Method and system for monitoring group user usage

A group user and user technology, applied in the field of group user usage monitoring method and system, can solve the problem of group user usage monitoring that cannot share subscription usage, etc.

Active Publication Date: 2017-11-07
HUAWEI TEHCHNOLOGIES CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in view of the existing usage monitoring and reporting mechanism, it is not yet possible to monitor the usage of group users who share the subscription usage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring group user usage
  • Method and system for monitoring group user usage
  • Method and system for monitoring group user usage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] image 3 A schematic flowchart showing a method for monitoring group user usage according to an embodiment of the present invention, as shown in image 3 As shown, the process of this embodiment mainly includes the following implementation steps:

[0099] Step 301, the first policy control entity sends a usage monitoring request to the second policy control entity;

[0100] Specifically, when the first policy control entity obtains an instruction to perform usage monitoring for the user, it sends a usage monitoring request to the second policy control entity.

[0101] The first policy control entity discovers the second policy control entity through the DRA, and the DRA discovers the second policy control entity according to the user group identifier.

[0102] In step 302, the second policy control entity makes a usage monitoring decision based on the subscription amount of the user group, and assigns a monitoring key (monitoring key) and a monitoring threshold (thres...

Embodiment 2

[0111] In this embodiment, it is assumed that the user group includes UE-1 and UE-2. According to the existing UE attachment process, when UE-1 attaches to the network, select PCEF-1 and PCRF-1 (namely the first policy control entity) for its access service; when UE-2 attaches to the network, select PCEF -2 and PCRF-2 serve for its access. The SPR-1 is used to store the subscription information of the UE-1, which includes an indication that the UE-1 needs to monitor the usage of group users. SPR-2 is used to save the subscription information of UE-2, which includes an indication that UE-2 needs to monitor the usage of group users. PCRF-3 is a policy control entity (that is, a second policy control entity) that specifically provides usage monitoring for group users. When a group user is attached to the network, the network device requests PCRF-3 for usage monitoring according to the usage monitoring instruction, and the process of delivering usage monitoring by PCRF-3 is as f...

Embodiment 3

[0124] The second embodiment above provides the process of UE-1 and UE-2 in the user group attaching to the network. In this embodiment, after the UE attaches to the network, it conducts services. The PCEF monitors the usage of the UE and reports the usage monitoring, and the PCRF implements a policy adjustment process according to the usage monitoring and reporting results. For the sake of brevity, this embodiment only provides the process of implementing usage monitoring on UE-1. For the process of implementing usage monitoring for UE-2, refer to the process of implementing usage monitoring for UE-1. The process of reporting usage monitoring and adjusting policies based on usage monitoring results in this embodiment is as follows: Figure 5 As shown, the process description is as follows:

[0125] Step 501. UE-1 launches services, and PCEF-1 implements usage monitoring on UE-1.

[0126] Step 502. PCEF-1 receives an instruction from PCRF-1 to report usage monitoring.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for monitoring group user usage. A first policy control entity sends a usage monitoring request to a second policy control entity; when the second policy control entity receives the usage monitoring request, it performs usage monitoring according to the user group subscription Make a decision, and issue usage monitoring information to the first policy control entity; the first policy control entity monitors the usage of the user according to the received usage monitoring information. The present invention introduces a dedicated policy control entity, and the policy control entity attached to each member user in the user group requests usage monitoring from the dedicated policy control entity, so as to realize usage monitoring of group users who share subscription usage, thereby solving the problem There are deficiencies in the quantity monitoring mechanism.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for monitoring group user usage. Background technique [0002] The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP for short) defines a Policy and Charging Control (Policy and Charging Control, PCC for short) architecture for mobile networks. Such as figure 1 As shown, the functions of each entity in the PCC architecture are described as follows: [0003] PCRF (Policy and Charging Rules Function, policy and charging rule function) formulates resource control strategies for the use of network resources in the transmission process of business data flows included in the business, including QoS (Quality of Service, quality of service) control strategies and charging control strategies . [0004] PCEF (Policy and Charging Enforcement Function, Policy and Charging Enforcement Function) is used to execute the PCC rules issued by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L12/1407H04M15/60H04M15/58H04M15/66H04M15/765H04M15/7657H04W4/24H04L41/0894
Inventor 毛玉欣
Owner HUAWEI TEHCHNOLOGIES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products