CN102523313A - Identification method of data bypass and apparatus thereof - Google Patents

Identification method of data bypass and apparatus thereof Download PDF

Info

Publication number
CN102523313A
CN102523313A CN2011104094803A CN201110409480A CN102523313A CN 102523313 A CN102523313 A CN 102523313A CN 2011104094803 A CN2011104094803 A CN 2011104094803A CN 201110409480 A CN201110409480 A CN 201110409480A CN 102523313 A CN102523313 A CN 102523313A
Authority
CN
China
Prior art keywords
subscriber equipment
packet
identification information
port
port list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104094803A
Other languages
Chinese (zh)
Other versions
CN102523313B (en
Inventor
张勇
朱伟
叶波
安勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201110409480.3A priority Critical patent/CN102523313B/en
Publication of CN102523313A publication Critical patent/CN102523313A/en
Priority to PCT/CN2012/082686 priority patent/WO2013082975A1/en
Application granted granted Critical
Publication of CN102523313B publication Critical patent/CN102523313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/082Mobility data transfer for traffic bypassing of mobility servers, e.g. location registers, home PLMNs or home agents

Abstract

The invention provides an identification method of a data bypass and an apparatus thereof, relating to the wireless communication field, and UE which data of a bypass comes from can be identified. The method comprises the following steps: receiving a data packet which carries out data bypassing of the UE; adding identification information of the UE in the received data packet; sending the data packet which is added with the identification information of the UE to a gateway so that the gateway identifies that the data packet is from the UE according to the identification information of the UE carried in the data packet. The invention also provides an apparatus of the data bypass. The method and the apparatus are used for Internet access.

Description

A kind of identification method of data bypass and device
Technical field
The present invention relates to wireless communication field, relate in particular to a kind of identification method and device of data bypass.
Background technology
AP (Access Point, access point) is based on fixedly IP transmission network, and the network equipment of wireless access service is provided for home/business.In wireless network environment; UE (User Equipment; Subscriber equipment) during accesses network, needs to insert AP through air interface earlier, and insert IP transmission network (AP might integrated home gateway) through home gateway by AP; And then be connected to mobile core network via the IP transmission network, realize access to netwoks.Under this kind access to netwoks mode, the data of UE access internet need be passed through mobile core network, the bandwidth that can waste mobile core network.
For the data of avoiding the UE access internet cause the mobile core network waste of bandwidth through mobile core network, can data directly be got into the internet from the AP bypass, thereby, can well alleviate flow attack to mobile core network equipment.But; In the data of UE during through the AP bypass and via the direct access internet of gateway; The data that all UE send under the AP can mix, and in the internet, can't distinguish the data from different UEs, thereby; Can't distinguish statistic flow to these different UE, and then can't charge respectively according to flow.
Summary of the invention
Embodiments of the invention provide a kind of identification method and device of data bypass, can identify bypass data from UE.
On the one hand, a kind of identification method of data bypass is provided, comprises:
Receive the packet that carries out data bypass of UE;
In the packet of said reception, add the identification information of said UE;
Send the said said packet that is added with the identification information of said UE to gateway, come from said UE so that said gateway, identifies said packet according to the identification information of the said UE that carries in the said packet.
On the other hand, a kind of identification method of data bypass is provided, comprises:
Receive the packet that carries out data bypass of UE, be added with the identification information of said UE in the said packet;
According to the identification information of the said UE that carries in the said packet, identify said packet and come from said UE.
On the other hand, a kind of identity device of data bypass is provided, comprises:
Receiving element is used to receive the packet that carries out data bypass of UE;
Adding device is used for the identification information at the said UE of packet interpolation of said reception;
Transmitting element is used for sending the said said packet that is added with the identification information of said UE to gateway, comes from said UE so that said gateway, identifies said packet according to the identification information of the said UE that carries in the said packet.
On the other hand, a kind of gateway apparatus is provided, comprises:
Receiving element is used to receive the packet that carries out data bypass of UE, is added with the identification information of said UE in the said packet;
Recognition unit, the identification information of the said UE that is used for carrying according to said packet identifies said packet and comes from said UE.
After adopting technique scheme, the identification method of data bypass provided by the invention, the identity device of data bypass and gateway apparatus are after receiving the packet that carries out data bypass of UE; Through sending out again to gateway behind the identification information that in the packet of said reception, adds said UE; Like this, said gateway just can be discerned said UE according to the identification information of the said UE that comprises in the said packet after receiving the packet that carries out data bypass of said UE; Know that promptly packet comes from said UE; Like this, said gateway can add up respectively the flow of different UEs according to the identification information in each packet, and then charges respectively.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of an embodiment of the method for data bypass of the present invention;
Fig. 2 is the flow chart of another embodiment of the method for data bypass of the present invention;
Fig. 3 is the flow chart of a specific embodiment of the method for data bypass of the present invention;
Fig. 4 is the flow chart of another specific embodiment of method of data bypass of the present invention;
Fig. 5 is the flow chart of another specific embodiment of method of data bypass of the present invention;
Fig. 6 A is the structured flowchart of an embodiment of the device of data bypass of the present invention;
Fig. 6 B is the structured flowchart of another embodiment of the device of data bypass of the present invention;
Fig. 6 C is the structured flowchart of another embodiment of the device of data bypass of the present invention;
Fig. 7 is the structured flowchart of another embodiment of the device of data bypass of the present invention.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme of the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is a part of embodiment of the present invention, rather than whole embodiment.Based on the embodiment among the present invention, all other embodiment that those of ordinary skills are obtained under the prerequisite of not making creative work belong to the scope that the present invention protects.
Fig. 1 is the flow chart of an embodiment of the method for data bypass of the present invention, and as shown in Figure 1, the identification method of the data bypass of present embodiment based on AP, comprising:
S11, the packet that carries out data bypass of reception UE;
Under an AP, possibly have a plurality of UE simultaneously, AP need carry out data bypass to the data of these a plurality of UE, and at this moment, AP will receive packet that each UE sent, that need carry out bypass among these a plurality of UE.
S12, the identification information of the said UE of interpolation in the packet of said reception;
Said identification information is meant the information that can identify UE uniquely, can identify said UE uniquely through said identification information.
Particularly, can in the Optional Field in packet packet header, add the identification information of said UE.Said identification information for example, can be IMSI (International Mobile Subscriber Identification Number, international mobile subscriber identity), MAC (Medium Access Control, medium access control) address etc.
S13 sends the said said packet that is added with the identification information of said UE to gateway, comes from said UE so that said gateway, identifies said packet according to the identification information of the said UE that carries in the said packet.
Present embodiment AP is after receiving the packet that carries out data bypass of UE; In the packet that is received, correspondingly add said UE corresponding identification information; Come to identify uniquely said UE through this identification information, and send the said said packet that is added with the identification information of said UE, so to said gateway; Said gateway can identify packet from said UE according to the identification information in the packet; Thereby, can correspondingly add up the flow of said UE, corresponding charging according to the packet of said UE.Likewise, which UE said gateway also can correspondingly identify packet from according to the identification information in each packet when receiving a plurality of UE data sent bag, thereby realizes statistic flow and the charging respectively to each UE.
Corresponding with preceding method, the embodiment of the invention also provides a kind of identification method of data bypass, and based on gateway, for example BRAS (Broadband Remote Access Server, Broadband Remote Access Server) is as shown in Figure 2, comprising:
S21 receives the packet that carries out data bypass of UE, is added with the identification information of said UE in the said packet;
S22 according to the identification information of the said UE that carries in the said packet, identifies said packet and comes from said UE.
The present embodiment gateway is after receiving the packet that carries out data bypass of UE; Owing in the packet that is received, be added with said UE corresponding identification information, this identification information identifies said UE uniquely, so; Said gateway can identify packet from said UE according to the identification information in the packet; Thereby, can correspondingly add up the flow of said UE, corresponding charging according to the packet of said UE.Likewise, which UE said gateway also can correspondingly identify packet from according to the identification information in each packet when receiving a plurality of UE data sent bag, thereby realizes statistic flow and the charging respectively to each UE.
For better understanding the present invention, be that example comes the present invention is further specified with several specific embodiments below.Also must note, below cited embodiment be a part of embodiment of the present invention, those skilled in the art can be easy to expect other embodiment by content according to the invention, they all within the scope of the invention.
Fig. 3 is the flow chart of a specific embodiment of the identification method of data bypass of the present invention.As shown in Figure 3, present embodiment comprises:
S31, AP receive the IP packet that carries out data bypass of a UE.
S32, said AP add the IMSI information (identification information) of a UE in the Optional Field in said IP packet packet header.
The IMSI information that is about to a UE writes the Optional Field in the said packet, makes the IMSI information that carries a UE in the Optional Field of said IP packet.Owing to IMSI is the number that distributes for mobile subscriber of unique identification in the world, so can identify a UE uniquely as the identification information of a UE with IMSI.
S33, said AP send the IP packet that carries out data bypass of a UE to gateway after with IMSI information the one UE being identified, include the IMSI information of a UE in the said IP packet.
S34, said gateway receive the IP packet that carries out data bypass of the UE that said AP sends.
S35, said gateway identify said packet and come from a UE according to the identification information that carries in the said IP packet.
Particularly, said gateway is resolved the IP packet of a UE, knows the IMSI information in the Optional Field in the said IP packet, and the IMSI information of carrying in the IP packet according to a UE, and the packet that identifies said bypass is from a UE.Like this, gateway just can be added up the flow of this UE, and then realizes the charging to this UE.
Certainly, for the IP packet that carries out data bypass that other UE send, AP and gateway also repeat said process, to realize statistics and the charging to other UE flows.
When UE moves between different AP; These different AP also add the IMSI information of said UE in the Optional Field of the IP packet that carries out data bypass of said UE; Thereby; Gateway equally can according to IMSI information Recognition data from subscriber equipment, and then add up the flow of this subscriber equipment and carry out corresponding charging.
In the present embodiment, AP adds the corresponding IMSI information of said UE in the packet that is received after receiving the packet that carries out data bypass of UE; Come to identify uniquely said UE through this IMSI information, and send the said said packet that is added with the IMSI information of said UE, so to gateway; Gateway can go out packet from said UE according to the IMSI information Recognition in the packet; Thereby, can correspondingly add up the flow of said UE, corresponding charging according to the packet of said UE.Correspondingly, gateway also can correspondingly identify the packet of each UE according to the IMSI information in each packet when receiving a plurality of UE data sent bag, thereby realizes statistic flow and the charging respectively to each UE.
Need to prove that in the present embodiment, IMSI information is added on the Optional Field in packet packet header, but present embodiment is not limited thereto, IMSI information also can be added to other positions of IP packet.
Fig. 4 is the flow chart of another specific embodiment of identification method of data bypass of the present invention.As shown in Figure 4, present embodiment comprises:
S41, AP receive the IP packet that carries out data bypass of a UE.
S42, said AP confirm UE corresponding port tabulation calculating parameter.
Particularly, AP can be a UE and distributes a port list calculating parameter after receiving the IP packet of a UE.For example, be that a UE distributes a port list calculating parameter through predefined allocation rule, can also be that a UE distributes port list calculating parameter, for example Random assignment through alternate manner certainly.It should be noted that in the present embodiment that the port list calculating parameter will be used to identify UE, therefore, need guarantee that the port list calculating parameter that distributes into each UE is different.Particularly, said port list calculating parameter is that AP is the numerical value that a UE distributes, and for example, this numerical value can be the numbering of AP to each UE under it, also can be the sequence number of other purposes certainly, and the present invention does not limit this.
S43, said AP confirms the port list that a UE can use according to the port list calculating parameter of a said definite UE.
Particularly, AP can confirm the port list that said UE can use through following formula:
A+n×N+(k-1)
Wherein, the port number of A for having taken, N is the sum of UE; K is that AP is the port list calculating parameter that a UE confirms in the S42 step, and n is the port sequence number that a UE can use, and n is an integer; And n=0,1... (M-A)/N, M are the port sum, and occurrence can be 65535.
For example, the port number that has taken when system is 2048, i.e. A=2048; UE under AP adds up to 10; Be N=10, the port list calculating parameter is 2, promptly during k=2; The port number that each UE can use under this AP is (M-A)/N=(65535-2048)/10=6348, and promptly each UE can use 6348 ports.
The port list calculating parameter is that the port list of 2 UE is:
During n=0,2048+0 * 10+ (2-1)=2049;
During n=1,2048+1 * 10+ (2-1)=2059;
During n=6437,2048+6347 * 10+ (2-1)=65519
And the like, the value of two every adjacent ports of same UE differs the UE sum, promptly is separated by 10.
More than just confirm a kind of method of port list also can adopt additive method to confirm port list according to the port list calculating parameter with what way of example was listed.For example, all UE under the AP add up at 10 o'clock, also desirable 6348 the continuous ports of each UE.
S44, said AP add said definite UE corresponding port tabulation calculating parameter (identification information) in the Optional Field in the IP packet packet header of carrying out data bypass of a UE who is received.
In the present embodiment, be the identification information of the definite port list calculating parameter of a UE as a UE with said AP.
S45, said AP will be added with the IP data packet transmission of port list calculating parameter of a UE to gateway through at least one port in the said port list of determining.
S46, said gateway receive the IP packet that carries out data bypass of the UE that said AP sends, carry UE corresponding port tabulation calculating parameter in the said IP packet.
S47, said gateway be according to the port list calculating parameter that comprises in the said IP packet, confirms to identify the port list of a UE and use the packet of at least one port in the said port list to come from a UE according to the computational methods identical with AP.
So; Said gateway is identical to the port list that same UE determines with said AP, again because the port list that each UE can use is inequality, thereby; The flow that said gateway can count the port list that each UE uses respectively can be determined the flow of each UE, and then corresponding charging.
Be noted that; In the present embodiment; For making AP identical according to the identical determined port list of port list calculating parameter with gateway; AP need dispose identical computational methods with gateway, thereby calculates the available port list of UE according to the port list calculating parameter, and then realizes statistics and charging to this UE flow through the port list that UE can use.
Obviously, for the IP packet that carries out data bypass that other UE send, AP and gateway also repeat said process, to realize statistics and the charging to other UE flows.
In the present embodiment, AP correspondingly adds said UE corresponding port tabulation calculating parameter in the packet that is received after receiving the packet that carries out data bypass of UE; Come to identify uniquely said UE through this parameter; And to the said said packet that is added with the port list calculating parameter of said UE of gateway transmission, so, gateway can be according to the corresponding port list of confirming said UE of port list calculating parameter; And then can identify the packet that sends through at least one port in the said definite port list from said UE; Thereby, can correspondingly add up the flow of said UE, corresponding charging according to the port list of said UE.Correspondingly, gateway also can correspondingly identify the packet of each UE according to the port list calculating parameter in each packet when receiving a plurality of UE data sent bag, thereby realizes statistic flow and the charging respectively to each UE.
Fig. 5 is the flow chart of another specific embodiment of identification method of data bypass of the present invention.As shown in Figure 5, present embodiment comprises:
S51, AP receive the IP packet that carries out data bypass of a UE.
S52, said AP copy and generate the corresponding MAC Address of a UE.
Particularly; AP can copy according to the rule that is provided with in advance and generate the corresponding MAC Address of a UE; The said rule that is provided with in advance can be anyly can copy the rule that generates MAC Address, copys the MAC Address that generates only as long as guarantee according to the said rule that is provided with in advance
S53, said AP apply for the IP address according to the MAC Address of said generation.
Particularly, after obtaining copying the MAC Address of generation, AP just can be according to the MAC Address of said generation to DHCP (Dynamic Host Configuration Protocol, DynamicHost is provided with agreement) server application IP address.Wherein, said MAC Address is corresponding one by one with said IP address.
S54, said AP add a UE corresponding MAC Address and/or IP address (identification information) in the Optional Field in the IP packet packet header of a UE who is received.
In the present embodiment, with the corresponding MAC Address of a UE and/or IP address identification information as a UE.In this step; Can only in the IP of UE packet, add the corresponding MAC Address of a UE; As identification information, can also be only in the IP of UE packet, add the corresponding IP address of a UE with MAC Address, with the IP address as identification information; Also can in the IP of UE packet, add simultaneously a UE corresponding MAC Address and IP address, with both perhaps both one of as identification information.
Particularly, after the success of IP application IP addresses, just can in the packet of a UE, add a UE corresponding MAC Address and/or IP address, the MAC Address of said generation and/or IP address are the identification information of said UE, in order to said UE is identified.
S55, said AP send to gateway and are added with the corresponding MAC Address of a UE and/or the IP packet of IP address.
S56, said gateway receive the IP packet that carries out data bypass of the UE that said AP sends, are added with MAC Address and/or the IP address of a UE in the said IP packet.
S57, said gateway identify said IP packet and come from a UE according to MAC Address that carries in the said IP packet and/or IP address.
So, said gateway just can be added up the flow of a UE according to the said MAC Address in the packet and/or IP address, charges.
Alternatively, when carrying MAC Address and IP address in the IP packet simultaneously, said gateway can identify said IP packet according in the two at least one and come from a UE.
Obviously, for the IP packet that carries out data bypass that other UE send, AP and gateway also repeat said process, to realize statistics and the charging to other UE flows.
In the present embodiment; AP correspondingly adds said UE corresponding MAC Address and/or IP address in the packet that is received after receiving the packet that carries out data bypass of UE, come to identify uniquely said UE through this MAC Address and/or IP address; And to the said MAC Address of said UE and/or the said packet of IP address of being added with of gateway transmission; So, said gateway can identify packet from said UE according to said MAC Address and/or IP address, thereby; The flow that can add up said UE according to MAC Address and/or the IP address of said UE, corresponding charging.Correspondingly; Said gateway is when receiving a plurality of UE data sent bag; Also can correspondingly identify the packet of each UE, thereby realize statistic flow and charging respectively each UE according to corresponding MAC Address and/or the IP address of said a plurality of UE that comprises in each packet.
It is to be noted; The order of each mentioned step may not be fixed among each embodiment in the above; Within the scope of the invention, can adjust accordingly the order of the step among each embodiment, these are all within scope of the present invention; For example, above the explanation in mentioned S44 can tune between S42 and the S43.
Be pointed out that also among each embodiment, said gateway can be BRAS in the above.
Corresponding with the method for a kind of data bypass provided by the invention, the present invention also provides a kind of identity device of data bypass, shown in Fig. 6 A, comprising:
Receiving element 61 is used to receive the packet that carries out data bypass of UE;
Adding device 62 is used for the said identification information that carries out the said UE of packet interpolation of data bypass that receives at receiving element 61;
Transmitting element 63; Be used for after adding device 62 adds the identification information of said UE; Send the said said packet that is added with the identification information of said UE to gateway; So that, identifying said packet according to the identification information of the said UE that carries in the said packet, said gateway comes from said UE.
After present embodiment receives the packet that carries out data bypass of UE at receiving element 61; In the packet that is received, correspondingly add said UE corresponding identification information by adding device 62; Come to identify uniquely said UE through this identification information, and send the said said packet that is added with the identification information of said UE to gateway, so by transmitting element 63; Gateway can identify packet from said UE according to the identification information in the packet; Thereby, can correspondingly add up the flow of said UE, corresponding charging according to the packet of said UE.Correspondingly, which UE gateway also can correspondingly identify packet from according to the identification information in each packet when receiving a plurality of UE data sent bag, thereby realizes statistic flow and the charging respectively to each UE.
Alternatively, in one embodiment of this invention, said identification information is an international mobile subscriber identity IMSI information; Adding device 62 specifically is used for:
In said packet, add the international mobile subscriber identity IMSI information of said UE.
Alternatively, in another embodiment of the present invention, said identification information is the port list calculating parameter; Shown in Fig. 6 B, said device also comprises:
Confirm unit 64, be used for after receiving element 61 receives the packet that carries out data bypass of UE, confirm said UE corresponding port tabulation calculating parameter; According to said definite said UE corresponding port tabulation calculating parameter, confirm the port list that said UE can use;
Adding device 62 specifically is used for:
In the packet of said reception, add the said UE corresponding port tabulation calculating parameter of confirming that unit 64 is confirmed;
Transmitting element 63 specifically is used for:
At least one port through in the port list of confirming to determine unit 64 sends the said said packet that is added with the identification information of said UE to gateway.
Particularly, confirm that unit 64 is used for:
Confirm the port list that said UE can use through following formula:
A+n×N+(k-1)
Wherein, A is the port number that taken, and N is the sum of UE, and k is the port list calculating parameter of said UE, and n is the port sequence number that said UE can use, and n is an integer, and n=0,1... (M-A)/N, and M is the port sum.
Alternatively, in another embodiment of the present invention, the identification information of said UE is corresponding MAC Address and/or IP address of said UE; Shown in Fig. 6 C, said device also comprises:
Generation unit 65 is used for after receiving element 61 receives the packet that carries out data bypass of UE, generates the corresponding medium access control MAC Address of said UE;
Application unit 66 is used for the medium access control MAC Address according to generation unit 65 generations, application IP address;
Adding device 62 is used for:
In the packet that receiving element 61 receives, add said UE corresponding MAC Address and/or IP address.
Corresponding with the method for a kind of data bypass provided by the invention, the present invention also provides a kind of gateway apparatus, and is as shown in Figure 7, comprising:
Receiving element 71 is used to receive the packet that carries out data bypass of UE, is added with the identification information of said UE in the said packet;
Recognition unit 72, the identification information of the said UE that is used for carrying according to the said packet that receiving element 71 receives identifies said packet and comes from said UE.
After present embodiment receives the packet that carries out data bypass of UE at receiving element 71; Be identified in the said UE corresponding identification information of having added in the packet that is received by recognition unit 72; So, said gateway can identify packet from said UE according to the identification information in the packet, thereby; Can correspondingly add up the flow of said UE according to the packet of said UE, corresponding charging.Correspondingly, said gateway also can be realized statistic flow and the charging respectively to each UE according to the identification information in each packet when receiving a plurality of UE data sent bag.
Alternatively, in one embodiment of this invention, said identification information is an international mobile subscriber identity IMSI information; Recognition unit 72 is used for:
International mobile subscriber identity IMSI information according to said UE identifies said packet and comes from said UE.
Alternatively, in one embodiment of this invention, said identification information is the port list calculating parameter; Recognition unit 72 is used for:
According to the port list calculating parameter that carries in the said packet, confirm the port list that said UE can use;
According to the port list of said definite UE, identify and use the packet of the port in the said port list to come from said UE.
Particularly, recognition unit 72 is used for:
Confirm the port list that said UE can use through following formula:
A+n×N+(k-1)
Wherein, A is the port number that taken, and N is the sum of UE, and k is the port list calculating parameter of said UE, and n is the port sequence number that said UE can use, and n is an integer, and n=0,1... (M-A)/N, and M is the port sum.
Alternatively, in another embodiment of the present invention, said identification information is MAC Address and/or IP address; Recognition unit 72 is used for:
According to MAC Address and/or the IP address of said UE, identify said packet and come from said UE.
The method and apparatus of data bypass provided by the invention; After receiving the packet that carries out data bypass of UE, through sending out again to gateway, like this behind the identification information that in the packet of said reception, adds said UE; Said gateway is after receiving the packet of said UE; Just can discern said UE, know that promptly packet comes from said UE, like this according to the identification information of the said UE that comprises in the said packet; Said gateway can add up respectively the flow of different UEs according to the identification information in each packet, and then charges.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to accomplish through program.Described program can be stored in a kind of computer-readable recording medium, and said storage medium can be read-only memory, disk or CD etc.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses; Can expect easily changing or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (20)

1. the identification method of a data bypass is characterized in that, comprising:
Receive the packet that carries out data bypass of subscriber equipment;
In the packet of said reception, add the identification information of said subscriber equipment;
Send the said said packet that is added with the identification information of said subscriber equipment to gateway, so that said gateway according to the identification information of the said subscriber equipment that carries in the said packet, identifies said packet.
2. method according to claim 1 is characterized in that,
The identification information of said subscriber equipment is an international mobile subscriber identity IMSI information;
The said identification information that in the packet of said reception, adds said subscriber equipment is specially:
In said packet, add the international mobile subscriber identity IMSI information of said subscriber equipment.
3. method according to claim 1 is characterized in that,
The identification information of said subscriber equipment is the port list calculating parameter;
Behind the packet that carries out data bypass that receives subscriber equipment, said method also comprises:
Confirm said subscriber equipment corresponding port tabulation calculating parameter;
According to said definite said subscriber equipment corresponding port tabulation calculating parameter, confirm the port list that said subscriber equipment can be used;
The said identification information that in the packet of said reception, adds said subscriber equipment comprises:
In the packet of said reception, add said definite said subscriber equipment corresponding port tabulation calculating parameter;
Saidly send the said said packet that is added with the identification information of said subscriber equipment to gateway and comprise:
Send the said said packet that is added with the identification information of said subscriber equipment through at least one port in the said port list of determining to gateway.
4. method according to claim 3 is characterized in that, and is said according to said definite said subscriber equipment corresponding port tabulation calculating parameter, confirm said subscriber equipment can with port list comprise:
Confirm the port list that said subscriber equipment can be used through following formula:
A+n×N+(k-1)
Wherein, A is the port number that taken, and N is the sum of subscriber equipment, and k is the port list calculating parameter of said subscriber equipment, and n is the port sequence number that said subscriber equipment can be used, and n is an integer, and n=0,1... (M-A)/N, and M is the port sum.
5. method according to claim 1 is characterized in that,
The identification information of said subscriber equipment is corresponding medium access control MAC Address and/or Internet Protocol IP address of said subscriber equipment;
Behind the packet that carries out data bypass that receives subscriber equipment, said method also comprises:
Generate the corresponding medium access control MAC Address of said subscriber equipment;
According to the medium access control MAC Address of said generation, application Internet Protocol IP address;
The said identification information that in the packet of said reception, adds said subscriber equipment is specially:
In the packet of said reception, add said subscriber equipment corresponding medium access control MAC Address and/or Internet Protocol IP address.
6. the identification method of a data bypass is characterized in that, comprising:
Receive the packet that carries out data bypass of subscriber equipment, be added with the identification information of said subscriber equipment in the said packet;
According to the identification information of the said subscriber equipment that carries in the said packet, identify said packet and come from said subscriber equipment.
7. method according to claim 6 is characterized in that,
Said identification information is an international mobile subscriber identity IMSI information;
Said identification information according to the said subscriber equipment that carries in the said packet, identify said packet and come from said subscriber equipment and comprise:
International mobile subscriber identity IMSI information according to said subscriber equipment identifies said packet and comes from said subscriber equipment.
8. method according to claim 6 is characterized in that,
Said identification information is the port list calculating parameter;
Said identification information according to the said subscriber equipment that carries in the said packet, identify said packet and come from said subscriber equipment and comprise:
According to the port list calculating parameter that carries in the said packet, confirm the port list that said subscriber equipment can be used;
According to the port list of said definite subscriber equipment, identify and use the packet of at least one port in the said port list to come from said subscriber equipment.
9. method according to claim 8 is characterized in that, and is said according to said definite said subscriber equipment corresponding port tabulation calculating parameter, confirm said subscriber equipment can with port list comprise:
Confirm the port list that said subscriber equipment can be used through following formula:
A+n×N+(k-1)
Wherein, A is the port number that taken, and N is the sum of subscriber equipment, and k is the port list calculating parameter of said subscriber equipment, and n is the port sequence number that said subscriber equipment can be used, and n is an integer, and n=0,1... (M-A)/N, and M is the port sum.
10. method according to claim 6 is characterized in that,
Said identification information is medium access control MAC Address and/or Internet Protocol IP address;
According to the identification information of the said subscriber equipment that carries in the said packet, identify said packet and come from said subscriber equipment and comprise:
According to the medium access control MAC Address and/or the Internet Protocol IP address of said subscriber equipment, identify said packet and come from said subscriber equipment.
11. the identity device of a data bypass is characterized in that, comprising:
Receiving element is used to receive the packet that carries out data bypass of subscriber equipment;
Adding device is used for the identification information at the said subscriber equipment of packet interpolation of said reception;
Transmitting element; Be used for sending the said said packet that is added with the identification information of said subscriber equipment to gateway; So that, identifying said packet according to the identification information of the said subscriber equipment that carries in the said packet, said gateway comes from said subscriber equipment.
12. device according to claim 11 is characterized in that,
Said identification information is an international mobile subscriber identity IMSI information;
Said adding device is used for:
In said packet, add the international mobile subscriber identity IMSI information of said subscriber equipment.
13. device according to claim 11 is characterized in that,
Said identification information is the port list calculating parameter;
Said device also comprises:
Confirm the unit, be used for confirming said subscriber equipment corresponding port tabulation calculating parameter; According to said definite said subscriber equipment corresponding port tabulation calculating parameter, confirm the port list that said subscriber equipment can be used;
Said adding device is used for:
In the packet of said reception, add said definite said subscriber equipment corresponding port tabulation calculating parameter;
Said transmitting element is used for:
Send the said said packet that is added with the identification information of said subscriber equipment through at least one port in the said port list of determining to gateway.
14. device according to claim 13 is characterized in that, said definite unit is used for:
Confirm the port list that said subscriber equipment can be used through following formula:
A+n×N+(k-1)
Wherein, A is the port number that taken, and N is the sum of subscriber equipment, and k is the port list calculating parameter of said subscriber equipment, and n is the port sequence number that said subscriber equipment can be used, and n is an integer, and n=0,1... (M-A)/N, and M is the port sum.
15. device according to claim 11 is characterized in that,
The identification information of said subscriber equipment is corresponding medium access control MAC Address and/or Internet Protocol IP address of said subscriber equipment;
Said device also comprises:
Generation unit is used to generate the corresponding medium access control MAC Address of said subscriber equipment;
The application unit is used for the medium access control MAC Address according to said generation, application Internet Protocol IP address;
Said adding device is used for:
In the packet of said reception, add said subscriber equipment corresponding medium access control MAC Address and/or Internet Protocol IP address.
16. a gateway apparatus is characterized in that, comprising:
Receiving element is used to receive the packet that carries out data bypass of subscriber equipment, is added with the identification information of said subscriber equipment in the said packet;
Recognition unit, the identification information of the said subscriber equipment that is used for carrying according to said packet identifies said packet and comes from said subscriber equipment.
17. device according to claim 16 is characterized in that,
Said identification information is an international mobile subscriber identity IMSI information;
Said recognition unit is used for:
International mobile subscriber identity IMSI information according to said subscriber equipment identifies said packet and comes from said subscriber equipment.
18. device according to claim 16 is characterized in that,
Said identification information is the port list calculating parameter;
Said recognition unit is used for:
According to the port list calculating parameter that carries in the said packet, confirm the port list that said subscriber equipment can be used;
According to the port list of said definite subscriber equipment, identify and use the packet of the port in the said port list to come from said subscriber equipment.
19. device according to claim 18 is characterized in that, said recognition unit is used for:
Confirm the port list that said subscriber equipment can be used through following formula:
A+n×N+(k-1)
Wherein, A is the port number that taken, and N is the sum of subscriber equipment, and k is the port list calculating parameter of said subscriber equipment, and n is the port sequence number that said subscriber equipment can be used, and n is an integer, and n=0,1... (M-A)/N, and M is the port sum.
20. device according to claim 16 is characterized in that,
Said identification information is medium access control MAC Address and/or Internet Protocol IP address;
Be used for according to recognition unit:
According to the medium access control MAC Address and/or the Internet Protocol IP address of said subscriber equipment, identify said packet and come from said subscriber equipment.
CN201110409480.3A 2011-12-09 2011-12-09 Identification method of data bypass and apparatus thereof Active CN102523313B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110409480.3A CN102523313B (en) 2011-12-09 2011-12-09 Identification method of data bypass and apparatus thereof
PCT/CN2012/082686 WO2013082975A1 (en) 2011-12-09 2012-10-10 Identification method and device for data bypass

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110409480.3A CN102523313B (en) 2011-12-09 2011-12-09 Identification method of data bypass and apparatus thereof

Publications (2)

Publication Number Publication Date
CN102523313A true CN102523313A (en) 2012-06-27
CN102523313B CN102523313B (en) 2015-03-18

Family

ID=46294100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110409480.3A Active CN102523313B (en) 2011-12-09 2011-12-09 Identification method of data bypass and apparatus thereof

Country Status (2)

Country Link
CN (1) CN102523313B (en)
WO (1) WO2013082975A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013082975A1 (en) * 2011-12-09 2013-06-13 华为技术有限公司 Identification method and device for data bypass
CN104125621A (en) * 2014-08-11 2014-10-29 上海云联计算机系统有限公司 Mobile terminal data packet tracking and identifying method and device of wireless router
CN104618360A (en) * 2015-01-22 2015-05-13 盛科网络(苏州)有限公司 Bypass authentication method and system based on 802.1X protocol

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789896A (en) * 2009-01-24 2010-07-28 华为技术有限公司 Method for accessing internet by user equipment and system therefor
CN101795478A (en) * 2010-03-31 2010-08-04 华为技术有限公司 Method for data bypass, network side equipment and access gateway

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765218B (en) * 2009-12-23 2012-10-03 华为技术有限公司 Data transmitting method and relevant device and system
CN102523313B (en) * 2011-12-09 2015-03-18 华为技术有限公司 Identification method of data bypass and apparatus thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789896A (en) * 2009-01-24 2010-07-28 华为技术有限公司 Method for accessing internet by user equipment and system therefor
CN101795478A (en) * 2010-03-31 2010-08-04 华为技术有限公司 Method for data bypass, network side equipment and access gateway

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013082975A1 (en) * 2011-12-09 2013-06-13 华为技术有限公司 Identification method and device for data bypass
CN104125621A (en) * 2014-08-11 2014-10-29 上海云联计算机系统有限公司 Mobile terminal data packet tracking and identifying method and device of wireless router
CN104618360A (en) * 2015-01-22 2015-05-13 盛科网络(苏州)有限公司 Bypass authentication method and system based on 802.1X protocol
CN104618360B (en) * 2015-01-22 2019-05-31 盛科网络(苏州)有限公司 Bypass authentication method and system based on 802.1X agreement

Also Published As

Publication number Publication date
WO2013082975A1 (en) 2013-06-13
CN102523313B (en) 2015-03-18

Similar Documents

Publication Publication Date Title
CN109156046B (en) Home gateway and method for forwarding service thereof
CN101729500B (en) Method, device and system for identifying IP session
CN103797772A (en) Differentiated handling of data traffic with user-class dependent adaptation of network address lookup
CN102469020A (en) Business control method and system, evolution base station, gateway of packet data network
CN102638407A (en) Message forwarding method, device and network equipment
CN109495594B (en) Data transmission method, PNF SDN controller, VNF SDN controller and system
CN102334355A (en) Strategy control method and equipment
CN104333610A (en) IPv6 address allocation method and device
WO2015169044A1 (en) Session binding method, device and system in roaming scenario
CN103517378A (en) Method for building packet data network connection and equipment
CN102523313A (en) Identification method of data bypass and apparatus thereof
CN111050355B (en) Method, device and system for dynamically adjusting Qos of mobile terminal
EP2418819A1 (en) Device and method for preventing internet protocol version 6 (ipv6) address being fraudulently attacked
KR20160050483A (en) Method for traffic path diversity in wireless communication system
EP2566139B1 (en) Method and device for obtaining remote ip address
CN104782105A (en) Recovering lost device information in cable networks
CN104780587A (en) AP (access point) accessing method and system for WiFi (wireless fidelity) equipment in Internet of Things
CN105100300B (en) Method and device for converting network address into NAT
US20200076494A1 (en) Communication system, relay server, communication method and program
CN113746736B (en) Method, device and communication system for sending and receiving message
CN105376174A (en) Method and apparatus for performing policy based on service chaining in LTE/EPC
CN104363176A (en) Message control method and equipment
CN102083173B (en) Network access control method, equipment and gateway GPRS support node
CN104243626A (en) Information processing apparatus
CN112969199A (en) Data acquisition method and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant