CN104081829A - Access information processing method, device and system - Google Patents

Access information processing method, device and system Download PDF

Info

Publication number
CN104081829A
CN104081829A CN201380000152.5A CN201380000152A CN104081829A CN 104081829 A CN104081829 A CN 104081829A CN 201380000152 A CN201380000152 A CN 201380000152A CN 104081829 A CN104081829 A CN 104081829A
Authority
CN
China
Prior art keywords
information
policy entity
access
access network
access information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201380000152.5A
Other languages
Chinese (zh)
Inventor
于游洋
靳维生
朱文若
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN104081829A publication Critical patent/CN104081829A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/22Interfaces between hierarchically similar devices between access point controllers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An embodiments of the present invention provides an access information processing method, comprising: a first policy entity acquiring second access information about a target access network of a user equipment stored by a second policy entity;and according to the second access information and first access information about the target access network stored by the first policy entity, the first policy entity determining the access information used when the user equipment accesses the target access network.Correspondingly, also provided by an embodiment of the present invention is a policy entity.The embodiments of the present invention can improve the availability of the access information.

Description

Access information processing method, device and system
A kind of access information processing method, equipment and systems technology field
The present invention relates to the communications field, more particularly to a kind of access information processing method, equipment and system.Core network in background technology network(Evolved Packet Core Network, EPC) 3GPP access technologies are not only supported, for example:Land radio access web(UMTS Terrestrial Radio Access Network, UTRAN), access technology, the Universal Terrestrial wireless access network of evolution(Evolved Universal Terrestrial Radio Access Network, E-UTRAN) access technology or(GSM EDGE Radio Access Network, GERAN) access technology;Meanwhile, EPC also supports non-3 GPP access technology, for example:CDMA(Code Division Multiple Access, CDMA) access technology of 2000 networks, the access technology of global ripple interconnection access (Worldwide Interoperability for Microwave Access, WiMax) network and WLAN(Wireless Local Area Networks, WLAN) access technology.User equipment for supporting a variety of access technologies, network side can pass through access network discovery and selection function (Access Network Discovery and Selection Function, ANDSF) policy information of server transmission user's granularity is to user equipment, so as to instruct user equipment to select suitable access network.
With the development of WLAN technologies, WLAN is increasingly becoming the useful supplement of 3GPP networks, especially in hot zones, and increasing mobile operator is ready to select and using WLAN shunt data, to mitigate backbone network pressure, lifts service quality.Certainly, WLAN itself is in order to realize the optimum choice of access network, and there is also corresponding policy control entity, such as WiFi alliances(Wi-Fi Alliance, WFA) server, server can provide more detailed WLAN status information and selection strategy for user equipment.
When network side has ANDSF servers and WFA servers simultaneously, i.e. 3GPP network supports WLAN access technology when, user equipment can receive the access information that ANDSF servers are issued, and the access information that WEA servers are issued is received, user equipment is further according to the two access informations selection access objective network.And the two access informations may have the access information for repeating even conflict, cause The availability reduction of access information.The content of the invention
The embodiments of the invention provide a kind of access information processing method, equipment and system, the availability of access information can be improved.
First aspect there is provided a kind of access information processing method, including:
First policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;
First access information of the target access network that first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
It is described to determine that the user equipment accesses the access information used during the target access network in the first possible implementation, including:
First policy entity merges first access information and second access information obtains the user equipment and accesses the access information used during the target access network, or,
First policy entity selects the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
With reference to the first possible implementation of first aspect or first aspect, in second of possible implementation, first access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or, first access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
With reference to the first possible implementation of first aspect, in the third possible implementation, wherein, it is described to find that packet contains at least one in following item:
Type information, the IP address type information of distribution, the authentication information of support, and application type information; The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, allow the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access.
With reference to any of the above-described implementation, in the 4th kind of possible implementation, methods described further comprises:
First policy entity receives the positional information of the user equipment to report, and the positional information is used to select the target access network for the user equipment.
With reference to the 4th kind of possible implementation of first aspect, in the 5th kind of possible implementation, first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage, including:
According to the positional information, first policy entity selects the target access network, and first policy entity sends the identification information of the target access network to second policy entity;
First policy entity receives second access information that second policy entity is sent.With reference to the 4th kind of possible implementation of first aspect, in the 6th kind of possible implementation, first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage, including:
First policy entity sends the positional information to second policy entity, and it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
First policy entity receives second access information that second policy entity is sent.With reference to the 6th kind of possible implementation of first aspect, in the 7th kind of possible implementation, first policy entity also sends inquiry list to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network; Or, first policy entity also sends subscription update instruction to second policy entity, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
With reference to the third possible implementation of second possible implementation or first aspect of the first possible implementation or first aspect of first aspect or first aspect, in the 8th kind of possible implementation, further comprise:
Second policy entity receives the positional information of the user equipment to report, and the positional information is used to select the target access network for the user equipment;
First policy entity sends the access information used when the user equipment accesses the target access network to second policy entity.
With reference to the third possible implementation of second possible implementation or first aspect of the first possible implementation or first aspect of first aspect or first aspect, in the 9th kind of possible implementation,
First policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage, including:
First policy entity receives second access information that second policy entity is pushed.With reference to any of the above-described implementation, in the tenth kind of possible implementation, first policy entity includes:
Access network discovery and selection function ANDSF servers or WFA servers;
Second policy entity includes:
ANDSF servers or WFA servers.
Second aspect there is provided a kind of policy entity, including:Acquiring unit and determining unit, wherein:The acquiring unit, the second access information of the target access network of the user equipment for obtaining the storage of the second policy entity;
The determining unit, for the first access information according to second access information and the target access network of policy entity storage, determines that the user equipment accesses the access information used during the target access network.
In the first possible implementation, the determining unit is additionally operable to merge first access information and second access information obtains the user equipment and accesses the access used during the target access network Information, or,
The determining unit is additionally operable to select the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
With reference to the first possible implementation of second aspect or second aspect, in second of possible implementation, first access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or, first access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
With reference to second of possible implementation of second aspect, in the third possible implementation, wherein, it is described to find that packet contains at least one in following item:
Type information, the IP address type information of distribution, the authentication information of support, and application type information;
The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, allow the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access.
With reference to the third possible implementation of second possible implementation or second aspect of the first possible implementation or second aspect of second aspect or second aspect, in the 4th kind of possible implementation, the policy entity also includes:
Receiving unit, the positional information for receiving the user equipment to report, the positional information is used to select the target access network for the user equipment. With reference to the 4th kind of possible implementation of second aspect, in the 5th kind of possible implementation, the acquiring unit includes:
Selecting unit, for according to the positional information, selecting the target access network,
First transmitting element, the identification information for sending the target access network to second policy entity,
First receiving subelement, for receiving second access information that second policy entity is sent.With reference to the 4th kind of possible implementation of second aspect, in the 6th kind of possible implementation, the acquiring unit includes:
Second transmitting element, for sending the positional information to second policy entity, it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
Second receiving subelement, for receiving second access information that second policy entity is sent.With reference to the 6th kind of possible implementation of second aspect, in the 7th kind of possible implementation, second transmitting element is additionally operable to send inquiry list to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Or, second transmitting element, which is additionally operable to send to second policy entity, subscribes to update instruction, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
With reference to the third possible implementation of second possible implementation or second aspect of the first possible implementation or second aspect of second aspect or second aspect, in the 8th kind of possible implementation, the acquiring unit is additionally operable to receive second access information that second policy entity is pushed.
With reference to any of the above-described implementation of second aspect, in the 8th kind of possible implementation, the policy entity includes:
ANDSF servers or WFA servers;
Second policy entity includes:
ANDSF servers or WFA servers.
The third aspect is there is provided a kind of policy entity, and receiver, processor and memory, the memory are used to store batch processing code, and the processor is used to call the program code of the memory storage to be used to perform following operation:
The target access network for obtaining the user equipment that the second policy entity is stored is received by the receiver The second access information;;
First access information of the target access network stored according to second access information and the policy entity, determines that the user equipment accesses the access information used during the target access network.
In the first possible implementation, the operation that user equipment described in the determination of the computing device accesses the access information used during the target access network includes:
Merge first access information and second access information obtains the user equipment and accesses the access information used during the target access network, or,
First policy entity selects the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
With reference to the first possible implementation of the third aspect or the third aspect, in second of possible implementation, first access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or, first access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
With reference to second of possible implementation of the third aspect, in the third possible implementation, wherein, it is described to find that packet contains at least one in following item:
Type information, the IP address type information of distribution, the authentication information of support, and application type information;
The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, allow the access network type of access and indicate whether that must being fulfilled for this permits Perhaps the information of the access network type accessed.
With reference to any of the above-described implementation of the third aspect, in the 4th kind of possible implementation, the processor is further additionally operable to perform following operation:
The positional information of the user equipment to report is received by the receiver, the positional information is used to select the target access network for the user equipment.
With reference to the 4th kind of possible implementation of the third aspect, in the 5th kind of possible implementation, the policy entity also includes transmitter, the operation of second access information of the target access network that the user equipment that the second policy entity is stored is obtained by the receiver of the computing device, including:
According to the positional information, the target access network is selected,
The identification information of the target access network is sent to second policy entity by the transmitter, second access information that second policy entity is sent is received by the receiver.
With reference to the 4th kind of possible implementation of the third aspect, in the 6th kind of possible implementation, the policy entity also includes transmitter, the operation of second access information of the target access network that the user equipment that the second policy entity is stored is obtained by the receiver of the computing device, including:
The positional information is sent to second policy entity by the transmitter, it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
Second access information that second policy entity is sent is received by the receiver.
With reference to the 6th kind of possible implementation of the third aspect, in the 7th kind of possible implementation, the processor also sends inquiry list by the transmitter to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Or, the processor also sends subscription update instruction by the transmitter to second policy entity, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
With reference to the third possible implementation of second possible implementation or the third aspect of the first possible implementation or the third aspect of the third aspect or the third aspect, in the 8th kind of possible implementation, the operation of second access information of the target access network that the user equipment that the second policy entity is stored is obtained by the receiver of the computing device, including:
Second access information that second policy entity is pushed is received by the receiver.
With reference to any of the above-described implementation of the third aspect, in the 9th kind of possible implementation, the strategy Entity includes:
Access network discovery and selection function ANDSF servers or WFA servers;
Second policy entity includes:
ANDSF servers or WFA servers.
In above-mentioned technical proposal, the first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;First access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The access information that access information after so determining would not be duplicated and conflicted, so as to improve the availability of access information.Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, the required accompanying drawing used in embodiment or description of the prior art will be briefly described below, apparently, drawings in the following description are only some embodiments of the present invention, for those of ordinary skill in the art, without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
A kind of Fig. 1 schematic flow sheets of access information processing method provided in an embodiment of the present invention;Fig. 2 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention;Fig. 3 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention;Fig. 4 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention;Fig. 5 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention;Fig. 6 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention;Fig. 7 is a kind of structural representation of policy entity provided in an embodiment of the present invention;
Fig. 8 is the structural representation of another policy entity provided in an embodiment of the present invention;
Fig. 9 is the structural representation of another policy entity provided in an embodiment of the present invention;
Figure 10 is the structural representation of another policy entity provided in an embodiment of the present invention;
Figure 11 is a kind of structural representation of access information processing system provided in an embodiment of the present invention;Figure 12 is the structural representation of another policy entity provided in an embodiment of the present invention;
Figure 13 is the structural representation of another policy entity provided in an embodiment of the present invention;
Figure 14 is the structural representation of another policy entity provided in an embodiment of the present invention; Figure 15 is the structural representation of another policy entity provided in an embodiment of the present invention;
Figure 16 is the structural representation of another access information processing system provided in an embodiment of the present invention.Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained under the premise of creative work is not made belongs to the scope of protection of the invention.
Fig. 1 is a kind of schematic flow sheet of access information processing method provided in an embodiment of the present invention, as shown in Fig. 1, including:
101st, the first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;
102nd, the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
Optionally, above-mentioned target access network can be that one or more access network, i.e. target access network are at least one access network;Above-mentioned first access information and the second access information can be one or more information.
Optionally, when above-mentioned target access network is multiple access networks, step 102 determines that the user equipment accesses the access information used during the target access network, can determine that user equipment accesses the access information used during each target access network respectively.
As an alternative embodiment, above-mentioned first policy entity can be the server for management strategy, such as:ANDSF servers or, WFA servers;Above-mentioned second policy entity can also be the server for management strategy, for example:ANDSF servers or, WFA servers.Wherein, above-mentioned first policy entity and the second policy entity the ANDSF servers that can be two different, can also be two different WFA servers, can be using the first policy entity as ANDSF servers, second policy entity is WFA servers, can be using the first policy entity as WFA servers, the second policy entity is ANDSF servers.
In above-mentioned technical proposal, the first policy entity obtains the target of the user equipment of the second policy entity storage Second access information of access network;First access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The access information that access information after so determining would not be duplicated and conflicted, so as to improve the availability of access information.Fig. 2 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention, as shown in Fig. 2 including:
201st, the first policy entity receives the positional information of the user equipment to report, and the positional information is used to select the target access network for the user equipment.
Optionally, above-mentioned position information of user equipment can be used to indicate that the position that user equipment is presently in, and such as above-mentioned position information of user equipment can be the positional information that location information of cell, i.e. user equipment are presently in cell;Or above-mentioned position information of user equipment can be access network mark, i.e. the mark for the network that user equipment is currently accessed, for example:Service set identification(Service Set Identification, SSID) or expansion service set mark(Homogenous Extended Service Set ID, HESSID) or infrastructure service set mark(Basic Service Set ID, BSSID) etc..
Optionally, above-mentioned target access network can be the adjacent cell of cell or access network shown in the position information of user equipment or access network as target access network, that is, at least one access network for meeting position information of user equipment is target access network.
Optionally, above-mentioned position information of user equipment can be an inquiring position information, and above-mentioned target access network is just at least one access network for belonging to indicating positions region shown in the inquiring position information.
202nd, the first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage.
As an alternative embodiment, step 202 can include:
According to the positional information, the first policy entity selects the target access network,
First policy entity sends the identification information of the target access network to second policy entity, and the first policy entity receives second access information that second policy entity is sent.
In the embodiment, it is possible to achieve select target access network according to above-mentioned positional information by the first policy entity.At least one access network that the position indicated by above-mentioned positional information can be selected to cover is above-mentioned target access network. As an alternative embodiment, step 202 can include:
First policy entity sends the positional information to second policy entity, and it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
First policy entity receives second access information that second policy entity is sent.
In the embodiment, it is possible to achieve send above-mentioned positional information from the first policy entity to the second policy entity, and target access network is selected according to above-mentioned positional information by the second policy entity.At least one access network that the position indicated by above-mentioned positional information can be selected to cover is above-mentioned target access network.
Optionally, the first policy entity can also receive the user equipment information of user equipment transmission, and the user equipment information can be comprising at least one of following:
Customer equipment identification and user equipment class information;
The first policy entity can also send above-mentioned user equipment information to the second policy entity in certain embodiment of the present invention, by the second policy entity according to the user equipment information selection target access network or the second access information.
Wherein, above-mentioned customer equipment identification can be the unique mark of user equipment, for example:International mobile subscriber identity (International Mobile Subscriber Identity, IMSI), International Mobile Equipment Identity code(International Mobile Equipment ID, IMEI) or mobile station International Integrated Services digital network number user equipment mark (Mobile Station International Integrated Services Digital Network Number, MSISDN) etc. other can unique mark user equipment mark.
First policy entity or the second policy entity are also an option that at least one applicable access network of the customer equipment identification as above-mentioned target access network.
Wherein, above-mentioned user equipment class information can be the grade for describing the user equipment, for example:Gold, silver and bronze medals user equipment grade, can also be other grades that user side is consulted in advance with network side.
First policy entity or the second policy entity are also an option that at least one applicable access network of the user equipment grade as above-mentioned target access network.Or, the second policy entity is also an option that the applicable access information of the user equipment grade is as the second access information in the access information of above-mentioned target access network;First policy entity is also an option that the applicable access information of the user equipment grade is as the first access information in the access information of above-mentioned target access network;The mapping relations of user equipment grade and access network can be equally pre-set, or user equipment grade and the mapping relations of access information can be pre-set.
Optionally, the first policy entity can also send inquiry list to second policy entity, with toilet State the second policy entity and second access information is selected from the access information of the target access network according to the inquiry list;Can send above-mentioned inquiry list to the second policy entity together with above-mentioned positional information, i.e., the first policy entity sends above-mentioned positional information and above-mentioned inquiry list to the second policy entity in step 202..It is, of course, also possible to be to send above-mentioned positional information and above-mentioned inquiry list by separating to the second policy entity.
Wherein, above-mentioned inquiry list be used for indicate inquiry content, wherein, the content can be find information and
/ or strategy, the information that the inquiry list that above-mentioned second access information is selected by the second policy entity from the access information of target access network is inquired about;
Optionally, above-mentioned inquiry list query content can be comprising at least one of following:
The load threshold of access network, the signal strength threshold value of access network, access network it is up in can use bandwidth threshold value, access network it is descending in can use bandwidth threshold value, allow access network type and access network information;
Optionally, first policy entity to second policy entity can also send inquiry list when, the second policy entity may be selected by above-mentioned inquiry list is inquired about in the access information of target access network information as the second access information of the target access network for being sent to the first policy entity;For example, when the information of above-mentioned inquiry list query includes the access network type allowed, the second policy entity may be selected by access network type information in the information of target access network as the second access information of the target access network for being sent to the first policy entity.
Optionally, the first policy entity can also send subscription update instruction to second policy entity, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
Optionally, above-mentioned subscription update instruction can be one and subscribe to renewal list, comprising multiple discovery information and/or strategy can be subscribed to, the subscription update instruction is used to indicate that the subscription changed is found that information and/or any subscription strategy are sent to first policy entity as above-mentioned second access information by second policy entity when any subscription finds that information and/or any subscription strategy change in the list of subscription renewal described in second policy entity.
203rd, the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network. As an alternative embodiment, user equipment described in determination in step 203 accesses the access information used during the target access network, including:
First policy entity merges first access information and second access information obtains the user equipment and accesses the access information used during the target access network;
Optionally, above-mentioned merging refers to the second access information adding the first access information, adds and only adds in the absence of what is repeated here certainly, i.e., will be added in the second access information with the unduplicated information of the first access information in the first access information.
Optionally, first policy entity can also receive the network identity of the above-mentioned target access network of the second policy entity transmission, and the access information comprising the network identity that such first policy entity can also define the storage of the first policy entity according to the network identity is above-mentioned second access information.Above-mentioned second access information and the access information comprising the network identity will be merged.
Optionally, when above-mentioned second access information is comprising information is found, the first policy entity adds the first information in second access information in the discovery information comprising the network identity that the first policy entity is stored;The first information is the storage of the first policy entity comprising above-mentioned network identity(That is the mark of target access network)Discovery information in non-existent information;
Optionally, when above-mentioned second access information includes different system switchover policy, the first policy entity adds the first policing parameter in second access information in the different system switchover policy comprising above-mentioned network identity that the first policy entity is stored;First policing parameter is non-existent policing parameter in the different system switchover policy comprising the network identity that the first policy entity is stored;
Optionally, when above-mentioned second access information includes different system routing policy, the first policy entity adds the first policing parameter in second access information in the different system routing policy comprising above-mentioned network identity that the first policy entity is stored;First policing parameter is non-existent policing parameter in the different system routing policy comprising the network identity that the first policy entity is stored.
As an alternative embodiment, user equipment described in determination in step 203 accesses the access information used during the target access network, including:
First policy entity selects the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
Optionally, the first policy entity can also receive the application scenarios information of the second access information, and above-mentioned first policy entity selects the high person of priority in first access information and second access information to be institute Stating the access information used during the user equipment access target access network can include:
First policy entity selects the access information used when the high person of priority level accesses the target access network as the user equipment in the first information of first access information and the first information of second access information;
Wherein, the first information is all present in the first access information and the second access information, and application scenarios identical information.The application scenarios can refer to that is, above-mentioned first sub- access information and the second sub- access information are only applicable to roaming service customer suitable for roaming service customer;Or application scenarios can refer to be applied to non-roaming subscriber, i.e., above-mentioned first sub- access information and the second sub- access information are only applicable to non-roaming subscriber.
User equipment described in determination in step 203 accesses the access information used during the target access network, can include:
First policy entity judges the priority level of the second information and the second information in second access information in second access information, and high the second information addition described second of priority level is connect in information.
Above-mentioned second information refers to the information all existed in the second access information and the first access information, for example, it was discovered that information and/or policing parameter.
For example:Above-mentioned second information is peak load value, that is all there is peak load value in the second policy entity is sent second access information and the first access information, such first policy entity is it may determine that the related tactful priority level of the two peak load values, when the priority level of peak load value corresponding strategies in second access information that the second policy entity is sent is high, just the peak load value strategy is added in the first access information, the original peak load value strategy of the first access information is removed.Not to how to judge that the scheme of two policy priority ranks is limited in the embodiment of the present invention.Such as the total strategy for being less than the second policy entity of the strategy that the first policy entity is configured in the first policy entity.The policy priority level order from two policy entities is determined with this.It can also be the priority level for pre-setting good strategy.
Optionally, first policy entity can also receive the network identity of the target access network of the second policy entity transmission, first policy entity can also be that network identity is matched in the access information for storing the network identity with the first policy entity, regard the access information that the match is successful as the second access information.First policy entity judges the priority level of the second information and the second information in second access information in second access information again, and high the second information addition described second of priority level is connect in information.
As an alternative embodiment, first access information can include the target access network First find information, second access information can include the target access network second find information;Step 203 can be just to determine finds that information and described first finds information according to described second, determines that the user equipment accesses the discovery information used during the target access network.Or,
First access information can include the first different system switchover policy of the target access network, and second access information can include the second different system switchover policy of the target access network;Step 203 can be just to determine according to the described second different system switchover policy and the first different system switchover policy, determine that the user equipment accesses the different system switchover policy used during the target access network.Or,
First access information can include the first different system routing policy of the target access network, and second access information can include the different system routing policy of the target access network.Step 203 can be just to determine according to the described second different system routing policy and the first different system routing policy, determine that the user equipment accesses the different system routing policy used during the target access network.
As a kind of optional implementation, first access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
Optionally, above-mentioned access information can include at least one of following:
It was found that information, different system switchover policy and different system routing policy;
Wherein, the discovery information can be comprising at least one of following:
Type information, the IP address type information of distribution, the authentication information and application type information supported;
The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicating whether must is fulfilled for the information of the peak load value, lowest signal intensity value and indicates whether must to be fulfilled for the lowest signal intensity value Information, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, it is allowed to the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access;Show that peak load value is the strategy must being fulfilled for when occurring with peak load value such as configured information simultaneously.
For example, it is above-mentioned indicate whether the information for must being fulfilled for the peak load value be indicate peak load value be must be fulfilled for when, then only when user equipment load value be less than the access information in peak load value when can just access the target access network.The up bandwidth value that can be used in lowest signal intensity value, most bottom, the minimum descending bandwidth value that can be used, peak load value are the same, do not illustrate one by one herein.
As an alternative embodiment, after step 203, methods described can also include:The access information of above-mentioned determination is sent to the user equipment.
In above-mentioned technical proposal, the positional information selection target access network according to user equipment to report is realized on the basis of above example, and also achieves a variety of access information processing methods, and the availability for improving access information can be realized.Fig. 3 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention, as shown in figure 3, including:
301st, the first policy entity receives second access information that second policy entity is pushed.
302nd, the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network;
303rd, the first policy entity receives the access information request message that user equipment is sent;
304th, the first policy entity is based on the access information request message, the access information used when at least one access network is selected from the target access network as the final access network of the user equipment, and the user equipment after determination being accessed into the final access network is sent to the user equipment.
Optionally, above-mentioned access information request message includes at least one of following:
Customer equipment identification, customer position information, capability information of user facility, user equipment access information and request strategy type information;Wherein, whether the user equipment access information is supported concurrently to access for instruction user equipment. Step 304 can just select at least one access network for meeting above-mentioned access information request message as the final access network of the user equipment from above-mentioned target access network, and the access information used when the user equipment after determination is accessed into the final access network is sent to the user equipment.For example:Above-mentioned policy request message includes customer position information, it is possible at least one access network adjacent with the cell shown in the positional information is selected from target access network is stated as the final access network of the user equipment.
In above-mentioned technical proposal, implemented on the basis of above example, first policy entity receives the second access information of the target access network that the second policy entity is actively sent, based on the access information request message, the access information used when at least one access network is selected from the target access network as the final access network of the user equipment, and the user equipment after determination being accessed into the final access network is sent to the user equipment.Simultaneously, it is possible to achieve improve the availability of access information.Fig. 4 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention, as shown in figure 4, including:
401st, the second policy entity receives the positional information of the user equipment to report, and the positional information is used to select the target access network for the user equipment;
402nd, the first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;
403rd, the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network;
404th, the first policy entity sends the access information used when the user equipment accesses the target access network to second policy entity.
Optionally, after step 404, methods described can also include:
Second policy entity sends the access information used when the user equipment accesses the target access network to the user equipment.
In above-mentioned technical proposal, on the basis of above example, the access information used when determining that the user equipment accesses the target access network by the first policy entity is realized, the access information that the first policy entity is used when the user equipment after determination being accessed into the target access network again is sent to the second policy entity.At the same time it can also realize the availability for improving access information. Fig. 5 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention, as shown in figure 5, including:
501st, the second policy entity sends the second access information of the target access network of the user equipment of the second policy entity storage to the first policy entity, so that the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
Optionally, before step 501, methods described can also include:
Second policy entity receives the positional information for the user equipment that the first policy entity is sent;
According to the positional information, second policy entity selects the target access network.
Optionally, the second policy entity receives the inquiry list that the first policy entity is sent, and second policy entity selects second access information according to the inquiry list from the access information of the target access network;Wherein, above-mentioned inquiry list is used to indicate inquiry content, wherein, the content can find information and/or strategy, the information that the inquiry list that above-mentioned second access information is selected by the second policy entity from the access information of target access network is inquired about;
Optionally, above-mentioned inquiry list query content can be comprising at least one of following:
The load threshold of access network, the signal strength threshold value of access network, access network it is up in can use bandwidth threshold value, access network it is descending in can use bandwidth threshold value, allow access network type and access network information;
Optionally, first policy entity to second policy entity can also send inquiry list when, the second policy entity may be selected by above-mentioned inquiry list is inquired about in the access information of target access network information as the second access information of the target access network for being sent to the first policy entity;For example, when the information of above-mentioned inquiry list query includes the access network type allowed, the second policy entity may be selected by access network type information in the information of target access network as the second access information of the target access network for being sent to the first policy entity.
Optionally, the second policy entity receives the subscription update instruction that the first policy entity is sent, and second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
Optionally, above-mentioned subscription update instruction can be that a subscription updates list, you can to include multiple hairs Existing information and/or subscription strategy, the subscription update instruction is used to indicate that the subscription changed is found that information and/or any subscription strategy are sent to first policy entity as above-mentioned second access information by second policy entity when any subscription finds that information and/or any subscription strategy change in the list of subscription renewal described in second policy entity.
As an alternative embodiment, above-mentioned first policy entity can be the server for management strategy, such as:ANDSF servers or, WFA servers;Above-mentioned second policy entity can also be the server for management strategy, for example:ANDSF servers or, WFA servers.Wherein, above-mentioned first policy entity and the second policy entity the ANDSF servers that can be two different, can also be two different WFA servers, can be using the first policy entity as ANDSF servers, second policy entity is WFA servers, can be using the first policy entity as WFA servers, the second policy entity is ANDSF servers.
In above-mentioned technical proposal, second policy entity sends the second access information of the target access network of the user equipment of the second policy entity storage to the first policy entity, so that the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The access information that access information after so handling would not be duplicated and conflicted, so as to improve the availability of access information.Fig. 6 is the schematic flow sheet of another access information processing method provided in an embodiment of the present invention, as shown in fig. 6, including:
601st, user equipment is to the first policy entity reporting position information;
602nd, the first policy entity sends the request message for including above-mentioned position requests to the second policy entity;
603rd, the second policy entity is based on above-mentioned positional information selection target access network;
604th, the second policy entity sends the second access information of the target access network of the user equipment of the second policy entity storage to the first policy entity;
605th, the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network;
606th, the first policy entity sends the access information used when the user equipment after above-mentioned determination accesses the target access network to the user equipment. In above-mentioned technical proposal, on the basis of above example, the flow of access information processing is described in more detail, and the access information used when the user equipment after determination is accessed into the target access network is sent to user equipment.At the same time it can also realize the availability for improving access information.It is apparatus of the present invention embodiment below, apparatus of the present invention embodiment is used for the method for performing the realization of the inventive method embodiment one to six, for convenience of description, it illustrate only the part related to the embodiment of the present invention, particular technique details is not disclosed, be refer to the embodiment of the present invention one, embodiment two, is implemented three, example IV, embodiment five and embodiment six.Fig. 7 is a kind of structural representation of policy entity provided in an embodiment of the present invention, as shown in fig. 7, comprises:Acquiring unit 11 and determining unit 12, wherein:
Acquiring unit 11, the second access information of the target access network of the user equipment for obtaining the storage of the second policy entity;
Determining unit 12, for the first access information according to second access information and the target access network of first policy entity storage, determines that the user equipment accesses the access information used during the target access network.
Optionally, above-mentioned target access network can be that one or more access network, i.e. target access network are at least one access network;Above-mentioned first access information and the second access information can be one or more information.
As an alternative embodiment, above-mentioned policy entity can be the server for management strategy, such as:ANDSF servers or, WFA servers;Above-mentioned second policy entity can also be the server for management strategy, for example:ANDSF servers or, WFA servers.Wherein, above-mentioned policy entity and the second policy entity the ANDSF servers that can be two different, can also be two different WFA servers, can be using above-mentioned policy entity as ANDSF servers, second policy entity is WFA servers, can be using above-mentioned policy entity as WFA servers, the second policy entity is ANDSF servers.
In above-mentioned technical proposal, policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;First access information of the target access network that policy entity is stored according to second access information and the policy entity, determines that the user equipment accesses the target access network When the access information that uses.The strategy that strategy after so handling would not be duplicated and conflicted, so as to improve the availability of access information.Fig. 8 is a kind of structural representation of policy entity provided in an embodiment of the present invention, as shown in figure 8, including:Receiving unit 21, acquiring unit 22 and determining unit 23, wherein:
Receiving unit 21, the positional information for receiving the user equipment to report, the positional information is used to select the target access network for the user equipment.
Optionally, above-mentioned position information of user equipment can be used to indicate that the position that user equipment is presently in, and such as above-mentioned position information of user equipment can be the positional information that location information of cell, i.e. user equipment are presently in cell;Or above-mentioned position information of user equipment can be access network mark, i.e. the mark for the network that user equipment is currently accessed, for example:SSID or HESSID or BSSID etc..
Optionally, above-mentioned target access network can be the adjacent cell of cell or access network shown in the position information of user equipment or access network as target access network, that is, at least one access network for meeting position information of user equipment is target access network.
Optionally, above-mentioned position information of user equipment can be an inquiring position information, and above-mentioned target access network is just at least one access network for belonging to indicating positions region shown in the inquiring position information.
Acquiring unit 22, the second access information of the target access network of the user equipment for obtaining the storage of the second policy entity.
As an alternative embodiment, acquiring unit 22 can include:
Selecting unit(It is not drawn into accompanying drawing), for according to the positional information, selecting the target access network,
First transmitting element(It is not drawn into accompanying drawing), the identification information for sending the target access network to second policy entity,
First receiving subelement(It is not drawn into accompanying drawing), for receiving second access information that second policy entity is sent.
In the embodiment, it is possible to achieve select target access network according to above-mentioned positional information by the first policy entity.At least one access network that the position indicated by above-mentioned positional information can be selected to cover is above-mentioned target access network.
As an alternative embodiment, acquiring unit 22 can include: Second transmitting element(It is not drawn into accompanying drawing), for sending the positional information to second policy entity, it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
Second receiving subelement(It is not drawn into accompanying drawing), for receiving second access information that second policy entity is sent.
In the embodiment, it is possible to achieve send above-mentioned positional information from the first policy entity to the second policy entity, and target access network is selected according to above-mentioned positional information by the second policy entity.At least one access network that the position indicated by above-mentioned positional information can be selected to cover is above-mentioned target access network.
Optionally, the first policy entity can also receive the user equipment information of user equipment transmission, and the user equipment information can be comprising at least one of following:
Customer equipment identification and user equipment class information;
The first policy entity can also send above-mentioned user equipment information to the second policy entity in certain embodiment of the present invention, by the second policy entity according to the user equipment information selection target access network or the second access information.
Wherein, above-mentioned customer equipment identification can be the unique mark of user equipment, for example:IMSI, IMEI or MSISDN etc. other can unique mark user equipment mark.
First policy entity or the second policy entity are also an option that at least one applicable access network of the customer equipment identification as above-mentioned target access network.
Wherein, above-mentioned user equipment class information can be the grade for describing the user equipment, for example:Gold, silver and bronze medals user equipment grade, can also be other grades that user side is consulted in advance with network side.
First policy entity or the second policy entity are also an option that at least one applicable access network of the user equipment grade as above-mentioned target access network.Or, the second policy entity is also an option that the applicable access information of the user equipment grade is as the second access information in the access information of above-mentioned target access network;First policy entity is also an option that the applicable access information of the user equipment grade is as the first access information in the access information of above-mentioned target access network;The mapping relations of user equipment grade and access network can be equally pre-set, or user equipment grade and the mapping relations of access information can be pre-set.
Optionally, the second transmitting element(It is not drawn into accompanying drawing)It can be also used for sending inquiry list to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Wherein, above-mentioned inquiry list is used to indicate inquiry content, Wherein, the content can find information and/or strategy, the information that the inquiry list that above-mentioned second access information is selected by the second policy entity from the access information of target access network is inquired about;
Optionally, above-mentioned inquiry list query content can be comprising at least one of following:
The load threshold of access network, the signal strength threshold value of access network, access network it is up in can use bandwidth threshold value, access network it is descending in can use bandwidth threshold value, allow access network type and access network information;
Optionally, first policy entity to second policy entity can also send inquiry list when, the second policy entity may be selected by above-mentioned inquiry list is inquired about in the access information of target access network information as the second access information of the target access network for being sent to the first policy entity;For example, when the information of above-mentioned inquiry list query includes the access network type allowed, the second policy entity may be selected by access network type information in the information of target access network as the second access information of the target access network for being sent to the first policy entity.
Or, the second transmitting element(It is not drawn into accompanying drawing)It can be also used for sending to second policy entity and subscribe to update instruction, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
Optionally, above-mentioned subscription update instruction can be one and subscribe to renewal list, comprising multiple discovery information and/or strategy can be subscribed to, the subscription update instruction is used to indicate that the subscription changed is found that information and/or any subscription strategy are sent to first policy entity as above-mentioned second access information by second policy entity when any subscription finds that information and/or any subscription strategy change in the list of subscription renewal described in second policy entity.
Determining unit 23, for the first access information according to second access information and the target access network of first policy entity storage, determines that the user equipment accesses the access information used during the target access network.
As an alternative embodiment, determining unit 23 can be also used for merging first access information and second access information obtains the user equipment and accesses the access information used during the target access network;
Optionally, above-mentioned merging refers to the second access information adding the first access information, adds and only adds in the absence of what is repeated here certainly, i.e., will be added in the second access information with the unduplicated information of the first access information in the first access information. Optionally, determining unit 23 can also receive the network identity of the above-mentioned target access network of the second policy entity transmission, and the access information comprising the network identity that such determining unit 23 can also define the storage of the first policy entity according to the network identity is above-mentioned second access information.Above-mentioned second access information and the access information comprising the network identity will be merged.
Optionally, when above-mentioned second access information is comprising information is found, determining unit 63 adds the first information in second access information in the discovery information comprising the network identity that the first policy entity is stored;The first information is the storage of the first policy entity comprising above-mentioned network identity(That is the mark of target access network)Discovery information in non-existent information;
Optionally, when above-mentioned second access information includes different system switchover policy, determining unit 63 adds the first policing parameter in second access information in the different system switchover policy comprising above-mentioned network identity that the first policy entity is stored;First policing parameter is non-existent policing parameter in the different system switchover policy comprising the network identity that the first policy entity is stored;
Optionally, when above-mentioned second access information includes different system routing policy, determining unit 63 adds the first policing parameter in second access information in the different system routing policy comprising above-mentioned network identity that the first policy entity is stored;First policing parameter is non-existent policing parameter in the different system routing policy comprising the network identity that the first policy entity is stored.
As an alternative embodiment, determining unit 23 can be also used for selecting the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
Optionally, determining unit 23 can be also used for when the first policy entity can also receive the application scenarios information of the second access information, select the access information used when the high person of priority level accesses the target access network as the user equipment in the first information of first access information and the first information of second access information;
Wherein, the first information is all present in the first access information and the second access information, and application scenarios identical information.The application scenarios can refer to that is, above-mentioned first sub- access information and the second sub- access information are only applicable to roaming service customer suitable for roaming service customer;Or application scenarios can refer to be applied to non-roaming subscriber, i.e., above-mentioned first sub- access information and the second sub- access information are only applicable to non-roaming subscriber.
As an alternative embodiment, first access information, which can include the first of the target access network, finds information, second access information can include the second of the target access network and find to believe Breath;Determining unit 23 can be just to determine finds that information and described first finds information according to described second, determines that the user equipment accesses the discovery information used during the target access network.Or,
First access information can include the first different system switchover policy of the target access network, and second access information can include the second different system switchover policy of the target access network;Determining unit 23 can be just to determine according to the described second different system switchover policy and the first different system switchover policy, determine that the user equipment accesses the different system switchover policy used during the target access network.Or, first access information can include the first different system routing policy of the target access network, and second access information can include the different system routing policy of the target access network.Determining unit 23 can be just to determine according to the described second different system routing policy and the first different system routing policy, determine that the user equipment accesses the different system routing policy used during the target access network.
As a kind of optional implementation, first access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
Optionally, above-mentioned access information can include at least one of following:
It was found that information, different system switchover policy and different system routing policy;
Wherein, the discovery information can be comprising at least one of following:
Type information, IP address type information, the authentication information and application type information supported;The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicating whether must is fulfilled for the information of the minimum up bandwidth value that can be used, and the minimum descending bandwidth value that can be used and indicates whether must to be fulfilled for this minimum descending The information for the bandwidth value that can be used, it is allowed to which the access network type of access and indicating whether must is fulfilled for the information of the access network type for allowing access
For example, it is above-mentioned indicate whether the information for must being fulfilled for the peak load value be indicate peak load value be must be fulfilled for when, then only when user equipment load value be less than the access information in peak load value when can just access the target access network.The up bandwidth value that can be used in lowest signal intensity value, most bottom, the minimum descending bandwidth value that can be used, peak load value are the same, do not illustrate one by one herein.
In above-mentioned technical proposal, the positional information selection target access network according to user equipment to report is realized on the basis of above example, and also achieves a variety of access information processing methods, and the availability for improving access information can be realized.Fig. 9 is a kind of structural representation of policy entity provided in an embodiment of the present invention, as shown in figure 9, including:Acquiring unit 31, determining unit 32, request message receiving unit 33 and access information transmitting element 34, wherein:
Acquiring unit 31, the access information request message for receiving user equipment push;
Determining unit 32, the first access information of the target access network stored according to second access information and first policy entity determines that the user equipment accesses the access information used during the target access network;
Request message receiving unit 33, the access information request message for receiving user equipment push;Access information transmitting element 34, for based on the access information request message, the access information used when at least one access network is selected from the target access network as the final access network of the user equipment, and the user equipment after determination being accessed into the final access network is sent to the user equipment.
Optionally, above-mentioned access information request message includes at least one of following:
Customer equipment identification, customer position information, capability information of user facility, user equipment access information and request strategy type information;Wherein, whether the user equipment access information is supported concurrently to access for instruction user equipment.
Access information transmitting element 34 can just select at least one access network for meeting above-mentioned access information request message as the final access network of the user equipment from above-mentioned target access network, and the access information used when the user equipment after determination is accessed into the final access network is sent to the user equipment.For example:Above-mentioned policy request message includes customer position information, it is possible to selected from target access network is stated At least one access network adjacent with the cell shown in the positional information as the user equipment final access network.
In above-mentioned technical proposal, implemented on the basis of above example, policy entity receives the second access information of the target access network that the second policy entity is actively sent, based on the access information request message, the access information used when at least one access network is selected from the target access network as the final access network of the user equipment, and the user equipment after determination being accessed into the final access network is sent to the user equipment.Simultaneously, it is possible to achieve improve the availability of access information.Figure 10 is a kind of structural representation of policy entity provided in an embodiment of the present invention, as shown in Figure 10, including:Transmitting element 41, wherein:
Transmitting element 41, for the second access information of the target access network that the user equipment that the policy entity is stored is sent to the first policy entity, so that the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
Optionally, the policy entity can also include:
Receiving unit(It is not drawn into accompanying drawing), the positional information for the user equipment that the first policy entity is sent is received for the second policy entity;
Selecting unit(It is not drawn into accompanying drawing), for according to the positional information, second policy entity to select the target access network.
Optionally, policy entity receives the inquiry list that the first policy entity is sent, and second policy entity selects second access information according to the inquiry list from the access information of the target access network;Optionally, policy entity receives the subscription update instruction that the first policy entity is sent, and second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
As an alternative embodiment, above-mentioned first policy entity can be the server for management strategy, such as:ANDSF servers or, WFA servers;Above-mentioned policy entity can also be the server for management strategy, for example:ANDSF servers or, WFA servers.Wherein, above-mentioned first policy entity and above-mentioned policy entity can be two different ANDSF servers or two different WFA servers, can be using the first policy entity as ANDSF servers, and above-mentioned policy entity is WFA servers, can be using the first policy entity as WFA servers, and above-mentioned policy entity is ANDSF servers.
In above-mentioned technical proposal, second access information of the target access network for the user equipment that policy entity is stored to the first policy entity sending strategy entity, so that the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The access information that access information after so handling would not be duplicated and conflicted, so as to improve the availability of access information.Figure 11 is a kind of structural representation of access information processing system provided in an embodiment of the present invention, as shown in figure 11, the first policy entity 51 and the second policy entity 52, wherein:
Second policy entity 52, the second access information of the target access network of the user equipment for sending the storage of the second policy entity to the first policy entity;
First policy entity 51, for receiving the second access information message that the second policy entity is sent, first access information of the target access network stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
In above-mentioned technical proposal, the first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;First access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The strategy that strategy after so handling would not be duplicated and conflicted, so as to improve the availability of access information.Figure 12 is the structural representation of another policy entity provided in an embodiment of the present invention, as shown in figure 12, including:Receiver 61, processor 62 and memory 63, memory 63 are used to store batch processing code, and the program code that processor 62 is used to call memory 63 to store is used to perform following operation:
The second access information of the target access network for the user equipment that the second policy entity is stored is obtained by receiver 61;
First access information of the target access network stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
Optionally, above-mentioned target access network can be one or more access network, i.e. target access network Network is at least one access network;Above-mentioned first access information and the second access information can be one or more information.
It should be noted that above-mentioned policy entity can be the first policy entity as described in preceding embodiment of the method.
As an alternative embodiment, above-mentioned policy entity can be the server for management strategy, such as:ANDSF servers or, WFA servers;Above-mentioned second policy entity can also be the server for management strategy, for example:ANDSF servers or, WFA servers.Wherein, above-mentioned policy entity and the second policy entity the ANDSF servers that can be two different, can also be two different WFA servers, can be using above-mentioned policy entity as ANDSF servers, second policy entity is WFA servers, can be using above-mentioned policy entity as WFA servers, the second policy entity is ANDSF servers.
In above-mentioned technical proposal, policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;First access information of the target access network that policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The access information that access information after so determining would not be duplicated and conflicted, so as to improve the availability of access information.Figure 13 is the structural representation of another policy entity provided in an embodiment of the present invention, as shown in figure 13, including:Receiver 71, processor 72 and memory 73, memory 73 are used to store batch processing code, and the program code that processor 72 is used to call memory 73 to store is used to perform following operation:
The positional information of the user equipment to report is received by receiver 71, the positional information is used to select the target access network for the user equipment;
The second access information of the target access network for the user equipment that the second policy entity is stored is obtained by receiver 71;
First access information of the target access network stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
Optionally, above-mentioned position information of user equipment can be used to indicate that the position that user equipment is presently in, and such as above-mentioned position information of user equipment can be the positional information that location information of cell, i.e. user equipment are presently in cell;Or above-mentioned position information of user equipment can be access network mark, i.e., user equipment currently connects The mark of the network entered, for example:SSID or HESSID or BSSID etc..
Optionally, above-mentioned target access network can be the adjacent cell of cell or access network shown in the position information of user equipment or access network as target access network, that is, at least one access network for meeting position information of user equipment is target access network.
Optionally, above-mentioned position information of user equipment can be an inquiring position information, and above-mentioned target access network is just at least one access network for belonging to indicating positions region shown in the inquiring position information.
It is used as a kind of optional embodiment, above-mentioned policy entity can also include transmitter 74, wherein, the operation of the second access information of the target access network that the user equipment that the second policy entity is stored is obtained by receiver 71 that processor 72 is performed, can include:
According to the positional information, the target access network is selected,
The identification information of the target access network is sent to second policy entity by transmitter 74, second access information that second policy entity is sent is received by receiver 71.
In the embodiment, it is possible to achieve select target access network according to above-mentioned positional information by the first policy entity.At least one access network that the position indicated by above-mentioned positional information can be selected to cover is above-mentioned target access network.
It is used as a kind of optional embodiment, above-mentioned policy entity can also include transmitter 74, wherein, the operation of the second access information of the target access network that the user equipment that the second policy entity is stored is obtained by receiver 71 that processor 72 is performed, can include:
The positional information is sent to second policy entity by transmitter 74, it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
Second access information that second policy entity is sent is received by receiver 71.
In the embodiment, it is possible to achieve send above-mentioned positional information from the first policy entity to the second policy entity, and target access network is selected according to above-mentioned positional information by the second policy entity.At least one access network that the position indicated by above-mentioned positional information can be selected to cover is above-mentioned target access network.
Optionally, processor 72 to second policy entity can also can also send inquiry list by transmitter 74, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Can send above-mentioned inquiry list to the second policy entity together with above-mentioned positional information.
Wherein, above-mentioned inquiry list be used for indicate inquiry content, wherein, the content can be find information and / or strategy, the information that the inquiry list that above-mentioned second access information is selected by the second policy entity from the access information of target access network is inquired about;
Optionally, above-mentioned inquiry list query content can be comprising at least one of following:
The load threshold of access network, the signal strength threshold value of access network, access network it is up in can use bandwidth threshold value, access network it is descending in can use bandwidth threshold value, allow access network type and access network information.
Optionally, processor 72 to second policy entity can also can also send subscription update instruction by transmitter 74, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
Optionally, above-mentioned subscription update instruction can be one and subscribe to renewal list, comprising multiple discovery information and/or strategy can be subscribed to, the subscription update instruction is used to indicate that the subscription changed is found that information and/or any subscription strategy are sent to first policy entity as above-mentioned second access information by second policy entity when any subscription finds that information and/or any subscription strategy change in the list of subscription renewal described in second policy entity.
As an alternative embodiment, user equipment accesses the operation of the access information used during the target access network described in the determination that processor 72 is performed, it can include:
Merge first access information and second access information obtains the user equipment and accesses the access information used during the target access network;
Optionally, above-mentioned merging refers to the second access information adding the first access information, adds and only adds in the absence of what is repeated here certainly, i.e., will be added in the second access information with the unduplicated information of the first access information in the first access information.
As an alternative embodiment, user equipment accesses the operation of the access information used during the target access network described in the determination that processor 72 is performed, it can include:
Merge first access information and second access information obtains the user equipment and accesses the access information used during the target access network;
Optionally, above-mentioned merging refers to the second access information adding the first access information, adds and only adds in the absence of what is repeated here certainly, i.e., will be added in the second access information with the unduplicated information of the first access information in the first access information.
Optionally, when above-mentioned second access information is comprising information is found, processor 72 connects described second The first information entered in information is added in the discovery information comprising the network identity of the first policy entity storage;The first information is the storage of the first policy entity comprising above-mentioned network identity(That is the mark of target access network)Discovery information in non-existent information;
Optionally, when above-mentioned second access information includes different system switchover policy, processor 72 adds the first policing parameter in second access information in the different system switchover policy comprising above-mentioned network identity that the first policy entity is stored;First policing parameter is non-existent policing parameter in the different system switchover policy comprising the network identity that the first policy entity is stored;
Optionally, when above-mentioned second access information includes different system routing policy, processor 72 adds the first policing parameter in second access information in the different system routing policy comprising above-mentioned network identity that the first policy entity is stored;First policing parameter is non-existent policing parameter in the different system routing policy comprising the network identity that the first policy entity is stored.
User equipment accesses the operation of the access information used during the target access network described in the determination that processor 72 is performed, and can include:
It is that the user equipment accesses the access information used during the target access network to select the high person of priority in first access information and second access information.
Optionally, processor 72 can also receive the application scenarios information of the second access information, the high person of priority is the operation that the user equipment accesses the access information used during the target access network in selection first access information and second access information that processor 72 is performed, can be included:
Select the access information used when the high person of priority level accesses the target access network as the user equipment in the first information of first access information and the first information of second access information;Wherein, the first information is all present in the first access information and the second access information, and application scenarios identical information.The application scenarios can refer to that is, above-mentioned first sub- access information and the second sub- access information are only applicable to roaming service customer suitable for roaming service customer;Or application scenarios can refer to be applied to non-roaming subscriber, i.e., above-mentioned first sub- access information and the second sub- access information are only applicable to non-roaming subscriber.
User equipment accesses the operation of the access information used during the target access network described in the determination that processor 72 is performed, and can include:
First policy entity judges the priority level of the second information and the second information in second access information in second access information, and high the second information addition described second of priority level is connect in information. Above-mentioned second information refers to the information all existed in the second access information and the first access information, for example, it was discovered that information and/or policing parameter.
Optionally, first policy entity can also receive the network identity of the target access network of the second policy entity transmission, processor 72 can also be that network identity is matched in the access information for storing the network identity with the first policy entity, regard the access information that the match is successful as the second access information.Processor 72 judges the priority level of the second information and the second information in second access information in second access information again, and high the second information addition described second of priority level is connect in information.
As an alternative embodiment, first access information, which can include the first of the target access network, finds information, second access information can include the second discovery information of the target access network;Processor 72 can be just to determine finds that information and described first finds information according to described second, determines that the user equipment accesses the discovery information used during the target access network.Or,
First access information can include the first different system switchover policy of the target access network, and second access information can include the second different system switchover policy of the target access network;Processor 72 can be just to determine according to the described second different system switchover policy and the first different system switchover policy, determine that the user equipment accesses the different system switchover policy used during the target access network.Or, first access information can include the first different system routing policy of the target access network, and second access information can include the different system routing policy of the target access network.Processor 72 can be just to determine according to the described second different system routing policy and the first different system routing policy, determine that the user equipment accesses the different system routing policy used during the target access network.
As a kind of optional implementation, first access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
Optionally, above-mentioned access information can include at least one of following:
It was found that information, different system switchover policy and different system routing policy; Wherein, the discovery information can be comprising at least one of following:
Type information, IP address type information, the authentication information and application type information supported;The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, allow the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access.
As an alternative embodiment, after the operation for the access information that processor 72 is used when performing and determining that the user equipment accesses the target access network, can be also used for performing following operation:
The access information of above-mentioned determination is sent to the user equipment by transmitter 74.
In above-mentioned technical proposal, the positional information selection target access network according to user equipment to report is realized on the basis of above example, and also achieves a variety of access information processing methods, and the availability for improving access information can be realized.Figure 14 is the structural representation of another policy entity provided in an embodiment of the present invention, as shown in figure 14, including:Receiver 81, processor 82 and memory 83, memory 83 are used to store batch processing code, and the program code that processor 82 is used to call memory 83 to store is used to perform following operation:
Second access information that second policy entity is pushed is received by receiver 81.
First access information of the target access network stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network;The access information request message that user equipment is pushed is received by receiver 81;
Based on the access information request message, the access information used when at least one access network is selected from the target access network as the final access network of the user equipment, and the user equipment after determination being accessed into the final access network is sent to the user equipment.
Optionally, above-mentioned access information request message includes at least one of following: Customer equipment identification, customer position information, capability information of user facility, user equipment access information and request strategy type information;Wherein, whether the user equipment access information is supported concurrently to access for instruction user equipment.
Processor 82 can just select at least one access network for meeting above-mentioned access information request message as the final access network of the user equipment from above-mentioned target access network, and the access information used when the user equipment after determination is accessed into the final access network is sent to the user equipment.For example:Above-mentioned policy request message includes customer position information, it is possible at least one access network adjacent with the cell shown in the positional information is selected from target access network is stated as the final access network of the user equipment.
In above-mentioned technical proposal, implemented on the basis of above example, policy entity receives the second access information of the target access network that the second policy entity is actively sent, based on the access information request message, the access information used when at least one access network is selected from the target access network as the final access network of the user equipment, and the user equipment after determination being accessed into the final access network is sent to the user equipment.Simultaneously, it is possible to achieve improve the availability of access information.Figure 15 is the structural representation of another policy entity provided in an embodiment of the present invention, as shown in figure 15, including:Transmitter 91, processor 92 and memory 93, memory 93 are used to store batch processing code, and the program code that processor 92 is used to call memory 93 to store is used to perform following operation:
The second access information of the target access network for the user equipment that the second policy entity is stored is sent to the first policy entity by transmitter 91, so that the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
It is used as a kind of optional embodiment, above-mentioned policy entity can also include receiver 94, processor 92 is additionally operable to perform following operation before the operation of the second access information for the target access network for sending the user equipment that the second policy entity is stored to the first policy entity by transmitter 91 is performed:
The positional information for the user equipment that the first policy entity is sent is received by receiver 94;
According to the positional information, the target access network is selected.
Optionally, above-mentioned policy entity receives the inquiry list that the first policy entity is sent, and second policy entity selects second access information according to the inquiry list from the access information of the target access network; Optionally, above-mentioned policy entity receives the subscription update instruction that the first policy entity is sent, and second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
As an alternative embodiment, above-mentioned first policy entity can be the server for management strategy, such as:ANDSF servers or, WFA servers;Above-mentioned policy entity can also be the server for management strategy, for example:ANDSF servers or, WFA servers.Wherein, above-mentioned first policy entity and above-mentioned policy entity the ANDSF servers that can be two different, can also be two different WFA servers, can be using the first policy entity as ANDSF servers, above-mentioned policy entity is WFA servers, can be using the first policy entity as WFA servers, the second policy entity is ANDSF servers.
In above-mentioned technical proposal, policy entity sends the second access information of the target access network of the user equipment of the second policy entity storage to the first policy entity, so that the first access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The access information that access information after so handling would not be duplicated and conflicted, so as to improve the availability of access information.Figure 16 is the structural representation of another access information processing system provided in an embodiment of the present invention, as shown in figure 16, including the first policy entity 101 and the second policy entity 102, wherein:
First policy entity 101 can be policy entity in any embodiment in embodiment shown in Figure 12-Figure 14.
Second policy entity 102 can be policy entity in any embodiment in embodiment shown in Figure 15.For example:First policy entity can include:Receiver, processor and memory, memory are used to store batch processing code, and processor is used to call the program code of memory storage to be used to perform following operation:
The second access information of the target access network for the user equipment that the second policy entity is stored is obtained by receiver;
First access information of the target access network stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
For example:Second policy entity can include:Transmitter, processor and memory, memory are used to deposit Batch processing code is stored up, and processor is used to call the program code of memory storage to be used to perform following operation:
The second access information of the target access network for the user equipment that the second policy entity is stored is sent to the first policy entity by transmitter.
In above-mentioned technical proposal, the first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;First access information of the target access network that the first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.The strategy that strategy after so handling would not be duplicated and conflicted, so as to improve the availability of access information.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, computer program is can be by instruct the hardware of correlation to complete, described program can be stored in a computer read/write memory medium, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only memory(Read-Only Memory, ROM) or random access memory(Random Access Memory, abbreviation RAM) etc..
Above disclosure is only preferred embodiment of present invention, can not limit the interest field of the present invention, therefore the equivalent variations made according to the claims in the present invention with this certainly, still belongs to the scope that the present invention is covered.

Claims (1)

  1. Claim
    1st, a kind of access information processing method, it is characterised in that including:
    First policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage;
    First access information of the target access network that first policy entity is stored according to second access information and first policy entity, determines that the user equipment accesses the access information used during the target access network.
    2nd, according to the method described in claim 1, it is characterised in that described to determine that the user equipment accesses the access information used during the target access network, including:
    First policy entity merges first access information and second access information obtains the user equipment and accesses the access information used during the target access network, or,
    First policy entity selects the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
    3rd, method according to claim 1 or 2, it is characterised in that:
    First access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or, first access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
    First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
    4th, method as claimed in claim 3, it is characterised in that:
    Wherein, it is described to find that packet contains at least one in following item:
    Type information, the IP address type information of distribution, the authentication information of support, and application type information;
    The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
    Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, it is allowed to the access network type of access and indicates whether must to be fulfilled at peak load value The information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, it is allowed to the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access.
    5th, according to any described methods of claim 1-4, it is characterised in that methods described further comprises:
    First policy entity receives the positional information of the user equipment to report, and the positional information is used to select the target access network for the user equipment.
    6th, method according to claim 5, it is characterised in that first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage, including:
    According to the positional information, first policy entity selects the target access network, and first policy entity sends the identification information of the target access network to second policy entity;
    First policy entity receives second access information that second policy entity is sent.
    7th, method according to claim 5, it is characterised in that first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage, including:
    First policy entity sends the positional information to second policy entity, and it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
    First policy entity receives second access information that second policy entity is sent.
    8th, method according to claim 7, it is characterized in that, first policy entity also sends inquiry list to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Or, first policy entity also sends subscription update instruction to second policy entity, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
    9th, according to any described methods of claim 1-4, it is characterised in that further comprise:Second policy entity receives the positional information of the user equipment to report, and the positional information is used to select the target access network for the user equipment;
    First policy entity sends the user equipment to second policy entity and accesses the target The access information used during access network.
    10th, according to any described methods of claim 1-4, it is characterised in that first policy entity obtains the second access information of the target access network of the user equipment of the second policy entity storage, including:First policy entity receives second access information that second policy entity is pushed.
    11st, according to any one of claim 1-10 method, it is characterised in that first policy entity includes:
    Access network discovery and selection function ANDSF servers or WiFi alliances WFA servers;Second policy entity includes:
    ANDSF servers or WFA servers.
    12nd, a kind of policy entity, it is characterised in that including:Acquiring unit and determining unit, wherein:The acquiring unit, the second access information of the target access network of the user equipment for obtaining the storage of the second policy entity;
    The determining unit, for the first access information according to second access information and the target access network of policy entity storage, determines that the user equipment accesses the access information used during the target access network.
    13rd, policy entity as claimed in claim 12, it is characterized in that, the determining unit is additionally operable to merge first access information and second access information obtains the user equipment and accesses the access information used during the target access network, or
    The determining unit is additionally operable to select the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
    14th, the policy entity according to claim 12 or 13, it is characterised in that
    First access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or, first access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
    First access information, second access information and the user equipment access the access information used during the target access network includes the different system routing policy of the target access network respectively.
    15th, policy entity according to claim 14, it is characterised in that Wherein, it is described to find that packet contains at least one in following item:
    Type information, the IP address type information of distribution, the authentication information of support, and application type information;
    The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
    Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, allow the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access.
    16th, the policy entity according to any one of claim 12-15, it is characterised in that the policy entity also includes:
    Receiving unit, the positional information for receiving the user equipment to report, the positional information is used to select the target access network for the user equipment.
    17th, policy entity as claimed in claim 16, it is characterised in that the acquiring unit includes:Selecting unit, for according to the positional information, selecting the target access network,
    First transmitting element, the identification information for sending the target access network to second policy entity,
    First receiving subelement, for receiving second access information that second policy entity is sent.
    18th, policy entity as claimed in claim 16, it is characterised in that the acquiring unit includes:Second transmitting element, for sending the positional information to second policy entity, it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,;
    Second receiving subelement, for receiving second access information that second policy entity is sent.
    19th, policy entity according to claim 18, it is characterized in that, second transmitting element is additionally operable to send inquiry list to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Or, second transmitting element, which is additionally operable to send to second policy entity, subscribes to update instruction, so as to second plan Slightly entity selects second access information according to the subscription update instruction from the access information of the target access network.
    20th, the policy entity according to any one of claim 12-15, it is characterised in that the acquiring unit is additionally operable to receive second access information that second policy entity is pushed.
    21st, the policy entity as any one of claim 12-20, it is characterised in that the policy entity includes:
    ANDSF servers or WFA servers;
    Second policy entity includes:
    ANDSF servers or WFA servers.
    22nd, a kind of policy entity, it is characterised in that including:Receiver, processor and memory, the memory are used to store batch processing code, and the processor is used to call the program code of the memory storage to be used to perform following operation:
    The second access information of the target access network for obtaining the user equipment that the second policy entity is stored is received by the receiver;
    First access information of the target access network stored according to second access information and the policy entity, determines that the user equipment accesses the access information used during the target access network.
    23rd, policy entity as claimed in claim 22, it is characterised in that the operation that user equipment described in the determination of the computing device accesses the access information used during the target access network includes:
    Merge first access information and second access information obtains the user equipment and accesses the access information used during the target access network, or,
    First policy entity selects the high person of priority in first access information and second access information to be that the user equipment accesses the access information used during the target access network.
    24th, the policy entity according to claim 22 or 23, it is characterised in that
    First access information, second access information and the user equipment access the access information used during the target access network includes the discovery information of the target access network respectively;Or, first access information, second access information and the user equipment access the access information used during the target access network includes the different system switchover policy of the target access network respectively;Or,
    First access information, second access information and the user equipment access the target and connect Enter the access information used during network includes the different system routing policy of the target access network respectively.
    25th, policy entity according to claim 24, it is characterised in that
    Wherein, it is described to find that packet contains at least one in following item:
    Type information, the IP address type information of distribution, the authentication information of support, and application type information;
    The parameter of the different system switchover policy or the different system routing policy includes at least one in following item:
    Peak load value, lowest signal intensity value, the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used, allow the access network type of access, peak load value and indicate whether must to be fulfilled for the information of the peak load value, lowest signal intensity value and indicate whether must to be fulfilled for the information of the lowest signal intensity value, the minimum up bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum up bandwidth value that can be used, the minimum descending bandwidth value that can be used and indicate whether must to be fulfilled for the information of the minimum descending bandwidth value that can be used, allow the access network type of access and indicate whether must to be fulfilled for the information of the access network type for allowing access.
    26th, the policy entity according to any one of claim 22-25, it is characterised in that the processor is further additionally operable to perform following operation:
    The positional information of the user equipment to report is received by the receiver, the positional information is used to select the target access network for the user equipment.
    27th, policy entity according to claim 26, it is characterized in that, the policy entity also include transmitter, the computing device by the receiver obtain the second policy entity store user equipment target access network the second access information operation, including:
    According to the positional information, the target access network is selected,
    The identification information of the target access network is sent to second policy entity by the transmitter, second access information that second policy entity is sent is received by the receiver.
    28th, policy entity according to claim 26, it is characterized in that, the policy entity also include transmitter, the computing device by the receiver obtain the second policy entity store user equipment target access network the second access information operation, including:
    The positional information is sent to second policy entity by the transmitter, it is that the user equipment selects the target access network that the positional information, which is used for second policy entity,; Second access information that second policy entity is sent is received by the receiver.
    29th, policy entity according to claim 28, it is characterized in that, the processor also sends inquiry list by the transmitter to second policy entity, so that second policy entity selects second access information according to the inquiry list from the access information of the target access network;Or, the processor also sends subscription update instruction by the transmitter to second policy entity, so that second policy entity selects second access information according to the subscription update instruction from the access information of the target access network.
    30th, the policy entity according to any one of claim 22-25, it is characterized in that, the operation of second access information of the target access network that the user equipment that the second policy entity is stored is obtained by the receiver of the computing device, including:
    Second access information that second policy entity is pushed is received by the receiver.
    31st, according to any one of claim 22-30 policy entity, it is characterised in that the policy entity includes:
    Access network discovery and selection function ANDSF servers or WiFi alliances WFA servers;Second policy entity includes:
    ANDSF servers or WFA servers.
CN201380000152.5A 2013-01-22 2013-01-22 Access information processing method, device and system Pending CN104081829A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/070814 WO2014113910A1 (en) 2013-01-22 2013-01-22 Access information processing method, device and system

Publications (1)

Publication Number Publication Date
CN104081829A true CN104081829A (en) 2014-10-01

Family

ID=51226796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380000152.5A Pending CN104081829A (en) 2013-01-22 2013-01-22 Access information processing method, device and system

Country Status (2)

Country Link
CN (1) CN104081829A (en)
WO (1) WO2014113910A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010037422A1 (en) * 2008-10-03 2010-04-08 Nokia Siemens Networks Oy Optimizing andsf information provisioning for multiple-radio terminals
CN101720109A (en) * 2009-06-26 2010-06-02 中兴通讯股份有限公司 System and method for realizing intercommunication and fusion of policy
CN102638871A (en) * 2012-03-31 2012-08-15 南京邮电大学 Access network selection method for virtual terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010037422A1 (en) * 2008-10-03 2010-04-08 Nokia Siemens Networks Oy Optimizing andsf information provisioning for multiple-radio terminals
CN101720109A (en) * 2009-06-26 2010-06-02 中兴通讯股份有限公司 System and method for realizing intercommunication and fusion of policy
CN102638871A (en) * 2012-03-31 2012-08-15 南京邮电大学 Access network selection method for virtual terminal

Also Published As

Publication number Publication date
WO2014113910A1 (en) 2014-07-31

Similar Documents

Publication Publication Date Title
EP2824870B1 (en) Wireless local area network discovery and selection method, device and system, and terminal
CN104918300B (en) Device and method for mobile communication
CN104105166B (en) A kind of mobile terminal looks for the method and mobile terminal of net automatically
CN104067664B (en) Connection control method, base station, user equipment and mobile management entity
US8874710B2 (en) Access network discovery
EP3136800B1 (en) Method for updating rplmn information, and user equipment
CN107172684B (en) Access method and system, user equipment and network side equipment
US9661567B2 (en) Method, apparatus and system for service establishment for multi-mode user equipment
CN103517360A (en) Switching method, system and device
CN102946586A (en) Access network information notification, access method and device based on position information
CN101600157A (en) The cut-in method of sub-district and device, terminal
EP3439363A2 (en) Access point switching method and device
CN104396301A (en) Load balancing method and device
CN105165068A (en) Entity and a method of operating an entity of a wireless local area network
CN104066154A (en) Method for selecting wireless local area network (WLAN) service provider and WLAN, and user equipment (UE)
CN103535060B (en) Method, device and system for processing network sharing
CN104303558A (en) Policy converging method, UE, and server
CN108093404A (en) A kind of information processing method and device
CN101394610A (en) Method and device for realizing network sharing under network gateway core network configuration
US10264137B2 (en) Method and system to control expense and usage of subscriptions in a mobile device
CN107124744B (en) Network switching method and wireless access point
CN103052142A (en) Network selection method, mobile terminal and base station
EP2571308A1 (en) Method, apparatus and system for sending measurement report
CN104247517A (en) Method and device for selecting network at visited location
CN105409288A (en) User management method, corresponding device and system of shared network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141001