Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing limited policy charging control

Use PCRF to determine whether the visited network supports PCC, and send the limited policy charging control deployment identifier to AF, which solves the complexity problem of AF in determining whether the visited network supports policy charging control, and achieves more accurate policy charging control and resources. save.

Active Publication Date: 2010-10-20
ZTE CORP
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main problem of this method is that the configuration information is relatively complicated, especially when the AF is a third-party service, it is difficult to update the configuration information, and when some S-GWs or trusted non-3GPP access gateways in the visited network or non-3GPP network When the BBERF function is supported, the AF will not be able to simply decide whether to subscribe to events based on the visited network where the UE is located

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing limited policy charging control
  • Method and system for realizing limited policy charging control
  • Method and system for realizing limited policy charging control

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0048] image 3 Shown is a schematic diagram of the application scenario of the first embodiment of the present invention; in this application scenario, the UE accesses the EPS through the trusted non-3GPP access network and adopts the PMIPv6 protocol; the 3GPP network supports dynamic PCC, and the trusted non-3GPP access network The network does not support dynamic PCC, and it can be trusted that the non-3GPP network and the 3GPP network belong to different operators.

[0049] The method flow chart of the first embodiment of the present invention is as follows Figure 4 As shown, the specific steps are as follows:

[0050] 401: The UE accesses a trusted non-3GPP access network.

[0051] 402: After the UE accesses the trusted non-3GPP access network, it requests the HSS / AAA for EPS access authentication; after receiving the EPS access authentication request, the HSS / AAA authenticates the requesting UE; HSS / AAA completes After the UE is authenticated, the P-GW selection info...

no. 2 example

[0068] In this embodiment, the UE is image 3 In the application scenario shown, through the trusted non-3GPP access network and the DSMIPv6 protocol to access EPS, the 3GPP network supports dynamic PCC, but the trusted non-3GPP access network does not support dynamic PCC (the trusted non-3GPP access network and 3GPP networks belong to different operators). The method flowchart of the second embodiment of the present invention is as follows Figure 5 As shown, the specific steps are as follows:

[0069] 501: The UE accesses a trusted non-3GPP access network, the HSS / AAA and the UE perform mutual authentication, and the HSS / AAA authorizes the UE.

[0070] 502: After the authentication is successful, the UE negotiates with the trusted non-3GPP access gateway and decides to use the DSMIPv6 protocol for access, the UE performs a layer 3 attachment process, and the trusted non-3GPP access gateway allocates a CoA (care-of address) for the UE.

[0071] 503: The UE performs DNS (Do...

no. 3 example

[0084] Figure 6 Shown is a schematic diagram of the application scenario of the third embodiment of the present invention; when the UE is in the roaming scenario of the home route, it accesses the EPS through the E-UTRAN of the visited location, and the PMIPv6 protocol is used between the S-GW and the P-GW, where The home network of the UE supports dynamic PCC, but the visited network does not support dynamic PCC.

[0085] The method flowchart of the third embodiment of the present invention is as follows Figure 7 As shown, the specific steps are as follows:

[0086] 701: The UE sends an attach request message to the MME; the HSS authenticates and authorizes the UE. After the authentication is successful, the MME initiates a location update process, and the HSS sends the subscription data of the UE to the MME. During the authentication process, the HSS sends the P-GW selection information subscribed by the UE to the MME, and the MME selects the P-GW according to the P-GW s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing limited policy charging control. The method comprises the following steps that: a policy and charging rule function (PCRF) entity judges whether the visited network where user equipment (UE) roams supports the policy charging control (PCC); and if the visited network does not support PCC, the PCRF entity sends a message to an applicationfunction (AF), wherein the message carries an identifier for indicating the limited policy charging control deployment. Due to the adoption of the method and system of the invention, the AF can be informed of the current policy charging control deployment condition more conveniently and accurately while the limited policy charging control is realized; and the AF can perform corresponding operation, such as no event subscription or the event subscription canceling, according to the current policy charging control deployment condition, thereby fulfilling the aim of saving the system resources.

Description

technical field [0001] The invention relates to a method and system for realizing limited policy charging control. Background technique [0002] Such as figure 1 As shown, the 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) Evolved Packet System (EPS for short) consists of the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E- UTRAN), Mobility Management Entity (MME for short), Serving Gateway (S-GW for short), Packet Data Network Gateway (PDN GW or P-GW for short), home user server ( Home Subscriber Server (HSS for short), 3GPP Authentication, Authorization and Accounting (AAA for short) server, Policy and Charging Rules Function (Policy and Charging Rules Function, PCRF for short) and other supporting nodes. [0003] Among them, MME is used for mobility management, processing of non-access stratum signaling and management of user mobility management context and other control plane relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/24H04L12/14
CPCH04L12/1403H04L12/14H04W4/24H04L12/1407
Inventor 周晓云宗在峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products