摘要:
The current invention relates to a method for a network attachment procedure and a user equipment in a wireless mobile network, the wireless mobile network comprising a user equipment with a temporary identity and at least one mobility management entity. The method comprises the steps of providing an estimation whether the user equipment is unknown at the mobility management entity and sending the user equipment's temporary identity during the network attachment procedure. If the user equipment has been estimated to be unknown at the at least one mobility management entity, the user equipment's identity is sent during the network attachment procedure. These steps are carried out by the user equipment.
摘要:
Disclosed is a technique to enable a user equipment at a remote place to perform local IP access to a locally-accessible network with simpler procedure and such a configuration while achieving the efficiency of costs and facility. According to the technique, a network (LIA-PDN 161) capable of dealing with a local IP access by a user equipment (UE 101) is placed on a core network 141. When the UE establishes a PDN connection with the LIA-PDN, the UE simultaneously transmits information concerning the LIA domain network 111 as well, to which the UE wants a local IP access. On the basis of this information, the LIA-PDN establishes a PDN connection with the LIA domain network, and the LIA-PDN transfers a packet, whereby the UE can access the LIA domain network via these PDN connections.
摘要:
The present invention discloses a technique for providing a packet recovery method, and the like, capable of starting packet recovery processing without waiting for a wasteful latency (time-out) at a mobile terminal by giving notice of information on a packet discard in a gateway device in real time, thereby enabling improvement in communication quality and communication efficiency. According to the technique, there is provided a packet recovery method for recovering a packet discarded by an intermediate device positioned on a communication path between a mobile terminal and a correspondent node of the mobile terminal among packets exchanged between the mobile terminal and correspondent node, the method including: a step of causing the intermediate device to transmit a discard notification message to the mobile terminal based on information on a communication flow for which transmission of the discard notification message indicating that the packet has been discarded is required; and a step of causing the mobile terminal to transmit the correspondent node a retransmission request message for requesting retransmission of the discarded packet based the discard notification message.
摘要:
The invention relates to a method for ensuring IP session continuity upon a handover of a mobile node to a non-3GPP network, wherein an ongoing IP session of the mobile node goes via a packet data network gateway. For non-3GPP networks it is necessary to discover a security gateway and to then establish the corresponding tunnels to the ePDG to form the new data path; a security tunnel between the mobile node and the security gateway, and an IP tunnel between the packet data network gateway and the security gateway. In order to prepare the handover to possible non-3GPP accesses, the two tunnels are pre-established, however maintained deactivated until their use is actually needed. Accordingly, when handing over to the non-3GPP network, the IP session may be continued without any significant interruption by activating the already established tunnels.
摘要:
Disclosed is a technique to enable a session handover between devices with different key generation functions in an authentication protocol. According to the technique, when a session where a UE (200) receives contents from a contents server (700) is to be handed over to a target node (300), the UE firstly transfers information (session HO information) necessary to the session handover to the target node (Step S1001). The target node performs authentication processing with an authentication server (600) of the network to which the UE is connected and notifies the authentication server of the session HO information transferred from the UE (Step S1003). The authentication server performs authentication for the session handover based on the session HO information, and when the authentication succeeds, the session is handed over from the contents server to the target node, and the contents are distributed to the target node (Step S1005).
摘要:
The current invention relates to a method for a network attachment procedure and a user equipment in a wireless mobile network, the wireless mobile network comprising a user equipment with a temporary identity and at least one mobility management entity. The method comprises the steps of providing an estimation whether the user equipment is unknown at the mobility management entity and sending the user equipment's temporary identity during the network attachment procedure. If the user equipment has been estimated to be unknown at the at least one mobility management entity, the user equipment's identity is sent during the network attachment procedure. These steps are carried out by the user equipment.
摘要:
Provided is a technique to provide a handover processing method that allows a mobile terminal to be handed over seamlessly while preventing occurrence of double reservation. The method includes a step where a mobile terminal (100) decides to connect to a desired access network (113) and detects the possibility of occurrence of a network-initiated handover processing performed by a predetermined device of the communication network as one of the controlling entities, and a step where the mobile terminal transmits a connection request message requesting a connection to the desired access network, the connection request message including information to maintain the connection with the access network with which the mobile terminal is currently connecting, to a base station disposed in the desired access network based on a detection result of the detection step.
摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
A rear-focusing type zoom lens includes in order from an object side: a positive first group that is fixed, a negative second group that is moved toward an image plane along an optical axis during zooming from a wide-angle end to a telephoto end, a negative third group that is fixed in an optical axis direction, and a positive fourth group that moves along the optical axis direction to correct image plane variation, which is caused by the zooming, and to perform focusing. The first group includes a first subgroup having a negative refractive power as a whole and a second subgroup having a positive refractive power as a whole. The first subgroup includes, in order from the object side, a negative meniscus lens having a convex surface directed toward the object side, a first negative lens, a positive lens, and a second negative lens.
摘要:
With the deployment of the Mobile Routers, some of the mobile devices would access the IP services, e.g. Remote Local IP Access (LIPA), via the local connections provided by the Mobile Router. In such cases, the mobile devices may be detached from the 3GPP access, and thus lose the capability of receiving certain services, e.g. CS domain related services. This invention presented a solution to allow the mobile device to continue enjoying the services provided via 3GPP access by placing the mobile device into a special state and binding Mobile Router's context with the mobile device's context. In this way, the mobile operator's core network would be able to trigger the mobile device to receive the CS service even its 3GPP access connections are removed.