17965018. AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.

Inventor(s)

Shengfeng Xu of Beijing (CN)

Yanmei Yang of Beijing (CN)

Meng Li of Beijing (CN)

Jiangwei Ying of Beijing (CN)

AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17965018 titled 'AUTHORIZATION METHOD, POLICY CONTROL FUNCTION DEVICE, AND ACCESS AND MOBILITY MANAGEMENT FUNCTION DEVICE

Simplified Explanation

The abstract describes an authorization method for establishing a relay service relationship between a relay terminal and a remote terminal. The method involves receiving a request message from the relay terminal, which includes identifiers of both the remote terminal and the relay terminal. The policy control function device then determines an authorization result based on these identifiers, indicating whether the relay terminal and the remote terminal are authorized to establish the relay service relationship. The authorization result is then sent back to the access and mobility management function device.

  • The method involves receiving a request message from a relay terminal.
  • The request message includes identifiers of both the remote terminal and the relay terminal.
  • The policy control function device determines an authorization result based on these identifiers.
  • The authorization result indicates whether the relay terminal and the remote terminal are authorized to establish a relay service relationship.
  • The authorization result is sent back to the access and mobility management function device.

Potential Applications

  • This authorization method can be applied in various communication systems that involve relay terminals, such as cellular networks or wireless mesh networks.
  • It can be used to ensure secure and authorized connections between relay terminals and remote terminals.

Problems Solved

  • The method solves the problem of unauthorized relay service relationships by providing an authorization mechanism based on the identifiers of the relay terminal and the remote terminal.
  • It helps prevent unauthorized access to network resources and ensures that only authorized devices can establish relay service relationships.

Benefits

  • The method provides a secure and controlled way to establish relay service relationships.
  • It helps protect network resources from unauthorized access.
  • It ensures that only authorized devices can establish relay service relationships, enhancing network security and reliability.


Original Abstract Submitted

An authorization method includes receiving, by a policy control function device of a relay terminal, a request message from an access and mobility management function device of the relay terminal. The request message includes an identifier of a remote terminal and an identifier of the relay terminal. The method also includes determining, by the policy control function device, an authorization result based on the identifier of the remote terminal and the identifier of the relay terminal. The authorization result indicates whether the relay terminal and the remote terminal are authorized to establish a relay service relationship. The method further includes sending, by the policy control function device, the authorization result to the access and mobility management function device.