CN102340766A - Method for home network to acquire network element information in visit network and system thereof - Google Patents
Method for home network to acquire network element information in visit network and system thereof Download PDFInfo
- Publication number
- CN102340766A CN102340766A CN2010102362051A CN201010236205A CN102340766A CN 102340766 A CN102340766 A CN 102340766A CN 2010102362051 A CN2010102362051 A CN 2010102362051A CN 201010236205 A CN201010236205 A CN 201010236205A CN 102340766 A CN102340766 A CN 102340766A
- Authority
- CN
- China
- Prior art keywords
- network
- home
- home network
- pcrf
- visited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000008569 process Effects 0.000 claims abstract description 22
- 230000003993 interaction Effects 0.000 claims description 12
- 238000013475 authorization Methods 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 11
- GVVPGTZRZFNKDS-JXMROGBWSA-N geranyl diphosphate Chemical compound CC(C)=CCC\C(C)=C\CO[P@](O)(=O)OP(O)(O)=O GVVPGTZRZFNKDS-JXMROGBWSA-N 0.000 description 10
- 230000011664 signaling Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for a home network to acquire network element information in a visit network. The method comprises the following steps that: when carrying out an authentication process to user equipment (UE) through an extensible authentication protocol (EAP), a gateway of the visit network reports identification information of the visit network to a certificate server of the home network; the gateway of the home network acquires a network identification of the visit network from the certificate server of the home network and sends to a strategy and control network element of the home network. The invention also discloses a system for the home network to acquire the network element information in the visit network. By using the system, the above method can be realized. By using the technical scheme of the invention, roaming can be realized through the visit network when a network roaming protocol is not subscribed between the home network and a third party network. A UE service access ability can be expanded and the UE can develop the related service of the home network in the specific network. In the invention, realization of the technical scheme is simple. Realization costs are low and user service experience can be raised.
Description
Technical Field
The present invention relates to a technique for acquiring network element information in a visited network, and in particular, to a method and a System for acquiring network element information in a visited network by a home network in an Evolved Packet System (EPS).
Background
Fig. 1 is a schematic diagram of a system architecture of an EPS, and as shown in fig. 1, in a Packet system evolved by the third Generation Partnership Project (3 GPP), an EPS Network architecture diagram of a non-roaming scenario is composed of an evolved universal mobile telecommunications system Terrestrial Radio Access Network (E-UTRAN), a mobility management unit (MME), a Serving Gateway (S-GW, Serving Gateway), a Packet Data Network Gateway (P-GW or PDN GW), a Packet Data Network Gateway (Packet Data Network Gateway), a Home Subscriber Server (HSS), a Policy and charging rules Function Entity (PCRF), and other support nodes. The PCRF is the core of Policy and Charging Control (PCC) and is responsible for policy decision and Charging rule making. The PCRF provides traffic data flow-based network Control rules including detection, Gating (Gating Control), Quality of Service (QoS) Control, and data flow-based charging rules, among others. The PCRF sends the Policy and Charging rules formulated by the PCRF to a Policy and Charging Enforcement Function (PCEF) for Enforcement, and meanwhile, the PCRF needs to ensure that the rules are consistent with the subscription information of the user. The basis for the PCRF to formulate the policy and charging rules comprises the following steps: acquiring information related to a service from an Application Function entity (AF); acquiring Subscription information with user policy charging control from a Subscription database (SPR); information of a bearer-related network is acquired from a PCEF.
EPS supports interworking with non-3 GPP systems. The interworking with non-3 GPP systems is realized through an S2a/S2b/S2c interface, and the P-GW is used as an anchor point between the 3GPP and the non-3 GPP systems. As shown in fig. 1, in the system of EPS, non-3 GPP systems are classified into trusted non-3 GPP IP access and untrusted non-3 GPP IP access. The trusted non-3 GPP IP access can be directly connected with the P-GW through an S2a interface; the untrusted non-3 GPP IP access needs to be connected with the P-GW through an Evolved Packet Data Gateway (ePDG), and can be accessed into the P-GW through the ePDG; the interface between the ePDG and the P-GW is S2b, and Internet protocol Security (IPSec, IP and Security) is used between the User Equipment (UE) and the ePDG to perform encryption protection on signaling and data. The S2c provides user plane related control and mobility support between the UE and the P-GW, which supports mobility management protocol of dual-stack mobile IPv6(DSMIPv6, Moblie IPv6 support for dual stack Hosts and Router).
At present, many operators pay attention to a Fixed Mobile Convergence (FMC) technology, and research on a 3GPP and Broadband Forum (BBF) interworking technology.
Fig. 2 is a schematic diagram of a home routing roaming architecture for a UE accessing a 3GPP core network through a BBF access network, where the BBF access network is considered as an untrusted non-3 GPP access network. The above scenario in which a user accesses a mobile core network through a BBF access network requires QoS guarantee on the entire transmission path for data transmission (data may be transmitted through a fixed network and a mobile network). In the prior art, QoS guarantee is realized by interaction between PCRF and a Broadband Policy Control Framework (BPCF) in BBF access. The BPCF is a policy control architecture in the BBF access network, and performs resource admission control on a resource request message of the PCRF according to a network policy, subscription information, and the like accessed by the BBF. For example, when a UE accesses a 3GPP core Network through a Wireless Local Area Network (WLAN), in order to ensure that the total bandwidth requirement of all UEs accessing a service through a WLAN access line does not exceed the bandwidth of the line, such as the contracted bandwidth or the maximum physical bandwidth supported by the line, the PCRF needs to interact with the BPCF during QoS authorization so that the BPCF performs admission control of resources. In order to implement the above interaction, the PCRF must acquire an access location of the BBF access network to which the UE is currently accessing. After the PCRF acquires the broadband access location information, the BPCF that needs to interact may be determined first, and then the broadband access location information is sent to the selected BPCF, and the BPCF determines a specific line to which the UE is accessed according to the broadband access location information, thereby implementing admission control of resources. For the scenario shown in fig. 2, since there is no business relationship (i.e. no roaming agreement is signed) between the Home network operator and the operator of the BBF access network, even if the Home-Policy and Charging Rules Function (H-PCRF) obtains the location information of the BBF access network to which the UE is currently accessing, the correct BPCF cannot be found, and the relevant information of the BPCF must be obtained through a visited-Policy and Charging Rules Function (V-PCRF). However, according to the prior art, for example, for the roaming scenario shown in fig. 2, when the H-PCRF cannot know the network where the ePDG is located, the correct V-PCRF cannot be found, and thus the information related to the BPCF cannot be obtained. Accordingly, the corresponding admission control cannot be achieved. Since the network convergence technology is still under study, there is no technical solution for solving the above technical problems in the prior art.
Disclosure of Invention
In view of this, the main objective of the present invention is to provide a method and a system for a home network to obtain network element information in a visited network, so that the home network can obtain PCRF information in the visited network, so as to interact with a policy control network element in a third party network through the PCRF of the visited network, thereby implementing policy control interworking with the third party network.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a method for home network to obtain network element information in visited network includes:
the method comprises the steps that in the process that an evolution packet data gateway of a visited network authenticates UE, identification information of the visited network is reported to an authentication server of a home network;
and the packet data network gateway of the home network acquires the network identifier of the visit network from the authentication server of the home network and sends the network identifier to the strategy and control network element of the home network.
Preferably, the authentication server is an AAA server and/or an HSS; and the policy control network element is PCRF.
Preferably, the reporting of the identification information of the visited network to the authentication server of the home network is:
the evolution packet data gateway of the visit network sends the identification information of the visit network to the AAA server of the home network through the proxy authentication server; or, the AAA server of the home network further reports the identifier information of the visited network to the HSS of the home network.
Preferably, the policy and control network element sent to the home network is:
and the gateway of the home network sends the identification information of the visit network to the PCRF of the home network in the process of establishing the IP-CAN session for the UE.
Preferably, the method further comprises:
the UE is located in a third party network outside the home network and the visited network; roaming is not supported between the third party network and the home network.
Preferably, the method further comprises:
the PCRF of the home network initiates the establishment of a policy control session with the PCRF of the visited network according to the identification information of the visited network;
and the PCRF of the visited network initiates the establishment of a policy control session with a policy control network element of the third party network according to the position information of the UE accessed to the third party network acquired after interaction.
A home network obtains the system which visits the network element information in the network, including UE, said home network and visiting the network of UE; the system also comprises an authentication unit, a reporting unit, an acquisition unit and a sending unit; the authentication unit and the reporting unit are positioned in a gateway of the visit network; the acquiring unit and the sending unit are positioned in a gateway of a home network; wherein,
an authentication unit configured to authenticate the UE;
a reporting unit, configured to report the identifier information of the visited network to an authentication server of the home network in the authentication process;
an obtaining unit, configured to obtain a network identifier of the visited network from an authentication server of the home network;
and the sending unit is used for sending the network identifier of the visited network to the strategy and control network element of the home network.
Preferably, the authentication server is an AAA server and/or an HSS; and the policy control network element is PCRF.
Preferably, the reporting unit further sends the identifier information of the visited network to an AAA server of the home network through an agent authentication server; or, the AAA server of the home network further reports the identifier information of the visited network to the HSS of the home network.
Preferably, the system further comprises:
the IP-CAN session establishing unit is used for establishing an IP-CAN session for the UE;
the sending unit further sends the identification information of the visited network to the PCRF of the home network in the process that the IP-CAN session establishing unit establishes the IP-CAN session for the UE.
Preferably, the UE is located in a third party network outside the home network and the visited network; roaming is not supported between the third party network and the home network.
Preferably, the PCRF of the home network initiates establishment of a policy control session with the PCRF of the visited network according to the identification information of the visited network;
and the PCRF of the visited network initiates the establishment of a policy control session with a policy control network element of the third party network according to the position information of the UE accessed to the third party network acquired after interaction.
In the invention, the UE reports the identification information of the visited network to an authentication server of the home network in the authentication process between the UE and the gateway of the visited network initiated by the third party network, so that the identification information of the visited network is sent to the PCRF of the home network in the process of establishing an IP-CAN session for the UE by the gateway of the home network, and the PCRF of the home network CAN interact with the PCRF of the visited network and interact with a policy control network element of the third party network through the PCRF of the visited network, thereby realizing the admission control of a user accessing the third party network. The technical scheme of the invention solves the problem that roaming can be realized through the visiting network when a network roaming agreement is not signed between the home network and the third-party network, thereby expanding the service access capability of the UE and facilitating the UE to still develop the related service in the home network in a specific network. The technical scheme of the invention is simple to realize, so the realization cost is lower, and the service experience of the user is improved.
Drawings
FIG. 1 is a system architecture diagram of an EPS;
FIG. 2 is a schematic diagram of a home routing roaming architecture in which a UE accesses a 3GPP core network through a BBF access network;
FIG. 3 is an attachment flow diagram when a UE accesses 3GPP via a DSMIPv6 protocol;
FIG. 4 is a handover flowchart when a UE accesses 3GPP via a DSMIPv6 protocol;
FIG. 5 is an attach flow diagram of a UE accessing 3GPP via PMIPv6 protocol;
FIG. 6 is a handover flowchart when a UE accesses 3GPP via PMIPv6 protocol;
FIG. 7 is a schematic diagram of the structure of a system for acquiring the meta information in the visited network by the home network according to the present invention;
fig. 8 is another structural diagram of the system for acquiring the meta information in the visited network by the home network according to the present invention.
Detailed Description
The method comprises the following steps that the UE reports identification information of a visited network to an authentication server of a home network in an EAP authentication process between the UE and a gateway of the visited network initiated by a third party network, so that the identification information of the visited network is sent to a PCRF of the home network in the process of establishing an IP-CAN session for the UE by the gateway of the home network, and the PCRF of the home network CAN interact with the PCRF of the visited network and interact with a policy control network element of the third party network through the PCRF of the visited network, thereby determining a PCC rule for performing policy and charging control on a user currently accessed to the third party network and realizing admission control on the user accessed to the third party network.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings by way of examples.
Example one
Fig. 3 is an attachment flow chart when the UE accesses 3GPP through the DSMIPv6 protocol, and as shown in fig. 3, by using the technical scheme in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so that interaction with the V-PCRF can be smoothly achieved, thereby achieving related admission control; the method specifically comprises the following steps:
step S301, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates an Internet Key Exchange Protocol (IKEv2, Internet Key Exchange) tunnel establishment procedure, and performs Authentication using an Extensible Authentication Protocol (EAP). Because of the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (or the AAA Server further interacts with the HSS) to complete the EAP authentication. In the EAP authentication process, the ePDG sends a network identification (VPLMN ID, Virtual Public Land Mobile network identifier) of a visiting network in which the ePDG is located to an AAA Server through an AAA Proxy, the AAA Server stores the VPLMN ID and/or further sends the VPLMN ID to an HSS, and the HSS stores the VPLMN ID; here, AAA Proxy is the AAA of the visited network. A roaming agreement is signed between the visited network and the home network, but the roaming agreement is not signed between the BBF access system and the home network.
Step S302, the ePDG sends the last IKEv2 message to the UE, wherein the message carries an IP Address allocated to the UE and is marked as IP Address3 as the care-of-Address (CoA) of the UE;
step S303, an Internet protocol security (IPSec) tunnel is established between the UE and the ePDG;
step S304, the UE performs bootstrapping procedure. And the UE searches a Domain Name System (DNS) according to the APN (Access Point Name) to obtain the IP address of the P-GW to be accessed to the PDN. In order to protect DSMIPv6 messages between the UE and the P-GW, the UE establishes a security association using IKEv2 and authenticates with EAP. The P-GW communicates with the AAA Server (or the AAA Server further interacts with the HSS) to complete EAP authentication, and meanwhile, the P-GW allocates an IPv6 address or prefix to the UE as a home address (HoA) of the UE. In the process of interaction between the P-GW and the AAA Server, the AAA Server sends the stored VPLMN ID to the P-GW (the AAA of the home network stores the VPLMN ID information in step S301) or the AAA sends the VPLMN ID returned by the HSS to the P-GW (the HSS stores the VPLMN ID information in step S301);
step S305, UE sends DSMIPv6 binding update message to P-GW, the message carries CoA and HoA. In the binding message, the lifetime parameter is not zero. The P-GW establishes a binding context;
step S306, PCEF in P-GW sends an IP connection Access Network (IP-CAN) session establishment indication message to H-PCRF, wherein the message carries a user identifier, a PDN identifier and a VPLMN ID;
step S307, the H-PCRF carries out QoS authorization according to information such as user identification and returns a confirmation message to the PCEF in the P-GW;
step S308, the P-GW returns a binding confirmation message to the UE;
step S309, the H-PCRF selects the V-PCRF according to the VPLMN ID and sends a reverse S9 session establishment message to the V-PCRF, and the message carries the access position information of the BBF access network currently accessed by the UE;
step S310, after the V-PCRF saves the access position information of the BBF access network, a confirmation message is returned to the H-PCRF;
step S311, the V-PCRF selects a BPCF according to the access position information of the BBF access network currently accessed by the UE, and sends S9 session establishment information to the BPCF;
step S312, the BPCF further executes resource admission control according to the access position information of the BBF access network currently accessed by the UE;
step S313, the BPCF returns a confirmation message to the PCRF.
Example two
Fig. 4 is a handover flow chart when the UE accesses the 3GPP through the DSMIPv6 protocol, and as shown in fig. 4, by using the technical scheme in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so that interaction with the V-PCRF can be smoothly achieved, thereby achieving related admission control; the method specifically comprises the following steps:
step S401, UE accesses a 3GPP core network through E-UTRAN and establishes PDN connection;
step S402, after finding BBF, UE decides to initiate switching;
step S403, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates an IKEv2 tunnel establishment procedure and authenticates with EAP. Because of the roaming scenario, the ePDG interacts with the AAA Server through AAA Proxy (AAA Server further interacts with HSS) to complete EAP authentication. In the process, the ePDG sends the network identification VPLMN ID of the visited network in which the ePDG is located to an AAA Server through an AAA Proxy, the AAA Server stores the VPLMN ID and/or further sends the VPLMN ID to an HSS, and the HSS stores the VPLMN ID;
step S404, the ePDG sends the last IKEv2 message to the UE, wherein the message carries an IP Address allocated to the UE and is marked as IP Address3 as CoA of the UE;
step S405, an IPSec tunnel is established between the UE and the ePDG;
step S406, if the UE does not perform the Bootstrapping procedure when accessing through the E-UTRAN, the UE performs the Bootstrapping procedure at this time. And the UE searches DNS according to the APN to obtain the IP address of the P-GW to be accessed to the PDN. In order to protect DSMIPv6 messages between the UE and the P-GW, the UE establishes a security association using IKEv2 and authenticates with EAP. The P-GW communicates with AAA Server (AAAServer further interacts with HSS) to complete EAP authentication, and meanwhile, the P-GW allocates an IPv6 address or prefix for the UE as the home address HoA of the UE. In the process of interaction between the P-GW and the AAA Server, the AAA Server sends the stored VPLMN ID to the P-GW (the AAA stores the information in step S403) or the AAA sends the VPLMN ID returned by the HSS to the P-GW (the HSS stores the information in step S403);
step S407, if the UE has executed a Bootstrapping procedure when accessing through the E-UTRAN, the AAA sends a message providing the VPLMN ID to the P-GW. If the AAA Server stores the information in step S403, the AAA Server directly provides the information to the P-GW, and if the HSS stores the information in step S403, the AAA Server receives the information provided by the HSS and forwards the information to the P-GW;
the step can be that after receiving the VPLMN ID in step S403, the AAA Server triggers the message;
step S408, P-GW returns confirmation message to AAA Server;
step S409, UE sends DSMIPv6 binding update message to P-GW, the message carries CoA and HoA. The lifetime parameter in the binding message is not zero. The P-GW establishes a binding context;
step S410, PCEF in P-GW sends IP-CAN conversation modification indication message to H-PCRF, carrying VPLMN ID;
step S411, the H-PCRF returns a confirmation message to the PCEF after storing the information;
step S412, the P-GW returns a binding confirmation message to the UE;
step S413, the H-PCRF selects the V-PCRF according to the VPLMN ID and sends a reverse S9 session establishment message to the V-PCRF, and the message carries the access position information of the BBF access network currently accessed by the UE;
step S414, after the V-PCRF saves the information, a confirmation message is returned to the H-PCRF;
step S415, the V-PCRF selects a BPCF according to the access position information of the BBF access network currently accessed by the UE, and sends S9 session establishment information to the BPCF;
step S416, the BPCF further executes resource admission control according to the access position information of the BBF access network currently accessed by the UE;
and step S417, the BPCF returns an acknowledgement message to the V-PCRF.
In other service flows, after the P-GW receives the binding update message sent by the UE, the P-GW requests the VPLMN ID to the AAA Server, so that the AAA Server provides the VPLMN ID to the P-GW.
EXAMPLE III
Fig. 5 is an attachment flow chart when the UE accesses the 3GPP through the PMIPv6 protocol, and as shown in fig. 5, with the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so that interaction with the V-PCRF can be smoothly achieved, thereby implementing relevant admission control; the specific process steps are as follows:
step S501, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates an IKEv2 tunnel establishment procedure and authenticates with EAP. Because of the roaming scenario, the ePDG interacts with the AAA Server through AAA Proxy (AAA Server further interacts with HSS) to complete EAP authentication. In the process, the ePDG sends the network identification VPLMN ID of the visited network in which the ePDG is located to an AAA Server through an AAA Proxy, the AAA Server stores the VPLMN ID and/or further sends the VPLMN ID to an HSS, and the HSS stores the VPLMN ID;
step S502, the ePDG selects the P-GW and then sends an agent binding update message to the selected P-GW, wherein the message carries information such as user identification and the like. After receiving the request message, the P-GW allocates an IP address for the UE and establishes a binding context;
step S503, the P-GW sends the message for updating the P-GW IP address to the AAA Server, the address of the P-GW is sent to the AAA Server, the AAA Server further interacts with the HSS, and the address of the P-GW is stored in the HSS. In the process, the AAA Server sends the VPLMN ID to the P-GW., if the AAA Server stores the information in step S501, the AAA Server directly provides the information to the P-GW, if the HSS stores the information in step S501, the AAA Server receives the information provided by the HSS and forwards the information to the P-GW;
step S504, PCEF in P-GW sends IP-CAN conversation establishment indication message to H-PCIF, and the message carries user identification, PDN identification and VPLMN ID;
step S505, the H-PCRF carries out QoS authorization according to information such as user identification and returns a confirmation message to the PCEF;
step S506, the P-GW returns an agent binding confirmation message to the ePDG, and the agent binding confirmation message carries the IP address distributed for the UE;
step S507, the proxy binding is updated successfully, and an IPSec tunnel is established between the UE and the ePDG;
step S508, ePDG sends the last IKEv2 signaling to UE, carrying the IP address of UE;
step S509, the H-PCRF selects the V-PCRF according to the VPLMN ID and sends a reverse S9 session establishment message to the V-PCRF, wherein the reverse S9 session establishment message carries access position information of a BBF access network currently accessed by the UE;
step S510, after the V-PCRF saves the information, a confirmation message is returned to the H-PCRF;
step S511, the V-PCRF selects the BPCF according to the access position information of the BBF access network currently accessed by the UE, and sends S9 session establishment information to the BPCF;
step S512, the BPCF further executes resource admission control according to the access position information of the BBF access network currently accessed by the UE;
step S513, the BPCF returns an acknowledgement message to the PCRF.
Example four
Fig. 6 is a handover flowchart when the UE accesses the 3GPP through the PMIPv6 protocol, and as shown in fig. 6, with the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so that interaction with the V-PCRF can be smoothly achieved, thereby implementing relevant admission control; the specific process steps are as follows:
step S601, UE accesses to a 3GPP core network through E-UTRAN and establishes PDN connection;
step S602, UE finds BBF access and decides to initiate switching;
step S603, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates an IKEv2 tunnel establishment procedure and authenticates with EAP. Because of the roaming scenario, the ePDG interacts with the AAA Server through AAA Proxy (AAA Server further interacts with HSS) to complete EAP authentication. In the process, the ePDG sends the network identification VPLMN ID of the visited network in which the ePDG is located to an AAA Server through an AAA Proxy, the AAA Server stores the VPLMN ID and/or further sends the VPLMN ID to an HSS, and the HSS stores the VPLMN ID;
step S604, ePDG sends the proxy binding update message to the P-GW selected in the access of E-UTRAN, and the message carries the information such as user identification. After receiving the request message, the P-GW allocates an IP address for the UE and establishes a binding context;
step S605, AAA Server sends message providing VPLMN ID to P-GW. If the AAA Server stores the information in step S603, the AAA Server directly provides the information to the P-GW, and if the HSS stores the information in step S603, the AAA Server receives the information provided by the HSS and forwards the information to the P-GW;
the step can be that after receiving the VPLMN ID in step S603, the AAA Server triggers the message;
step S606, P-GW returns confirmation message to AAA Server;
step S607, PCEF in P-GW sends IP-CAN conversation modification indication message to PCRF, carrying VPLMN ID;
step S608, the H-PCRF returns a confirmation message to the PCEF after the H-PCRF saves the VPLMN ID;
step S609, the P-GW returns an agent binding confirmation message to the ePDG, and the agent binding confirmation message carries the IP address distributed for the UE;
step S610, the proxy binding update is successful, and an IPSec tunnel is established between the UE and the ePDG. The ePDG sends the last IKEv2 signaling to the UE, and the signaling carries the IP address of the UE;
step S611, the H-PCRF selects the V-PCRF according to the VPLMN ID and sends a reverse S9 session establishment message to the V-PCRF, and the message carries the access position information of the BBF access network currently accessed by the UE;
step S610, after the V-PCRF saves the information, a confirmation message is returned to the H-PCRF;
step S611, the V-PCRF selects a BPCF according to the access position information of the BBF access network currently accessed by the UE, and sends S9 session establishment information to the BPCF;
step S612, the BPCF further executes resource admission control according to the access position information of the BBF access network currently accessed by the UE;
step S613, the BPCF returns a confirmation message to the PCRF.
In other service flows, after the P-GW receives the proxy binding update message sent by the ePDG, the P-GW requests the AAA Server for the VPLMN ID, so that the AAA Server provides the VPLMN ID to the P-GW.
The above-described embodiments of the present invention are merely illustrative and are not intended to limit the technical implementation of the present invention. The access network described above may be any access network.
The invention relates to a system for acquiring network element information in a visited network by a home network, which comprises UE, the home network of the UE and the visited network; fig. 7 is a schematic structural diagram of a system for acquiring meta information in a visited network by a home network according to the present invention, and as shown in fig. 7, the system for acquiring meta information in a visited network by a home network according to the present invention further includes an authentication unit 70, a reporting unit 71, an acquiring unit 72, and a sending unit 73; the authentication unit 70 and the reporting unit 71 are located in the gateway of the visited network; the acquiring unit 72 and the transmitting unit 73 are located in a gateway of the home network; wherein,
an authentication unit 70, configured to perform EAP authentication on the UE;
a reporting unit 71, configured to report the identifier information of the visited network to an authentication server of the home network in the EAP authentication process;
an obtaining unit 72, configured to obtain a network identifier of a visited network from an authentication server of a home network;
a sending unit 73, configured to send the network identifier of the visited network to the policy and control network element of the home network.
The authentication server is an AAA server and/or an HSS; the policy control network element is a PCRF.
The reporting unit 71 further sends the identification information of the visited network to the AAA server of the home network through the proxy authentication server; or, the AAA server of the home network further reports the identifier information of the visited network to the HSS of the home network.
Fig. 8 is another schematic structural diagram of a system for acquiring meta information in a visited network by a home network according to the present invention, and as shown in fig. 8, based on the system shown in fig. 7, the system for acquiring meta information in a visited network by a home network according to the present invention further includes: an IP-CAN session establishing unit 74 configured to establish an IP-CAN session for the UE;
the sending unit 73 further sends the identification information of the visited network to the PCRF of the home network in the process of the IP-CAN session establishing unit establishing the IP-CAN session for the UE.
The UE is positioned in a third party network outside a home network and a visit network; roaming is not supported between the third party network and the home network.
The PCRF of the home network initiates the establishment of a policy control session with the PCRF of the visited network according to the identification information of the visited network;
and the PCRF of the visited network initiates the establishment of a policy control session with a policy control network element of the third party network according to the position information of the UE accessed to the third party network acquired after interaction.
It should be understood by those skilled in the art that the system for acquiring network element information in a visited network by a home network shown in fig. 7 and 8 of the present invention is designed to implement the foregoing method for acquiring network element information in a visited network by a home network, and the implementation functions of the foregoing processing units can be understood by referring to the relevant description of the foregoing method. The functions of the processing units in the figures may be implemented by a program running on a processor, or may be implemented by specific logic circuits.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (12)
1. A method for a home network to obtain network element information in a visited network is characterized in that the method comprises the following steps:
the method comprises the steps that in the process that an evolution packet data gateway of a visited network authenticates User Equipment (UE), identification information of the visited network is reported to an authentication server of a home network;
and the packet data network gateway of the home network acquires the network identifier of the visit network from the authentication server of the home network and sends the network identifier to the strategy and control network element of the home network.
2. The method according to claim 1, characterized in that the authentication server is an authentication, authorization and accounting, AAA, server and/or a home subscriber server, HSS; the policy control network element is a Policy and Charging Rules Function (PCRF) entity.
3. The method of claim 2, wherein the reporting the identification information of the visited network to an authentication server of a home network is:
the evolution packet data gateway of the visit network sends the identification information of the visit network to the AAA server of the home network through the proxy authentication server; or, the AAA server of the home network further reports the identifier information of the visited network to the HSS of the home network.
4. The method of claim 2, wherein the policy and control network element sent to the home network is:
and the packet data network gateway of the home network sends the identification information of the visit network to the PCRF of the home network in the process of establishing an IP connection visit network IP-CAN session for the UE.
5. The method according to any one of claims 1 to 4, further comprising:
the UE is located in a third party network outside the home network and the visited network; roaming is not supported between the third party network and the home network.
6. The method of claim 5, further comprising:
the PCRF of the home network initiates the establishment of a policy control session with the PCRF of the visited network according to the identification information of the visited network;
and the PCRF of the visited network initiates the establishment of a policy control session with a policy control network element of the third party network according to the position information of the UE accessed to the third party network acquired after interaction.
7. A home network obtains the system which visits the network element information in the network, including UE, said home network and visiting the network of UE; the system is characterized by comprising an authentication unit, a reporting unit, an acquisition unit and a sending unit; the authentication unit and the reporting unit are positioned in an evolution packet data gateway of the visit network; the acquiring unit and the sending unit are positioned in a packet data network gateway of a home network; wherein,
an authentication unit configured to authenticate the UE;
a reporting unit, configured to report the identifier information of the visited network to an authentication server of the home network in the authentication process;
an obtaining unit, configured to obtain a network identifier of the visited network from an authentication server of the home network;
and the sending unit is used for sending the network identifier of the visited network to the strategy and control network element of the home network.
8. The system of claim 7, wherein the authentication server is an AAA server and/or an HSS; and the policy control network element is PCRF.
9. The system of claim 7, wherein the reporting unit further sends the identification information of the visited network to an AAA server of the home network through a proxy authentication server; or, the AAA server of the home network further reports the identifier information of the visited network to the HSS of the home network.
10. The system of claim 7, further comprising:
the IP-CAN session establishing unit is used for establishing an IP-CAN session for the UE;
the sending unit further sends the identification information of the visited network to the PCRF of the home network in the process that the IP-CAN session establishing unit establishes the IP-CAN session for the UE.
11. The system according to any of claims 7 to 10, wherein the UE is located in a third party network other than the home network and the visited network; roaming is not supported between the third party network and the home network.
12. The system of claim 11 wherein the PCRF of the home network initiates establishment of a policy control session with the PCRF of the visited network based on the identification information of the visited network;
and the PCRF of the visited network initiates the establishment of a policy control session with a policy control network element of the third party network according to the acquired position information of the UE accessing the third party network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010236205.1A CN102340766B (en) | 2010-07-23 | 2010-07-23 | Home network obtains the method and system of net element information in visited network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010236205.1A CN102340766B (en) | 2010-07-23 | 2010-07-23 | Home network obtains the method and system of net element information in visited network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102340766A true CN102340766A (en) | 2012-02-01 |
CN102340766B CN102340766B (en) | 2015-08-12 |
Family
ID=45516226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010236205.1A Expired - Fee Related CN102340766B (en) | 2010-07-23 | 2010-07-23 | Home network obtains the method and system of net element information in visited network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102340766B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103702311A (en) * | 2012-09-27 | 2014-04-02 | 中兴通讯股份有限公司 | Method and system for selecting VPLMN (visited public land mobile network) and packet data network gateway |
CN103731930A (en) * | 2012-10-12 | 2014-04-16 | 中兴通讯股份有限公司 | Session setup method, device and system |
WO2016101267A1 (en) * | 2014-12-26 | 2016-06-30 | 华为技术有限公司 | Control method, device and systemfor accessinguntrusted wireless local area networks of user equipment |
WO2016183745A1 (en) * | 2015-05-15 | 2016-11-24 | 华为技术有限公司 | Method and apparatus for establishing connection |
CN102761852B (en) * | 2011-04-27 | 2017-05-31 | 中兴通讯股份有限公司 | A kind of method and system for obtaining roaming information |
CN111406423A (en) * | 2017-11-30 | 2020-07-10 | 瑞典爱立信有限公司 | Core network allocation processing |
WO2023051427A1 (en) * | 2021-09-30 | 2023-04-06 | 华为技术有限公司 | Communication method and apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080046963A1 (en) * | 2006-08-18 | 2008-02-21 | Cisco Technology, Inc. | System and method for implementing policy server based application interaction manager |
CN101150782A (en) * | 2007-10-17 | 2008-03-26 | 中兴通讯股份有限公司 | A selection method for policy billing control server |
CN101420673A (en) * | 2007-10-25 | 2009-04-29 | 华为技术有限公司 | Method and system for implementing policy and charging control |
CN101568095A (en) * | 2008-04-26 | 2009-10-28 | 华为技术有限公司 | Method, equipment and system for linking non-3GPP access gateway and policy and charging rule function (PCRF) |
-
2010
- 2010-07-23 CN CN201010236205.1A patent/CN102340766B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080046963A1 (en) * | 2006-08-18 | 2008-02-21 | Cisco Technology, Inc. | System and method for implementing policy server based application interaction manager |
CN101150782A (en) * | 2007-10-17 | 2008-03-26 | 中兴通讯股份有限公司 | A selection method for policy billing control server |
CN101420673A (en) * | 2007-10-25 | 2009-04-29 | 华为技术有限公司 | Method and system for implementing policy and charging control |
CN101568095A (en) * | 2008-04-26 | 2009-10-28 | 华为技术有限公司 | Method, equipment and system for linking non-3GPP access gateway and policy and charging rule function (PCRF) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761852B (en) * | 2011-04-27 | 2017-05-31 | 中兴通讯股份有限公司 | A kind of method and system for obtaining roaming information |
WO2014048191A1 (en) * | 2012-09-27 | 2014-04-03 | 中兴通讯股份有限公司 | Method and system for selecting vplmn and packet data network gateway |
CN103702311A (en) * | 2012-09-27 | 2014-04-02 | 中兴通讯股份有限公司 | Method and system for selecting VPLMN (visited public land mobile network) and packet data network gateway |
RU2626084C2 (en) * | 2012-10-12 | 2017-07-21 | ЗетТиИ Корпорейшн | Method, device and system for establishing a session |
US9609028B2 (en) | 2012-10-12 | 2017-03-28 | Zte Corporation | Method, apparatus and system for establishing session |
WO2014056374A1 (en) * | 2012-10-12 | 2014-04-17 | 中兴通讯股份有限公司 | Method, device and system for establishing session |
CN103731930A (en) * | 2012-10-12 | 2014-04-16 | 中兴通讯股份有限公司 | Session setup method, device and system |
CN103731930B (en) * | 2012-10-12 | 2018-10-26 | 中兴通讯股份有限公司 | Session establishing method, apparatus and system |
WO2016101267A1 (en) * | 2014-12-26 | 2016-06-30 | 华为技术有限公司 | Control method, device and systemfor accessinguntrusted wireless local area networks of user equipment |
CN105934918A (en) * | 2014-12-26 | 2016-09-07 | 华为技术有限公司 | Control method, device and system for accessing untrusted wireless local area networks of user equipment |
CN105934918B (en) * | 2014-12-26 | 2020-06-02 | 华为技术有限公司 | Method, device and system for controlling access of untrusted wireless local area network of user equipment |
WO2016183745A1 (en) * | 2015-05-15 | 2016-11-24 | 华为技术有限公司 | Method and apparatus for establishing connection |
CN111406423A (en) * | 2017-11-30 | 2020-07-10 | 瑞典爱立信有限公司 | Core network allocation processing |
CN111406423B (en) * | 2017-11-30 | 2022-04-08 | 瑞典爱立信有限公司 | Core network allocation processing |
WO2023051427A1 (en) * | 2021-09-30 | 2023-04-06 | 华为技术有限公司 | Communication method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN102340766B (en) | 2015-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101267319B (en) | A method for distributing control rule of policy billing | |
CN101159563B (en) | Method and system for selecting strategy charging control server | |
US8943165B2 (en) | Method for reselecting bearer binding and event report function | |
US8849273B2 (en) | Method and system for reporting fixed network access information | |
CN101252782B (en) | Method for obtaining terminal roam access mode | |
CN102378280B (en) | Policy control method and system for realizing BBF (Broadband Forum) access | |
CN102340763B (en) | Obtain the method and system of user bandwidth accessing position information | |
CN102340766B (en) | Home network obtains the method and system of net element information in visited network | |
CN101335675B (en) | Policy control method | |
WO2010034195A1 (en) | Method for providing ip address of user equipment, diameter routing agent | |
US9609028B2 (en) | Method, apparatus and system for establishing session | |
CN103209410A (en) | Methods and system for achieving QoS (quality of service) reflection mechanism | |
EP2884802B1 (en) | Method and system for notifying access network position information | |
CN101778446A (en) | Multiple access control method and device and multiple access indicating method in development grouping system | |
EP2728810B1 (en) | Information transmission method, packet data gateway, and policy and charging rules function | |
CN103702327B (en) | Method, system and the equipment of user equipment selection visited Public Land mobile network | |
CN101459524B (en) | Method for distributing policy charging control rule | |
CN101841798B (en) | Correlation method and device of charging identifier | |
CN102761852B (en) | A kind of method and system for obtaining roaming information | |
CN103702311A (en) | Method and system for selecting VPLMN (visited public land mobile network) and packet data network gateway | |
CN103369502B (en) | The processing method and network element of a kind of policy control session | |
CN102347892B (en) | A kind of method and system of acquiring user access information by network equipment | |
CN103188646B (en) | The offer method of charge information, apparatus and system | |
CN101998515A (en) | Implementation method and implementation system for controlling PCRF load balancing | |
CN102378143B (en) | A kind of method and system triggering fixed network mobile fusion policy conferring |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150812 Termination date: 20190723 |
|
CF01 | Termination of patent right due to non-payment of annual fee |