scispace - formally typeset
Search or ask a question

Showing papers by "Huawei published in 2005"


Patent
Enhui Liu1
21 Jul 2005
TL;DR: In this article, a method for providing QoS guarantee by an edge router, the edge router transporting user traffic between the access network and core network, the method comprising: creating a service traffic flow classification table; establishing a plurality of label switching paths; configuring the attributes of the label switching path; classifying and conditioning the service traffic flows entering into the core network at a downlink interface of an edge routers according to the service traffics classification table.
Abstract: The present invention discloses a method for providing QoS guarantee by an edge router, the edge router transporting user traffic between the access network and core network, the method comprising: creating a service traffic flow classification table; establishing a plurality of label switching paths; configuring the attributes of the label switching paths; classifying and conditioning the service traffic flows entering into the core network at a downlink interface of an edge router according to the service traffic flow classification table; forwarding the processed traffic by an uplink interface of the edge router according to the attributes of the label switching paths. The present invention also discloses an apparatus for providing QoS guarantee by an edge router. Using the present invention, an edge router can provide exact QoS guarantee and QoS routing control for the application flows.

132 citations


Patent
21 Dec 2005
TL;DR: In this paper, the authors present a user interface for making a playlist available to the public, including user-defined descriptor information, and a search engine for searching for such public playlists.
Abstract: The present disclosure provides a user interface for making a playlist available to the public. In another embodiment, the present disclosure provides a user interface for creating a playlist comprising user-defined descriptor information. In another embodiment, the present disclosure provides a user interface for searching for such public playlists.

97 citations


Patent
20 Oct 2005
TL;DR: In this paper, an apparatus and method for canceling ISI in a broadband wireless communication system are provided, where a controller acquires a CP length, a puncturing pattern, and a time sample interval according to a delay spread.
Abstract: An apparatus and method for canceling ISI in a broadband wireless communication system are provided. In a transmitter of the broadband wireless communication system, a controller acquires a CP length, a puncturing pattern, and a time sample interval according to a delay spread. A puncturer punctures coded data in the puncturing pattern. An IFFT processor IFFT-processes the punctured coded data and outputs sample data. A CP inserter generates an OFDM symbol by inserting a copy of a last part of the sample data before the sample data. Here, the length of the last part of the sample data is equal to the CP length. A D/A converter converts the OFDM symbol to an analog signal at a sampling rate determined by the time sample interval.

56 citations


Patent
12 Oct 2005
TL;DR: In this paper, an interface, apparatus, and method for communication between a radio equipment control (REC) node and first and second radio equipment (RE) nodes in a radio base station that transceives information over radio interface using multiple antenna carriers is described.
Abstract: An interface, apparatus, and method are described for communication between a radio equipment control (REC) node and first and second radio equipment (RE) nodes in a radio base station that transceives information over radio interface using multiple antenna carriers. The REC node is separate from and coupled to the first RE node by a first transmission link, and the second RE node coupled to the first RE by a second transmission link. Both control information and user information intended for communication between the REC node and the first RE node and the REC and the second RE node are conveyed over the first transmission link. The first RE node also conveys information between the REC and second RE node. Many advantageous features are described.

53 citations


Patent
Tang Yong1, Quan Xingyue1
12 Sep 2005
TL;DR: In this paper, the authors proposed a method for dynamically and losslessly adjusting bandwidth of an embedded Resilient Packet Ring (RPR) ring network, in which dynamic and lossless bandwidth adjustment for an RPR ring network embedded in a Synchronous Digital Hierarchy (SDH)/Synchronous Optical Network (SONET) can be realized through adding a Link Capacity Adjustment Scheme (LCAS) system in the SDH/SONET processing layer.
Abstract: Disclosed is a method for dynamically and losslessly adjusting bandwidth of an embedded Resilient Packet Ring (RPR) ring network, in which dynamic and lossless bandwidth adjustment for an RPR ring network embedded in a Synchronous Digital Hierarchy (SDH)/Synchronous Optical Network (SONET) can be realized through adding a Link Capacity Adjustment Scheme (LCAS) system in the SDH/SONET processing layer. When it is required to increase ring network bandwidth, the bandwidth of the link section between sites on the SDH/SONET processing layer is first increased. Then the LCAS system in the SDH/SONET processing layer is started, and the actual bandwidth of the link on the SDH/SONET processing layer is increased losslessly with the LCAS system. Finally the bandwidth of the ring network on the RPR processing layer is increased. When it is required to decrease ring network bandwidth, the bandwidth of the ring network on the RPR processing layer is first decreased. Then the LCAS system in the SDH/SONET processing layer is started, and the actual bandwidth of the link on the SDH/SONET processing layer is decreased losslessly with the LCAS system. Finally the bandwidth of the link section between sites on the SDH/SONET processing layer is decreased. With the disclosed method, dynamic and lossless bandwidth adjustment for an embedded RPR ring network in SDH/SONET can be realized.

38 citations


Patent
Huang Yingxin1, Wu Yajuan1, Zhang Wenlin1
19 Sep 2005
TL;DR: In this paper, a method for selecting the authentication manner at the network side is presented, in which HSS returns the authentication information supporting Early IMS authentication manner, or the authentication status supporting Full IMS Authentication manner to S-CSCF, or returns the failing information directly to SSCF based on the received authentication information requested in the authentication vector information message from the S-cSCF and the types of the requesting user.
Abstract: The emphases of a method for selecting the authentication manner at network side is that HSS returns the authentication information supporting Early IMS authentication manner, or the authentication information supporting Full IMS authentication manner to S-CSCF, or returns the failing information directly to S-CSCF, based on the received authentication information requested in the authentication vector information message from the S-CSCF and the types of the requesting user. If it is the first or the second situation, S-CSCF returns the information for granting access or refusing access to the user based on the authentication result, after authenticating by using the corresponding authentication manner. If it is the last situation, S-CSCF sends directly the information for prohibiting access to UE. The usage of the invention enables the network side to authenticate the user by selecting the accurate authentication manner based on the acquirement of the user, and increase the capability for handling the abnormal events associated with the network side, and the invention is compatible with the existing security protocol farthest at the network side.

35 citations


Patent
26 Oct 2005
TL;DR: In this paper, a system organizes the received data into uniform data records having a predetermined format, which are then processed to extract and/or deduce information desired by users.
Abstract: In one example, a system receives, from different sources, data having various formats, the received data is selected and combined in accordance with the invention to create accurate records. Specifically, the inventive system organizes the received data into uniform data records having a predetermined format. The data in the uniform data records is converted, if necessary, to conform to a predetermined nomenclature, resulting in normalized data records. The normalized data records are then processed to extract and/or deduce information desired by users.

35 citations


Patent
Defeng Li1, Guoping Li, Bin Li
12 Jan 2005
TL;DR: In this paper, a system for ensuring quality of service (QoS) in a virtual private network and a method thereof are provided, which includes a logical bearer network, which is formed by connecting label switch paths configured with preserving bandwidth to routers, and is dedicated to transmit QoS service data.
Abstract: A system for ensuring quality of service (QoS) in a virtual private network and a method thereof are provided. The system includes a logical bearer network, which is formed by connecting label switch paths configured with preserving bandwidth to routers, and is dedicated to transmit QoS service data; and a bearer control network, which is used to maintain logical bearer network, allocate route, mark service priority, and route service data to opposite end. The method includes the steps of: A. constructing a logical bearer network to transmit QoS service data by configuring label switch paths with preserved bandwidth; B. providing a centralized resource controller to manage resources of the logical bearer network; C. if QoS service data is to be transmitted, marking service priority in QoS field of the routing labels of multi-protocol label switch data packets, and routing service data to the opposite end.

34 citations


Patent
Jie Wang1
18 Mar 2005
TL;DR: In this paper, a method for implementing access restriction of mobile networks is presented, which includes the following steps: a Mobile Station (MS) inquiring a list of forbidden Public Land Mobile Networks (PLMNs) and access technology identifiers, which is saved by itself, when selecting a PLMN network; the MS determining whether the selected PLMN networks and the access technology exist in the list of prohibited PLMNs, if they exist, the MS will not send a Location Updating Request to a Mobile Switching Center/Serving GPRS Support Node (MSC
Abstract: The present invention discloses a method for implementing access restriction of mobile networks. The method includes the following steps: a Mobile Station (MS) inquiring a list of forbidden Public Land Mobile Networks (PLMNs) and access technology identifiers, which is saved by itself, when selecting a PLMN network; the MS determining whether the selected PLMN network and the access technology exist in the list of forbidden PLMNs and access technology identifiers, if they exist, the MS will not send a Location Updating Request to a Mobile Switching Center/Serving GPRS Support Node (MSC/SGSN); otherwise, the MS will send the Location Updating Request to the MSC/SGSN in order to access to the network. The present invention makes it possible to implement the access restrictions upon different types of access networks using different restriction rules. Furthermore, during the process of implementing the access restriction, the modification to the existing networks and user terminals is very small, the method is easy to implement and can well satisfy demands on the access restriction of operators.

33 citations


Patent
Yajuan Wu1
07 Jul 2005
TL;DR: In this article, a method of informing a network of a change of user equipment capability includes: stopping a registration timer on the user side set currently when the user equipment capabilities changes; sending a register request message carrying information of new equipment capability to the network; analyzing, by the network, the register request messages, and storing the information for reference by subsequent establishment of a session.
Abstract: A method of informing a network of a change of user equipment capability includes: stopping a registration timer on the user side set currently when the user equipment capability changes; sending a register request message carrying information of new user equipment capability to the network; analyzing, by the network, the register request message, and storing the information of new user equipment capability for reference by subsequent establishment of a session; stopping a current registration timer on the server side set for the user equipment; initiating a new registration timer on the server side for the user equipment; sending a response message carrying information of the new registration timer on the server side to the user equipment; resetting the registration timer on the user side based on information of the new registration timer on the server side in the response message. The capability change is informed to the network in time.

32 citations


Patent
21 Dec 2005
TL;DR: In this article, the authors present a method and user interface for sharing a media collection among computing devices in communication via a network, regardless of their associated rights, such as non-DRM media files, purchased and downloaded media files and subscription download files such as tethered downloads.
Abstract: In one aspect, the present disclosure provides for the accessing and playing of media files having differing associated rights such as non-DRM media files, purchased and downloaded media files, subscription download files such as tethered downloads, and subscription streamed DRM files. In one embodiment, the present disclosure provides a method and user interface for sharing a media collection among computing devices in communication via a network. In one embodiment, the disclosed method allows access and playback, from each computing device on a network, of all media files in a media collection, regardless of their associated rights.

Patent
Yanhong Wang1, Hai Zhang1, Hao Hu1
30 Sep 2005
TL;DR: In this article, the authors present a method and apparatus for service identifying and routing in a multimedia broadcast and multicast service (MBMS) system, which includes a radio access network equipment (RNC) and a core network equipment communicating with each other via an Iu connection.
Abstract: Embodiments of the present invention disclose a method and apparatus for service identifying and routing in a multimedia broadcast and multicast service (MBMS) system. The apparatus includes a radio access network equipment (RNC) and a core network equipment (CN) communicating with each other via an Iu connection; CN includes a module for service information transmission which is used to send the identity information corresponding to the service the UE joins to RNC, and RNC includes a module for service identifying and routing which is used to identify the service according to the identity information and determine the routing of the MBMS service in the non access stratum. RNC obtains the identity information corresponding to the service the UE joins through interaction of interface information with CN, identifies the service and determines the routing of the MBMS service in the non access stratum.

Patent
Wang Yuxiang Wan1, Huaixue Wan1, Li Zeng1
27 Sep 2005
TL;DR: In this article, a ring network and a method for implementing the service thereof is described. But the ring network includes multiple nodes in a same logic layer for accessing a service to ring network or receiving a service from ring network; two virtual channels of reverse directions, which connect the adjacent nodes and are utilized to bear and adapt service data; a physical link which is utilized to carry the service data adapted to the virtual channel.
Abstract: This invention discloses a ring network and a method for implementing the service thereof. The ring network includes multiple nodes in a same logic layer for accessing a service to the ring network or receiving a service from the ring network; two virtual channels of reverse directions, which connect the adjacent nodes and are utilized to bear and adapt service data; a physical link, which is utilized to bear the service data adapted to the virtual channel. The method includes the steps of configuring virtual channels at the nodes to form an eastward and westward bidirectional ring network; establishing service Label Switching Path schedules at the nodes; determining a service sink node according to the Label Switching Path schedule at a service source node; dispatching services up to the ring network according to a predetermined algorithm; multiplexing the services of different nodes in a same virtual channel for transmission in the way of Label Switching Path; dispatching the services down the ring network at the service sink node.

Patent
Jun Yan1, Yanming Liu1
05 Sep 2005
TL;DR: In this paper, a method and node apparatus for traffic protection of Optical Transport Network (OTN) is presented. But the method is not suitable for the case of large-scale networks, where the number of working channels is equal to that of the working channels.
Abstract: Disclosed is a method and node apparatus for traffic protection of Optical Transport Network (OTN), including: setting a part of channels in one fiber as working channels used for carrying traffic in need of protection, and setting a part of channels in the other fiber with a reverse transmission direction as protection channels, the number of which is equal to that of the working channels, to form a one-to-one protection for the working channels; when a failure in an optical line of OTN is detected, determining a bridging node and a switching node in accordance with pre-designated protection strategy, bridging and switching the traffic to be transmitted through the failed optical line between the working channels and the protection channels at the determined bridging node and switching node. This invention can realize OTN protection based on two-fiber OMS shared protection ring, and improve the transmission reliability of optical networks.

Patent
Wu Yang1, Qianfeng Xu1
22 Apr 2005
TL;DR: In this paper, a sub-rate transmission method for user data services in transmission devices of a metropolitan area network (MAN) is proposed, which comprises the steps of: pre-configuring each transmission device to form forwarding table items representing corresponding relationship between self-defined tags and transmission lines; after receiving a user data frame, an original transmission device nesting a self defined tag into the user dataframe according to the forwarding table item to form a self- defined data frame.
Abstract: The present invention discloses a sub-rate transmission method for user data services in transmission devices of a Metropolitan Area Network (MAN). The method comprises the steps of: pre-configuring each transmission device to form forwarding table items representing corresponding relationship between self-defined tags and transmission lines; after receiving a user data frame, an original transmission device nesting a self-defined tag into the user data frame according to said forwarding table items to form a self-defined data frame, then transmitting the self-defined data frame; and after receiving the self-defined data frame, a terminal transmission device determining an output port for transferring the data frame by searching the forwarding table items with the nested self-defined tag, then deleting the nested self-defined tag and sending the original user data frame to the said output port. The present invention, by nesting a self-defined tag, can greatly increase the number of Virtual Local Area Networks (VLANs) accommodated by a MAN as well as simplify the configuration of tags for user data to bring more convenience to users.

Patent
Yajuan Wu1, Wenlin Zhang1
06 Jan 2005
TL;DR: In this paper, a method for reducing the interface load of Home Subscriber Server (HSS) is proposed, which simplifies the steps of querying user subscribing information, optimizes service flow, and reduces interface load.
Abstract: The present invention provides a method for reducing interface load of Home Subscriber Server. After receiving request information from S-CSCF that requests to save name information of the S-CSCF and requests for user subscribing information, HSS first saves name information of the S-CSCF included in the information, then performs a query according to user identification in the information, and returns respond information including user subscribing information back to the S-CSCF directly. The present invention simplifies the steps of querying user subscribing information, optimizes service flow, and reduces interface load of the HSS. In addition, After receiving query request information from the I-CSCF, HSS returns respond information including S-CSCF name and/or information of S-CSCF ability set that can support the strictest service-subscribing requirement of the user to the I-CSCF, further reducing the interface load of HSS. The present invention has no effect on existing network structure and service implementation, and needs not to modify existing interface specification, therefore having good compatibility and expandability.

Patent
Duan Xiaoqin1
11 Aug 2005
TL;DR: In this paper, a method for establishing a diameter session for packet flow based charging with multiple ways for establishing the diameter session between a TPF and a CRF is presented, which improves the mechanism for establishing Diameter sessions and makes the implementation of the charging flow more integrated.
Abstract: A method for establishing a Diameter session for packet flow based charging with multiple ways for establishing the Diameter session between a TPF and a CRF The Diameter session can be established for each bearer of each subscriber, which means that for GPRS the Diameter session is established for each PDP Context State Model of each subscriber The Diameter session can also be established for the bearers with a same APN of each subscriber The Diameter session can further be established for all the bearers of each subscriber The invention improves the mechanism for establishing Diameter sessions and makes the implementation of the charging flow more integrated Moreover, the multiple ways for establishing Diameter sessions between the TPF and the CRF provided in the present invention can be flexibly selected according to the practical charging applications

Patent
Enhui Liu1
07 Sep 2005
TL;DR: In this paper, a system and a method of dynamic QoS negotiation in NGN is presented, where the resource and admission control subsystem (RACS) provides intercommunication interfaces with Transport functional (TF) entity, Service Control Functional (SCF) entities, and Network Attachment Subsystem (NASS).
Abstract: The present invention discloses a system and a method of dynamic QoS negotiation in NGN. The Resource and Admission Control Subsystem (RACS) provides intercommunication interfaces with Transport functional (TF) entity, Service Control Functional (SCF) entities, and Network Attachment Subsystem (NASS), and thereby, when a user terminal in NGN is to develop a service with QoS requirement, the RACS can obtain the QoS requirement parameters of a service, determine the admission control decision parameters in accordance with the QoS requirement parameters, and the RACS send the determined admission control decision parameters to the TF entity for execution, such that the QoS assurance for the service is realized. The present invention allows an end-to-end QoS negotiation in NGN in accordance with the availability of current transport network resources, and thereby can effectively improve the transport resource utilities. Therefore, the present invention can effectively ensure QoS of service transported in NGN.

Patent
Larry R. Dennison, Derek Chiou1
09 Jun 2005
TL;DR: In this paper, the packet is scheduled according to its latency requirements and queues are assigned to the queues according to their latency ranges, within ranges, queues of different priorities may be provided.
Abstract: In scheduling a packet, latency requirements of the packet is determined. The packet is then scheduled according to its latency requirements. Queues may be assigned latency ranges and packets are assigned to the queues according to those ranges. Within ranges, queues of different priorities may be provided.

Patent
Wenlin Zhang1
28 Oct 2005
TL;DR: In this article, a method for the establishment of a service tunnel in a wireless local area network (WLAN) is presented, which includes a service authentication authorization unit making authentication and authorization to a WLAN user terminal currently requesting a service, and judging whether the authentication is successful.
Abstract: Disclosed herein is a method for the establishment of a service tunnel in a wireless local area network (WLAN). The method includes a service authentication authorization unit making authentication and authorization to a WLAN user terminal currently requesting a service, and judging whether the authentication and authorization is successful. If successful, the method includes generating service authorization information that includes a shared communication key used for communication between the WLAN user terminal and a destination packet data gateway (PDG), and otherwise ending the procedure. The method further includes the service authentication authorization unit sending to the destination PDG the generated service authorization information including the shared communication key, and the destination PDG, according to the shared communication key, establishing a trust relation with the WLAN user terminal through negotiation with the WLAN user terminal. If the establishment of the trust relation is successful, the destination PDG allocates tunnel resources for the WLAN user terminal, negotiates parameters and then establishes a tunnel with the WLAN user terminal, and otherwise, ends the procedure. As a result, a secured service data tunnel may be established between the user terminal and the PDG.

Patent
Hao Hu1, Wenlin Zhang1, Hai Zhang1, Bingyu Qu1
13 Apr 2005
TL;DR: In this article, a method of counting the number of MBMS subscribers, comprising of setting different types of notifications, each of which is designed to instruct UEs in at least one mode to respond said counting number of subscribers, is presented.
Abstract: The present invention discloses a method of counting the number of MBMS subscribers, comprising: setting different types of notifications, each of which is designed to instruct UEs in at least one mode to respond said counting number of subscribers; the network side issuing different types of notifications, so as to monitor the activation of UEs in at least one mode in the MBMS with said notifications, and thereby achieving counting the number of subscribers of each MBMS. The method of counting the number of MBMS subscribers provided in the present invention can be used to perform counting the number of subscribers of each MBMS more accurately, so as to take fuller advantage of the precious air interface resource.

Patent
Wenlin Zhang1
27 Oct 2005
TL;DR: In this paper, a method of user access authorization in wireless local area networks is presented, where different users can be controlled to access the network according to different authorization conditions, and be restricted by different access rules after getting accessed.
Abstract: The present invention discloses a method of user access authorization in wireless local area networks. The method comprises: when a Wireless Local Area Network (WLAN) user terminal is accessing a WLAN operational network, the WLAN operational network, while authenticating this WLAN user terminal, judging whether to allow this WLAN user terminal to access according to authorization conditions having an impact on the access of this WLAN user terminal, if yes, the WLAN operational network will determine the access rules of this WLAN user terminal according to the said authorization conditions; otherwise, the WLAN operational network will notify the WLAN user terminal about the failure. By adopting the method of the present invention, different users can be controlled to access the network according to different authorization conditions, and be restricted by different access rules after getting accessed. As a result, the access control capability of a wireless local area network is enhanced and the working efficiency of the network is improved.

Patent
Duan Xiaoqin1
06 Oct 2005
TL;DR: In this paper, a method for restricting Location request flow in location service, related to flow control technique, is presented, which includes: after receiving Location request sent by LCS Client, LCS Server verifying whether the number of current Location request task is more than maximum location request task, if yes, LCS server rejects to process current location request; otherwise, LCSserver process the Location request.
Abstract: Disclosed is a method for restricting Location request flow in location service, related to flow control technique. The method includes: after receiving Location request sent by LCS Client, LCS Server verifying whether the number of current Location request task is more than Maximum Location request task, if yes, LCS Server rejects to process current Location request; otherwise, LCS Server process the Location request. On the one hand, LCS Server can set different Maximum Location request task for different LCS Clients, and restrict Location request number sent by the LCS Client; on the other hand, LCS Server can control whether to continue processing subsequent Location request according to self processing capacity, so as to protect system performance security of LCS Server when facing collision of large number of Location requests.

Patent
Fu Yan1, Haitao Hu1
24 Mar 2005
TL;DR: In this article, a method for realizing the multicast service includes: A. establish the correspondence relation between multicast user address and multicast group address in advance; B. obtain the requesting message transmitted by the user when he joins the multicasting group and judge whether the multicasted group address matched the multicAST user address.
Abstract: A method for realizing the multicast service includes: A. establish the correspondence relation between the multicast user address and the multicast group address in advance; B. obtain the requesting message transmitted by the user when he joins the multicast group and judge whether the multicast group address in the requesting message matches the multicast group address that the multicast user address corresponds to in the correspondence relation established in step A according to the multicast user address and the multicast group address carried in the requesting message, if matching, the user is permitted to join the multicast group, otherwise the user is prohibited to join the multicast group. The present invention can distribute the predetermined multicast resource to the predetermined multicast users rapidly and purposefully and restrict the maximum number of the multicast group that every multicast user can join at the same time. The present invention can control the bandwidth of the multicast service efficiently and thereby protect the network device efficiently. The present invention makes the multicast user and the multicast resource in the administrable and operable state while realizing the multicast service, realizes the multiple usage of the multicast service.

Patent
Yanhong Wang1, Hao Hu1
30 Sep 2005
TL;DR: In this article, a recounting method in multimedia broadcast/multicast service (MBMS) performs the following steps: A) the wireless access network sends the notification information for recounting current MBMS service to the UEs; B) after detecting the recounting notification information, the UE respond to the information and establish wireless resource controlling connections or initiate the cell update procedure according to the notifications and the connection status; C) the WAN recounts the UE according to UE's connection status and the used MBMS services.
Abstract: When the wireless access network is initiating recounting, the recounting method in multimedia broadcast/multicast service (MBMS) performs the following steps: A) The wireless access network sends the notification information for recounting current MBMS service to the UEs; B) After detecting the recounting notification information, the UEs respond to the information and establish wireless resource controlling connections or initiate the cell update procedure according to the notification information and the connection status; C) The wireless access network recounts the UEs according to the UE's connection status and the used MBMS service. According to the method, the recounting is more accurate, and the MBMS carrying mode selection of the UTRAN based on the recounting result is more appropriate.

Patent
Bin Li1, Defeng Li1
28 Jan 2005
TL;DR: In this article, a method for implementing a virtual leased line (VLL) is provided, which includes the steps of configuring a virtual local area network (VLAN) label stack on the basis of VLAN QinQ technique, configuring an VLAN switching device and a multi-protocol label switching device to communicate with each other, extending a label distribution protocol (LDP) to support encapsulation of Vlan labels, so as to carry out VLAN label assignment and take the extended LDP as a topology discovery protocol for an L2 virtual private network,
Abstract: A method for implementing a virtual leased line (VLL) is provided. The method includes the steps of: configuring a virtual local area network (VLAN) label stack on the basis of VLAN QinQ technique; configuring a VLAN QinQ switching device and a multi-protocol label switching device to communicate with each other; extending a label distribution protocol (LDP) to support encapsulation of VLAN labels, so as to carry out VLAN label assignment and take the extended LDP as a topology discovery protocol for an L2 virtual private network; setting the range of VLAN labels; implementing a VLL by constructing a VLAN switching path.

Patent
Qian Sun1
21 Dec 2005
TL;DR: In this paper, a platform system for game including the interface for processing virtual article data and virtual article service modules in database of virtual article is presented, which also discloses game system including server for virtual articles.
Abstract: The method sets up united interface for processing virtual article data and database of virtual article. Steps for processing virtual article data includes: (1) in running procedure, each game calls interface for processing virtual article data; (2) virtual article data are processed by interaction between interface for processing virtual article data and database of virtual article. The invention discloses a platform system for game including the interface for processing virtual article data and virtual article service modules in database of virtual article. The invention also discloses game system including server for virtual articles. Comparing existing techniques, the invention processes virtual article data unitedly in game system so as to possess advantages: low cost of development, united data, easy of maintenance, and good security etc.

Patent
Yajuan Wu1
27 Jul 2005
TL;DR: In this article, when the terminal capacity changes, the subscriber equipment stops the current set login and refresh timer at client-side, and sends the login request message carrying new terminal capacity message to network; the network analyzes the reply message, and stores the new terminal message.
Abstract: The method includes following steps: when the terminal capacity changes, the subscriber equipment stops the current set login and refresh timer at client-side, and sends the login request message carrying new terminal capacity message to network; the network analyzes the login request message, and stores the new terminal capacity message; then the current login and refresh timer at network side set for the subscriber is stopped. The new login and refresh timer at network side starts for the subscriber; the response message carrying new login and refresh timer message is sent to subscriber equipment; according to the message about the new login and refresh timer in the response message, the login and refresh timer at network side is set again.

Patent
Ding Yingzhe1
23 Nov 2005
TL;DR: In this article, a method for message transmission in a simplified way is presented, where UE transmitting the messages to the network through the lower layer, the method includes following steps: if the UE has received response from the network before the timer expires, stopping the timer; otherwise, ending the current procedure.
Abstract: The present invention discloses a method for messages transmission in a simplified way UE transmitting the messages to the network through the lower layer, the method includes following steps: if the lower layer indicates the message has been transmitted successfully, then starting timer, otherwise, ending the current procedure; if the UE has received response from the network before the timer expires, stopping the timer; otherwise, ending the current procedure. The method can effectively avoid unnecessary operations, and reduce energy consumption of the UE.

Patent
Huang Yingxin1, Wenlin Zhang2
24 Mar 2005
TL;DR: In this article, the authors propose a method for a roaming user to establish security association with the application server in the visited network by making use of the authentication results of the generic authentication architecture in the home network via the BSF in the local network, or the Generic Authentication Protocol (GAP) proxy in a local network and the AAA server in a home network.
Abstract: The present invention provides a method for a roaming user to establish security association with the application server in the visited network. When receiving the service request from the roaming user, the application server in the visited network establishes security association with the roaming user by making use of the authentication results of the generic authentication architecture in the home network via the BSF in the local network, or the generic authentication architecture proxy in the local network, or the AAA server in the local network and the AAA server in the roaming user's home network, so as to achieve the object that the roaming user is able to use the services of the visited network after authentication of the generic authentication architecture in his home network.