Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Telecommunications Network Technology》 2009-06
Add to Favorite Get Latest Update

Realization of"Three No Principle"Helping Develop 3G

"Three No Principle(No change of SIM card,no replacement of phone number,no need for registration)"is an important policy for the operator to promote 3G.In this article,the implementation theory of the principle has been researched and analyzed,and the major modification aspects on UE and network have been introduced.It also analyzed the authentication procedures for using the SIM card to 3G network,as well as the 2G/3G inter-operation mechanism and the improvement to the threshold parameters for UE's preferential access to 3G.In the end,the significant and affects of"Three No principle"have been summarized.
【CateGory Index】: TN929.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 DONG Jiang~(1a),DONG Shi-lei~2,GUO Yun-xia~(1b)(1a.Educational Technology Center,1b.Library of Nanhu Campus,Jilin University,Changchun 130012,China;2.School of Telecommunication and Network Technology,Bejing University of Posts and Telecommunication,Beijing 100876,China);Universal Platform of Downloading OTA Technology Based on SMS[J];Journal of Changchun Post and Telecommunication Institute;2005-06
2 Zhang Yi Wu Zhouhua Guangxi Radio &TV University,School of Science Engineering Nanning 530022;Research on the Security of One Card System on Campus[J];Journal of Guangxi Radio and TV University;2005-01
3 WU Weidong WANG Guangxing(Computer college,Shenyang Institute of Aeronautical Engineering,Liaoning Shenyang 110034);Design of a lower working power IC card reader of multi- SAM module[J];Journal of Shenyang Institute of Aeronautcal Engineering;2005-02
4 ;Design of the Museum Access and Historical relic Manage System Based on RFID Technology[J];Cards World;2008-01
5 ;Design of the Museum Access and Historical relic Manage System Based on RFIDTechnology[J];Cards World;2008-03
6 Guo Daifei Li Zhijiang Yang Yixian Hu Zhengming(Information Security Center,Beijing University of Posts and Telecommunications,Beijing100876);Solution of Security Problem of STK-based OTA System[J];Computer Engineering and Applications;2002-23
7 Li Zuowei Yang Yixian Hu Zhengming(Information Security Center of Beijing University of Posts and Telecommunications,Beijing100876);Research on STK-based Mobile Business Modes[J];Computer Engineering and Applications;2003-28
8 Li Zuowei Yang Yixian Hu Zhengming(Information Security Center of Beijing University of Posts and Telecommunications,Beijing100876);Research on Synchronization Counter Mechanism in STK-based OTA Technology[J];Computer Engineering and Applications;2003-31
9 XIE Man-de(Hangzhou University of Commerce, Hangzhou 310027,China);Research on Method of Power Analysis Attack Against Smart-card[J];Computer and Modernization;2005-02
10 OU Guang-yu1,LIU Hui2 (1.College of Computer Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China;2.Department of Computer and Information Engineering,Shanghai University of Electric Power,Shanghai 200090,China);RFID and Application in Logistics Support Chain[J];Computer and Modernization;2008-07
China Proceedings of conference Full-text Database 1 Hits
1 SHI Lei LV Bin Maintenance of Equipment Center,Tianjin Branch,China Netcom (Group) Corporation LTD,Tianjin 300052,China;An Improved Authentication Technology of Personal Handset System[A];[C];2008
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved