Nothing Special   »   [go: up one dir, main page]

CN102821381A - Method and device for accessing and acquiring contexts and identifiers of user equipment - Google Patents

Method and device for accessing and acquiring contexts and identifiers of user equipment Download PDF

Info

Publication number
CN102821381A
CN102821381A CN2012102831227A CN201210283122A CN102821381A CN 102821381 A CN102821381 A CN 102821381A CN 2012102831227 A CN2012102831227 A CN 2012102831227A CN 201210283122 A CN201210283122 A CN 201210283122A CN 102821381 A CN102821381 A CN 102821381A
Authority
CN
China
Prior art keywords
mme
old
context
tmsi
gummei
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012102831227A
Other languages
Chinese (zh)
Inventor
郭小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Huawei Technologies Co Ltd
Original Assignee
Shanghai Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Huawei Technologies Co Ltd filed Critical Shanghai Huawei Technologies Co Ltd
Priority to CN2012102831227A priority Critical patent/CN102821381A/en
Publication of CN102821381A publication Critical patent/CN102821381A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0022Control or signalling for completing the hand-off for data sessions of end-to-end connection for transferring data sessions between adjacent core network technologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/04Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/10Mobility data transfer between location register and external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/005Data network PoA devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method and a device for accessing and acquiring contexts and identifiers of user equipment. The method comprises the following steps: when the user equipment UE is accessed into a system architecture evolution network SAE, an evolution base station eNodeB judges whether global mobile management entity identifiers GUMMEI carried by the UE or mobile management entity group identifiers MMEGI in the GUMMEI are distributed or mapped by the SAE. The method and the device provided by the invention have the advantages that the temporary identifiers carried when the UE is accessed into the network side are distinguished to be distributed or mapped by the network side, so that different access methods are adopted for different temporary identifiers, and flexible application to the temporary identifiers is realized.

Description

Method and device for accessing and acquiring user equipment context and user equipment identification
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for accessing and acquiring a context and an identifier of a user equipment.
Background
Among existing communication networks, there are a conventional 2G (Second Generation) communication network, a 3G (3 rd Generation) communication network, and a Long Term Evolution (LTE)/System Architecture Evolution (SAE) network that merges more advanced technologies. The communication Network generally includes a Radio Access Network (RAN) and a Core Network (CN), and different communication networks may use different Radio Access Technologies (RATs) to enter the CN, that is, different communication networks have different RANs, for example, the RAN of a 3G communication Network is called Universal Terrestrial Radio Access Network (UTRAN), and the RAN of an SAE communication Network is called E-UTRAN, etc.
The RAN is composed of RAN nodes, such as a Radio Network Controller (RNC) and a base station (NodeB) in the UTRAN; the CN is composed of CN nodes, such as SGSN (Serving GPRS Support Node) in UTRAN, or Mobility Management Entity (MME) in E-UTRAN, etc. The MME is configured to store a mobility management Context (Context) of a User Equipment (UE), which is referred to as a UE Context for short, such as a UE identity, a mobility management status, and location information.
In the prior art, one RAN node may route to multiple CN nodes, that is, the RAN node may select a route to a different CN node for the UE initially accessing. The CN nodes form a Pool domain (Pool), and the CN nodes in the Pool in the 2G/3G system, such as SGSN, are identified by Network Resource Identifier (NRI), and the CN nodes in the Pool in the SAE system are identified by Globally Unique Mobility Management Entity Identifier (GUMMEI).
When the UE accesses the communication network, the communication network may assign a Temporary identifier to the UE, for example, the 2G/3G system may assign a Packet Temporary subscriber Identity (P-TMSI)/TMSI to the UE, and the SAE system may assign a Globally Unique Temporary Identifier (GUTI) to the UE, where the GUTI includes a GUMMEI. Since the UE moves in different communication networks, when the UE is switched from an original communication network to a new communication network or from an original CN node to a new CN node, the UE needs to search the original CN node through the NRI/GUMMEI and the temporary identifier of the UE to obtain the context of the UE, so that the UE can be switched quickly. If the communication network is switched, because the RATs adopted by different communication networks are different, when the UE accesses a new communication network from an original communication network, the UE needs to map the identity of the RAT of the original communication network, that is, the identity of the old RAT is accessed to the identity of the RAT of the new communication network, so that the CN node in the original communication network may be found, and the context of the UE may be acquired.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
since the mapped RAT identity is different from the actual RAT identity, the mapped RAT identity may not correspond to the CN node, i.e. a new CN node may not be selected in the new communication network.
In addition, since there are different communication networks, if the new CN node cannot recognize whether the identity of the current RAT is the identity of the real RAT or the identity of the mapped RAT, it is not known what form of RAT is used to acquire the UE context from the original CN node, so that the UE context may not be acquired.
Disclosure of Invention
The embodiment of the invention aims to provide a method and a device for accessing and acquiring a user equipment context and a user equipment identifier, so as to realize flexible application of a temporary identifier.
The embodiment of the invention provides an access method, which comprises the following steps:
when the UE accesses the SAE, a network side node, such as an evolved node b (eNodeB) or a preset central node, determines whether a GUMMEI carried by the UE or a Mobility Management Entity Group Identity (MMEGI) in the GUMMEI is allocated or mapped by the SAE;
if the GUMMEI or MMEGI is allocated by SAE, the eNodeB selects a mobility management Entity MME according to the GUMMEI, or according to the MMEGI and a Mobility Management Entity Code (MMEC), or according to an identity (hereinafter, referred to as PLMN-id) of the selected Public Land Mobile Network (PLMN), MMEGI and MMEC;
if the GUMMEI or MMEGI is mapped, the eNodeB selects an MME according to a Mobile Country Code (MCC), a Mobile Network Code (MNC) and an MMEC in the GUMMEI, or selects an MME according to a selected PLMN-id and an MMEC in the GUMMEI.
The embodiment of the invention also provides an access method, which comprises the following steps:
when UE accesses SAE, MME judges whether GUTI carried by the UE is allocated or mapped by SAE;
if the GUTI is allocated by SAE, the MME uses the GUTI to fetch the context of the UE to an old mobility management entity (old MME);
if the GUTI is mapped, the MME reduces the GUTI into an old Routing Area identifier (old RAI) and a packet Temporary mobile subscriber identifier (P-TMSI), or reduces the GUTI into an old RAI and a Logical link Temporary identifier (TLLI), and obtains the context of the UE from an old serving general packet radio service support node (old SGSN) according to the reduced identifier.
The embodiment of the invention also provides an access method, which comprises the following steps:
when UE accesses SAE, MME maps GUTI carried by the UE into old RAI and P-TMSI, or TLLI and packet temporary mobile subscriber identity Signature (P-TMSI Signature) form;
the MME uses the mapped old RAI and P-TMSI, or TLLI and P-TMSI Signature to obtain the context of the UE from the old MME or the old SGSN;
and the old MME reduces the old RAI and the P-TMSI, or the old RAI, the TLLI and the P-TMSISignature into GUTI, and returns the context of the UE to the MME according to the GUTI obtained by reduction.
The embodiment of the invention also provides an access method, which comprises the following steps:
when the user equipment UE accesses the system architecture evolution network SAE,
if the old node is MME, the MME uses the GUTI to fetch the context of UE from an old mobility management entity old MME;
if the old node is Gn/Gp SGSN, the MME reduces the GUTI into an old routing area identifier (old RAI) and a packet temporary mobile subscriber identifier (P-TMSI), or into a logical link temporary identifier (TLLI); and using the reduced identifier to fetch the context of the UE from the old SGSN; if the old node is S4SGSN, the MME uses the GUTI to fetch the context of the UE from old SGSN; and the old SGSN reduces the GUTI into an old RAI and a P-TMSI, or into an old RAI/TLLI identifier, and returns the identifier to the MME after finding the context of the UE.
The embodiment of the invention also provides an access method, which comprises the following steps:
when UE accesses a 2G/3G network, SGSN searches a corresponding old entity address according to old RAI and P-TMSI carried by the UE or TLLI, and obtains the context of the UE from the old entity;
if the old entity is an old MME, the old MME restores the old RAI and the P-TMSI, or restores the TLLI and the P-TMSI Signature to GUTI, and returns the found context of the UE to the SGSN.
The embodiment of the invention also provides an access method, which comprises the following steps:
when UE accesses a 2G/3G network, an SGSN searches whether a corresponding old entity is an old SGSN or an old MME according to old RAI and P-TMSI carried by the UE, or according to whether TLLI and P-TMSI Signature carried by the UE are allocated by 2G/3G or mapped;
if the old entity is old MME if old RAI and P-TMSI carried by the UE or TLLI and P-TMSI Signature are mapped, the SGSN restores GUTI according to the old RAI and P-TMSI or TLLI/P-TMSI Signature, and the context of the UE is acquired from the old MME by the GUTI; the old MME finds out the UE context according to the GUTI and returns the UE context to the SGSN;
if the old entity is old SGSN, and the old entity uses old RAI and P-TMSI, or TLLI to fetch UE context from old SGSN, if the old RAI and P-TMSI carried by UE are 2G/3G distributed.
The embodiment of the invention also provides a method for acquiring the context of the UE, which comprises the following steps:
when the Temporary identifier indicated by the Temporary Identifier (TIN) used for Next update is consistent with the Additional Temporary identifier, the UE only carries the Temporary identifier indicated by the TIN for access;
and the access node finds the UE context through the temporary identifier indicated by the TIN carried by the UE.
The embodiment of the invention also provides a method for acquiring the context of the UE, which comprises the following steps:
in Tracking Area Update (TAU) or Routing Area Update (RAU) in the handover process, the UE only needs to carry the TMSI of the RAT system or not carry any TMSI, and finds the UE context through the connection established by the target side.
The embodiment of the invention also provides a method for acquiring the UE identification, which comprises the following steps:
in the UE initiated Attach (Attach) procedure,
if the UE has the temporary identifier of the RAT, carrying the temporary identifier, and the access entity searching a corresponding node through the temporary identifier to obtain an International Mobile Subscriber Identity (IMSI) and security parameters of the UE;
if the UE does not have the temporary identifier of the access RAT but has the temporary identifier of the other RAT, the temporary identifier of the other RAT is carried, and the access entity searches the corresponding node through the temporary identifier of the other RAT to acquire the IMSI and the security parameters of the UE.
The embodiment of the invention also provides a network side device, which comprises the following modules,
an identifier attribute obtaining module, configured to obtain an attribute of a temporary identifier of a UE currently accessing to a network side, where the attribute of the temporary identifier of the UE is that the UE identifier is allocated or mapped by the network side;
and the network resource node distribution module is used for distributing network resource nodes for the UE according to the attribute of the temporary identifier of the UE.
When User Equipment (UE) accesses an evolution network (SAE) of a system architecture, the UE carries a temporary mobile user identification (S-TMSI, which consists of MMEC and M-TMSI) of the SAE network in a Radio Resource Control (RRC) connection establishment request message sent to an evolved node B eNodeB, if the UE carries a 2G/3G identification to access the SAE/LTE system, the S-TMSI is actually mapped by NRI and RAC and part of P-TMSI), and does not carry a Globally Unique Mobility Management Entity Identification (GUMMEI) in an RRC connection establishment completion message sent to the eNodeB; the eNodeB selects a corresponding MME according to the received S-TMSI, and if the corresponding MME does not exist, the eNodeB selects a new MME.
The embodiment of the invention distinguishes the temporary identification carried when the UE is accessed to the network side as the temporary identification which is distributed or mapped by the network side, thereby adopting different access methods aiming at different temporary identifications and realizing the flexible application of the temporary identification.
Drawings
Fig. 1 is a flowchart illustrating an access method according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating an access method according to a third embodiment of the present invention;
fig. 3 is a flowchart illustrating an access method according to a fourth embodiment of the present invention;
fig. 4 is a flowchart illustrating an access method according to a fifth embodiment of the present invention;
fig. 5 is a flowchart illustrating an access method according to a sixth embodiment of the present invention;
fig. 6 is a flowchart illustrating an access method according to a seventh embodiment of the present invention;
fig. 7 is a schematic structural diagram of a network-side device in an embodiment of the present invention;
fig. 8 is a schematic diagram of a network scenario according to a first embodiment of the present invention;
FIG. 9 is a flowchart illustrating a method for accessing an SAE/LTE network by a UE using a TA registered case according to a second embodiment of the present invention;
FIG. 10 is a flowchart of a method for accessing an SAE/LTE network by a UE using a TA not registered case according to a second embodiment of the present invention.
Detailed Description
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
In a first embodiment, this embodiment provides a method for distinguishing a Location Area Code (LAC) from an MMEGI, for example, setting the value of a bit in the LAC to be different from the value of a corresponding bit in the MMEGI may distinguish the LAC from the MMEGI. For example, the first bit of the MMEGI is 1, the first bit of the LAC is 0, and the bits are called flag bits for distinguishing the MMEGI from the LAC, but other bits may be used as the distinguishing flag bits. Thus, when the UE accesses the eNodeB through the mapped GUTI in the old RAI and P-TMSI of the 3G network or the old RAI and TLLI of the 2G communication network, the eNodeB knows that the UE uses the real GUTI access through the differentiation. For example, the eNodeB acquires whether the GUTI allocated by the SAE is the GUTI or the mapped GUTI is used, and as described above, the old RAI and the P-TMSI (or the old RAI and the TLLI) mapped GUTI access. When the mapped GUTI is carried by the UE, the eNodeB selects an MME corresponding to the MMEC mapped by the NRI, where the MME may not be an MME originally registered by the UE, or the MME corresponding to the MMEC mapped by the NRI is used, and the MME is a node or an integrated node allowed by Idle mode Signaling Reduction (ISR) or a configured node, and then selects the node.
Referring to fig. 1, in the process of accessing SAE, the UE carries GUMMEI information in a Radio Resource Control (RRC) part, that is, the RRC part in a tracking area update Request (TAU Request) message sent by the UE to the eNodeB carries GUMMEI information, and the eNodeB checks whether GUMMEI is mapped GUMMEI or SAE-allocated GUMMEI, and if the GUMMEI is allocated for SAE, the eNodeB determines an MME according to all information in GUMMEI, MCC + MNC + MMEGI + MMEC, or the eNodeB does not find the corresponding GUMMEI and reselects the MME, and if there is an MME corresponding to MCC + MNC + MMEGI + MMEC or MMEGI + MMEC, selects the MME whose GUMMEI is consistent with the GUMMEI carried by the UE or MMEGI + mmei corresponds to mmemi. If there is no MME corresponding to MCC + MNC + MMEGI + MMEC or MMEGI + MMEC, the eNodeB reselects the MME. If the GUMMEI is the mapped GUMMEI, the eNodeB determines the MME according to MCC + MNC + MMEC in the GUMMEI or according to MMEC only, specifically, if there is an MME, the MCC, MNC, MMEC of the MME is consistent with the MCC, MNC, MMEC carried by the UE (mapped by NRI) or the configuration is optional, for example: and the eNodeB configures MMEC or NRI corresponding to a certain MME, selects the MME, and reselects an MME if the MMEC or NRI corresponds to the MME.
Or, if the UE identifies the identifier to be carried according to the identifier that the UE will carry during the SAE access procedure, for example, by using TIN (temporal Identity used in Next update, Temporary identifier needed to be used Next time), if TIN = "P-TMSI", it indicates that the Next access needs to carry the identifier after P-TMSI/old RAI mapping, if TIN = "GUTI", it indicates that the Next access carries the identifier of SAE, and if TIN = "RAT-related TMSI", it indicates that the Next access is to the TMSI allocated by that RAT. Therefore, if the TIN = 'P-TMSI' of the UE, the UE can access the network by carrying not the mapped GUMMEI in the RRC part, but by carrying S-TMSI (consisting of MMEC and M-TMSI, actually mapped by NRI and RAC and part of P-TMSI) in the RRC part, so that the eNodeB does not get MMEGI, and the eNodeB will select MME according to the MMEC (mapped by NRI) therein. Of course, if there is an MOCN, the eNodeB selects an MME according to Selected PLMN-id (Selected PLMN-id) information in addition to the MME according to MMEC in the S-TMSI, that is, the eNodeB selects a mobility management entity MME according to the Selected PLMN-id, MMEGI, and MMEC, specifically, if MCC and MNC in GUMMEI of the MME are the same as the Selected PLMN-id carried by the UE, and at the same time, the MMEC carried by the MMEC and the UE are the same, the network side node selects the MME. In addition, the UE needs to carry the mapped GUTI in the Non Access Stratum (NAS) part, so that the MME can acquire the context from the old SGSN. Or, the eNodeB configures an LAC list, and when the eNodeB finds that the MMEGI belongs to one of the LAC list and the LAC list, selects a corresponding MME, for example, when the eNodeB finds that the GUMMEI carried by the UE is consistent with an identifier of a certain MME configured in the eNodeB, selects the corresponding MME, otherwise, if there is no corresponding MME, performs a new MME selection; the GUMMEI identifier of the MME actually consists of PLMN-id + LAC + NRI mapping. For example, Pool of SAE overlaps Pool of 2G/3G, where there is an MME/SGSN unification node, there are RAI1, RAI2, RAI3, and three Routing areas (RA, Routing Area) under the Pool of 2G/3G, when the UE moves from 2G/3G network to SAE network and accesses, the UE uses old RAI/P-TMSI mapped GUTI access, the eNodeB finds the UE uses mapped GUTI according to the configured information, and the RA before mapping belongs to one of RAI1, RAI2, and RAI3, the eNodeB selects the corresponding MME according to MCC + MNC + MMEC (mapped by NRI) or MMEC, and it is not necessary that the MCC, MNC, MMEGI, and MMEC are all consistent to select MME. If there is no corresponding MME that meets the above description, e.g. does not belong to one of the configured RAIs, then one MME is reselected.
The eNodeB configures the LAC list in the following way.
The MME maps the configured LAC to GUMMEI and sends it to the eNodeB through S1 CONFIGURATION RESPONSE (S1 SETUP RESPONSE) message or MME CONFIGURATION UPDATE (CONFIGURATION UPDATE) message, and the eNodeB records the S1SETUP RESPONSE message or MME CONFIGURATION UPDATE message and stores it in the CONFIGURATION information, i.e., LAC list. The following will be described by way of example.
For example, in fig. 8, Pool1 includes SGSN Pool and MME Pool, SGSN1, SGSN2, MME1, MME2, etc. are all nodes in Pool1, there is also MME/SGSN unified node SGSN3/MME3 in Pool1, LAC1, LAC2, LAC3, LAC4, etc. in fig. 8 are location area codes in 2G/3G network, respectively, and TA1, TA2, TA3, TA4, etc. are tracking areas of SAE network, respectively; from the perspective of the SAE system, the GUMMEI of the SGSN3/MME3 is PLMN-id (PLMN Identity, PLMN id, where the PLMN-id is MCC + MNC) + MMEGI (i.e. id of MME Pool) + MMEC (i.e. id of MME3 in MME Pool), in order to allow the SGSN registered to the integration node, i.e. the UE on the SGSN3 can also select the integration node when entering the SAE area from the 2G/3G area, the MME3 may also configure all LACs in the SGSN3 Pool into the eNodeB to form an LAC list, the method is as follows:
for each LAC in Pool1, MME3 forms a GUMMEI corresponding to PLMN-id + LAC + NRI (i.e. NRI configured by the unification node to SGSN, i.e. SGSN3, is generally equal to MMEC configured by the unification node to MME), so MME3 may form several GUMMEI. The MME3 sends a list of true GUMMEI (identities in SAE) and mapped GUMMEI (there are several GUMMEI for each LAC in Pool 1) to eNodeB through S1SETUP RESPONSE message or MME CONFIGURATION UPDATE message, and eNodeB stores the GUMMEI list (or LAC list because each LAC has a corresponding GUMMEI), so that when UE registered to SGSN3 enters E-UTRAN area from LAC in Pool1, e.g. LAC1 or LAC2, and when eNodeB is accessed, the eNodeB can know that the GUMMEI corresponds to MME3 by querying the list of true GUMMEI and mapped GUMMEI that stored before, and selecting directly MME node 3, because UE accesses the list of that identity is GUMMEI (mapped by PLMN-id + LAC1+ NRI) carried by UE.
The above CONFIGURATION method has a disadvantage that due to the requirement of integrating nodes and ISRs, one MME may have a large number of mapping gummis, because the MME correspondingly forms one MMEGI to each LAC in Pool, and even the MME may also configure one MMEGI to each LAC in the neighboring SGSN Pool to meet the requirement of ISR, therefore, in the S1SETUP RESPONSE message or MME CONFIGURATION UPDATE message, a large number of gummis may need to be carried.
Currently, the S1SETUP RESPONSE message and MME CONFIGURATION UPDATE message are used to carry the GUMMEI list in the following way, see table one, where other cells are omitted from the table for the convenience of description.
Table one:
IE/Group Name (information element Name) ......
Service GUMMEIs (service GUMMEI list) ......
>GUMMEI (GUMMEI value) ......
As shown in table one, the complete GUMMEI list, i.e. the service GUMMEI list, is carried in the S1SETUP RESPONSE message or the MME configuration update message. In addition, when the SGSN Pool adds/deletes/modifies LACs, the MME resends all GUMMEI lists to each eNodeB via an mmeconfigulingtate message. Due to the large GUMMEI list and the large number of enodebs, more information is inevitably transmitted in the network, and the signaling traffic in the network is increased, i.e., the overhead of the network is increased. For example, if there are 10 MMEs and 200 enodebs in a Pool, then when the related LAC changes, each MME is required to send a MMECONFIGURATION UPDATE message to each eNodeB, which means that there will be 2000 CONFIGURATION UPDATE messages transmitted on the S1 interface, and each message contains all the GUMMEI lists (both updated and non-updated needs to be sent). To avoid this, the following configuration method may also be adopted in the embodiment of the present invention.
(1) In order to reduce the size of configuration messages such as S1SETUP RESPONSE message or MME configuration UPDATE message, so that configuration messages such as S1SETUP RESPONSE message or MME configuration UPDATE message do not need to carry a large number of GUMMEI lists, GUMMEI may be decomposed, and then lists respectively formed by each component of GUMMEI are sent, that is, configuration messages about LAC lists sent by MME are sent to eNodeB, where the configuration messages about LAC lists carry PLMN-id lists, MMEGI lists, and MMEC lists, specifically as follows:
since the MME forms a corresponding GUMMEI for each LAC in Pool, the eNodeB configuration LAC list may also be actually regarded as the GUMMEI list configured on the eNodeB, and since the GUMMEI is composed of PLMN-id + MMEGI + MMEC, if the GUMMEI is formed by the mapping method, the GUMMEI is actually valued as PLMN-id + LAC + NRI. Generally the values of MMEC and NRI are the same, and the values of PLMN-id are also the same, so there is much of the same content in GUMMEIlist. Therefore, as shown in table two, the GUMMEI list can be changed into a form of PLMN-id (i.e. PLMN Identity)/PLMN-id list + MMEGI list + MMEC/MMEC list, where PLMN-id list refers to PLMN-id list, MMEGI list refers to MMEG list, and MMEC list refers to MMEC list;
table two:
Figure BDA00001994081600111
in general, the values of PLMN-id and MMEC in the GUMMEI list are the same, and only the value of MMEGI is different, so that the GUMMEI list is sent in the form of PLMN-id + MMEGI list + MMEC, which can save a lot of repeated sending of PLMN-id and MMEC, and certainly, in the case of supporting multiple PLMNs, PLMN-id can be changed to PLMN-id list, and similarly, MMEC can be changed to mmeci list. After receiving the changed list, the eNodeB stores and automatically combines the list into a GUMMEI list according to the information of the PLMN-id, the MMEGI list, the MMEC and the like in the list, thereby completing the configuration of the LAC list.
For example, the PLMN-id is currently 3 bytes, the MMEGI is 2 bytes, and the MMEC is 1 byte. If one MME Pool supports 3 PLMNs, the MME Pool needs to configure 100 MMEGI and one MMEC, where the 100 MMEGI include 1 real MMEGI and 99 LAC mapped MMEGI). Then if the size of the GUMMEI list is as follows according to the original configuration method: 3 × 100 (3+2+1) =1800 byte. By using the method, the current GUMMEI list consists of PLMN-idlist, MMEGI list and MMEC list, and the occupied size is as follows: 3 × 3(PLMN-list) +100 × 2(MMEGI list) +1 × 1(MMEC list) =210 bytes. It can be seen that the existing GUMMEI list occupies a greatly reduced space.
(2) In order to solve the problem that when the LAC or the GUMMEI changes, the MME needs to send all GUMMEI lists to the eNodeB, which causes excessive information to be transmitted in the network, the embodiment of the present invention proposes that when the LAC or the GUMMEI changes, the MME sends an indication message to the eNodeB, where the indication message indicates that the eNodeB adds/modifies/deletes the GUMMEI in the LAC list, for example, an indication is carried in an MME CONFIGURATION UPDATE message sent by the MME to the eNodeB, where the indication indicates the change condition of the LAC or the GUMMEI, i.e., whether one or several GUMMEI are added or the GUMMEI is modified or the GUMMEI is deleted, etc. The modified MMECONFIGURATION UPDATE message can be seen in Table III;
table three:
Figure BDA00001994081600121
Figure BDA00001994081600131
of course, it is also possible to directly indicate in the message to add, or delete, or modify a GUMMEI without having the MME send other GUMMEI that is not changed to the eNodeB as well, for example, as follows:
when the MME needs to add a GUMMEI, it may send a new GUMMEI UPDATE (new GUMMEI, behavor = 'add') message to the eNodeB, where "new GUMMEI" indicates an identifier (ID, Identity) of the GUMMEI that needs to be added, "behavor = 'add' indicates that the GUMMEI needs to be added to the original LAC list, and" behavor "is an Information Element (IE, Information Element), and its value indicates a specific action, so that when the MME receives the CONFIGURATION UPDATE (new GUMMEI, behavor = 'add') message, the MME adds a GUMMEI to the original LAC list;
when an MME wants to delete a GUMMEI, the MME may send a MME configuration update data (GUMMEI, modify ') message to the eNodeB, where "GUMMEI" indicates that an ID of a GUMMEI in an original LAC list is to be deleted, and "modify ═ modify'" indicates that the GUMMEI needs to be deleted, and when the eNodeB receives the message, the eNodeB deletes the corresponding GUMMEI in the original LAC list according to the message;
when the MME wants to modify a GUMMEI, an MME configuration update (new GUMMEI, behavior = 'modification') message may be sent to the eNodeB, where "behavior = 'modification'" indicates that the GUMMEI in the original LAC list needs to be modified, "GUMMEI" indicates the ID of the GUMMEI that needs to be modified, "new GUMMEI" indicates the ID of the GUMMEI that needs to be modified, that is, the ID of the GUMMEI corresponding to the "GUMMEI" in the original LAC list needs to be modified to "new GUMMEI".
Of course, an IE such as "behavior" may not be carried, and for example, actions, i.e., "update GUMMEI" and "new GUMMEI" may be indicated by "updated GUMMEI" and "new GUMMEI", where "updated GUMMEI" indicates that the original GUMMEI is to be updated and new GUMMEI indicates that a new GUMMEI needs to be added; thus, if updated GUMMEI has no value or is not carried, and new GUMMEI =5, it indicates that a GUMMEI with id 5 is to be added; if updated GUMMEI =5 and new GUMMEI has no value or is not carried, it indicates that GUMMEI with id 5 is to be deleted; if updated GUMMEI =5 and new GUMMEI =10, it indicates that the GUMMEI to be modified with GUMMEI equal to 5 is changed to 10.
(3) Of course, in order to further reduce the number of messages sent by the MME to the eNodeB when the LAC or GUMMEI changes, and reduce the signaling traffic between the MME and the eNodeB, another method may be adopted, as follows:
all configuration information is collected on a preset central node, which may be a preset eNodeB, a preset MME, or the like, and the central node has all MME configuration information, and if the configuration information of a certain MME changes, the central node sends a configuration message to all enodebs, for example, sends an S1SETUP RESPONSE message or a MMECONFIGURATION UPDATE message. Therefore, when the central node needs to send configuration information to the eNodeB, the configuration information of all MMEs will be sent. For example, the GUMMEI list in the S1SETUP RESPONSE message or MME CONFIGURATION UPDATE message is not the GUMMEI list of one MME but the GUMMEI lists of all MMEs, and of course, in order to implement this method, the S1SETUP report message needs to be modified, and the modified S1SETUP RESPONSE message is shown in table four;
table four:
Figure BDA00001994081600151
the "GUMMEI" in the table is the true GUMMEI of each MME, each MME has only one true GUMMEI, and the MME uses the true GUMMEI as a unique identifier to group together the information of all MMEs to form an MME list, where each MME in the MME list has some specific configuration information, such as the name and capability of the MME, and the mapped GUMMEI list, etc., where the GUMMEI list may be (PLMN-id + MMEGI + MMEC) list, or may be PLMN-id list + MMEGI list + MMEC list, or may not have the mapped GUMMEI list.
In short, the central node provides configuration information of all MMEs in the MME Pool to enodebs in the Pool through a configuration message, so that when LAC or GUMMEI changes, the central node only needs to send an MME configuration update message to each eNodeB, and does not need to send each MME to each eNodeB, thereby reducing the number of messages transmitted in the network. For example, there are 10 MMEs and 200 enodebs in MME Pool, when LAC changes, the central node only needs to send a total configuration message about configuration change to 200 enodebs, and the number of messages is only 200, and before this, the MME may also need to send its own configuration message to the central node.
The above three methods (1), (2) and (3) may be used independently or in combination, and of course, the combined use is more optimized, for example, when 10 LACs are added, the MME only needs to update the information of the 10 LACs, and then sends the mapped MMEGI + MMEC of PLMN-id list +10 LACs to the eNodeB, and in case that the core network nodes of multiple operators are not supported, the size of the message sent to the eNodeB is only 3+20+1=24 byte. Otherwise, if only (1) method is used, although the size of the message is reduced, the number of messages is not changed, i.e. all the GUMMEI information (including not updated) still needs to be sent to the eNodeB; if only (2) is used, the size of the message is still 6 x 10=60 bytes, although the number of messages is reduced, which is clearly much larger than the above-mentioned size of the message after combining (1) and (2) methods, i.e. "24 bytes". Of course, the method (3) can also be combined with the method (1) or the method (2), or even combined with all of them, and will not be described herein again.
It should be noted that, in this embodiment, the network side node is an eNodeB as an example, and the network side node may also be the central node, that is, the operation performed by the eNodeB in this embodiment may also be completed by the central node, for example, the central node may also be a node for selecting a CN node, that is, the central node is connected to each eNodeB, and when the UE accesses the eNodeB, the eNodeB does not select the CN node, but sends a message to the central node, and the central node selects the CN node, for example, an MME. In this way, the configuration information of the MME only needs to be configured to the central node, and does not need to be sent to the eNodeB, that is, each MME only needs to perform information interaction with the central node when S1 establishes or the configuration information changes, that is, when the LAC or the GUMMEI changes. For example, there are 10 MMEs and 200 enodebs in MME Pool, when LAC changes, 10 MMEs only need to send configuration messages about configuration changes to the central node, and the number of messages is only 10, and it is not necessary to send configuration messages about configuration changes to 200 enodebs, thereby greatly reducing the number of information transmission in the network.
The beneficial effects of the first embodiment: in the first embodiment, the identifier of the UE during access is distinguished to obtain the information of the UE identifier, and whether the information is information allocated by a network or information mapped by the network to the UE is determined, and according to the above distinction, a suitable network node is selected for the UE, so that the UE is prevented from being unable to access to a corresponding CN node due to RAT change.
In the second embodiment, the method described in the first embodiment is performed when the UE accesses the SAE/LTE network by carrying the 2G/3G identity, and the UE accesses the SAE/LTE network according to a condition that the cell currently camped by the UE is not in a registered Tracking Area (TA), and in the method described in the first embodiment, if the cell currently camped by the UE is in the registered TA, the NAS part in an RRC Connection setup complete (RRC Connection setup complete) message, for example, the NAS part of the TAU Request message (hereinafter, the NAS part of the RRC Connection setup complete message is referred to as a NAS message), may not carry the UE identity (UE-id), such as GUTI, P-TMSI, or IMSI, or the like, that is, the UE may determine whether to carry the UE identity in the NAS message according to whether the currently accessed TA is in its own TA list (TA list).
That is, if the NAS message carries the UE identity, it is generally considered that the cell currently camped by the UE is not in the registered TA, and actually, if the NAS message carries the UE identity, the UE may also access according to the condition that the cell currently camped by the UE is in the registered TA, for example, when the UE carries the identity of the 2G/3G network and accesses the SAE/LTE network, the NAS message may only be an Attach Request (Attach Request) message or a tracking area update Request (TAU Request) message, and as long as the two messages always carry the UE identity, the selected MME may find the old node through the UE identity to acquire the UE context, or acquire the UE context from the HSS even if the selected MME has no UE context. To this end, the present embodiment provides another access method.
For convenience of description, a case where the cell to which the UE currently camps is not in the registered TA will be referred to as a TA not registered case hereinafter, whereas a case where the cell to which the UE currently camps is in the registered TA is referred to as a TA registered case hereinafter. It should be noted that, in order to better describe the technical solution provided in this embodiment, the following briefly introduces TA Registered case and TA not Registered case technologies, where the TA Registered case and the TA not Registered case are technologies when the UE accesses the SAE carrying the identifier allocated by the SAE.
When UE enters an SAE Pool and initiates access by using a temporary identifier allocated by SAE, the UE judges whether a cell currently accessed belongs to a registration area of the UE, namely the UE detects whether a cell currently camped on is in a registered TA, if so, the UE in an idle (idle) mode accesses an RRC Connection establishment Request (RRC Connection Request) message initiated by an SAE/LTE network to carry S-TMSI, because the UE does not move out of the original Pool area in this situation, the eNodeB can directly select to an original MME (under the condition of MOCN, the MME is selected according to the selected PLMN-id information combination carried by the UE) through MMEC in the S-TMSI, after receiving the RRC Connection establishment message of the S-TMSI returned by the eNodeB, in order to reduce the size of the message and save the occupied bandwidth, the UE can not carry the UE identifier in an NAS message in a subsequent RRC Connection establishment completion message sent by the UE to the eNodeB, the RRC part in the RRC connection establishment completion message does not carry GUMMEI, after the eNodeB selects the MME, the eNodeB sends an initial UE message to the selected MME, and then the MME acquires the context of the UE according to the S-TMSI, wherein the initial UE message comprises the S-TMSI in the RRC connection establishment request initiated by the UE, NAS information in the RRC connection establishment completion message and other information; if not, namely when the UE detects that the cell currently camped by the UE is not in the registered TA, the UE in idle mode accesses an RRC connection establishment request message initiated by an SAE/LTE network to carry a Random number (Random ID), then receives an RRC connection establishment message carrying the Random number returned by the eNodeB, and because the UE may or may not move out of the original Pool area, the UE needs to carry the UE identifier in an NAS message in the RRC connection establishment completion message sent to the eNodeB, and simultaneously carries a GUMMEI in the RRC connection establishment completion message, so that the eNodeB can search the corresponding MME through the GUMMEI (in the case of MOCN, the eNodeB selects the MME according to the selected PLMN-ID carried by the UE and the MME Group ID and MMEC in the GUMMEI), if the corresponding MME (the original MME) exists, the eNodeB directly selects the original MME, if the corresponding MME does not exist, the fact that the UE has changed Pool is indicated, the eNodeB selects a new MME, then sends an initial UE message to the selected MME, and the selected MME acquires the context of the UE, wherein the initial UE message comprises information such as NAS information. Referring to fig. 9 and 10, fig. 9 is a flowchart illustrating a method for a UE to access an SAE/LTE network using a TA registered case, and fig. 10 is a flowchart illustrating a method for a UE to access an SAE/LTE network using a TA not registered case.
The access method provided by the embodiment is as follows: when UE carries 2G/3G identification to access SAE system, UE firstly maps 2G/3G identification to SAE identification format, then accesses according to TA registered case, that is UE carries mapped S-TMSI in initiated RRC Connection establishment Request (RRC Connection Request) message, and RRC part in subsequent RRC Connection establishment completion message does not carry GUMMEI. While the NAS Message in the RRC connection setup complete Message may always carry the UE identity, the eNodeB may not carry the S-TMSI in the initial UE Message (the first initial UE Message) sent to the MME. The UE may determine whether the currently accessed cell is in the registered TA, and if so, the UE identity is not always carried in the NAS message in the RRC connection setup complete message, and if not, the UE identity is carried in the NAS message in the RRC connection setup complete message.
Certainly, before the UE accesses the system architecture evolution network SAE, the UE may also determine whether the UE identifier used in the access is allocated by the SAE or mapped, and if the UE identifier is mapped, the actions described in the above method are performed, that is, the step that the UE carries the mapped S-TMSI in the RRC connection setup request message sent to the eNodeB and does not carry the GUMMEI in the RRC connection setup complete message sent to the eNodeB is performed; otherwise, if the UE identity is allocated by SAE, determining whether the area accessed by the UE belongs to the registration area of the UE, if the area accessed by the UE belongs to the registration area of the UE, performing TA registered case access, and if the area accessed by the UE does not belong to the registration area of the UE, performing TA not registered case access, which may refer to the related descriptions of TA registered cases and TA not registered cases in this embodiment, and is not redundant here.
It should be noted that, since the eNodeB needs to distinguish whether the RRC connection establishment request message carries the S-TMSI or the random number, it needs to define an identifier in the S-TMSI and the random number, for example, the identifier is named a Distinguishing Mark, and the size of the identifier is defined as 8 bits, if the number of the 8 bits is all 1, it is determined that the RRC connection establishment request message carries the random number, and if the number of the 8 bits is not all 1, it is determined that the RRC connection establishment request message carries the S-TMSI. The Distinguishing Mark is located in the MMEC part of the S-TMSI and the first 8 bits of the random number.
Since the MMEC part in the S-TMSI is mapped by NRI when the UE accesses the SAE by carrying the mapped identity, and the NRI may be all 1, the eNodeB may misunderstand that the random number is received, and therefore, it is necessary to define that the NRI cannot be all 1.
Of course, the UE may also always use TA Registered Case without determining whether the currently accessed cell belongs to the registration area of the UE, or whether the UE identity carried by the UE itself is allocated by SAE or mapped, that is, S-TMSI is always carried in the RRC connection setup request message sent to the eNodeB, and then, in any Case, the NAS message in the RRC connection setup complete message always carries the UE identity, and the S-TMSI carried in the RRC connection setup request message is only used for the eNodeB to select the MME, without bringing S-TMSI on the subsequent S1 interface, that is, the initial UE message sent by the eNodeB to the MME does not carry S-TMSI information, so that the traffic size of the message can be reduced and the occupied bandwidth can be saved, but the method has a disadvantage that, when the UE changes Pool, if the new Pool also has the same number of MMECs, the eNodeB directly selects the MME corresponding to the MMEC with the same number from the new Pool, and does not select a new MME by the principles of Load Balancing (Load Balancing), etc. Alternatively, the SAE/LTE network may be always accessed using the TA not registered case, that is, the UE always carries the random number in the RRC connection setup Request message sent to the eNodeB, carries the GUMMEI in the RRC part of the subsequent RRC connection setup complete message, and carries the UE identity in the NAS message of the RRC connection setup complete message, but then the procedure of UE initiating a Service Request (Service Request) is not too fast because the Service Request message generally has a limited length in order to initiate access as soon as possible.
It should be noted that, the above description only takes the RAN node as the eNodeB and the CN node as the MME as an example, the RAN node may also be another device having a function similar to that of the eNodeB, and the CN node may also be another device having a function similar to that of the MME.
The beneficial effects of the second embodiment: in the embodiment, the S-TMSI is carried in the RRC connection establishment request message initiated by the UE, and then the S-TMSI is used for selecting the proper CN node for the UE, so that the condition that the UE cannot access the corresponding CN node due to the change of the RAT is avoided.
In a third embodiment, the LAC and the MMEGI may be distinguished by setting the values of bits in the LAC and corresponding bits in the MMEGI to be different, for example. The embodiment proposes that when the UE accesses the MME through GUTI, the specific access manner may include attach or TAU. If the MME has the UE Context (UE Context), the MME finds the UE through the GUTI, otherwise, the MME finds the old MME through the GUMMEI in the GUTI, for example, the old MME can be found through a Domain Name System (DNS), and sends a Context Request (Context Request) to the old MME, wherein the Context Request comprises the GUTI or an Identification Request (Identification Request), the Identification Request comprises the GUTI, the old MME finds the UE Context through the GUTI, and returns the UE Context or the IMSI information of the UE to the MME. When the UE accesses the MME through the GUTI mapped by old RAI/P-TMSI or TLLI, the MME or DNS needs to distinguish the GUTI allocated to the UE by the network, for example, the GUTI allocated to the UE by SAE, from the mapped GUTI. If the GUTI is known as the mapped GUTI, the GUTI is restored to old RAI/P-TMSI or TLLI/old RAI of the 2G network (if the old SGSN is the 2G SGSN). Finding the old SGSN through the old RAI or through the old RAI and the NRI, and sending a Context Request to the old SGSN, wherein the Context Request comprises the old RAI, the P-TMSI or the TLLI, or sending an authentication Request (Identification Request) which comprises the old RAI, the P-TMSI or the TLLI. The old SGSN finds the UE Context through the old RAI and the P-TMSI, or the old GGSN finds the UE Context through the TLLI, and returns the UE Context or the IMSI information of the UE to the MME.
Referring to fig. 2, the UE sends a tracking area update Request, i.e. a TAU Request message to the MME, the TAU Request message includes a GUTI, the MME checks whether the GUTI is a true GUTI, i.e. a true GUTI allocated to the UE on the SAE network side, or a mapped GUTI, if the GUTI is a true GUTI, the MME sends a Context Request to the old MME, the Context Request carries (GUTI, complete TAU Request message) to obtain a Context from the old MME, the old MME searches for the UE Context through the GUTI, the complete TAU Request message is a taureq message sent by the UE, if the message has integrity protection, the message is carried to the old MME to check the integrity protection, and if the verification is successful, the UE Context is returned to the new MME. If the MME checks that the GUTI is the mapped GUTI, the MME sends Contextrequest (old RAI, P-TMSI or TLLI) to the old SGSN, and the old SGSN searches UE Context according to the old RAI and the P-TMSI or TLLI.
Regarding the safety integrity protection problem, when the UE accesses the SAE system through the mapped GUTI, the following methods may be adopted:
1. since the old SGSN does not have the integrity protection parameters of SAE, the MME may not send the TAU Request message to the old SGSN according to GUTI being post-mapping GUTI.
Or
And 2, the MME always sends a TAU Request message to an old node regardless of whether the GUTI is the mapped identifier, such as the old SGSN requires verification, but the old SGSN does not verify the message and returns information of no successful verification or no verification to the MME, so that the MME executes a security related process, if the MME does not have a UE context, for example, other MME is attached with a global unique temporary identifier (Additional GUTI) indication, the other MME can execute the security related process, or the MME finds the UE context stored by the MME according to the Additional GUTI, and performs security verification on the UE, or the MME initiates a security authentication process to the UE.
Or
And 3, the UE carries the Additional GUTI which just indicates that the UE has the UE Context in the accessed MME, the accessed MME carries out security verification on the UE, and if the UE passes the security verification, the Context Request or the authentication Request sent to the old SGSN carries the verified information of the UE.
Or
4. If the Additional GUTI indicates other MME, the new MME acquires the security context from the MME indicated by the Additional GUTI, and the new MME verifies the UE according to the acquired security information; or the new MME sends an Attach Request (Attach Request) message or a TAU Request message to the MME indicated by the Additional GUTI for verification.
Or
5. And if the UE carries the mapped GUTI for access, the UE does not perform integrity protection on messages such as TAU Request messages or Attach Request messages and the like.
Or
6. And if the UE carries the mapped GUTI to access, the UE carries a P-TMSI Signature field distributed to the UE by the SGSN and sends the P-TMSI Signature field to the old SGSN for UE verification after the MME receives the P-TMSI Signature field. That is, if the UE carries old RAI/P-TMSI or the GUTI mapped by TLLI to access SAE, the UE carries a P-TMSI Signature cell, and the Context Request message sent by the MME to the old sgsn also carries the P-TMSI Signature cell, requesting the old sgsn to verify the UE.
The above security problem can also be applied to the following embodiments in which the UE carries the mapped GUTI access SAE system or the UE carries the mapped old RAI/P-TMSI (or TLLI)/P-tmsisidentity access 2G/3G (MME and SGSN need to change location).
The difference between the fourth embodiment and the third embodiment is that the MME directly maps the GUTI. In this embodiment, the MME maps or reduces the GUTI to old RAI/P-TMSI (or TLLI)/P-TMSI identifier or old RAI/P-TMSI, or the P-TMSI therein may also be in the form of TLLI, and obtains a Context from an old entity, such as an old MME or an old SGSN, through the form of old RAI/P-TMSI (or TLLI)/P-TMSI identifier, if the MME is an old MME, the old MME maps or reduces the old RAI/P-TMSI to GUTI obtaining UE Context; if it is old SGSN, the old SGSN finds UE Context directly according to old RAI/P-TMSI (or TLLI), P-TMSI Signature, see FIG. 3.
The fifth embodiment is different from the third embodiment in that, after determining that the mapping is GUTI, the fifth embodiment performs a different operation according to whether the corresponding old SGSN is S4SGSN or Gn/Gp SGSN. The embodiment performs different operations by the access node knowing whether the old node is an MME/S4-SGSN or a Gn/Gp SGSN. For example, when the UE accesses the MME through the GUTI after old RAI/P-TMSI mapping, the specific access mode may be Attach or TAU mode. If the MME knows that the old SGSN is an SGSN supporting S4, e.g., from querying the DNS, or from its interface being a GTP-v2 based interface, that the old SGSN is an SGSN supporting S4, the MME sends a ContextRequest to the old SGSN, the Context Request GUTI containing a GUTI, or an Identification Request containing a GUTI, which is differentiated by the GUTI by the old SGSN to reduce the GUTI to an old RAI, P-TMSI, or to an old RAI, P-TMSI TLLI, which finds the UE Context by the old RAI and P-TMSI, or the old RAI and/or TLLI, returns the UE Context or IMSI, etc. to the MME; if the MME knows that the old SGSN is the SGSN supporting Gn/Gp, for example, according to a query DNS, or according to an interface based on GTP-v1 or v0 to know that the old SGSN is the SGSN supporting Gn/Gp, such as SGSNPre-R8 SGSN before the definition of 3GPP R8 version, the MME reduces the old RAI/P-TMSI (or TLLI), sends an SGSN Context Request (old RAI, P-TMSI or TLLI) or an Identification Request (old RAI, P-TMSI or TLLI) to the old SGSN, and the old SGSN finds the UE Context through the old RAI and P-TMSI (or TLLI) and returns the UE Context to the MME.
Referring to FIG. 4, if the UE is in SAE Attach, the Temporary Identifier (TIN) used by the UE for the Next update is set to P-TMSI or TLLI, or the Temporary identifier used by the UE for detaching Detach from 2G/3G last time, the UE needs to use old RAI/P-TMSI, wherein the P-TMSI can also be a GUTI access SAE mapped by TLLI; the MME receives the mapped GUTI and can directly restore to old RAI/P-TMSI (or TLLI) or see whether the old SGSN is S4SGSN or Gn/Gp SGSN, if the old SGSN is S4SGSN, the UE can acquire IMSI, context and the like from S4SGSN through Identification Request (GUTI, complete Attach Request message), and the S4SGSN restores the GUTI to old RAI/P-TMSI (or TLLI) to find the UE context and return IMSI and the like. If the old SGSN is Gn/Gp SGSN, the MME uses the restored old RAI/P-TMSI (or TLLI) to acquire information from the old SGSN, and requests an Identification Request which carries the old RAI/P-TMSI (or TLLI). Of course, if there is a temporary identifier allocated to the access RAT, the UE may use the temporary identifier allocated to the access RAT at Attach, regardless of the indication of the TIN, use a temporary identifier of another RAT if there is no temporary identifier of the access RAT, or use the IMSI for access if there is no temporary identifier of each RAT. If the GUTI is a true GUTI, the integrity Request message may carry a complete Attach Request message from the UE for the old MME to perform integrity protection verification, and if the MME finds that the GUTI is a mapped GUTI, the MME does not need to carry the Attach Request message in the integrity Request message to the SGSN and needs to perform security verification on the UE.
Regarding the security related problem, if the Additional GUTI or the Additional rai/P-TMSI carried by the UE indicates that the UE has a Context locally, the UE performs security procedures such as integrity protection verification locally, so that the access entity, e.g. MME or SGSN, does not need to Request integrity protection verification or the like to the old entity indicated by the TIN, e.g. old MME or old SGSN, and if the UE has performed integrity protection verification locally, the access entity carries UE verified information in the Context Request, and the old entity does not need to verify the UE. Otherwise, if the UE does not have the UE context in the local access entity, when the old entity indicated by the TIN is the same RAT as the access entity, the access entity may require the old entity to perform integrity protection verification on the UE, for example, the access entity sends a message sent by the UE to the old entity, and the old entity performs verification. Otherwise, the access entity may not require the old entity to perform a security procedure on the UE, for example, the access entity does not send a message sent by the UE to the old entity, or the access entity requires the old entity to perform the security procedure on the UE, but if the old entity cannot be verified (if the old entity and the access entity are not in the same RAT), the old entity returns information such as verification failure or incomplete verification, and requires the access entity to verify the UE by itself. In addition, if the TIN of the UE indicates "P-TMSI" or "TLLI", the UE needs to carry P-TMSI Signature when Attach or TAU/RAU access to perform security verification of the UE, that is, the access entity brings the old entity to verify the UE, otherwise if the TIN of the UE indicates "GUTI", the UE needs to carry P-TMSISignature when accessing 2G/3G, because the GUTI needs to have partial information mapped to the P-TMSI Signature.
Sixth embodiment is different from the third embodiment in that in the third embodiment, the UE accesses the MME through GUTI, and in the present embodiment, the UE carries old RAI/P-TMSI Signature access to the SGSN, where the P-TMSI may also be TLLI. When UE carries old RAI/P-TMSI (or TLLI)/P-TMSI Signature to access SGSN, SGSN or DNS searches old MME or old SGSN according to the difference between the real old RAI/P-TMSI (or TLLI)/P-TMSI Signature and the mapped identifier, such as difference between MMEGI and 1bit of LAC. The SGSN can always acquire the Context from the old entity through an old RAI/P-TMSI/P-TMSI Signature form, if the old entity is an MME, the SGSN sends an SGSN Context Request to the old MME, wherein the Context Request comprises the old RAI, the P-TMSI/TLLI, the P-TMSI Signature and the old MME recovers GUTI, finds the UEContext, returns the UE Context, and returns the EPS Context or the 2G/3G Context according to the interface or the content of the Context Request.
Referring to FIG. 5, the UE accesses the SGSN by sending an RAU Request message, i.e. by old RAI, P-TMSI/TLLI, P-TMSI Signature, if the UE uses old RAI, P-TMSI/TLLI, P-TMSI Signature mapped by GUTI, the SGSN finds the address of the old MME, sends a Context Request to the old MME, the Context Request carries (old RAI, P-TMSI/TLLI, P-TMSI Signature) message, the old MME finds the UE Context according to the old RAI, P-TMSI/TLLI, P-TMSI Signature, and returns UE Context. In addition, since the old MME has no P-TMSI Signature information, the following method can be adopted for verifying the UE:
the Old MME carries UE security non-verification information in the returned Context Response, for example, carries the Cause value of 'P-TMSI Signature mismatch', so that the SGSN verifies the UE again.
2. Or, if the SGSN does not have the UE Context and the SGSN knows that the old node corresponding to the old RAI, P-TMSI/TLLI, and P-TMSI Signature indicated by the TIN is the old MME, the SGSN always authenticates the UE, and the Context Request sent to the old MME carries "MS valid" information, which indicates that the UE has passed the authentication. If the SGSN has the UE Context, wherein the UE Context can be found through the additional RAI/P-TMSI, the SGSN verifies the UE in advance, and if the verification is successful, the Context Request sent to the old MME carries 'MS valid' information, which indicates that the UE passes the verification.
Seventh embodiment differs from sixth embodiment in that in sixth embodiment old MME reduces oldRAI/P-TMSI Signature to GUTI, where P-TMSI may be TLLI. In this embodiment, when the old entity is old MME, the old RAI/P-TMSI (or TLLI)/P-TMSI Signature is reduced to GUTI by SGSN. Referring to fig. 6, the SGSN knows whether the old entity is an MME or an SGSN, and if the old entity is an MME, the S4SGSN recovers the GUTI, sends a Context Request (GUTI) to the old MME, and the old MME finds the UE Context according to the GUTI and returns the UE Context.
The security problem is the same as the third to sixth embodiments, if the SGSN has a UE context locally, the P-tmsisauthentication is verified, if there is no UE context and the old entity is found to correspond to the MME, the SGSN always initiates a security procedure to the UE, and the SGSN restores the GUTI and requests the old MME for the UE context.
The access node can distinguish whether the temporary identifier is an original temporary identifier or a mapped identifier by itself, and can also feed back whether the temporary identifier of the access node is the mapped identifier or not after DNS analysis. If the address of the access node and the address of the translated old node of the DNS are wrong, the translated old node continues to search the real old node after receiving the Context Request, and the message is relayed to the real old node.
In addition, in the prior art, the UE may also carry an Additional TMSI (with a temporary identifier), that is, the UE carries an Additional GUTI when accessing the SAE, and carries an Additional oldRAI/P-TMSI when accessing the 2G/3G, where the P-TMSI may also be a TLLI, and the Additional TMSI is used to find a possibly existing UE Context in the access RAT entity as much as possible, and obtain a Context using the temporary identifier indicated by the TIN, and the like, so that the obtained Context can be directly merged to the UE Context in the RAT entity, otherwise, the access RAT needs to query whether the UE Context exists in the RAT entity according to IMSI information in the obtained Context, and then merge to cause complexity. The Additional TMSI may not actually need to be carried under the following conditions to save air interface resources: a TAU or RAU in a Periodic location update (PeriodicTAU or periodicrau) or handover procedure; or the temporary identifier indicated by the TIN is consistent with the Additional temporary identifier, namely the temporary identifier of the access RAT is indicated by the TIN; or when the UE has temporary identity of accessing RAT during Attach.
By adopting the embodiment of the invention, the processing of each node on the temporary identifier is clarified. The following can be realized:
the real GUTI is distinguished from the mapped GUTI; the true old RAI/P-TMSI (or TLLI) is also distinguished from the mapped old RAI/P-TMSI (or TLLI). If a bit is set in the LAC and the MMEGI, the LAC is always 0, and the MMEGI is always 1.
When UE uses GUTI mapped by old RAI/P-TMSI to access SAE, eNodeB knows that UE uses old RAI/P-TMSI to access through differentiation, and then selects MME corresponding to NRI as much as possible; or the eNodeB determines whether to select the MME corresponding to the NRI or reselect the MME by finding whether the LAC has a configuration.
When UE accesses to MME through GUTI mapped by old RAI/P-TMSI, MME knows that GUTI is mapped GUTI, reduces old RAI/P-TMSI/TLLI, finds out old SGSN through old RAI and NRI, sends Context Request to old SGSN, the Context Request carries (old RAI, P-TMSI/TLLI), and the old SGSN finds out UE Context through old RAI and P-TMSI/TLLI and returns to MME.
Or, when the UE accesses the MME through the GUTI mapped by the old RAI/P-TMSI, the MME knows that the GUTI is the mapped GUTI, and the MME queries whether the old SGSN is the S4SGSN or the Gn/GpSGSN. If the old SGSN is S4SGSN, the MME sends ContextRequest (GUTI) to the old SGSN, namely the Context Request carries GUTI, or sends an IdentificationRequest, the old SGSN restores the GUTI to old RAI and P-TMSI/TLLI, finds UE Context through the old RAI and the P-TMSI/TLLI, and returns the UE Context to the MME; if the old SGSN is Gn/Gp SGSN, the MME restores the old RAI/P-TMSI/TLLI, sends a Context Request to the old SGSN, the Context Request carries (old RAI, P-TMSI/TLLI), and the old SGSN finds the UE Context through the old RAI and the P-TMSI/TLLI and returns the UE Context to the MME.
The Additional TMSI may not be needed when the temporary identifier indicated by TAU/RAU, Periodic TAU/RAU, TIN in the HO is switched to be consistent with the Additional temporary identifier or when the UE has the temporary identifier of the access RAT in the Attach process.
When the MME and SGSN of the Combined node belong to different PLMNs or the MME and SGSN of different PLMNs establish ISR, the UE can select the corresponding CN node by carrying two PLMN-ids or configuration.
By distinguishing which RAT the identifier carried by the UE is allocated, the RAN node or the access node can perform corresponding appropriate processing, so as to prevent selection of wrong nodes or sending of inconsistent parameters to corresponding nodes.
The embodiment of the invention also provides a method for distributing network resource nodes for User Equipment (UE), which comprises the following steps:
the network side obtains the mapping attribute of the carried temporary identifier of the user equipment UE,
and the network side allocates network resource nodes for the UE according to the mapping attribute of the temporary identifier.
Specifically, the network side obtains the mapping attribute of the temporary identifier carried by the UE, so that the network side determines whether the UE identifier is allocated by the network side or mapped.
The detailed implementation is described as follows:
when the network side to which the UE accesses is a system architecture evolution network SAE, the network side obtains the mapping attribute of the identity carried by the UE specifically as follows: an evolved node B eNodeB of the SAE network judges whether a global unique mobile management entity identifier GUMMEI carried by the UE or a mobile management entity group identifier MMEGI in the GUMMEI is allocated or mapped by SAE;
if the GUMMEI and/or the MMEGI are allocated by SAE, the network side allocates a network resource node to the UE according to the mapping attribute of the identifier specifically is: the eNodeB selects a mobility management entity MME according to the GUMMEI or MMEGI and the mobility management entity code MMEC;
if the GUMMEI or MMEGI is mapped, the network side allocates network resource nodes for the UE according to the identified mapping attribute, specifically, the network side allocates network resource nodes for the UE, and the network side selects an MME according to a mobile country code MCC, a mobile network code MNC and an MMEC in the GUMMEI; or the eNodeB selects the MME according to the MMEC in the GUMMEI.
Or it can be realized by the following method:
when the network side to which the UE accesses is a system architecture evolution network SAE, the network side obtains the mapping attribute of the identity carried by the UE specifically as follows: a mobile management entity MME of the SAE network judges whether a global unique temporary identity GUTI carried by the UE is distributed by SAE or mapped;
if GUTI is allocated by SAE, the network side allocates network resource nodes for UE according to the mapping attribute of the identifier, wherein the MME uses GUTI to fetch the context of UE from an old mobility management entity old MME;
if the GUTI is mapped, the network side also comprises the step that the MME reduces the GUTI into an old routing area identifier old RAI/packet temporary mobile subscriber identifier P-TMSI or into an old RAI/logical link temporary identifier TLLI before allocating network resource nodes for the UE according to the mapping attribute of the identifier; and takes the context of the UE to the old serving general packet radio service support node oldSGSN with either oldRAI/P-TMSI or old RAI/TLLI.
Corresponding to the above description of the method embodiments, the embodiment of the present invention further provides a UE, where the UE does not perform integrity protection on an access message when the UE accesses the SAE system using the mapped GUTI.
Referring to fig. 7, the network side apparatus includes an identifier attribute obtaining module 701, configured to distinguish whether the UE uses the mapped temporary identifier or the real temporary identifier, where the real temporary identifier is an identifier allocated by the network side; the network side node may be a radio access network node.
The network resource node allocating module 702 allocates a network resource node to the UE according to the attribute of the temporary identifier of the UE, that is, whether the UE is a network-side allocated identifier or a mapped identifier. The network resource node comprises an MME or an SGSN or a CN node.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present invention may be implemented by software plus a necessary hardware platform, and may also be implemented by hardware entirely. With this understanding in mind, all or part of the technical solutions of the present invention that contribute to the background can be embodied in the form of a software product, which can be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes instructions for causing a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments or some parts of the embodiments of the present invention.
The foregoing is directed to embodiments of the present invention, and it is understood that various modifications and adaptations of the invention may occur to those skilled in the art without departing from the scope and spirit of the invention.

Claims (31)

1. A method of access, the method comprising:
when User Equipment (UE) accesses a System Architecture Evolution (SAE) network, a network side node judges whether a Global Unique Mobile Management Entity Identifier (GUMMEI) carried by the UE or a Mobile Management Entity Group Identifier (MMEGI) in the GUMMEI is allocated or mapped by the SAE network;
if the GUMMEI or MMEGI is allocated by SAE, the network side node selects a mobility management entity MME according to the GUMMEI, or according to the MMEGI and a mobility management entity code MMEC, or according to a selected public land mobile network identity PLMN-id and MMEGI and MMEC;
if the GUMMEI or the MMEGI is mapped, the network side node selects an MME according to a mobile country code MCC, a mobile network code MNC and an MMEC in the GUMMEI, or selects an MME according to a selected PLMN-id and an MMEC in the GUMMEI.
2. The access method of claim 1, wherein the network side node determining whether GUMMEI or MMEGI is SAE allocated or mapped comprises:
the network side node checks whether the marker bit of the MMEGI in the GUMMEI is the marker of the MMEGI or the marker of the location area code LAC;
if the signature is MMEGI, judging that GUMMEI is allocated by SAE;
if the mapping is the LAC mark, the GUMMEI is judged to be mapped.
3. The access method of claim 1, wherein the network side node selecting the MME according to the GUMMEI or the MMEGI and MMEC in the GUMMEI comprises:
if the GUMMEI of an MME is the same as the GUMMEI carried by the UE, or if the MMEGI and the MMEC in the GUMMEI of the MME are respectively the same as the MMEGI and the MMEC in the GUMMEI carried by the UE, the network side node selects the MME; or,
the network side node searches a LAC list, and when the MMEGI in the GUMMEI carried by the UE belongs to one of the LAC lists, the network side node selects an MME corresponding to the MMEC in the GUMMEI carried by the UE or the network side node selects an MCC and an MNC in the GUMMEI carried by the UE and an MME corresponding to the MMEC.
4. The access method of claim 1, wherein the network side node selecting the MME according to the MCC, MNC and MMEC in the GUMMEI comprises:
if the MCC, MNC and MMEC in the GUMMEI of the MME are respectively the same as the MCC, MNC and MMEC in the GUMMEI carried by the UE, the network side node selects the MME; or
And if the MCC and MNC in the GUMMEI of the MME are the same as the selected PLMN-id carried by the UE, and simultaneously the MMEC is the same as the MMEC carried by the UE, the network side node selects the MME.
5. The access method of claim 1, wherein the network side node selecting an MME according to the MMEC in the GUMMEI comprises:
if the MMEC in the GUMMEI of the MME is the same as the MMEC in the GUMMEI carried by the UE, the network side node selects the MME; or,
and the network side node searches an LAC list, and when the MMEGI in the GUMMEI carried by the UE belongs to one of the LAC lists, the network side node selects an MME corresponding to the MMEC in the GUMMEI carried by the UE.
6. The access method according to claim 3 or 5, wherein the before the eNodeB searching the LAC list, further comprising:
and the network side node configures the LAC list.
7. The access method according to claim 6, wherein the configuring, by the network side node, of the LAC list specifically includes:
a network side node receives a configuration message about an LAC list sent by an MME, wherein the configuration message about the LAC list carries a GUMMEI list, or the configuration message about the LAC list carries a PLMN-id list, an MMEGI list and an MMEC list;
and the network side node saves the configuration message about the LAC list.
8. The access method according to claim 6 or 7, further comprising:
when the LAC changes, the network side node receives an indication message sent by an MME, wherein the indication message sent by the MME indicates the network side node to add/modify/delete the GUMMEI in the LAC list;
and the network side node adds/modifies/deletes the GUMMEI in the LAC list according to the indication message sent by the MME.
9. The access method according to any of claims 1 to 8, wherein the network side node comprises an eNodeB or a pre-set central node.
10. The access method according to claim 9, further comprising:
if the network side node is an eNodeB, when the LAC is changed, the eNodeB receives an indication message sent by a preset central node, and the indication message sent by the central node indicates the eNodeB to add/modify/delete the GUMMEI in the LAC list;
and the eNodeB adds/modifies/deletes the GUMMEI in the LAC list according to the preset indication message sent by the central node.
11. A method of access, the method comprising:
when User Equipment (UE) accesses a System Architecture Evolution (SAE) network, a Mobility Management Entity (MME) judges whether a Global Unique Temporary Identity (GUTI) carried by the UE is allocated or mapped by the SAE network;
if the GUTI is allocated by SAE, the MME uses the GUTI to fetch the context of the UE from an old mobility management entity old MME;
if the GUTI is mapped, the MME reduces the GUTI into an old routing area identifier old RAI and a packet temporary mobile subscriber identifier P-TMSI, or into an old RA and a logical link temporary identifier TLLI, and acquires the context of the UE from an old serving general packet radio service support node old SGSN according to the reduced identifier.
12. The access method of claim 11, wherein the MME determining whether the GUTI carried by the UE is SAE-allocated or mapped comprises:
the MME checks whether the flag bit of the MMEGI or the LAC in the GUTI;
if the marker is the MMEGI, judging that the GUTI is allocated by SAE;
if the mapping is the LAC mark, the GUTI is judged to be mapped.
13. The access method of claim 11, wherein the fetching the context of the UE to the old SGSN using the old RAI and P-TMSI, or the old RAI and TLLI comprises:
the MME sends a Context Request to the old SGSN, wherein the Context Request carries a Request message when the UE accesses SAE, the old RAI and P-TMSI, or the old RAI and TLLI; the old SGSN returns a message of failure or no verification of the integrity protection verification of the request message to the MME; the MME verifies the UE through the UE context stored by the MME according to the information attached with the globally unique temporary identifier Additional GUTI, or sends the request message or the security verification message to the MME with the UE context indicated by the Additional GUTI to request the MME to perform integrity protection verification on the UE; or the MME initiates a security process to the UE to authenticate the UE;
or,
according to the indication of the old RAI and the P-TMSI or the old RAI and the TLLI, the MME sends a Context Request to the old SGSN, wherein the Context Request does not carry a Request message when the UE accesses SAE; the MME verifies the UE through the UE context stored by the MME according to the information of the Additional GUTI, or sends the request message or the safety verification message to the MME which is indicated by the Additional GUTI and has the UE context to request the MME to perform integrity protection verification on the UE; or the MME initiates a security process to the UE to authenticate the UE;
or,
according to the indication of the old RAI and the P-TMSI, or the indication of the old RAI and the TLLI, the MME sends a Context Request to the old SGSN, wherein the Context Request carries safety verification passing information but does not carry a Request message when the UE accesses SAE; the MME verifies the UE through the UE context stored by the MME according to the information of the additional GUTI, or sends the request message or the safety verification message to the MME which has the UE context and is indicated by the additional GUTI to request the MME to perform integrity protection verification on the UE; or the MME initiates a security process to the UE to authenticate the UE.
14. The access method of claim 11, wherein the MME fetching UE context from oldSGSN comprises:
if the MME has the context of the UE, the MME verifies integrity protection for a request message when the UE accesses SAE;
and if the verification is passed, the MME sends a Context Request to the old SGSN, wherein the Context Request carries a verification passing message.
15. The access method of claim 11, wherein the fetching the context of the UE to the old SGSN with the old RAI and P-TMSI or old RAI and TLLI comprises:
according to the indication of the Additional GUTI, the MME sends a request message when the UE accesses the SAE to the MME with the context of the UE;
the MME with the context of the UE returns a verification result of integrity protection of the request message to the MME;
if the verification is passed, the MME sends a Context Request to the old SGSN, wherein the Context Request carries the old RAI/P-TMSI or the old RAI and TLLI and verification passing information;
finding context of UE by the old SGSN according to the old RAI and P-TMSI, or according to the old RAI and TLLI;
and according to the verification passing information, the old SGSN does not verify the UE and returns the context of the UE to the MME.
16. The access method of claim 11, wherein the fetching the context of the UE to the old SGSN using the old RAI and P-TMSI, or the old RAI and TLLI comprises:
according to the indication of the Additional GUTI, the MME acquires a security context from an MME with a context of the UE;
the MME verifies integrity protection for a request message when the UE accesses SAE according to the security context;
if the verification is passed, the MME sends a Context Request to the old SGSN, wherein the Context Request carries the old RAI and the P-TMSI, or carries the old RAI and the TLLI and verification passing information;
according to the old RAI and the P-TMSI, or the old RAI and the TLLI, the old SGSN finds the context of the UE;
and according to the verification passing information, the old SGSN does not verify the UE and returns the context of the UE to the MME.
17. The access method according to claim 11, wherein if UE carries old RAI and P-TMSI, or TLLI mapped GUTI access SAE, the UE does not integrity protect tracking area update Request TAU Request message or Attach Request message.
18. The access method according to claim 11, wherein if the UE carries old RAI and P-TMSI, or carries TLLI mapped GUTI access SAE, the UE carries a packet temporary mobile subscriber identity Signature P-TMSI Signature cell, and the ContextRequest message sent by the MME to the old SGSN also carries the P-TMSI Signature cell, requesting the old SGSN to authenticate the UE.
19. A method of access, the method comprising:
when User Equipment (UE) accesses a system architecture evolution network (SAE), a Mobility Management Entity (MME) maps a Globally Unique Temporary Identifier (GUTI) carried by the UE into an old routing area identifier (old RAI) and a packet temporary mobile subscriber identifier (P-TMSI), or a logical link temporary identifier (TLLI) and a packet temporary mobile subscriber identifier (P-TMSI) Signature;
the MME uses the mapped old RAI and P-TMSI, or TLLI and P-TMSI Signature to obtain the context of the UE from the old mobility management entity old MME or the old serving GPRS support node old SGSN;
and the old MME reduces the old RAI and the P-TMSI, or the old RAI, the TLLI and the P-TMSISignature into GUTI, and returns the context of the UE to the MME according to the GUTI obtained by reduction.
20. A method of access, the method comprising:
when the user equipment UE accesses the system architecture evolution network SAE,
if the old node is MME, the MME uses the GUTI to fetch the context of UE from an old mobility management entity old MME;
if the old node is Gn/Gp SGSN, the MME reduces the GUTI into an old routing area identifier (old RAI) and a packet temporary mobile subscriber identifier (P-TMSI), or into a logical link temporary identifier (TLLI); and using the reduced identifier to fetch the context of the UE from the old SGSN;
if the old node is S4SGSN, the MME uses the GUTI to fetch the context of the UE from old SGSN; and the old SGSN reduces the GUTI into an old RAI and a P-TMSI, or into an old RAI/TLLI identifier, and returns the identifier to the MME after finding the context of the UE.
21. A method of access, the method comprising:
when User Equipment (UE) accesses a 2G/3G network, a Serving GPRS Support Node (SGSN) searches a corresponding old entity address according to an old routing area identifier (old RAI) and a packet temporary mobile subscriber identifier (P-TMSI) carried by the UE or a logical link temporary identifier (TLLI), and obtains the context of the UE from the old entity;
if the old entity is an old MME, the old MME restores the old RAI and the P-TMSI, or restores the TLLI and the packet temporary mobile subscriber identity Signature P-TMSI Signature as a globally unique temporary identity GUTI, and returns the context of the found UE to the SGSN.
22. A method of access, the method comprising:
when User Equipment (UE) accesses a 2G/3G network, a serving general packet radio service support node (SGSN) searches whether a corresponding old entity is an old serving general packet radio service support node (old SGSN) or an old mobility management entity (old MME) according to an old routing area identifier (old RAI) and a packet temporary mobile subscriber identifier (P-TMSI) carried by the UE, or according to whether a logical link temporary identifier (TLLI) and a packet temporary mobile subscriber identifier (P-TMSI) Signature carried by the UE are allocated by the 2G/3G network or mapped;
if the old entity is old MME if old RAI and P-TMSI carried by the UE or TLLI and P-TMSI Signature are mapped, the SGSN restores GUTI according to the old RAI and P-TMSI or TLLI/P-TMSI Signature, and the context of the UE is acquired from the old MME by the GUTI; the old MME finds out the UE context according to the GUTI and returns the UE context to the SGSN;
if the old entity is old SGSN, and the old entity uses old RAI and P-TMSI, or TLLI to fetch UE context from old SGSN, if the old RAI and P-TMSI carried by UE are 2G/3G distributed.
23. A method for obtaining a context of a User Equipment (UE), the method comprising:
when the temporary identifier indicated by the temporary identifier TIN used for next updating is consistent with the Additional temporary identifier, the user equipment UE only carries the temporary identifier indicated by the TIN to access;
and the access node finds the UE context through the temporary identifier indicated by the TIN carried by the UE.
24. A method for obtaining a context of a User Equipment (UE), the method comprising:
in the switching process, the tracking area updates TAU or the routing area updates RAU, UE only needs to carry temporary mobile subscriber identity TMSI of the RAT system of the wireless access technology or does not carry any TMSI, and the UE finds out UE context through the well-established connection of the target side.
25. A method for obtaining UE identity, the method comprising:
in the process of initiating Attach of the user equipment UE,
if the UE has a temporary identifier accessed to a Radio Access Technology (RAT), the temporary identifier is carried, and an access entity searches a corresponding node through the temporary identifier to obtain an International Mobile Subscriber Identity (IMSI) and security parameters of the UE;
if the UE does not have the temporary identifier of the access RAT but has the temporary identifier of the other RAT, the temporary identifier of the other RAT is carried, and the access entity searches the corresponding node through the temporary identifier of the other RAT to acquire the IMSI and the security parameters of the UE.
26. A network side device is characterized by comprising the following modules,
an identifier attribute obtaining module, configured to obtain an attribute of a temporary identifier of a UE currently accessing to a network side, where the attribute of the temporary identifier of the UE is that the UE identifier is allocated or mapped by the network side;
and the network resource node distribution module is used for distributing network resource nodes for the UE according to the attribute of the temporary identifier of the UE.
27. A method of access, comprising:
when User Equipment (UE) accesses a system architecture evolution network (SAE), the UE carries a temporary mobile user identification (S-TMSI) of the SAE network in a radio resource control protocol (RRC) connection establishment request message sent to an eNodeB (evolved node B), and does not carry a Globally Unique Mobile Management Entity Identification (GUMMEI) in an RRC connection establishment completion message sent to the eNodeB;
the eNodeB selects a corresponding MME according to the received S-TMSI, and if the corresponding MME does not exist, the eNodeB selects a new MME.
28. The method of accessing according to claim 27, further comprising:
and the non-access stratum NAS message in the RRC connection establishment completion message sent to the eNodeB carries the UE identification.
29. The method of accessing according to claim 28, further comprising:
and the initial UE message sent to the selected MME by the eNodeB does not carry S-TMSI information.
30. The method of accessing according to claim 27, further comprising:
and the UE judges whether the current accessed cell is in the registered tracking area TA, if so, the NAS message in the RRC connection establishment completion message sent to the eNodeB does not carry the UE identification.
31. The method of accessing according to any one of claims 27 to 30, further comprising:
before the UE accesses SAE, the UE judges whether the UE identification used in the access is allocated by SAE or mapped;
and if the UE identification is mapped, carrying the mapped S-TMSI in the RRC connection establishment request message sent to the eNodeB, and not carrying the GUMMEI in the RRC connection establishment completion message sent to the eNodeB.
CN2012102831227A 2008-06-18 2009-01-05 Method and device for accessing and acquiring contexts and identifiers of user equipment Pending CN102821381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012102831227A CN102821381A (en) 2008-06-18 2009-01-05 Method and device for accessing and acquiring contexts and identifiers of user equipment

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
CN200810039358 2008-06-18
CN200810039358.X 2008-06-18
CN200810175964.4 2008-11-03
CN200810175964 2008-11-03
CN2012102831227A CN102821381A (en) 2008-06-18 2009-01-05 Method and device for accessing and acquiring contexts and identifiers of user equipment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN2009100035419A Division CN101610504B (en) 2008-06-18 2009-01-05 Method and device for accessing and obtaining user equipment context and user equipment identification

Publications (1)

Publication Number Publication Date
CN102821381A true CN102821381A (en) 2012-12-12

Family

ID=43477772

Family Applications (4)

Application Number Title Priority Date Filing Date
CN201210283093.4A Active CN102821440B (en) 2008-06-18 2009-01-05 The method and apparatus accessing, obtaining customer equipment context and customer equipment identification
CN201110241665.8A Active CN102761855B (en) 2008-06-18 2009-01-05 Access, obtain customer equipment context and the method and apparatus of customer equipment identification
CN2011102433456A Pending CN102307339A (en) 2008-06-18 2009-01-05 Access method and device, and method and device for acquiring user equipment context and user equipment identity
CN2012102831227A Pending CN102821381A (en) 2008-06-18 2009-01-05 Method and device for accessing and acquiring contexts and identifiers of user equipment

Family Applications Before (3)

Application Number Title Priority Date Filing Date
CN201210283093.4A Active CN102821440B (en) 2008-06-18 2009-01-05 The method and apparatus accessing, obtaining customer equipment context and customer equipment identification
CN201110241665.8A Active CN102761855B (en) 2008-06-18 2009-01-05 Access, obtain customer equipment context and the method and apparatus of customer equipment identification
CN2011102433456A Pending CN102307339A (en) 2008-06-18 2009-01-05 Access method and device, and method and device for acquiring user equipment context and user equipment identity

Country Status (1)

Country Link
CN (4) CN102821440B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592974A (en) * 2015-03-02 2018-01-16 三星电子株式会社 Method and apparatus for providing service in a wireless communication system
CN110786047A (en) * 2017-09-04 2020-02-11 Oppo广东移动通信有限公司 Method and apparatus for wireless communication
CN111386742A (en) * 2018-10-17 2020-07-07 联发科技(新加坡)私人有限公司 Improved globally unique temporary identity allocation after establishing a mobile terminated connection in mobile communications
US11627515B2 (en) 2015-09-24 2023-04-11 Samsung Electronics Co., Ltd Method for supporting lawful interception of remote ProSe UE in network

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2707741C1 (en) 2016-07-01 2019-11-29 Телефонактиеболагет Лм Эрикссон (Пабл) Systems and methods of registering user equipment (ue)
CN110650471B (en) 2018-06-26 2020-12-22 华为技术有限公司 Access method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816206A (en) * 2005-02-02 2006-08-09 华为技术有限公司 Method for repositioning between support nodes in service general group wireless business
CN101009609A (en) * 2006-01-25 2007-08-01 华为技术有限公司 A network binding method and network binding system
CN101035308A (en) * 2006-03-09 2007-09-12 华为技术有限公司 Radio communication system and mobility management method
CN101039510A (en) * 2006-03-17 2007-09-19 华为技术有限公司 Method for realizing equivalent routing area in wireless evolution network
CN101043705A (en) * 2006-03-21 2007-09-26 华为技术有限公司 Method and system for limiting signaling of mobile management in wireless evolvement network
CN101128030A (en) * 2006-08-16 2008-02-20 华为技术有限公司 Context negotiation method
CN101128046A (en) * 2006-08-16 2008-02-20 华为技术有限公司 Method for obtaining access system context

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070254667A1 (en) * 2006-04-28 2007-11-01 Joanna Jokinen Inter-MME handover in evolved communication systems
US20070280177A1 (en) * 2006-05-31 2007-12-06 Nokia Corporation Managing user profile information in a mobile telecommunications network
JP4992308B2 (en) * 2006-06-14 2012-08-08 日本電気株式会社 Communication system, operation control method, location management server, and program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816206A (en) * 2005-02-02 2006-08-09 华为技术有限公司 Method for repositioning between support nodes in service general group wireless business
CN101009609A (en) * 2006-01-25 2007-08-01 华为技术有限公司 A network binding method and network binding system
CN101035308A (en) * 2006-03-09 2007-09-12 华为技术有限公司 Radio communication system and mobility management method
CN101039510A (en) * 2006-03-17 2007-09-19 华为技术有限公司 Method for realizing equivalent routing area in wireless evolution network
CN101043705A (en) * 2006-03-21 2007-09-26 华为技术有限公司 Method and system for limiting signaling of mobile management in wireless evolvement network
CN101128030A (en) * 2006-08-16 2008-02-20 华为技术有限公司 Context negotiation method
CN101128046A (en) * 2006-08-16 2008-02-20 华为技术有限公司 Method for obtaining access system context

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592974A (en) * 2015-03-02 2018-01-16 三星电子株式会社 Method and apparatus for providing service in a wireless communication system
US11129071B2 (en) 2015-03-02 2021-09-21 Samsung Electronics Co., Ltd. Method and apparatus for providing congestion control for application in wireless communication system
US11627515B2 (en) 2015-09-24 2023-04-11 Samsung Electronics Co., Ltd Method for supporting lawful interception of remote ProSe UE in network
CN110786047A (en) * 2017-09-04 2020-02-11 Oppo广东移动通信有限公司 Method and apparatus for wireless communication
CN111386742A (en) * 2018-10-17 2020-07-07 联发科技(新加坡)私人有限公司 Improved globally unique temporary identity allocation after establishing a mobile terminated connection in mobile communications
CN111386742B (en) * 2018-10-17 2023-09-29 联发科技(新加坡)私人有限公司 Method for improving global unique temporary identifier allocation and user equipment

Also Published As

Publication number Publication date
CN102761855B (en) 2016-08-10
CN102821440B (en) 2016-06-29
CN102821440A (en) 2012-12-12
CN102307339A (en) 2012-01-04
CN102761855A (en) 2012-10-31

Similar Documents

Publication Publication Date Title
CN101610504B (en) Method and device for accessing and obtaining user equipment context and user equipment identification
US10873883B2 (en) Method and apparatus for accessing legacy networks through temporary ID of evolved network
CN102761855B (en) Access, obtain customer equipment context and the method and apparatus of customer equipment identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121212