Method and device for controlling subscriber strategy

A user policy, user technology, applied in the field of communication, can solve the problem of no policy server controlling user policy and so on

Inactive Publication Date: 2011-06-15
ZTE CORP
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In the above network architecture, in the prior art, there is no method for controlling user policies based on a policy server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling subscriber strategy
  • Method and device for controlling subscriber strategy
  • Method and device for controlling subscriber strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] In this embodiment, when a user initially accesses the network, an AAA (Authentication, Authorization, Accounting, verification, authorization, and accounting) Server interacts with a policy server and triggers the policy server to issue user policies as an example. Process such as figure 2 Shown:

[0084] In step 201, the gateway for accessing the broadband network receives an indication of the user's access to the network, such as a DHCP Discovery message.

[0085] In the present invention, the access broadband network gateway is an IP edge device.

[0086] Step 202, the gateway for accessing the broadband network sends an access request message to the AAA server, requesting the AAA server to perform access authentication and authorization for the user.

[0087] Step 203.1: The AAA server responds to the user access authentication and authorization request to the access broadband network gateway, authenticates the user and provides authorization information of the ...

Embodiment 2

[0095] In this embodiment, when the user subscription information in the AAA Server is changed, the AAA Server interacts with the policy server to trigger the policy server to update the installed user policy as an example. The specific process is as follows: image 3 Shown:

[0096] In step 301, the AAA server detects that information related to user subscription has been changed.

[0097] For example, a user who has already accessed the network changes his subscription-related information in the AAA server. This embodiment is not limited to the user's modification of user subscription-related information, and is also applicable to other entities in the network that have modified user subscription information.

[0098] Step 302, the AAA server sends the changed user subscription related information to the policy server.

[0099] Specifically, if the AAA server interacts with the policy server through the diameter protocol, the AAA server sends the user subscription-related ...

Embodiment 3

[0105] In this embodiment, when the user subscription information in the policy server is not available, the policy server actively requests the AAA server for the subscription information and installs the user policy as an example. The specific process is as follows: Figure 4 Shown:

[0106] Step 401, the policy server detects that the user subscription-related information is unavailable;

[0107] The unavailability of the user subscription-related information may be that the user subscription-related information is lost or incomplete.

[0108] For example, when receiving a service resource request sent by a network service provider or an application service provider, the policy server detects that information related to user subscription related to the application is unavailable.

[0109] Step 402, the policy server requests the user subscription related information from the AAA server.

[0110] Specifically, if the AAA server interacts with the policy server through the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for controlling a subscriber strategy, relating to the communication field. The method comprises the step that: a strategy server obtains information related to a subscriber from an authentification, authorization and accounting (AAA) server, and conducts a follow-up strategy control according to the obtained information related to the subscriber.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for controlling user policies. Background technique [0002] With the development of IP technology, the simplicity, speed, and sharing of IP networks have promoted the prosperity of broadband networks, and IP services have surged, such as IP-based voice, video, games, and enterprise services. The requirements will continue to increase. [0003] Broadband Forum (Broadband Forum) is committed to solving the problems encountered in the development of broadband networks. It is mainly responsible for the research on the three fields of broadband network control (control), access (access), and Home (family). [0004] Such as figure 1 As shown, the broadband network architecture established by BBF includes: [0005] User equipment (User Equipment, UE); [0006] CPE (Customer Premises Equipment); [0007] Business router (Business router), which is used to provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L12/18H04L47/2466
Inventor 成超文郭剑
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products