of the present invention is substantially the same as that of the nineteenth embodiment.
- the UE is also in the "Local Breakout" roaming scenario, the non-3GPP access system is also the IWLAN, and the gateway is also the PDG, and the service address of the UE is also The PDG provides the difference that IWLAN is untrustworthy for the SAE system.
- the system architecture of this embodiment is the same as that of the nineteenth embodiment, as shown in FIG. 35, in which how the combinations of MME, UPE, PDG, 3GPP Anchor and SAE Anchor are undecided.
- step 3901 the UE accesses the IWLAN access system.
- the UE queries the address of the available PDG.
- the UE initiates a bearer setup request to the available PDG.
- the PDG initiates an authentication authentication request to the HSS/AAA Server in the home network by using the AAA Server Proxy in the visited network instead of the UE.
- the HSS/AAA Server in the home network authenticates the UE, and returns the result to the PDG through the AAA Server Proxy in the visited network, and also returns the QoS related information of the default bearer of the UE. If the system requires the UE to perform IMS registration after the registration is completed, the HSS/AAA also needs to return the address of the P-CSCF and use the corresponding standard bit to indicate that IMS registration is required.
- step 3906 the PDG allocates a service address to the UE
- step 3907 proceed to establish a secure tunnel from the PDG to the SAE Anchor in the visited network.
- step 3908 the PDG sends a bearer setup request to the SAE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- step 3909 the SAEAnchor in the visited network sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated.
- the PDG sends a bearer setup response to the UE, and carries the service address allocated for the UE in the response. If the system confirms in step 3905 that the UE needs to perform IMS registration after the registration is completed and the address of the P-CSCF is obtained from the HSS/AAA, the address is carried in the response at the same time.
- the UE After the UE receives the bearer setup response from the GW, if the IMS registration is still required, the UE proceeds to step 3911 after the SAE registration is completed, and initiates an IMS registration process for the UE to allocate the service address in step 3906, and performs the IMS registration process in the IMS. registered.
- the twenty-third embodiment of the present invention is substantially the same as the twenty-second embodiment, except that in the twenty-second embodiment, the service address of the UE is provided by the PDG; The address is provided by HHS/AAA Server.
- step 4001 to step 4005 are similar to steps 3901 to 3905, and are not described herein again. . '
- step 4006 the PDG interacts with the AAA Server Proxy in the visited network, and is visited by the visited network.
- the AAA Server Proxy allocates the service address of the UE.
- Step 4007 - Step 4011 is similar to Step 3907 - Step 3911, and details are not described herein again.
- the twenty-fourth embodiment of the present invention is substantially the same as the twenty-second embodiment, except that in the twenty-second embodiment, the service address of the UE is provided by the PDG.
- the service of the UE is Address by SAE
- steps 4101 to 4105 are similar to steps 3901 to 3905, and are not described herein again.
- step 4106 a secure tunnel is established from the PDG to the S AE Anchor in the visited network.
- the PDG sends a bearer setup request to the SAE Anchor in the visited network, where the QoS parameters of the default bearer of the UE are carried.
- the SAE Anchor in the visited network allocates the service address of the UE.
- step 4109 the SAE anchor in the visited network sends a bearer setup response to the PDG, indicating that the corresponding resource has been successfully allocated, and the service address of the allocated UE is sent to the PDG through the response.
- Step 4110 and step 4111 are similar to steps 3910 and 3911, and are not described herein again.
- the present invention can also be applied to other non-3GPP access systems, such as microwave access.
- WiMAX Worldwide Interoperability for Microwave Access
- 3GPP2 3GPP2 access system
- Asymmetric Digital Subscriber Line ADSL
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention concerne un procédé destiné à un terminal utilisateur accédant à un système de télécommunication, et le système de télécommunication correspondant. Le procédé comprend les opérations suivantes : le côté réseau établit une porteuse par défaut pour l'EU dont l'accès s'effectue via le réseau d'accès non-3GPP au cours de l'enregistrement côté réseau. L'accès de l'utilisateur via le réseau d'accès non-3GPP peut être activé pour posséder la fonction“online forever”(constamment en ligne). Pour différents scénarios, la porteuse par défaut peut être établie pour l'EU auquel l'accès s'effectue via le réseau d'accès non-3GPP par l'élément d'ancrage SAE (system architecture evolution / évolution d'architecture système) du réseau de rattachement et/ou du réseau visité. Si le réseau d'accès non-3GPP destiné à accéder à l'EU n'est pas fiable, un tunnel sécurisé est établi entre la passerelle du réseau d'accès non-3GPP et l'élément d'ancrage SAE pour garantir la sécurité des informations. Il est recommandé d'attribuer une adresse de service à l'EU au cours de l'enregistrement, puis l'enregistrement IMS peut être lancé après l'enregistrement.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101065475A CN101106812B (zh) | 2006-07-11 | 2006-07-11 | 通信网络及用户设备接入方法 |
CN200610106547.5 | 2006-07-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008009227A1 true WO2008009227A1 (fr) | 2008-01-24 |
Family
ID=38956545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/070252 WO2008009227A1 (fr) | 2006-07-11 | 2007-07-06 | Procédé destiné à un terminal utilisateur accédant à un système de télécommunication, et système de télécommunication correspondant |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101106812B (fr) |
WO (1) | WO2008009227A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101210245B1 (ko) | 2008-05-05 | 2012-12-10 | 차이나 아카데미 오브 텔레커뮤니케이션즈 테크놀로지 | 비(non)-3GPP액세스시스템 신뢰 유형의 획득방법, 시스템 및 장치 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101557610B (zh) * | 2008-04-11 | 2012-09-05 | 华为技术有限公司 | 承载处理方法、系统和装置 |
US20110099097A1 (en) * | 2008-06-05 | 2011-04-28 | Johan Svedberg | Charging for services in a communication network |
CN101808101B (zh) * | 2010-04-20 | 2013-01-09 | 华为技术有限公司 | 子网间的通信方法、装置及系统 |
CN102469124B (zh) * | 2010-11-09 | 2015-08-12 | 中兴通讯股份有限公司 | 基于aog的移动互联网业务的实现方法、网关、代理及系统 |
CN103581312B (zh) * | 2010-11-09 | 2017-01-18 | 中兴通讯股份有限公司 | 基于aog的移动互联网业务的实现方法、网关、代理及系统 |
CN104506406B (zh) * | 2011-11-03 | 2018-10-30 | 华为技术有限公司 | 一种鉴权认证设备 |
WO2013063783A1 (fr) * | 2011-11-03 | 2013-05-10 | 华为技术有限公司 | Procédé et dispositif de gestion de canal de sécurité de données |
CN103916854A (zh) | 2013-01-08 | 2014-07-09 | 中兴通讯股份有限公司 | 一种无线局域网络用户接入固定宽带网络的方法和系统 |
CN106470465B (zh) * | 2015-08-19 | 2021-05-04 | 中兴通讯股份有限公司 | Wifi语音业务发起方法、lte通信设备、终端及通信系统 |
EP3573360B1 (fr) * | 2017-02-15 | 2022-11-30 | Huawei Technologies Co., Ltd. | Procédé de transmission de données de type "local breakout" |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1645960A (zh) * | 2004-02-02 | 2005-07-27 | 华为技术有限公司 | 无线局域网用户终端重新选择运营网络的交互方法 |
WO2005122457A2 (fr) * | 2004-06-02 | 2005-12-22 | Interdigital Technology Corporation | Configuration d'un equipement d'utilisateur de reseau local sans fil d'interconnexion afin d'acceder a un systeme 3gpp |
WO2006059931A1 (fr) * | 2004-12-03 | 2006-06-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Procede et systeme permettant la mise en oeuvre d'une gestion de regles locales sblp dans un systeme integre wlan-gsm/3g |
-
2006
- 2006-07-11 CN CN2006101065475A patent/CN101106812B/zh not_active Expired - Fee Related
-
2007
- 2007-07-06 WO PCT/CN2007/070252 patent/WO2008009227A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1645960A (zh) * | 2004-02-02 | 2005-07-27 | 华为技术有限公司 | 无线局域网用户终端重新选择运营网络的交互方法 |
WO2005122457A2 (fr) * | 2004-06-02 | 2005-12-22 | Interdigital Technology Corporation | Configuration d'un equipement d'utilisateur de reseau local sans fil d'interconnexion afin d'acceder a un systeme 3gpp |
WO2006059931A1 (fr) * | 2004-12-03 | 2006-06-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Procede et systeme permettant la mise en oeuvre d'une gestion de regles locales sblp dans un systeme integre wlan-gsm/3g |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101210245B1 (ko) | 2008-05-05 | 2012-12-10 | 차이나 아카데미 오브 텔레커뮤니케이션즈 테크놀로지 | 비(non)-3GPP액세스시스템 신뢰 유형의 획득방법, 시스템 및 장치 |
Also Published As
Publication number | Publication date |
---|---|
CN101106812B (zh) | 2011-11-02 |
CN101106812A (zh) | 2008-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3030741C (fr) | Procede de traitement d'une procedure d'etablissement de session pdu et noeud amf | |
WO2008009227A1 (fr) | Procédé destiné à un terminal utilisateur accédant à un système de télécommunication, et système de télécommunication correspondant | |
US20220225263A1 (en) | Interworking function using untrusted network | |
US8315227B2 (en) | GTP for integration of multiple access | |
EP3477993A1 (fr) | Procédé de traitement d'une procédure d'établissement de session pdu et noeud amf | |
WO2014048294A1 (fr) | Procédé de commande de flux de données et appareil et système de communication correspondants | |
JP2009510858A (ja) | 拡張システム・アーキテクチャにおけるポリシ制御 | |
KR20070058614A (ko) | 이종 네트워크에서 상호 작업을 위한 고속 컨텍스트 확립 | |
WO2009000124A1 (fr) | Procede de selection de passerelle dans un reseau sans fil | |
WO2009043210A1 (fr) | Procédé servant à sélectionner une passerelle de réseau radio | |
WO2015196396A1 (fr) | Procédé d'établissement d'une connexion de réseau, passerelle et terminal | |
WO2013017098A1 (fr) | Procédé, dispositif et système pour l'accès d'un équipement utilisateur à un réseau fédérateur de transmission par paquets évolué | |
CA2523915A1 (fr) | Methode pour resoudre et acceder a un service selectionne dans un reseaulocal sans fils | |
WO2011147074A1 (fr) | Procédé, système et dispositif associé pour la mise en œuvre d'un contrôle de politique et de tarification | |
WO2019225326A1 (fr) | Dispositif utilisateur, dispositif de commande et procédé de commande de communication | |
WO2009046666A1 (fr) | Procédé d'adressage d'entité à fonction de décision de politique, élément de réseau et système de réseau | |
WO2008022597A1 (fr) | Procédé et dispositif pour transfert intercellulaire de terminal procédé et dispositif permettant d'obtenir l'adresse d'une entité d'accès d'origine | |
WO2008154874A1 (fr) | Procédé et système permettant d'établir un tunnel dans le réseau en évolution | |
WO2009135371A1 (fr) | Procédé de détermination de mode de connexion de réseau | |
WO2014101755A1 (fr) | Procédé et système de dérivation de données de service | |
TW201043052A (en) | Apparatus and method for selecting IP services | |
WO2007073654A1 (fr) | Procede de gestion ip mobile et systeme de reseau correspondant | |
CN1845523B (zh) | 互通无线局域网中实现服务质量协商的方法 | |
WO2010091589A1 (fr) | Procédé d'authentification de sécurité | |
WO2014169781A1 (fr) | Procédé et système de fermeture de connexion par un utilisateur |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07764180 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07764180 Country of ref document: EP Kind code of ref document: A1 |