Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for home network to obtain network element information in visited network

A technology of visited network and home network, which is applied in the home network to obtain network element information in the visited network. It can solve problems such as unresolved, unable to find BPCF, unable to find V-PCRF, etc., to expand service access capabilities and improve business Experience and realize the effect of low cost

Inactive Publication Date: 2015-08-12
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

and for figure 2 In the scenario shown, since there is no commercial relationship between the home network operator and the operator of the BBF access network (that is, no roaming agreement is signed), even if the home policy and charging rule functional entity (H-PCRF, Home-Policy and Charging Rules Function) obtains the location information of the BBF access network currently accessed by the UE, and cannot find the correct BPCF, but must use the Visitor-Policy and Charging Rules Function entity (V-PCRF, Visitor-Policy and Charging Rules Function) to Get information about BPCF
However, according to the prior art, for example for figure 2 In the roaming scenario shown, when the H-PCRF cannot know the network where the ePDG is located, it cannot find the correct V-PCRF, and thus cannot obtain the relevant information of BPCF
Therefore, it is impossible to achieve the corresponding admission control
Since the above-mentioned network fusion technology is still in the research stage, there is no technical solution to the above-mentioned technical problems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for home network to obtain network element information in visited network
  • Method and system for home network to obtain network element information in visited network
  • Method and system for home network to obtain network element information in visited network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] image 3 It is the attach flow chart when the UE accesses 3GPP through the DSMIPv6 protocol, such as image 3 As shown, using the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so it can smoothly realize the interaction with the V-PCRF, so as to realize the relevant admission control; specifically, the following steps are included:

[0047] In step S301, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates an Internet Key Exchange Protocol (IKEv2, Internet Key Exchange) tunnel establishment process, and uses an Extensible Authentication Protocol (EAP, Extensible Authentication Protocol) for authentication. Due to the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (or, the AAA Server further interacts with the HSS) to complete EAP authentication. During the EAP authentication process, th...

Embodiment 2

[0061] Figure 4 It is a handover flow chart when UE accesses 3GPP through DSMIPv6 protocol, such as Figure 4 As shown, using the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so it can smoothly realize the interaction with the V-PCRF, so as to realize the relevant admission control; specifically, the following steps are included:

[0062] Step S401, the UE accesses the 3GPP core network through the E-UTRAN, and establishes a PDN connection;

[0063] Step S402, after discovering the BBF, the UE decides to initiate a handover;

[0064] Step S403, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates the IKEv2 tunnel establishment process and uses EAP for authentication. Due to the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (the AAA Server further interacts with the HSS) to complete EAP au...

Embodiment 3

[0082] Figure 5 It is the attach flow chart when UE accesses 3GPP through PMIPv6 protocol, such as Figure 5 As shown, using the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so it can smoothly realize the interaction with the V-PCRF, so as to realize the relevant admission control; the specific process steps are as follows:

[0083] In step S501, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates the IKEv2 tunnel establishment process and uses EAP for authentication. Due to the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (the AAA Server further interacts with the HSS) to complete EAP authentication. In this process, the ePDG sends the network identifier VPLMN ID of the visited network it is located to the AAA Server through the AAA Proxy, and the AAA Server saves the VPLMN ID and / or fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for a home network to acquire network element information in a visit network. The method comprises the following steps that: when carrying out an authentication process to user equipment (UE) through an extensible authentication protocol (EAP), a gateway of the visit network reports identification information of the visit network to a certificate server of the home network; the gateway of the home network acquires a network identification of the visit network from the certificate server of the home network and sends to a strategy and control network element of the home network. The invention also discloses a system for the home network to acquire the network element information in the visit network. By using the system, the above method can be realized. By using the technical scheme of the invention, roaming can be realized through the visit network when a network roaming protocol is not subscribed between the home network and a third party network. A UE service access ability can be expanded and the UE can develop the related service of the home network in the specific network. In the invention, realization of the technical scheme is simple. Realization costs are low and user service experience can be raised.

Description

technical field [0001] The present invention relates to a technique for obtaining network element information in a visited network, and in particular to a method and a system for a home network in an Evolved Packet System (EPS) to obtain network element information in a visited network. Background technique [0002] figure 1 It is a schematic diagram of the system architecture of the EPS, such as figure 1 As shown, in the packet system evolved by the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project), the EPS network architecture diagram of the non-roaming scene is composed of the evolved universal mobile communication system terrestrial radio access network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network), Mobility Management Entity (MME, Mobility Management Entity), Serving Gateway (S-GW, Serving Gateway), Packet Data Network Gateway (P-GW or PDN GW, Packet Data Network Gateway), Home User Server (HSS, Home Subscriber Server), Poli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/08H04W12/06H04W48/16H04W76/02
Inventor 周晓云宗在峰
Owner ZTE CORP