CN102638867B - The processing method and system of secondary call access control - Google Patents

The processing method and system of secondary call access control Download PDF

Info

Publication number
CN102638867B
CN102638867B CN201110039357.7A CN201110039357A CN102638867B CN 102638867 B CN102638867 B CN 102638867B CN 201110039357 A CN201110039357 A CN 201110039357A CN 102638867 B CN102638867 B CN 102638867B
Authority
CN
China
Prior art keywords
pcrf
henb
address
information
network equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110039357.7A
Other languages
Chinese (zh)
Other versions
CN102638867A (en
Inventor
毛玉欣
周晓云
宗在峰
芮通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110039357.7A priority Critical patent/CN102638867B/en
Publication of CN102638867A publication Critical patent/CN102638867A/en
Application granted granted Critical
Publication of CN102638867B publication Critical patent/CN102638867B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of processing method and system of secondary call access control, this method includes:The network equipment is found to be the PCRF of UE services, the wherein network equipment is S GW or P GW according to internet-ip address information;The network equipment and the control session of PCRF establishment strategies.CPE IP address or HeNB IP address are identical used in the UE of the invention accessed by same HeNB, therefore it is that the PCRF that the UE has found is identical according to the CPE IP address or the HeNB IP address, can ensures that PCRF commences business according to information such as UE priority to UE therein with this and realize secondary call access control.

Description

The processing method and system of secondary call access control
Technical field
The present invention relates to the communications field, in particular to a kind of processing method and system of secondary call access control.
Background technology
Third generation partner program (3rd Generation Partnership Project, referred to as 3GPP) is developed Evolved packet system (Evolved Packet System, referred to as EPS) by the Universal Terrestrial Radio Access Network of evolution (EvolvedUniversal Terrestrial Radio Access Network, referred to as E-UTRAN), mobile management list First (MobilityManagement Entity, referred to as MME), gateway (Serving Gateway, referred to as S-GW), Grouped data network gateway (Packet Data Network Gateway, referred to as P-GW), home subscriber server (HomeSubscriber Server, referred to as HSS) is formed, as shown in Figure 1.
MME is connected with EUTRAN, S-GW and femto gateway (HeNB GW), is responsible for mobile management, Non-Access Stratum The related work of the chain of command such as the processing of signaling and the management of user's mobile management context;S-GW is connected with E-UTRAN Accessing gateway equipment, data are forwarded between E-UTRAN and P-GW, and be responsible for caching the pending datas such as paging;P-GW It is then EPS and packet data network (Packet Data Network, referred to as PDN) network borde gateway, is responsible for PDN's Access and the function such as forwarding data between EPS and PDN.
If EPS support policy charging control (Policy and Charging Control, referred to as PCC), then "Policy and Charging Rules Function (Policy and Charging Rules Function, referred to as PCRF) carries out strategy and meter Take the formulation of rule, it passes through interface Rx and carrier network agreement (Internet Protocol, referred to as IP) business network In application function (Application Function, referred to as AF) be connected, obtain business information, for generate PCC strategy Business information.When the S5 interfaces between S-GW and P-GW use GTP agreements, strategy is resided in P-GW and charging performs work( Energy (Policy and Charging Enforcement Function, referred to as PCEF), is connect between PCRF and P-GW by Gx Information is changed in oral sex, is responsible for initiating the foundation of carrying, modification and release, ensures the service quality (Qualifyof of business datum Service, referred to as QoS), and carry out charging control.When S-GW and P-GW S5 interfaces use proxy-mobile IP (Proxy Mobile IP, referred to as PMIP) when, bearing binding and event reporting function (Bearer Bindingand are resident in S-GW Event Report Function, referred to as BBERF), and information is exchanged by Gxc interfaces between S-GW and PCRF, by BBERF is responsible for initiating the foundation of carrying, modification and release, ensures the service quality of business datum, charging control is carried out by PCEF.
EPS supports evolution Home eNodeB (Home evolved NodeB, referred to as HeNB) access, and Fig. 1 is also described HeNB accesses the signal of EPS.HeNB is a kind of small-sized, low power base station, is deployed in the indoor place such as family and office. HeNB generally accesses EPS core nets by the fixed network circuit of rental.In order to ensure access safety, security gateway is introduced in core net (Securify Gateway, referred to as SeGW) is shielded, and the data interaction between HeNB and SeGW will use IPSec to carry out Encapsulation, fixed network equipment can not perceive the data of HeNB and EPS network interactions.HeNB can be directly connected to MME, can also pass through HeNB GW are connected to MME, i.e. HeNB GW are optional network elements.
In addition, UMTS (Universal Mobile Telecommunications System, referred to as For UMTS) support Home eNodeB HNB (Home NodeB) access.Fig. 2 is under non-roaming scence, and HNB accesses UMTS framework Schematic diagram.Framework shown in Fig. 2 is similar with Fig. 1 framework, and difference is, uses generic service packet wireless business support node (Serving General Packet Radio Service Support Node, referred to as SGSN) instead of S-GW, use Ggsn (Gateway General Packet Radio Service SupportingNode, referred to as GGSN) P-GW is instead of, HNB GW are essential network elements under the scene.
Due to needing to use the QoS resource of fixed network circuit, the QoS when HeNB/HNB is linked into EPS by fixed network circuit Resource is generally limited by the signing of HeNB/HNB owner and fixed network operator, and this part generally is distributed into HeNB/HNB makes Fixed network resource is referred to as HeNB/HNB signings QoS.When 3GPP UE are by HeNB/HNB access services, business is wanted to QoS Seek the signing QoS no more than HeNB/HNB, otherwise the development of the business cannot QoS guarantees, influence business experience, it is right It is even more so in the business for requiring guarantee bit rate (Guaranteed Bitrate, referred to as GBR).On the other hand, it is directed to Fig. 1 and figure Framework shown in 2, a set of resource mechanism of control is introduced to be managed collectively fixed and mobile network resource.Introduced in fixed network side BPCF (BroadBand Policy Control Function, broadband policy control function) is used for managing fixed network resource, is moving Dynamic network side introduces PCRF and is used to manage mobile resources, and S9 is established between BPCF and PCRF*Interface realizes resource management The intercommunication of strategy.When UE initiates business by HeNB/HNB, the requirement that business carries out to QoS is sent to PCRF, by PCRF QoS mandates are carried out, mobile network carries out resource reservation according to mandate QoS in mobile network, while PCRF sends out the mandate QoS BPCF is given, the requirement that whether can meet to authorize QoS for the available HeNB in BPCF decision-making fixed networks side signings QoS, if can be with Meet, then need to be that business carries out reserved fixed network resource corresponding with the mandate QoS in fixed network side, will if can not meet Ask, then need to exclude user's development business.
Meanwhile prioritization be present by the same HeNB users accessed and (such as CSG (Closed be present SubscriberGroup, closed user group) priority, or ARP (Priority points of Allocation and Retention Match somebody with somebody and keep priority)).If a new User Priority for initiating business is excellent higher than the lower other users of same HeNB accesses First level, then (i.e. HeNB contracts QoS by the business of other users in the case where HeNB signing QoS resources use anxiety All take, or available HeNB signings QoS can not meet that the high-priority users initiate need of the business to QoS Ask), according to prior art, BPCF can also refuse the user and initiate the business when carrying out call access control.But from conjunction Manage management and control resource angle for, it is above-mentioned in this case, it should secondary admission control mechanism is realized by PCRF, that is, received To after the BPCF instruction excluded, PCRF still can be according to information such as all UE priority under HeNB accesses Call access control is carried out to the Client-initiated business again.In this case, because the priority of the user is used higher than other The priority at family, therefore low priority user is degraded using resource, while the business for receiving high-priority users to initiate, And provide Resource Guarantee.
Above-mentioned secondary admission control mechanism is realized, it is necessary that all UE under same HeNB accesses are by unification PCRF service, so as to PCRF receive BPCF exclude instruction in the case of, can be according to all UE under the HeNB The information such as priority are to the secondary call access control of Client-initiated business realizing.
But according to existing correlation technique, the UE under same HeNB accesses may be serviced by different PCRF, i.e., should The user profile (such as CSG, ARP) of HeNB accesses may be dispersed in multiple PCRF, therefore can not just be realized on PCRF Secondary call access control.
The content of the invention
It may be serviced for the UE under same HeNB accesses in correlation technique by different PCRF and propose the present invention, be This, it is a primary object of the present invention to provide a kind of processing method and system of secondary call access control, to solve the above problems.
To achieve these goals, according to an aspect of the invention, there is provided a kind of processing side of secondary call access control Method.
Included according to the processing method of the secondary call access control of the present invention:The network equipment according to internet-ip address information, The PCRF of UE services is found to be, the wherein network equipment is S-GW or P-GW;The network equipment and the control session of PCRF establishment strategies.
To achieve these goals, according to another aspect of the present invention, there is provided a kind of processing of secondary call access control Method.
Included according to the processing method of the secondary call access control of the present invention:The network equipment according to fixed network backhaul information, The PCRF of UE services is found to be, the wherein network equipment is S-GW or P-GW;The network equipment and the control session of PCRF establishment strategies.
To achieve these goals, according to a further aspect of the invention, there is provided a kind of processing of secondary call access control Method.
Included according to the processing method of the secondary call access control of the present invention:First PCRF obtains fixed network backhaul information; First PCRF establishes session by the 2nd PCRF with BPCF.
To achieve these goals, according to an aspect of the invention, there is provided a kind of processing system of secondary call access control System.
The network equipment and PCRF are included according to the processing system of the secondary call access control of the present invention, the wherein network equipment is S- GW or P-GW, the wherein network equipment include:First discovery module, for according to internet-ip address information, being found to be user The PCRF of equipment UE service;First session establishment module, for controlling session with PCRF establishment strategies.
To achieve these goals, according to another aspect of the present invention, there is provided a kind of processing of secondary call access control System.
It is according to the processing system of the secondary call access control of the present invention, including the network equipment and PCRF, the wherein network equipment S-GW or P-GW, the wherein network equipment include:Second discovery module, for according to fixed network backhaul information, being found to be UE The PCRF of service;Second session establishment module, for controlling session with PCRF establishment strategies.
To achieve these goals, according to a further aspect of the invention, there is provided a kind of processing of secondary call access control System.
According to the processing system of the secondary call access control of the present invention, including the first PCRF, the 2nd PCRF, BPCF, wherein the One PCRF includes:Acquisition module, for obtaining fixed network backhaul information;Session establishment module, for by the 2nd PCRF, with BPCF establishes session.
By the present invention, CPE IP address used in the UE accessed by same HeNB or HeNB IP address are identical, Therefore it is that the PCRF that the UE has found is identical according to the CPE IP address or the HeNB IP address, PCRF roots can be ensured with this The information such as the priority according to UE are commenced business to UE therein and realize secondary call access control.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the configuration diagram of the HeNB accesses EPS under the non-roaming scene according to correlation technique;
Fig. 2 is configuration diagrams of the HNB under the non-roaming scene according to correlation technique by fixed network access UMTS;
Fig. 3 is the schematic diagram of the processing scene one of secondary call access control according to embodiments of the present invention;
Fig. 4 is the flow chart of the processing method one of secondary call access control according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the processing scene two of secondary call access control according to embodiments of the present invention;
Fig. 6 is the schematic diagram of the processing scene three of secondary call access control according to embodiments of the present invention;
Fig. 7 is the flow chart of the processing method two of secondary call access control according to embodiments of the present invention;
Fig. 8 is the schematic diagram of the processing scene four (before processing) of secondary call access control according to embodiments of the present invention;
Fig. 9 is the schematic diagram of the processing scene five (before processing) of secondary call access control according to embodiments of the present invention;
Figure 10 is the schematic diagram of the processing scene six (before processing) of secondary call access control according to embodiments of the present invention;
Figure 11 is the schematic diagram of the processing scene seven (before processing) of secondary call access control according to embodiments of the present invention;
Figure 12 is the schematic diagram of the processing scene four (after processing) of secondary call access control according to embodiments of the present invention;
Figure 13 is the schematic diagram of the processing scene five (after processing) of secondary call access control according to embodiments of the present invention;
Figure 14 is the schematic diagram of the processing scene six (after processing) of secondary call access control according to embodiments of the present invention;
Figure 15 is the schematic diagram of the processing scene seven (after processing) of secondary call access control according to embodiments of the present invention;
Figure 16 is the flow chart of the processing method three of secondary call access control according to embodiments of the present invention;
Figure 17 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention one;
Figure 18 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention two;
Figure 19 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention three;
Figure 20 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention four;
Figure 21 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention five;
Figure 22 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention six;
Figure 23 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention seven;
Figure 24 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention eight;
Figure 25 is the interaction diagrams according to the processing method of the secondary call access control of the preferred embodiment of the present invention nine;
Figure 26 is the unified structured flowchart of the processing system of secondary call access control according to embodiments of the present invention;
Figure 27 is the structured flowchart of the processing system two of secondary call access control according to embodiments of the present invention;
Figure 28 is the structured flowchart of the processing system three of secondary call access control according to embodiments of the present invention.
Embodiment
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the present invention in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 3 is the schematic diagram of the processing scene one of secondary call access control according to embodiments of the present invention, as shown in figure 3, All users under HeNB accesses are the scenes of initial attachment user, i.e. UE-1, UE-2, UE-3 is occurred by same HeNB Initial attachment, the user of the HeNB accesses is not switched to from other accesses.
Scene based on Fig. 3, the embodiments of the invention provide a kind of processing method of secondary call access control.Fig. 4 is basis The flow chart of the processing method one of the secondary call access control of the embodiment of the present invention, as shown in figure 4, including steps S402 extremely Step S404.
Step S402, the network equipment are found to be the PCRF that UE is serviced, the wherein network equipment according to internet-ip address information It is S-GW or P-GW.
Step S404, the network equipment and the control session of PCRF establishment strategies.
In correlation technique, the UE under same HeNB accesses may be serviced by different PCRF, i.e. the use of HeNB accesses Family information (such as CSG, ARP) may be dispersed in multiple PCRF.In the embodiment of the present invention, the UE that is accessed by same HeNB Used CPE IP address or HeNB IP address are identical, therefore are according to the CPE IP address or the HeNB IP address The PCRF that the UE has found is identical, can ensure that PCRF commences business realization according to information such as UE priority to UE therein with this Secondary call access control.
Preferably, it is found to be in the network equipment according to internet-ip address information before the PCRF of UE services, the above method Also include:When UE accesses HeNB networks, the network equipment obtains internet-ip address information.
Preferably, internet-ip address information includes one below:When HeNB is accessed with route pattern, internet ip Location information is that UE accesses in ipsec tunnel information used in HeNB the customer premises equipment, CPE CPE IP address included;Work as HeNB When being accessed with bridge mode, internet-ip address information is that UE accesses in ipsec tunnel information used in HeNB what is included HeNB IP address, the outside ip address that HeNB IP address is the HeNB of mark ipsec tunnel.
Preferably, according to IP address, be found to be the PCRF of UE services includes the network equipment:The network equipment is to Diameter roads IP address is sent by acting on behalf of (Diameter RouterAgent, referred to as DRA);DRA is found to be UE services according to IP address PCRF。
Preferably, DRA according to IP address and/or configuration information, can also be found to be the PCRF of UE services.
Preferably, the network equipment includes one below with the control session of PCRF establishment strategies:If the network equipment is S-GW, Then the network equipment establishes gateway control session with PCRF;If the network equipment is P-GW, the network equipment establishes IP- with PCRF CAN sessions.
Preferably, the network equipment includes with the control session of PCRF establishment strategies:The network equipment sends UE closure to PCRF Subscriber group (CSG) information and ipsec tunnel information.
Preferably, after the network equipment and the control session of PCRF establishment strategies, the above method also includes:PCRF is received Response message is excluded from BPCF, is commenced business wherein excluding response message and excluding UE for instruction; PCRF is according to CSG information and/or distribution and keeps priority ARP and/or operator's configuration strategy decision-making to allow or refuse UE Commence business.
Following scenes two to scene seven describes the lower scene for including switching user of HeNB accesses, i.e., certain customers are (in figure Represented with UE-2, UE-3) for initial attachment user, and certain customers' (being represented in figure with UE-1) be access from other (such as WLAN or other HeNB) it is switched to the user under the HeNB accesses.It should be noted that in order to ensure business continuance, The front and rear P-GW for switching user service of switching will not change, and be similarly the PCRF of the switching user service and will not also send out Changing, the policy control session established between P-GW and PCRF will not also interrupt.Under the scene, also comprising following two kinds Situation.
Situation one:The HeNB used after the WLAN accesses or HeNB accesses and switching that are used before UE switchings accesses same symbolic animal of the birth year Same fixed network backhaul, the network equipment select PCRF according to fixed network backhaul information, as described WLAN accesses and HeNB The PCRF of UE services under access is identical.
Fig. 5 is the schematic diagram of the processing scene two of secondary call access control according to embodiments of the present invention, as shown in figure 5, UE- By same HeNB-2 initial attachment occurs for 2 and UE-3;And UE-1 is to be switched to HeNB-2 accesses from HeNB-1 accesses, its Using identical fixed network backhaul access EPC networks, i.e. HeNB-1 and HeNB-2 use identical by middle HeNB-1 and HeNB-2 Fixed network circuit accesses.
Fig. 6 is the schematic diagram of the processing scene three of secondary call access control according to embodiments of the present invention, as shown in fig. 6, UE- By same HeNB initial attachment occurs for 2 and UE-3;And UE-1 be from WLAN access be switched to HeNB access, wherein WLAN and HeNB is accessed using identical fixed network backhaul access EPC networks, i.e. WLAN and HeNB using identical fixed network circuit.
The scene described for above-mentioned Fig. 5 and Fig. 6, because WLAN and HeNB or multiple HeNB uses identical fixed network Backhaul, therefore UE (including initial attachment user that either switching is adhered to) is passing through WLAN or HeNB generation network attachments When need fixed network backhaul information being sent to the network equipment, the network equipment selects PCRF according to fixed network backhaul information. Because WLAN and HeNB or multiple HeNB belong to identical fixed network backhaul, therefore their fixed network backhaul information phases together Together, the PCRF for the UE services under WLAN and HeNB accesses is identical.
Based on Fig. 5 and Fig. 6 scene, the embodiments of the invention provide a kind of processing method of secondary call access control.Fig. 7 is The flow chart of the processing method two of secondary call access control according to embodiments of the present invention, as shown in fig. 7, comprises the steps S702 to step S704.
Step S702, the network equipment are found to be the PCRF that UE is serviced, the wherein network equipment according to fixed network backhaul information It is S-GW or P-GW.
Step S704, the network equipment and the control session of PCRF establishment strategies.
In correlation technique, the UE under same HeNB accesses may be serviced by different PCRF, i.e. the use of HeNB accesses Family information (such as CSG, ARP) may be dispersed in multiple PCRF.In the embodiment of the present invention, believed according to fixed network backhaul Breath, the PCRF that the UE to be accessed by WLAN has found is identical with the PCRF of the UE discoveries to be accessed by HeNB, therefore works as WLAN When UE under access is switched to HeNB accesses, it is ensured that all UE of HeNB accesses are serviced by unified PCRF.Can be with this Ensure that PCRF commences business according to information such as UE priority to UE therein and realize secondary call access control.
Preferably, fixed network backhaul information includes one below:When WLAN or HeNB are accessed with route pattern, Gu It is CPE IP address to net backhaul information;When WLAN or HeNB are accessed with bridge mode, fixed network backhaul information is Fixed network line identification.
Preferably, fixed network backhaul information represents to provide the WLAN or HeNB of UE accesses on-position.
Preferably, according to fixed network backhaul information, be found to be the PCRF of UE services includes the network equipment:The network equipment to DRA sends fixed network backhaul information;DRA is found to be the PCRF that UE is serviced according to fixed network backhaul information.
Preferably, DRA according to IP address and/or configuration information, can also be found to be the PCRF of UE services.
Preferably, the network equipment includes one below with the control session of PCRF establishment strategies:If the network equipment is S-GW, Then the network equipment establishes gateway control session with PCRF, or the network equipment establishes gateway control and QoS rule requests with PCRF; If the network equipment is P-GW, the network equipment establishes IP-CAN sessions with PCRF, or the network equipment establishes IP- with PCRF CAN session modifications.
Preferably, the network equipment includes with the control session of PCRF establishment strategies:The CSG that the network equipment sends UE to PCRF believes Breath and fixed network backhaul information.
Preferably, after the network equipment and the control session of PCRF establishment strategies, the above method also includes:PCRF is received Response message is excluded from BPCF, is commenced business wherein excluding response message and excluding UE for instruction; PCRF allows according to CSG information and/or ARP and/or operator's configuration strategy decision-making or refusal UE commences business.
Situation two:The HeNB accesses used after the WLAN accesses or HeNB accesses and switching that are used before UE switchings belong to not Same fixed network backhaul, now fixed network backhaul information is different, and the network equipment selects not according to fixed network backhaul information Same PCRF, as described WLAN accesses are different with the PCRF of the UE services under HeNB accesses (if it should be noted that selection PCRF it is identical, such as there was only a PCRF in network, no matter whether access information identical, all serviced with the PCRF, the scene Under, solution method corresponding to service condition one).
Fig. 8 is the schematic diagram of the processing scene four (before processing) of secondary call access control according to embodiments of the present invention, such as Fig. 8 Shown, by same HeNB-2 initial attachment occurs for UE-2 and UE-3;And UE-1 is to be switched to HeNB- from HeNB-1 accesses 2 accesses, wherein HeNB-1 and HeNB-2 use fixed network line using different fixed network backhaul access EPC networks, i.e. HeNB-1 Road 1 is accessed, and HeNB-2 is accessed using fixed network circuit 2, and fixed network circuit 1 is shown as in figure and fixed network circuit 2 is accessed by different BPCF is controlled, and can also be controlled by identical BPCF.
Fig. 9 is the schematic diagram of the processing scene five (before processing) of secondary call access control according to embodiments of the present invention, such as Fig. 9 Shown, by same HeNB initial attachment occurs for UE-2 and UE-3;And UE-1 is to be switched to HeNB accesses from WLAN accesses, its Middle WLAN and HeNB are accessed using different fixed network backhaul access EPC networks, i.e. WLAN using fixed network circuit 1, and HeNB makes Accessed with fixed network circuit 2, fixed network circuit 1 is shown as in figure and fixed network circuit 2 is accessed by different BPCF controls, can also be by phase Same BPCF controls.
Figure 10 is the schematic diagram of the processing scene six (before processing) of secondary call access control according to embodiments of the present invention, is such as schemed Shown in 10, by same HeNB initial attachment occurs for UE-2 and UE-3;And UE-1 is to be switched to HeNB from EUTRAN accesses to connect Enter, wherein it is respectively the user service under user and HeNB accesses under EUTRAN accesses to select different PCRF.
The scene described for above-mentioned Fig. 8 to Figure 10, due to (being HeNB-1 in Fig. 8 in the networks of UE-1 before handover Network, Fig. 9 are wlan networks, and Figure 10 is EUTRAN networks), that for its service is PCRF-1, when UE-1 is switched to HeNB networks (Fig. 8 is HeNB-2 networks, and Fig. 9 and Figure 10 are HeNB networks) afterwards, in order to ensure business continuance, for the P- of UE-1 services GW1, PCRF-1 become, and will not also be interrupted for the UE-1 IP-CAN sessions established between P-GW1 and PCRF-1, now UE-1 is switched to After HeNB networks, just serviced by different PCRF for the lower user of HeNB accesses (UE-1 is still serviced by PCRF-1, UE-2 with UE-3 is serviced by PCRF-2), now because PCRF is different, secondary call access control control can not just be realized.
Figure 11 is the schematic diagram of the processing scene seven (before processing) of secondary call access control according to embodiments of the present invention, is such as schemed Shown in 11, UE1 roams into EPC networks 2 from EPC networks 1, and initial attachment occurs by HeNB accesses in roaming place, overflows here Trip interface S8 (interface between the P-GW1 of the S-GW and EPC networks 1 of EPC networks 2) uses GTP agreements, now selects EPC nets The PCRF-1 of network 1 services for UE1;And initial attachment is occurred by HeNB accesses for the user UE2 and UE3 under EPC networks 2, Now the PCRF-2 in EPC networks 2 is that UE2 and UE3 is serviced.It is simultaneously same HeNB there is also different PCRF under the scene Multiple UE services of access.
For the scene shown in above-mentioned Fig. 8 to Figure 11, realized by following methods, being switched to HeNB for UE-1 accesses it Afterwards, PCRF-1 establishes S9 by PCRF-2 and BPCF*Session, can so ensure for HeNB access under all users (UE-1, UE-2 and UE-3) establish policy control session can be associated with PCRF-2, secondary call access control is realized by PCRF-2.Figure 12 to Figure 15 just the scene shown in Fig. 8 to Figure 11 is described respectively.
Figure 16 is the flow chart of the processing method three of secondary call access control according to embodiments of the present invention, as shown in figure 16, Including steps S1602 to step S1604.
Step S1602, the first PCRF obtain fixed network backhaul information.
Step S1604, the first PCRF establish session by the 2nd PCRF with BPCF.
Preferably, in the first PCRF by the 2nd PCRF, before establishing session with BPCF, the above method also includes:First PCRF is according to the PCRF of fixed network backhaul INFORMATION DISCOVERYs the 2nd;2nd PCRF is according to fixed network backhaul INFORMATION DISCOVERYs BPCF;
Preferably, fixed network backhaul information includes one below:When HeNB is accessed with routing mode, fixed network Backhaul information is CPE IP address;When HeNB is accessed in a manner of bridging, fixed network backhaul information accesses institute for HeNB The fixed network line identification used, or form the HeNB of ipsec tunnel information outside ip address.
Preferably, fixed network backhaul information is used for the on-position for identifying HeNB accesses.
Preferably, the network equipment sends fixed network backhaul by way of one below to the first PCRF:IP-CAN meetings Words modification program, gateway control session establish program, gateway control and QoS rule requests.
Preferably, after the first PCRF determines the 2nd PCRF according to fixed network backhaul, the above method also includes:First PCRF sends fixed network backhaul information, UE CSG information and UE ARP to the 2nd PCRF.
Preferably, in the first PCRF by the 2nd PCRF, after establishing session with BPCF, the above method also includes:Second PCRF receives excludes response message from BPCF, is opened wherein excluding response message and excluding UE for instruction Exhibition industry is engaged in;2nd PCRF allows according to CSG information and/or ARP and/or operator's configuration strategy decision-making or refusal UE carries out industry Business.
Preferably, it is above-mentioned before establishing session with broadband policy control function BPCF in the first PCRF by the 2nd PCRF Method also includes:The network equipment receives the handover request from UE, and the fixed network backhaul that UE switchings are used afterwards believes Breath and UE closed subscriber group (CSG) information are sent to the first PCRF, and the wherein network equipment is gateway S-GW or packet Data network gateway P-GW.
The implementation process of the embodiment of the present invention is described in detail below in conjunction with example.
Preferred embodiment one
This preferred embodiment one uses GTP relative to the non-roaming scene shown in Fig. 3, S5 interfaces (between S-GW and P-GW) Agreement, all UE are initially adhered to by HeNB accesses, are realized under the scene and are carried out industry to the UE accessed by HeNB Business carries out secondary call access control.
Figure 17 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention one, is such as schemed Shown in 17, including the steps 1 is to step 17.
Specifically, step 1-3 is the process that EPC is electrically accessed on HeNB;Step 4a-6a is that UE-1 is accessed initially by HeNB It is attached to EPC process;Step 4b-6b is that UE-2 passes through the initial process for being attached to EPC of HeNB accesses;Step 7-17 is UE-1 Initiation business, PCRF carry out the process of secondary call access control.It is assumed here that before UE-1 initiation business, under HeNB accesses Through there is other UE to initiate business, the most of business initiated by these UE of HeNB signings QoS takes.
1st, the upper electricity of HeNB.
2nd, IKEv2 negotiations are carried out between HeNB and SeGW, establish ipsec tunnel.
3rd, HeNB is registered to HeNB GW/MME, establishes S1 sessions, and ipsec tunnel information is occurred to HeNBGW/MME.
By HeNB accesses initial attachment occurs for 4a, UE-1, after MME receives attach request, by ipsec tunnel information P-GW is sent to by S-GW.
The tunnel header that 5a, P-GW are contained by DRA according to ipsec tunnel packet is (under route pattern for CPE IP Location, it is HeNB IP address under bridge mode) and/or the INFORMATION DISCOVERY PCRF such as UE marks, and IP-CAN sessions are established, and will Ipsec tunnel information is sent to PCRF.
The tunnel header that 6a, PCRF contain according to ipsec tunnel packet (is CPE IP address under route pattern, bridged It is HeNB IP address under pattern) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 1 session.
By HeNB accesses initial attachment occurs for 4b, UE-2, after MME receives attach request, by ipsec tunnel information P-GW is sent to by S-GW.
The tunnel header that 5b, P-GW are contained by DRA according to ipsec tunnel packet is (under route pattern for CPE IP Location, it is HeNB IP address under bridge mode) and/or the INFORMATION DISCOVERY PCRF such as UE marks, and IP-CAN sessions are established, and will Ipsec tunnel information is sent to PCRF.Because UE-2 and UE-1 is accessed using identical HeNB, therefore according to identical IPSec The PCRF that tunnel information is found is identical.
The tunnel header that 6b, PCRF contain according to ipsec tunnel packet (is CPE IP address under route pattern, bridged It is HeNB IP address under pattern) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 2 sessions.
7th, UE-1 initiates business, and to QoS request corresponding to P-GW transmission business, UE marks, IP address etc. are included in request Information.
8th, after P-GW receives request message, to QoS authorization requests corresponding to PCRF initiation business.
9th, QoS authorization requests are sent to BPCF by PCRF, and request BPCF is that the business that UE-1 is initiated carries out receiving control System.
10th, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
11st, BPCF returns to the response excluded to PCRF, and will be appreciated by QoS resource and feed back to PCRF.
12nd, after PCRF receives BPCF call access control result, according to UE CSG information, ARP, it is found that UE-1 CSG is excellent First level is higher than the CSG information of the other users under HeNB accesses, and the service request of the UE-1 is received in decision-making, and to priority The QoS resource of low user (such as UE-2) distribution is degraded.PCRF, which is produced, authorizes QoS, including the mandate for UE-1 QoS, and the mandate QoS after degrading to UE-2.
13rd, PCRF will authorize QoS to be handed down to P-GW and perform, including the mandate QoS for UE-1, and awarding for UE-2 Weigh QoS.
14th, P-GW installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
15th, P-GW returns to QoS reservation to UE-1 and successfully responded.
16th, P-GW initiates carrying QoS modifications corresponding to UE-2.
17th, after PCRF carries out QoS mandates, while issuing mandate QoS to P-GW, also QoS will be authorized to be handed down to BPCF, So that BPCF carries out policy update.
Preferred embodiment two
This preferred embodiment two uses relative to the non-roaming scene shown in Fig. 3, S5 interfaces (between S-GW and P-GW) PMIP agreements, all UE are initially adhered to by HeNB accesses, are realized under the scene and the UE accessed by HeNB is opened Exhibition industry business carries out secondary call access control.
Figure 18 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention two, is such as schemed Shown in 18, including the steps 1 is to step 18.
Specifically, step 1 is that EPC process is electrically accessed on HeNB;Step 2a-6a is UE-1 initial attached by HeNB accesses EPC process;Step 2b-6b is that UE-2 passes through the initial process for being attached to EPC of HeNB accesses;Step 7-18 sends out for UE-1 The business of rising, PCRF carry out the process of secondary call access control.It is assumed here that before UE-1 initiation business, under HeNB accesses There are other UE to initiate business, the most of business initiated by these UE of HeNB signings QoS takes.
1st, before initial attachment occurs for UE, EPC is electrically accessed on HeNB and (may be referred to the step 1 in preferred embodiment one To step 3).
By HeNB accesses initial attachment occurs for 2a, UE-1, after MME receives attach request, by ipsec tunnel information It is sent to S-GW.
The tunnel header that 3a, S-GW are contained by DRA according to ipsec tunnel packet is (under route pattern for CPE IP Location, it is HeNB IP address under bridge mode) and/or the INFORMATION DISCOVERY PCRF such as UE marks, and gateway control session is established, and will Ipsec tunnel information is sent to PCRF.
PMIP registrations are completed between 4a, S-GW and P-GW.
5a, P-GW initiate the request of IP-CAN session establishments to PCRF.
The tunnel header that 6a, PCRF contain according to ipsec tunnel packet (is CPE IP address under route pattern, bridged It is HeNB IP address under pattern) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 1 session.
By HeNB accesses initial attachment occurs for 2b, UE-2, after MME receives attach request, by ipsec tunnel information It is sent to S-GW.
The tunnel header that 3b, S-GW are contained by DRA according to ipsec tunnel packet is (under route pattern for CPE IP Location, it is HeNB IP address under bridge mode) and/or the INFORMATION DISCOVERY PCRF such as UE marks, and gateway control session is established, and will Ipsec tunnel information is sent to PCRF.Because UE-2 and UE-1 is accessed using identical HeNB, therefore according to identical IPSec The PCRF that tunnel information is found is identical.
PMIP registrations are completed between 4b, S-GW and P-GW.
5b, P-GW initiate the request of IP-CAN session establishments to PCRF.
The tunnel header that 6b, PCRF contain according to ipsec tunnel packet (is CPE IP address under route pattern, bridged It is HeNB IP address under pattern) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 2 sessions.
7th, UE-1 initiates business, and to QoS request corresponding to S-GW transmission business, UE marks, IP address etc. are included in request Information.
8th, after S-GW receives request message, to QoS authorization requests corresponding to PCRF initiation business.
9th, QoS authorization requests are sent to BPCF by PCRF, and request BPCF is that the business that UE-1 is initiated carries out receiving control System.
10th, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
11st, BPCF returns to the response excluded to PCRF, and will be appreciated by QoS resource and feed back to PCRF.
12nd, after PCRF receives BPCF call access control result, according to UE CSG information, ARP, it is found that UE-1 CSG is excellent First level is higher than the CSG information of the other users (such as UE-2) under HeNB accesses, and the service request of the UE-1 is received in decision-making, And the QoS resource to distributing to UE-2 degrades.PCRF, which is produced, authorizes QoS, including the mandate QoS for UE-1, and right UE-2 degraded after mandate QoS.
13rd, PCRF will authorize QoS to be handed down to S-GW and perform, including the mandate QoS for UE-1, and awarding for UE-2 Weigh QoS.
P-GW is initiated IP-CAN session modifications by 14 while PCRF, updates the mandate QoS on P-GW.
15th, S-GW installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
16th, S-GW returns to QoS reservation to UE-1 and successfully responded.
17th, S-GW initiates carrying QoS modifications corresponding to UE-2.
18th, after PCRF carries out QoS mandates, while issuing mandate QoS to P-GW, also QoS will be authorized to be handed down to BPCF, So that BPCF carries out policy update.
Preferred embodiment three
This preferred embodiment three is relative to the handoff scenario shown in Fig. 5, and UE-1 is in the case where belonging to same fixed network backhaul together Switched between two HeNB, because the network equipment is according to backhaul information selection PCRF, therefore under two HeNB The PCRF of user's selection is identical.UE-1 under HeNB-2 is switching user, and UE-2 is initial attachment user, is realized under the scene The UE accessed by HeN B is commenced business and carries out secondary call access control.
Figure 19 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention three, is such as schemed Shown in 19, including the steps 1 is to step 22.
Specifically, step 1 and 2 is respectively the process that EPC is electrically accessed on HeNB-1 and HeNB-2;Step 3a-5a is UE-1 Pass through the initial process for being attached to EPC of HeNB-1 accesses;Step 3b-5b is that UE-2 is initially attached to EPC by HeNB-2 accesses Process;Step 7-11 is the process that UE-1 is switched to HeNB-2 from HeNB-1 accesses;Step 12-22 is that UE-1 initiates business, PCRF carries out the process of secondary call access control.It is assumed here that before UE-1 initiation business, there are other under HeNB-2 accesses UE has initiated business, and the most of business initiated by these UE of HeNB-2 signings QoS takes.
1 to 2, before initial attachment occurs for UE, on HeNB-1 and HeNB-2 EPC is electrically accessed (to may be referred to be preferable to carry out Step 1 in example one is to step 3).
By HeNB-1 accesses initial attachment occurs for 3a, UE-1, after MME receives attach request, by fixed network Backhaul information (is used for the on-position for identifying the HeNB, can be CPE IP address in the case where routeing access module, in bridge Connecing under access module can be fixed network line identification) it is sent to P-GW.
4a, P-GW the INFORMATION DISCOVERY PCRF such as identify by DRA according to the fixed network backhaul information and/or UE, and build Vertical IP-CAN sessions, and fixed network backhaul information and user's CSG information are sent to PCRF.
5a, PCRF (are CPE IP address under route pattern, are fixed network line under bridge mode according to fixed network backhaul information Line) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 1 session.
By HeNB-2 accesses initial attachment occurs for 3b, UE-2, after MME receives attach request, by fixed network Backhaul information (is used for the on-position for identifying the HeNB, can be CPE IP address in the case where routeing access module, in bridge Connecing under access module can be fixed network line identification) it is sent to P-GW.
4b, P-GW the INFORMATION DISCOVERY PCRF such as identify by DRA according to the fixed network backhaul information and/or UE, and build Vertical IP-CAN sessions, and fixed network backhaul information and user's CSG information are sent to PCRF.
5b, PCRF (are CPE IP address under route pattern, are fixed network line under bridge mode according to fixed network backhaul information Line) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 2 sessions.
6th, step 7-11 is the process that UE-1 is switched to HeNB-2 from HeNB-1 accesses.
7th, UE-1 is switched to HeNB-2 from HeNB-1.
8th, P-GW receives UE-1 handover request, and the modification of IP-CAN sessions is initiated to PCRF.PCRF completes strategy and determined Plan, and delegated strategy is handed down to P-GW.
9th, P-GW is performed according to the delegated strategy issued and is authorized QoS, initiate to distribute to UE-1 resource in HeNB-1 accesses Release.
10th, P-GW is performed according to the delegated strategy issued and is authorized QoS, initiate corresponding for UE-1 distribution in HeNB-2 accesses Resource.
11st, PCRF initiates the S9 to BPCF*- 1 session modification.
12nd, UE-1 initiates business, and to QoS request corresponding to P-GW transmission business, UE marks, IP address etc. are included in request Information.
13rd, after P-GW receives request message, to QoS authorization requests corresponding to PCRF initiation business.
14th, QoS authorization requests are sent to BPCF by PCRF, and request BPCF is that the business that UE-1 is initiated carries out receiving control System.
15th, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
16th, BPCF returns to the response excluded to PCRF, and will be appreciated by QoS resource and feed back to PCRF.
17th, after PCRF receives BPCF call access control result, according to UE CSG information, ARP, it is found that UE-1 CSG is excellent First level is higher than the CSG information of the other users (such as UE-2) under HeNB accesses, and the service request of the UE-1 is received in decision-making, And the QoS resource to distributing to UE-2 degrades.PCRF, which is produced, authorizes QoS, including the mandate QoS for UE-1, and right UE-2 degraded after mandate QoS.
18th, PCRF will authorize QoS to be handed down to P-GW and perform, including the mandate QoS for UE-1, and awarding for UE-2 Weigh QoS.
19th, P-GW installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
20th, P-GW returns to QoS reservation to UE-1 and successfully responded.
21st, P-GW initiates carrying QoS modifications corresponding to UE-2 simultaneously.
22nd, after PCRF carries out QoS mandates, while issuing mandate QoS to P-GW, also QoS will be authorized to be handed down to BPCF, So that BPCF carries out policy update.
Preferred embodiment four
This preferred embodiment four is relative to the handoff scenario shown in Fig. 6, and UE-1 is in the case where belonging to same fixed network backhaul together Switched between WLAN and HeNB, because the network equipment is according to backhaul information selection PCRF, therefore be WLAN and HeNB Under user selection PCRF it is identical.UE-1 under HeNB is switching user, and UE-2 is initial attachment user, real under the scene Now the UE accessed by HeNB is commenced business and carries out secondary call access control.
Figure 20 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention four, is such as schemed Shown in 20, including the steps 1 is to step 11.
Specifically, step 1a-3a is that UE-1 passes through the initial process for being attached to EPC of WLAN accesses;Step 1b-4b is HeNB On be electrically accessed EPC process and UE-2 passes through the initial process for being attached to EPC of HeNB accesses;Step 6-10 is UE-1 from WLAN Access is switched to HeNB process;Step 11 is that UE-1 initiates business, and PCRF carries out the process of secondary call access control, its process ginseng Examine the step 12-22 in the flow shown in Figure 16 embodiments three.
By WLAN accesses initial attachment occurs for 1a, UE-1, and P-GW obtains fixed network backhaul information during UE-1 accesses (it is used for the on-position for identifying the HeNB, can is CPE IP address in the case where routeing access module, in the case where bridging access module Can be fixed network line identification).
2a, P-GW the INFORMATION DISCOVERY PCRF such as identify by DRA according to the fixed network backhaul information and/or UE, and build Vertical IP-CAN sessions, and fixed network backhaul information and user's CSG information are sent to PCRF.
3a, PCRF (are CPE IP address under route pattern, are fixed network line under bridge mode according to fixed network backhaul information Line) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 1 session.
Before initial attachment occurs for 1b, UE-2, the EPC step 1-3 of process reference implementation example one is electrically accessed on HeNB.
By HeNB accesses initial attachment occurs for 2b, UE-2, after MME receives attach request, by fixed network backhaul Information (is used for the on-position for identifying the HeNB, can be CPE IP address in the case where routeing access module, mould is accessed in bridge joint Can be fixed network line identification under formula) it is sent to P-GW.
3b, P-GW the INFORMATION DISCOVERY PCRF such as identify by DRA according to the fixed network backhaul information and/or UE, and build Vertical IP-CAN sessions, and fixed network backhaul information and user's CSG information are sent to PCRF.
4b, PCRF (are CPE IP address under route pattern, are fixed network line under bridge mode according to fixed network backhaul information Line) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 2 sessions.
5th, step 6-10 is the process that UE-1 is switched to HeNB from WLAN accesses.
6th, UE-1 is switched to HeNB from WLAN.
7th, P-GW receives UE-1 handover request, and the modification of IP-CAN sessions is initiated to PCRF.PCRF completes strategy and determined Plan, and delegated strategy is handed down to P-GW.
8th, P-GW is performed according to the delegated strategy issued and is authorized QoS, the resource for initiating to distribute to UE-1 in WLAN accesses is released Put.
9th, P-GW is performed according to the delegated strategy issued and is authorized QoS, initiate in HeNB accesses as the corresponding money of UE-1 distribution Source.
10th, PCRF initiates the S9 to BPCF*- 1 session modification.
11st, step 12 is that UE-1 initiates business, and PCRF carries out the process of secondary call access control.Its process is with reference to shown in figure 19 Flow in step 12-22.
Preferred embodiment five
This preferred embodiment five is relative to the handoff scenario shown in Figure 12, two under different fixed network backhaul of UE-1 Switched between HeNB, because the network equipment is according to backhaul information selection PCRF, therefore be the user under two HeNB The PCRF of selection is different.UE-1 under HeNB-2 is switching user, is serviced by PCRF-1 for it;UE-2 is initial attachment user, Serviced by PCRF-2 for it.Realize to commence business to the UE accessed by HeNB under the scene and carry out secondary call access control.
Figure 21 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention five, is such as schemed Shown in 21, including the steps 1 is to step 27.
Specifically, step 1 and 2 is respectively that EPC process, detailed process reference implementation are electrically accessed on HeNB-1 and HeNB-2 The step 1-3 of example one;Step 3a-5a is that UE-1 passes through the initial process for being attached to EPC of HeNB-1 accesses;Step 3b-5b is UE- 2 pass through the initial process for being attached to EPC of HeNB-2 accesses;Step 7-13 is the mistake that UE-1 is switched to HeNB-2 from HeNB-1 accesses Journey;Step 14-27 is that UE-1 initiates business, and PCRF carries out the process of secondary call access control.It is assumed here that initiate business in UE-1 Before, other UE initiate business under HeNB-2 accesses, HeNB-2 signings QoS has largely been initiated by these UE Business takes.
1,2, it is electrically accessed EPC before initial attachment occurs for UE, on HeNB-1 and HeNB-2 and (may be referred to preferred embodiment Step 1 in one is to step 3).
By HeNB-1 accesses initial attachment occurs for 3a, UE-1, after MME receives attach request, by fixed network Backhaul information (is used for the on-position for identifying the HeNB, can be CPE IP address in the case where routeing access module, in bridge Connecing under access module can be fixed network line identification) it is sent to P-GW1.
4a, P-GW1 the INFORMATION DISCOVERY PCRF-1 such as identify by DRA according to the fixed network backhaul information and/or UE, and IP-CAN sessions are established, and fixed network backhaul information and user's CSG information are sent to PCRF-1.
5a, PCRF-1 (are CPE IP address under route pattern, are fixed network under bridge mode according to fixed network backhaul information Line identification) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 1 session.
By HeNB-2 accesses initial attachment occurs for 3b, UE-2, after MME receives attach request, by fixed network Backhaul information (is used for the on-position for identifying the HeNB, can be CPE IP address in the case where routeing access module, in bridge Connecing under access module can be fixed network line identification) it is sent to P-GW2.
4b, P-GW2 the INFORMATION DISCOVERY PCRF-2 such as identify by DRA according to the fixed network backhaul information and/or UE, and IP-CAN sessions are established, and fixed network backhaul information and user's CSG information are sent to PCRF-2.
5b, PCRF-2 (are CPE IP address under route pattern, are fixed network under bridge mode according to fixed network backhaul information Line identification) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 2 sessions.
6th, step 7-13 is the process that UE-1 is switched to HeNB-2 from HeNB-1 accesses
7th, UE-1 is switched to HeNB-2 from HeNB-1.
8th, P-GW1 receives UE-1 handover request, and the modification of IP-CAN sessions is initiated to PCRF-1.PCRF-1 completes plan Slightly decision-making, and delegated strategy is handed down to P-GW1.
9th, P-GW-1 is performed according to the delegated strategy issued and is authorized QoS, initiate to distribute to UE-1 money in HeNB-1 accesses Source discharges.
10th, P-GW-1 is performed according to the delegated strategy issued and is authorized QoS, initiate to distribute phase in HeNB-2 accesses for UE-1 The resource answered.
11st, PCRF-1 is according to fixed network backhaul INFORMATION DISCOVERY PCRF-2, and by fixed network backhaul information and user CSG Information, ARP are sent to PCRF-2.
12nd, PCRF-2 is according to fixed network backhaul INFORMATION DISCOVERYs BPCF.
13rd, PCRF-1 initiates the S9 to BPCF by PCRF-2*- 1 session modification.
14th, UE-1 initiates business, and to QoS request corresponding to P-GW1 transmission business, UE marks, IP address are included in request Etc. information.
15th, after P-GW1 receives request message, to QoS authorization requests corresponding to PCRF-1 initiation business.
16th, QoS authorization requests are sent to BPCF by PCRF-1 by PCRF-2, and request BPCF is the industry that UE-1 is initiated Business carries out call access control.
17th, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
18th, BPCF returns to the response excluded to PCRF-2, and will be appreciated by QoS resource and feed back to PCRF.
19th, after PCRF-2 receives BPCF call access control result, according to UE CSG information, ARP, UE-1 CSG is found For priority higher than the CSG information of the other users (such as UE-2) under HeNB accesses, decision-making receiving UE-1 business please Ask, and the QoS resource to distributing to UE-2 degrades.PCRF-2 is produced for UE-2 and is authorized QoS, and will receive UE-1 developments The call access control response of business returns to PCRF-1.
20th, PCRF-2 returns to the response of call access control to PCRF-1.
21st, PCRF-1 is directed to UE-1 request, carries out strategic decision-making.
22nd, the mandate QoS for UE-1 is handed down to P-GW1 and performed by PCRF-1.
23rd, P-GW1 installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
24th, P-GW1 returns to QoS reservation to UE-1 and successfully responded.
25th, PCRF-2 is after secondary call access control is carried out, and strategic decision-making is carried out for UE-2, and by awarding for UE-2 Power QoS is handed down to P-GW2.
26th, P-GW2 initiates carrying QoS modifications corresponding to UE-2.
27th, after PCRF-1 carries out QoS mandates, while issuing mandate QoS to P-GW1, also QoS will be authorized to be handed down to BPCF, so that BPCF carries out policy update.
Preferred embodiment six
This preferred embodiment six is relative to the handoff scenario shown in Figure 13, WLANs of the UE-1 under different fixed network backhaul Switched between HeNB, because the network equipment is according to backhaul information selection PCRF, therefore under WLAN and HeNB The PCRF of user's selection is different.UE-1 under HeNB is switching user, is serviced by PCRF-1 for it, UE-2 uses for initial attachment Family, serviced by PCRF-2 for it.Realize to commence business to the UE accessed by HeNB under the scene and carry out secondary call access control.
Figure 22 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention six, is such as schemed Shown in 22, including the steps 1 is to step 13.
Specifically, step 1a-3a is that UE-1 passes through the initial process for being attached to EPC of WLAN accesses;Step 1b-4b is HeNB On be electrically accessed EPC process and UE-2 passes through the initial process for being attached to EPC of HeNB accesses;Step 6-12 is UE-1 from WLAN Access is switched to HeNB process;Step 13 is that UE-1 initiates business, and PCRF carries out the process of secondary call access control, its process ginseng Examine the step 14-27 in the flow shown in Figure 18 embodiments five.
By WLAN accesses initial attachment occurs for 1a, UE-1, and P-GW1 obtains fixed network backhaul information during UE-1 accesses (it is used for the on-position for identifying the HeNB, can is CPE IP address in the case where routeing access module, in the case where bridging access module Can be fixed network line identification).
2a, P-GW1 the INFORMATION DISCOVERY PCRF such as identify by DRA according to the fixed network backhaul information and/or UE, and build Vertical IP-CAN sessions, and fixed network backhaul information and user's CSG information are sent to PCRF-1.
3a, PCRF-1 (are CPE IP address under route pattern, are fixed network under bridge mode according to fixed network backhaul information Line identification) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 1 session.
Before initial attachment occurs for 1b, UE-2, be electrically accessed on HeNB EPC process with reference to the step 1 of preferred embodiment one to 3。
By HeNB accesses initial attachment occurs for 2b, UE-2, after MME receives attach request, by fixed network backhaul Information (is used for the on-position for identifying the HeNB, can be CPE IP address in the case where routeing access module, mould is accessed in bridge joint Can be fixed network line identification under formula) it is sent to P-GW2.
3b, P-GW2 the INFORMATION DISCOVERY PCRF-2 such as identify by DRA according to the fixed network backhaul information and/or UE, and IP-CAN sessions are established, and fixed network backhaul information and user's CSG information are sent to PCRF-2.
4b, PCRF-2 (are CPE IP address under route pattern, are fixed network under bridge mode according to fixed network backhaul information Line identification) and/or configuration relation discovery BPCF, and S9 is established between BPCF*- 2 sessions.
5th, step 6-12 is the process that UE-1 is switched to HeNB from WLAN accesses
6th, UE-1 is switched to HeNB from WLAN.
7th, P-GW1 receives UE-1 handover request, and the modification of IP-CAN sessions is initiated to PCRF-1.PCRF-1 completes plan Slightly decision-making, and delegated strategy is handed down to P-GW1.
8th, P-GW1 is performed according to the delegated strategy issued and is authorized QoS, initiate to distribute to UE-1 resource in WLAN accesses Release.
9th, P-GW1 is performed according to the delegated strategy issued and is authorized QoS, initiate corresponding for UE-1 distribution in HeNB accesses Resource.
10th, PCRF-1 is according to fixed network backhaul INFORMATION DISCOVERY PCRF-2, and by fixed network backhaul information and user CSG Information, ARP are sent to PCRF-2.
11st, PCRF-2 is according to fixed network backhaul INFORMATION DISCOVERYs BPCF.
12nd, PCRF-1 initiates the S9 to BPCF by PCRF-2*- 1 session modification.
13rd, step 14 is that UE-1 initiates business, and PCRF carries out the process of secondary call access control.Its process is with reference to shown in figure 21 Flow in step 14-27.
Preferred embodiment seven
This preferred embodiment seven is switched to HeNB from EUTRAN accesses and connect relative to the handoff scenario shown in Figure 14, UE-1 Enter, serviced by PCRF-1 for it, the UE-2 under HeNB-2 is initial attachment user, is serviced by PCRF-2 for it.Under the scene Realize to commence business to the UE accessed by HeNB and carry out secondary call access control.
Figure 23 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention seven, is such as schemed Shown in 23, including the steps 1 is to step 28.
Specifically, step 1 is the process that UE-1 is attached to EPC by EUTRAN;Step 2 is the process of electricity on HeNB;Step Rapid 3 and 4 be that UE-2 passes through the initial process for being attached to EPC of HeNB accesses;Step 6-13 is that UE-1 is switched to from EUTRAN accesses The process of HeNB accesses;Step 14-28 is that UE-1 initiates business, and PCRF-2 carries out the process of secondary call access control.It is assumed here that Before UE-1 initiation business, there are other UE to initiate business under HeNB accesses, HeNB signings QoS most of quilts The business that these UE are initiated takes.
1st, UE-1 is attached to EPC networks by eNB, and network selection P-GW1 is UE-1 access service, and P-GW1 is according to UE Mark and/or APN information are that UE-1 selects PCRF-1, and establish IP-CAN sessions with PCRF-1.
2nd, EPC networks are electrically accessed on HeNB, its process is with reference to the step 1 of preferred embodiment one to 3.
3rd, UE-2 is attached to EPC networks by HeNB accesses, and network selection P-GW2 is UE-2 access service, P-GW2 roots It is that UE-2 selects PCRF-2 according to UE marks and/or APN information, and IP-CAN sessions is established with PCRF-2.And when UE-2 is accessed Fixed network backhaul information (be used to identifying the on-position of the HeNB, can be CPE IP in the case where routeing access module Location, can be fixed network line identification in the case where bridging access module) it is sent to PCRF-2.
4th, PCRF-2 has found BPCF according to fixed network backhaul information and/or configuration relation, and establishes S9*- 2 sessions.
5th, UE-1 occurs to be linked into the switching of HeNB accesses from EUTRAN, and step 6-13 describes handoff procedure.
6th, UE-1 switches.
7th, switching mark, fixed network backhaul information are contained after P-GW1 receives handover request, in request.P-GW1 judges UE-1 is switched, and initiates IP-CAN session modification requests to PCRF-1, and fixed network backhaul information is sent into PCRF- 1。
8th, PCRF-1 has found PCRF-2 according to fixed network backhaul and/or configuration information, and by fixed network backhaul information PCRF-2 is sent to the CSG information of user.
9th, PCRF-2 has found BPCF according to fixed network backhaul information and/or configuration information.
10th, PCRF-1 is that S9 is established in UE-1 accesses by PCRF-2 and BPCF*- 1 session.
11st, PCRF-1 returns to the response of IP-CAN session modifications to P-GW1.
12nd, the Authorization result that P-GW1 returns according to PCRF-1, resource allocation is initiated.ENB accesses are discharged simultaneously for UE-1 points The resource matched somebody with somebody.
13rd, UE-1 completes the switching accessed from EUTRAN to HeNB.
14th, UE-1 initiates business, and to QoS request corresponding to P-GW1 transmission business, UE marks, IP address are included in request Etc. information.
15th, after P-GW1 receives request message, to QoS authorization requests corresponding to PCRF-1 initiation business.
16th, QoS authorization requests are sent to BPCF by PCRF-1 by PCRF-2, and request BPCF is the industry that UE-1 is initiated Business carries out call access control.
17th, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
18th, BPCF returns to the response excluded, and returns to acceptable QoS resource.
19th, after PCRF-2 receives BPCF call access control result, according to UE CSG information, ARP, UE-1 CSG is found For priority higher than the CSG information of the other users (such as UE-2) under HeNB accesses, decision-making receiving UE-1 business please Ask, and UE-2 QoS resource is degraded.PCRF-2 sends call access control result to PCRF-1, and UE-2 is re-started QoS is authorized.
20th, the mandate QoS for UE-2 is handed down to P-GW2 and performed by PCRF-2.
21st, P-GW2 installations authorize QoS, and according to qos requirement is authorized, initiate QoS corresponding to the bearer network for UE-2 Resource reservation.
22nd, PCRF-2 initiates S9 to BPCF simultaneously*- 2 session updates, update qos policy.
23rd, call access control result is returned to PCRF-1 by PCRF-2.
24th, the call access control result returned according to PCRF-2, QoS of survice requests of the PCRF-1 to UE-1 authorize.
25th, PCRF-1 will authorize QoS to be handed down to P-GW1.
26th, P-GW1 installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
27th, P-GW1 returns to QoS of survice request to UE-1 and authorizes successfully response.
Mandate QoS for UE-1 is sent to BPCF by 28 while PCRF-1 by PCRF-2, and strategy is carried out more for BPCF Newly.
Preferred embodiment eight
This preferred embodiment eight is relative to the handoff scenario shown in Figure 15, under non-roaming scene, and S5 interfaces (S-GW and P- Between GW) using the situation of PMIP agreements, for UE-1 by eNB access EPC networks, S-GW1 is UE-1 according to APN or UE-ID Select PCRF-1.UE-2 accesses EPC networks by HeNB, and S-GW2 selects according to the information such as HeNB IP address and/or UE marks PCRF-2.Now UE-1 is switched to HeNB accesses from eNB accesses.Realized under the scene and industry is carried out to the UE accessed by HeNB Business carries out secondary call access control.
Figure 24 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention eight, is such as schemed Shown in 24, including the steps 1 is to step 35.
Specifically, step 1-3 is the process that UE-1 is attached to EPC by EUTRAN;Step 4 is the process of electricity on HeNB; Step 5-8 is that UE-2 passes through the initial process for being attached to EPC of HeNB accesses;Step 9-18 is that UE-1 is switched to from EUTRAN accesses The process of HeNB accesses;Step 19-35 is that UE-1 initiates business, and PCRF-2 carries out the process of secondary call access control.It is assumed here that Before UE-1 initiation business, there are other UE to initiate business under HeNB accesses, HeNB signings QoS most of quilts The business that these UE are initiated takes.
1st, UE-1 is attached to EPC networks by eNB, and network selection S-GW1 is UE-1 access service, and S-GW1 is according to UE Mark and/or APN information are that UE-1 selects PCRF-1, and establish gateway control session with PCRF-1.
2nd, PMIP registrations are completed between S-GW1 and P-GW1.
3rd, IP-CAN sessions are established between P-GW1 and PCRF-1.
4th, EPC networks are electrically accessed on HeNB, its process is with reference to the step 1 of preferred embodiment one to 3.
5th, UE-2 is attached to EPC networks by HeNB accesses, and network selection S-GW2 is UE-2 access service, S-GW2 roots It is that UE-2 selects PCRF-2 according to UE marks and/or APN information, and gateway control session is established with PCRF-2.And UE-2 is accessed When fixed network backhaul information (be used to identify the on-position of the HeNB, can be CPE IP in the case where routeing access module Address, can be fixed network line identification in the case where bridging access module) it is sent to PCRF-2.
6th, PMIP registrations are completed between S-GW2 and P-GW2.
7th, IP-CAN sessions are established between P-GW2 and PCRF-2.
8th, PCRF-2 has found BPCF according to fixed network backhaul information and/or configuration relation, and establishes S9*- 2 sessions.
9th, UE-1 occurs to be linked into the switching of HeNB accesses from EUTRAN
10th, UE-1 switches
11st, switching mark, fixed network backhaul information are contained after S-GW2 receives handover request, in request.S-GW2 sentences Disconnected UE-1 is switched, and is initiated gateway control session to PCRF-1 and is established, and fixed network backhaul information is sent into PCRF- 1。
12nd, PMIP registrations are completed between S-GW2 and P-GW1.
13rd, P-GW1 initiates IP-CAN session modifications to PCRF-1.
14th, PCRF-1 has found PCRF-2 according to fixed network backhaul information and/or configuration information, and by fixed network backhaul Information and the CSG information of user are sent to PCRF-2
15th, PCRF-2 has found BPCF according to fixed network backhaul information and/or configuration information.
16th, PCRF-1 is that S9 is established in UE-1 accesses by PCRF-2 and BPCF*Session.
17th, the mandate QoS, S-GW2 returned according to PCRF-1 in step 11 initiates bearing resource distribution.
18th, UE-1 completes the switching accessed from EUTRAN to HeNB.
19th, UE-1 initiates business, and to QoS request corresponding to S-GW2 transmission business, UE marks, IP address are included in request Etc. information.
20th, after S-GW2 receives request message, to QoS authorization requests corresponding to PCRF-1 initiation business.
21st, QoS authorization requests are sent to BPCF by PCRF-1 by PCRF-2, and request BPCF is the industry that UE-1 is initiated Business carries out call access control.
22nd, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
23rd, BPCF returns to the response excluded, and returns to acceptable QoS resource.
24th, after PCRF-2 receives BPCF call access control result, according to UE CSG information, ARP, UE-1 CSG is found For priority higher than the CSG information of the other users (such as UE-2) under HeNB accesses, decision-making receiving UE-1 business please Ask, and UE-2 QoS resource is degraded.PCRF-2 sends call access control result to PCRF-1, and UE-2 is re-started QoS is authorized.
25th, the mandate QoS for UE-2 is handed down to P-GW2 and performed by PCRF-2.
Mandate QoS for UE-2 is handed down to S-GW2 and performed by 26 while PCRF-2.
27th, S-GW2 installations authorize QoS, and according to qos requirement is authorized, initiate QoS resource modification corresponding to bearer network.
28th, PCRF-2 initiates S9 to BPCF simultaneously*- 2 session updates, update qos policy.
29th, call access control result is returned to PCRF-1 by PCRF-2.
30th, the call access control result returned according to PCRF-2, QoS of survice requests of the PCRF-1 to UE-1 authorize.
31st, PCRF-1 will authorize QoS to be handed down to P-GW1.
32nd, PCRF-1 will authorize QoS to provide program by gateway control and QoS rules and is supplied to S-GW2 simultaneously.
33rd, S-GW2 installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
34th, S-GW2 returns to QoS of survice request to UE-1 and authorizes successfully response.
Mandate QoS for UE-1 is sent to BPCF by 35 while PCRF-1 by PCRF-2, and strategy is carried out more for BPCF Newly.
Preferred embodiment nine
This preferred embodiment nine is relative to the handoff scenario shown in Figure 15, and EPC networks 1 are by MME, S-GW, P-GW1, PCRF- 1 grade network element is formed, and GTP agreements are used between S-GW and P-GW1.UE-1 is the user under EPC networks 1;EPC networks 2 are by P- The network elements such as GW2 and PCRF-2 form, and UE-2 is the user under EPC networks 2, and is roamed into EPC networks 1, in EPC networks 1 P-GW2 in S-GW and EPC networks 2 passes through PMIP protocol interactions.Now, UE-1 and UE-2 is carried out just by HeNB accesses Begin to adhere to, the secondary call access control of progress of being commenced business to the UE accessed by HeNB is realized under the scene.
Figure 25 is according to the interaction diagrams of the processing method of the secondary call access control of the preferred embodiment of the present invention nine, is such as schemed Shown in 25, including the steps 1 is to step 23.
Specifically, step 1 is the process of electricity on HeNB, implements the step 1-3 of reference implementation example one;Step 2a-4a Pass through the initial process for being attached to EPC networks 1 of HeNB accesses for the UE-1 under EPC networks 1;Step 2b-6b is under EPC networks 2 UE-2 roam into EPC networks 1, and pass through the initial process for being attached to EPC networks 2 of HeNB accesses;Step 7-23 sends out for UE-1 The business of rising, PCRF-1 carry out the process of secondary call access control.It is assumed here that before UE-1 initiation business, under HeNB accesses Through there is other UE to initiate business, the most of business initiated by these UE of HeNB signings QoS takes.
1st, before initial attachment occurs for UE, EPC process is electrically accessed on HeNB with reference to the step 1 of preferred embodiment one to 3.
By HeNB accesses initial attachment occurs for 2a, UE-1, after MME receives attach request, when UE-1 is accessed Fixed network backhaul information (it is used for the on-position for identifying the HeNB, can is CPE IP address in the case where routeing access module, Can be fixed network line identification in the case where bridging access module) P-GW1 is sent to by S-GW.
3a, P-GW the INFORMATION DISCOVERY PCRF-1 such as identify by DRA according to fixed network backhaul information and/or UE, and establish IP-CAN sessions, and fixed network backhaul information is sent to PCRF-1.
4a, PCRF-1 have found BPCF according to fixed network backhaul information and configuration relation, and S9 is established between BPCF*-1 Session.
By HeNB accesses initial attachment occurs for 2b, UE-2, after MME receives attach request, when UE-2 is accessed Fixed network backhaul information (it is used for the on-position for identifying the HeNB, can is CPE IP address in the case where routeing access module, Can be fixed network line identification in the case where bridging access module) information is sent to S-GW.
3b, S-GW the INFORMATION DISCOVERY PCRF-1 such as identify by DRA according to fixed network backhaul information and/or UE, and establish Gateway control session, and fixed network backhaul information is sent to PCRF-1.Because UE-2 and UE-1 is connect using identical HeNB Enter, thus it is identical according to the PCRF of fixed network backhaul INFORMATION DISCOVERYs, i.e., all it is PCRF-1.Then PCRF-1 is roaming service customer UE-2 attach request, PCRF-2 is had found according to UE identification informations, and establish S9 sessions.
4b while PCRF-1 have found BPCF according to fixed network backhaul information and/or configuration relation, and are built between BPCF Vertical S9*- 2 sessions
PMIP registrations are completed between 5b, S-GW and P-GW2.
6b, P-GW2 initiate the request of IP-CAN session establishments to PCRF-2.
7th, UE-1 initiates business, and to QoS request corresponding to P-GW1 transmission business, UE marks, IP address etc. are included in request Information.
8th, after P-GW1 receives request message, to QoS authorization requests corresponding to PCRF-1 initiation business.
9th, QoS authorization requests are sent to BPCF by PCRF-1, and request BPCF is that the business that UE-1 is initiated is received Control.
10th, BPCF has found that available HeNB signings QoS can not meet requirement of the business of UE-1 initiations to QoS, and refusal connects The UE-1 that receives carries out the business.
11st, BPCF returns to the response excluded to PCRF-1, and will be appreciated by QoS resource and feed back to PCRF-1.
12nd, after PCRF-1 receives BPCF call access control result, according to UE CSG information, ARP, UE-1 CSG is found For priority higher than the CSG information of the other users (such as UE-2) under HeNB accesses, decision-making receiving UE-1 business please Ask, and the QoS of survice request to UE-1 authorizes.Send and ask to PCRF-2 simultaneously, it is desirable to which UE-2 QoS resource is carried out Degrade.
13rd, the mandate QoS for UE-1 is handed down to P-GW1 and performed by PCRF-1.
14th, P-GW1 installations authorize QoS, and according to qos requirement is authorized, QoS resource corresponding to initiation bearer network is reserved.
15th, P-GW1 returns to QoS reservation to UE-1 and successfully responded.
16th, while the QoS of survice request generation mandate QoS that PCRF-1 is UE-1 is handed down to P-GW1, also by the mandate QoS is handed down to BPCF more new strategies.
17th, while the QoS of survice request that PCRF-1 is UE-1 produces mandate QoS, send and ask to PCRF-2, it is desirable to be right UE-2 mandate QoS resource is degraded.
18th, PCRF-2 re-starts QoS mandates to UE-2.
19th, PCRF-2 will authorize QoS to be handed down to P-GW2, carry out policy update.
20th, the mandate QoS resource for UE-2 is handed down to PCRF-1 by PCRF-2.
21st, PCRF-1 initiates gateway control and QoS rules provide program, updates the mandate QoS that UE-1 is directed on S-GW.
22nd, S-GW bearing resource renewals according to corresponding to authorizing QoS to initiate.
23rd, the mandate QoS resource for UE-2 is handed down to BPCF by S-GW simultaneously, so that BPCF carries out policy update.
It should be noted that can be in such as one group of computer executable instructions the flow of accompanying drawing illustrates the step of Performed in computer system, although also, show logical order in flow charts, in some cases, can be with not The order being same as herein performs shown or described step.
The embodiments of the invention provide a kind of processing system of secondary call access control, the processing system of the secondary call access control It can be used for the processing method for realizing above-mentioned secondary call access control.Figure 26 is secondary call access control according to embodiments of the present invention The unified structured flowchart of processing system, as shown in figure 26, including the network equipment 262 and PCRF 264, the wherein network equipment 262 is S- GW or P-GW, the wherein network equipment 262 include the first discovery module 2622 and the first session establishment module 2624.Below to it Structure is described in detail.
First discovery module 2622, for according to internet-ip address information, being found to be the PCRF 264 that UE is serviced;First Session establishment module 2624, the first discovery module 2622 is connected to, for controlling session with the establishment strategies of PCRF 264.
Preferably, PCRF 264 includes the first receiving module 2642 and the first decision-making module 2644.Its structure is entered below Row is described in detail.
First receiving module 2642, response message is excluded from BPCF for receiving, wherein excluding response Message excludes UE for instruction and commenced business;First decision-making module 2644, the first receiving module 2642 is connected to, for root According to CSG information and/or distribution and priority ARP and/or operator's configuration strategy decision-making is kept to allow or refuse UE to carry out industry Business.
The embodiments of the invention provide a kind of processing system of secondary call access control, the processing system of the secondary call access control It can be used for the processing method for realizing above-mentioned secondary call access control.Figure 27 is secondary call access control according to embodiments of the present invention The structured flowchart of processing system two, as shown in figure 27, including the network equipment 272 and PCRF 274, the wherein network equipment 272 is S- GW or P-GW, the wherein network equipment 272 include the second discovery module 2722 and the second session establishment module 2724.Below to it Structure is described in detail.
Second discovery module 2722, for according to fixed network backhaul information, being found to be the PCRF 274 that UE is serviced;Second Session establishment module 2724, the second discovery module 2722 is connected to, for controlling session with the establishment strategies of PCRF 274.
Preferably, PCRF 274 includes the second receiving module 2742 and the second decision-making module 2744.Its structure is entered below Row is described in detail.
Second receiving module 2742, response message is excluded from BPCF for receiving, wherein excluding response Message excludes UE for instruction and commenced business;Second decision-making module 2744, the second receiving module 2742 is connected to, for root Allow according to CSG information and/or ARP and/or operator's configuration strategy decision-making or refusal UE commences business.
The embodiments of the invention provide a kind of processing system of secondary call access control, the processing system of the secondary call access control It can be used for the processing method for realizing above-mentioned secondary call access control.Figure 28 is secondary call access control according to embodiments of the present invention The structured flowchart of processing system three, as shown in figure 28, including the first PCRF 282, the 2nd PCRF 284, BPCF 286, wherein the One PCRF 282 includes acquisition module 2822 and session establishment module 2824.Its structure is described in detail below.
Acquisition module 2822, for obtaining fixed network backhaul information;Session establishment module 2824, is connected to acquisition module 2822, for by the 2nd PCRF 284, session to be established with BPCF 286.
Preferably, the 2nd PCRF 284 includes the 3rd receiving module 2842 and the 3rd decision-making module 2844.It is tied below Structure is described in detail.
3rd receiving module 2842, response message is excluded from BPCF 286 for receiving, wherein excluding Response message excludes UE for instruction and commenced business;3rd decision-making module 2844, the 3rd receiving module 2842 is connected to, used Commenced business according to CSG information and/or ARP and/or operator's configuration strategy decision-making permission or refusal UE.
Preferably, said system also includes the network equipment 288, and the wherein network equipment 288 is S-GW or P-GW, wherein net Network equipment 288 includes receiving module 2882 and sending module 2884.Its structure is described in detail below.
Receiving module 2882, for receiving the handover request from UE;Sending module 2884, is connected to receiving module 2882, fixed network backhaul information and UE CSG information for UE switchings to be used afterwards are sent to the first PCRF 282.
Implement it should be noted that the business admission control device described in device embodiment corresponds to above-mentioned method Example, its concrete implementation process had carried out detailed description in embodiment of the method, will not be repeated here.
In summary, according to the abovementioned embodiments of the present invention, there is provided a kind of processing method of secondary call access control and be System.By the present invention, CPE IP address used in the UE accessed by same HeNB or HeNB IP address are identical, therefore It is that the PCRF that the UE has found is identical according to the CPE IP address or the HeNB IP address, with this PCRF can be ensured according to UE The information such as priority UE therein commenced business realize secondary call access control.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed Network on, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to they are stored Performed in the storage device by computing device, either they are fabricated to respectively each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific Hardware and software combines.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (8)

  1. A kind of 1. processing method of secondary call access control, it is characterised in that including:
    The network equipment is found to be the "Policy and Charging Rules Function of user equipment (UE) service according to internet-ip address information PCRF, wherein the network equipment is gateway S-GW or grouped data network gateway P-GW, the internet-ip address Information includes one below:When HeNB is accessed with route pattern, the internet-ip address information is that the UE accesses HeNB The customer premises equipment, CPE CPE IP address included in used ipsec tunnel information;When HeNB is accessed with bridge mode, institute The IP address that internet-ip address information accesses in ipsec tunnel information used in HeNB the HeNB included for the UE is stated, The IP address of the HeNB is the HeNB of mark ipsec tunnel outside ip address;
    The network equipment and PCRF establishment strategies control session.
  2. 2. according to the method for claim 1, it is characterised in that in the network equipment according to internet-ip address information, find Before PCRF for UE services, methods described also includes:
    When the UE accesses evolved Home eNodeB HeNB networks, the network equipment obtains the internet-ip address letter Breath.
  3. 3. according to the method for claim 1, it is characterised in that the network equipment is found to be institute according to the IP address Stating the PCRF of UE services includes:
    The network equipment sends the IP address to Diameter route agents DRA;
    The DRA is found to be the PCRF that the UE is serviced according to the IP address.
  4. 4. according to the method for claim 1, it is characterised in that the network equipment and PCRF establishment strategies control meeting Words include one below:
    If the network equipment is S-GW, the network equipment establishes gateway control session with the PCRF;
    If the network equipment is P-GW, the network equipment establishes IP-CAN sessions with the PCRF.
  5. 5. according to the method for claim 1, it is characterised in that the network equipment and PCRF establishment strategies control meeting Words include:The network equipment sends the closed subscriber group (CSG) information and ipsec tunnel information of the UE to the PCRF.
  6. 6. method according to any one of claim 1 to 5, it is characterised in that in the network equipment and the PCRF After establishment strategy control session, methods described also includes:
    The PCRF receives excludes response message from broadband policy control function BPCF, wherein described exclude Response message excludes the UE for instruction and commenced business;
    The PCRF according to CSG information and/or distribution and keep priority ARP and/or operator configuration strategy decision-making allow or Person refuses the UE and commenced business.
  7. 7. a kind of processing system of secondary call access control, it is characterised in that including the network equipment and "Policy and Charging Rules Function PCRF, wherein the network equipment is gateway S-GW or grouped data network gateway P-GW, wherein the network equipment Including:
    First discovery module, for according to internet-ip address information, being found to be the PCRF of user equipment (UE) service, wherein, institute Stating internet-ip address information includes one below:When HeNB is accessed with route pattern, the internet-ip address information is The customer premises equipment, CPE CPE IP address included in ipsec tunnel information used in the UE accesses HeNB;When HeNB is with bridge When connecing pattern access, the internet-ip address information is to be included in ipsec tunnel information used in UE accesses HeNB HeNB IP address, the IP address of the HeNB for the HeNB of mark ipsec tunnel outside ip address;
    First session establishment module, for controlling session with the PCRF establishment strategies.
  8. 8. system according to claim 7, it is characterised in that the PCRF includes:
    First receiving module, response message is excluded from broadband policy control function BPCF for receiving, wherein described Exclude response message and exclude the UE for instruction and commence business;
    First decision-making module, for being determined according to CSG information and/or distribution and holding priority ARP and/or operator's configuration strategy Plan allows or refuses the UE and commence business.
CN201110039357.7A 2011-02-14 2011-02-14 The processing method and system of secondary call access control Active CN102638867B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110039357.7A CN102638867B (en) 2011-02-14 2011-02-14 The processing method and system of secondary call access control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110039357.7A CN102638867B (en) 2011-02-14 2011-02-14 The processing method and system of secondary call access control

Publications (2)

Publication Number Publication Date
CN102638867A CN102638867A (en) 2012-08-15
CN102638867B true CN102638867B (en) 2018-01-02

Family

ID=46623054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110039357.7A Active CN102638867B (en) 2011-02-14 2011-02-14 The processing method and system of secondary call access control

Country Status (1)

Country Link
CN (1) CN102638867B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139914A (en) * 2011-12-05 2013-06-05 中兴通讯股份有限公司 Resource control method and system on local unloaded data
WO2014186936A1 (en) * 2013-05-20 2014-11-27 华为技术有限公司 Policy control method, related apparatus, and system
CN104244211A (en) * 2013-06-07 2014-12-24 阿尔卡特朗讯 Method and device for determining PCRF

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150418A (en) * 2007-10-17 2008-03-26 中兴通讯股份有限公司 A selection method for policy billing control server
CN101583114A (en) * 2008-09-23 2009-11-18 中兴通讯股份有限公司 Providing method of user equipment (UE) IP address and Diameter routing agent
CN101588326A (en) * 2009-06-15 2009-11-25 华为技术有限公司 Method, devcie and system for associating gateway controlled conversation with Gx conversation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150418A (en) * 2007-10-17 2008-03-26 中兴通讯股份有限公司 A selection method for policy billing control server
CN101583114A (en) * 2008-09-23 2009-11-18 中兴通讯股份有限公司 Providing method of user equipment (UE) IP address and Diameter routing agent
CN101588326A (en) * 2009-06-15 2009-11-25 华为技术有限公司 Method, devcie and system for associating gateway controlled conversation with Gx conversation

Also Published As

Publication number Publication date
CN102638867A (en) 2012-08-15

Similar Documents

Publication Publication Date Title
CN103444148B (en) Control the business detection Route Selection of functional node disposed or the network node walked around and method
KR101575223B1 (en) Method and system for requesting local breakout in session home enhanced node b
EP3477993B1 (en) Method for processing pdu session establishment procedure and amf node
EP2709340A2 (en) Local network and method for establishing connection between local gateway and home nodeb
CN102457847B (en) A kind of method and system of fixed network perception user access
US20140192780A1 (en) Method and apparatus for accessing via local network in wireless communication system
CN103548387B (en) Method, mobile management network element, wireless access network element and the system of process switching
JP2013506332A (en) Enhanced allocation / retention policy solutions
CN104349297A (en) Charging policy method of internetwork signing authorization and device thereof
EP2911427A1 (en) Method and system for differentiating subscriber
CN102638867B (en) The processing method and system of secondary call access control
US8874079B2 (en) Control method for home base station access and home base station gateway
CN102791042B (en) Method and system for establishing S9 subsession and policy and charging rules function (PCRF)
CN103533599A (en) Strategy control method under fixed network fusion scene
CN102625396B (en) A kind of method for managing resource and system
CN103369501B (en) A kind of method for managing resource, system and resource management network element
CN103139914A (en) Resource control method and system on local unloaded data
CN102761932B (en) Strategy control method and system for IP flow mobility
CN103227981B (en) A kind of recognition methods of application detection control function pattern and system
CN102740378B (en) A kind of method and system of call access control
CN103929756B (en) A kind of web information processing method, device and system
CN102457974B (en) A kind of service admission control method and system
CN102238648B (en) Home evolved NodeB access control method and system
CN102781067B (en) A kind of realization method and system of business admission control
CN102769933B (en) Strategy conversation deleting method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant