Unlock instant, AI-driven research and patent intelligence for your innovation.

Processing method based on block data flow charging re-discrimination weight

A processing method and re-authentication technology, which are applied in the field of packet data charging, can solve the problems of not mentioning the source of re-authentication events and the uncertainty of the realization of re-authentication process, and achieve clear realization, reasonable information interaction and high efficiency. Perfect, achieve clear results

Active Publication Date: 2006-09-27
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0037] At present, although the specification defines that in the case of online charging, TPF can initiate a re-authentication process to the OCS according to the occurrence of a re-authentication event when the bearer is modified, requesting the OCS to recalculate the user's credit and return it to the TPF. However, currently The source of re-authentication events in TPF is not mentioned in the specification, resulting in uncertainty in the realization of the re-authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method based on block data flow charging re-discrimination weight
  • Processing method based on block data flow charging re-discrimination weight
  • Processing method based on block data flow charging re-discrimination weight

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0057] In the present invention, re-authentication events are pre-stored in TPF, or OCS provides re-authentication events to TPF, and TPF monitors the occurrence of re-authentication events. When re-authentication events occur, TPF requests OCS to re-authenticate users. For authentication, the OCS recalculates the user credit and returns the recalculated user credit to the TPF.

[0058] Figure 5 It shows the flow chart of the establishment of the online charging bearer in the present invention, as shown in Figure 5 As shown, the specific implementation process when the online charging bearer is established includes the following steps:

[0059] Steps 501 to 506 are basically the same as steps 301 to 306.

[0060] Step 507: After receiving the credit request, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a re-authentication process method based on packet data stream charge including: TPF acquires re-authentication matter information and monitors that when re-authentication happens, it asks OCS to re-authenticate the user. TPF pre-stores the re-authentication matter or OCS provides it to TPF to get the matter accurately. TPF monitors the happening of the matter and asks OCS to re-authenticate the user, OCS re-computes the trust of the user and feeds back the re-computed trust.

Description

technical field [0001] The invention relates to the field of packet data charging, in particular to a processing method for charging re-authentication based on packet data flow. Background technique [0002] With the gradual widespread application of packet data services, how to charge packet data services accurately and reasonably has become a common concern of operators. [0003] figure 1 Shows the packet data protocol context (PDP Context, Packet Data ProtocolContext) activation, data transmission, deactivation flowchart, such as figure 1 As shown, in the general packet radio service (GPRS, General Packet Radio Service), the implementation process of activating the PDP Context, performing data interaction with the external packet data network (PDN, Packet Data Network), and deactivating the PDPContext includes the following steps: [0004] Step 101: the mobile terminal (MS) sends a PDP Context activation request (Activate PDPContext Request) to the Serving General Packe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/14H04L9/32H04L12/70H04M11/00H04W4/24H04W12/00H04W12/06H04W28/00
CPCH04M15/82H04L12/14H04L12/1485H04M15/62H04M15/66H04M15/90H04M17/10H04M2215/016H04M2215/204H04M2215/22H04M2215/78
Inventor 段小琴
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More