Method and system for triggering fixed-mobile convergence policy negotiation

A fixed network mobile convergence and policy technology, applied in the field of communication, can solve the problems of inability to initiate proactively, uncertainty, and not always guaranteed to trigger policy negotiation between fixed network and mobile network, etc., to achieve reliable support and stable QoS control.

Inactive Publication Date: 2012-03-14
ZTE CORP
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, in some scenarios, the BBF fixed network cannot always perceive UE access, or the BBF fixed network does not support 3GPP-based access authentication. Can't perceive UE's access, or can't support 3GPP-based access authentication
In this case, BPCF will not be able to actively initiate S9 * The establishment of a session cannot trigger the policy negotiation between the fixed network and the mobile

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for triggering fixed-mobile convergence policy negotiation
  • Method and system for triggering fixed-mobile convergence policy negotiation
  • Method and system for triggering fixed-mobile convergence policy negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Image 6 In the S2b access scenario of the present invention, the ePDG and the 3GPP AAA Server / Proxy decide to activate the policy negotiation flow chart with the fixed network. This embodiment is applicable to the case where the fixed network is an untrustworthy non-3GPP access network, and the UE accesses the 3GPP core network through the S2b interface. Image 6 The process includes the following steps:

[0046] In step 601, the UE accesses through the BBF fixed network, and performs 3GPP-based access authentication. This step is optional. When 3GPP-based access authentication is not performed, the UE only needs to perform traditional fixed network access authentication. In this scenario, the BBF access network cannot perceive that the UE accesses the 3GPP core network.

[0047] Step 602, after the UE accesses the BBF access network, the BBF access network allocates a local IP address for the UE.

[0048] In step 603, the UE initiates an IKEv2 tunnel establishment ...

Embodiment 2

[0082] Figure 7 In the S2b access scenario of the present invention, the 3GPP AAA Server / Proxy decides to activate the policy negotiation flow chart with the fixed network. This embodiment is applicable to the case where the fixed network is an untrustworthy non-3GPP access network, and the UE accesses the 3GPP core network through the S2b interface. Figure 7 The process includes the following steps:

[0083] Step 701-Step 702: Same as Step 601-Step 602.

[0084] In step 703, the UE initiates an IKEv2 tunnel establishment process and uses EAP for authentication. In roaming scenarios, ePDG interacts with AAA Server through AAA Proxy (AAA Server further interacts with HSS) to complete EAP authentication,

[0085] Step 703a, step 703b, step 703c, and step 703d belong to the EAP authentication process. In the non-roaming scenario, execute step 703a, step 703b, and step 703d, and execute step 703a, step 703c, and step 703d in the roaming scenario.

[0086] Step 703a, the DER...

Embodiment 3

[0104] Figure 8 In the S2c access scenario of the present invention, the ePDG and the 3GPP AAA Server / Proxy decide to activate the policy negotiation flow chart with the fixed network. This embodiment is applicable to the case where the fixed network is an untrustworthy non-3GPP access network, and the UE accesses the 3GPP core network through the S2c interface. Figure 8 The process includes the following steps:

[0105] Step 801-Step 806: Same as Step 601-Step 606.

[0106] Step 807-step 808 are the same as: step 611-step 612.

[0107] In step 809, the UE executes the Bootstraping process. The UE performs DNS lookup according to the APN to obtain the IP address of the P-GW to access the PDN. In order to protect the DSMIPv6 message between UE and P-GW, UE uses IKEv2 to establish a security association and uses EAP for authentication. The P-GW communicates with the AAA Server (the AAA Server further interacts with the HSS) to complete EAP authentication, and at the same ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for triggering fixed-mobile convergence policy negotiation. The method comprises the following steps of: initiating the establishment of a Gxb session to a policy and charging rules function (PCRF) by using an evolved packet data gateway (ePDG); under the trigger of the establishment of the Gxb session, initiating the establishment of an S9* session to a broadband policy control function (BPCF) by using the PCRF to trigger the policy negotiation of a mobile network and a fixed network. The invention also discloses a system for triggering fixed-mobile convergence policy negotiation. A policy negotiation trigger unit is used for initiating the establishment of the Gxb session to the PCRF on the ePDG, and under the trigger of the establishment of the Gxb session, the PCRF initiates the establishment of the S9* session to the BPCF so as to trigger the policy negotiation of the mobile network and the fixed network. By the method and the system, the policy negotiation of the mobile network and the fixed network can be triggered under any conditions.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and system for triggering negotiation of a fixed-network-mobile convergence strategy. Background technique [0002] Such as figure 1 As shown, the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) Evolved Packet System (EPS, Evolved Packet System) network architecture in the non-roaming scenario is composed of the Evolved Universal Mobile Communications System Terrestrial Radio Access Network (E- UTRAN, Evolved Universal Terrestrial Radio Access Network), mobile management unit (MME, Mobility Management Entity), serving gateway (S-GW, Serving Gateway), packet data network gateway (P-GW or PDN GW, Packet Data Network Gateway), Home Subscriber Server (HSS, Home Subscriber Server), Policy and Charging Rules Function (PCRF, Policy and Charging Rules Function) entity and other support nodes. PCRF is the core of Policy and Charging Control (P...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/24H04W8/02H04W12/06H04L29/06H04W12/0431
CPCH04L12/1407H04W28/24H04M15/55H04M15/66
Inventor 霍玉臻周晓云毕以峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products