Resource authorization method and system

A technology of resources and resource information, applied in the field of resource authorization methods and systems, which can solve problems such as rough architecture

Inactive Publication Date: 2015-09-16
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology only provides a rough architecture, how to implement policy control is still an unsolved problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource authorization method and system
  • Resource authorization method and system
  • Resource authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0119] Figure 5 It is a flowchart of H(e)NB reporting IPSec tunnel information in the method of the present invention, and is applicable to EPS system or 3G system. exist Figure 4 In the technical solution shown, the step 1 includes:

[0120] Step 11. The H(e)NB is powered on and connected to the fixed network. The fixed network assigns a local IP address to the H(e)NB through relevant mechanisms, and this address is used as the subsequent IPSec tunnel encapsulation between the H(e)NB and the SeGW. The external IP address of the packet.

[0121] Step 12, the H(e)NB establishes an IPsec tunnel with the SeGW to ensure the security and integrity of data during transmission.

[0122] Step 13: The SeGW reports the tunnel information of the IPsec tunnel and the H(e)NB identification information to the H(e)NB PF through the interface T1.

[0123] Step 14, the H(e)NB PF saves the tunnel information and the H(e)NB identification information.

[0124] In this embodiment, the SeGW...

no. 2 example

[0128] In this example, Figure 4 Step 1 in the shown technical solution includes:

[0129] Step 11. The H(e)NB is powered on and connected to the fixed network. The fixed network assigns a local IP address to the H(e)NB through relevant mechanisms, and this address is used as the subsequent IPSec tunnel encapsulation between the H(e)NB and the SeGW. The external IP address of the packet.

[0130] Step 12, the H(e)NB establishes an IPsec tunnel with the SeGW to ensure the security and integrity of data during transmission.

[0131] The difference from the first embodiment is that the H(e)NB identification information in this embodiment is brought to the H(e)NB PF when the SeGW sends a resource authorization, resource modification or resource release request message in subsequent procedures.

no. 3 example

[0133] Image 6 is a flow chart of sending a resource authorization or resource modification message in the method of the present invention, in Figure 4 In the technical solution shown, the step 2 includes:

[0134] Step 211, the core network is triggered to initiate a resource authorization or resource modification process.

[0135] In the technical solution of the present application, the core network is an EPS network or a 3G network. For resource authorization or resource modification, the triggers on the core network include but are not limited to the following situations: the default bearer establishment process in the EPS network attachment process, the default bearer establishment process in the EPS network terminal request to create a PDN connection, and the dedicated bearer activation process in the EPS network , Bearer modification process in EPS network, PDP context activation process in 3G network, PDP context secondary activation process in 3G network, PDP con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a resource authorization method and system. The resource authorization method comprises the steps: an SeGW (Security Gateway) monitors a signaling on an interface S1 or Iuh, and sends a resource authorization, resource modification or resource release message to an H(e)NB PF (Home evolved Node B) through an interface T1 when monitoring the resource authorization, resource modification or resource release request message, and the H(e)NB PF forwards the resource authorization, resource modification or resource release message to a BPCF (Broadband Forum Policy Control Function), wherein the resource authorization, resource modification or resource release message carries request authorization, modification and release resource information and tunnel information; and the BPCF makes access control according to the tunnel information and the resource information and returns an access control result to the H(e)NB PF, the H(e)NB PF returns the access control result to the SeGW, and the SeGW carries out access processing according to the access control result. Through arranging the interface T1 between the SeGW and the H(e)NB PF, the invention realizes access management and resource management on users, and can be used for carrying out QoS control on all UE accessed through a home base station.

Description

technical field [0001] The present invention relates to the communication field, in particular to a resource authorization method and system. Background technique [0002] The Evolved Packet System (EPS) of the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP for short) consists of the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, Evolved Universal Terrestrial Radio Access Network for short). -UTRAN), Mobility Management Entity (MME for short), Serving Gateway (S-GW for short), Packet DataNetwork Gateway (P-GW for short), home user server ( Home Subscriber Server, referred to as HSS). [0003] figure 1 It is a schematic diagram of the architecture of HeNB accessing EPS in the non-roaming scenario in the prior art, figure 2 It is a schematic structural diagram of HNB accessing UMTS through a fixed network in a non-roaming scenario in the prior art. Such as figure 1 with figure 2 As s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/02H04W28/16H04W48/08
Inventor 霍玉臻周晓云宗在峰毕以峰蒋陶
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products