A method and device for accessing a network instance

A technology for accessing networks and networks, which is applied in the field of communication and can solve unsolved problems

Active Publication Date: 2019-09-20
DATANG MOBILE COMM EQUIP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, it is currently not resolved how the third party triggers the network to authorize the UE to access a specific network instance when the user changes the priority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for accessing a network instance
  • A method and device for accessing a network instance
  • A method and device for accessing a network instance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] See figure 1 , The figure shows a method of accessing the network instance, the specific steps are as follows:

[0064] Step 101: The first network function receives a first request message sent by a third party;

[0065] The foregoing first network function may also be referred to as a first NF (Network Functions), or may also be referred to as a first network device, and its specific type is not specifically limited in this embodiment.

[0066] For example: the first network function may be a policy control function. The policy control function may formulate a policy based on the user’s subscription information or information provided by a third party, and then issue it to the policy enforcement entity. The policy enforcement entity will control the UE according to the policy. Flow rate is monitored and / or controlled.

[0067] For another example: the first network function may be a general control network function, which may be a network function commonly used by multiple di...

Embodiment 2

[0094] In this embodiment, the specific network architecture is as figure 2 Shown.

[0095] The UE has already connected to the third party through the first network instance (or referred to as the first network slice), and the UE wants to obtain better services, so it subscribes to the third party. In order to provide better services to the UE, the third party decides to trigger the network to redirect the UE to a specific network instance (for example, a second network instance, or called a second network slice). Based on the above network architecture, the interaction process between the third party and the network is as follows image 3 As shown, the following takes the first network function as the policy control function as an example.

[0096] Specific steps are as follows:

[0097] Step 301: The third party sends a fourth request message to the policy control function. The fourth request message carries at least user identification information (such as user name, UE IP addr...

Embodiment 3

[0108] This embodiment describes the operation after the authorization is successful based on the second embodiment. In this embodiment, the third party triggers the UE to establish a connection in a specific network instance. The specific process is as Figure 4 As shown, the specific steps are as follows:

[0109] Step 401: The third party notifies the UE to connect to the target network instance;

[0110] Step 402: The UE sends a connection establishment request to the general control network function, and the connection establishment request message carries information of the target network instance, such as the network instance identifier or service information;

[0111] The aforementioned general control network function is equivalent to the second network function in the first embodiment.

[0112] Step 403: The general control network function selects the target network instance according to the information of the target network instance, and sends the connection establishment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a method and device for accessing a network instance. The method includes: the first network function receives a first request message sent by a third party; the first network function triggers a request according to the first request message The operation of authorizing the UE to access the target network instance enables the third party to trigger the network to authorize the UE to access a specific network instance and establish a connection for the UE in the target network instance.

Description

Technical field [0001] The present invention relates to the field of communication technology, and in particular to a method and equipment for accessing network instances. Background technique [0002] In order to provide higher-priority users (such as gold users) with better service quality or special services, third parties (such as service providers) can deploy target network instances in the operator's network, which can provide users with higher The quality of service or special services can only be accessed by high-priority users. [0003] However, there is currently no solution to how the third party triggers the network to authorize the UE to access a specific network instance when the user changes the priority. Summary of the invention [0004] In view of the foregoing technical problems, the embodiments of the present invention provide a method and device for accessing a network instance to solve the problem that the network authorizes the UE to access the target network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/50H04W12/06H04W76/10H04L29/06H04W12/08
CPCH04L63/08H04W12/06
Inventor 侯云静
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products