17965018. AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)
Contents
- 1 AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Original Abstract Submitted
AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE
Organization Name
Inventor(s)
AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17965018 titled 'AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE
Simplified Explanation
The abstract describes an authorization method for establishing a relay service relationship between a relay terminal and a remote terminal. The method involves receiving a request message from the relay terminal, which includes identifiers of both the remote terminal and the relay terminal. The policy control function device then determines an authorization result based on these identifiers, indicating whether the relay terminal and the remote terminal are authorized to establish the relay service relationship. The authorization result is then sent back to the access and mobility management function device.
- The method involves receiving a request message from a relay terminal.
- The request message includes identifiers of both the remote terminal and the relay terminal.
- The policy control function device determines an authorization result based on these identifiers.
- The authorization result indicates whether the relay terminal and the remote terminal are authorized to establish a relay service relationship.
- The authorization result is sent back to the access and mobility management function device.
Potential Applications
- This authorization method can be applied in various communication systems that involve relay terminals, such as cellular networks or wireless mesh networks.
- It can be used to ensure secure and authorized connections between relay terminals and remote terminals.
Problems Solved
- The method solves the problem of unauthorized relay service relationships by providing an authorization mechanism based on the identifiers of the relay terminal and the remote terminal.
- It helps prevent unauthorized access to network resources and ensures that only authorized devices can establish relay service relationships.
Benefits
- The method provides a secure and controlled way to establish relay service relationships.
- It helps protect network resources from unauthorized access.
- It ensures that only authorized devices can establish relay service relationships, enhancing network security and reliability.
Original Abstract Submitted
An authorization method includes receiving, by a policy control function device of a relay terminal, a request message from an access and mobility management function device of the relay terminal. The request message includes an identifier of a remote terminal and an identifier of the relay terminal. The method also includes determining, by the policy control function device, an authorization result based on the identifier of the remote terminal and the identifier of the relay terminal. The authorization result indicates whether the relay terminal and the remote terminal are authorized to establish a relay service relationship. The method further includes sending, by the policy control function device, the authorization result to the access and mobility management function device.