CN104521293B - A kind of method, apparatus and terminal of preferably believable WLAN accesses net - Google Patents

A kind of method, apparatus and terminal of preferably believable WLAN accesses net Download PDF

Info

Publication number
CN104521293B
CN104521293B CN201380000953.1A CN201380000953A CN104521293B CN 104521293 B CN104521293 B CN 104521293B CN 201380000953 A CN201380000953 A CN 201380000953A CN 104521293 B CN104521293 B CN 104521293B
Authority
CN
China
Prior art keywords
access
plmn
net
credible
access net
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201380000953.1A
Other languages
Chinese (zh)
Other versions
CN104521293A (en
Inventor
于游洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN104521293A publication Critical patent/CN104521293A/en
Application granted granted Critical
Publication of CN104521293B publication Critical patent/CN104521293B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Abstract

The method netted is accessed an embodiment of the present invention provides a kind of preferably believable WLAN, including:According to the ownership place access network discovery of acquisition and selection function H ANDSF strategies, judge whether target or visited place public land mobile network V PLMN support credible access net;According to judging result, credible access net is obtained;It is target access network to choose the credible access net.The embodiment of the present invention additionally provides a kind of device and terminal of preferably believable WLAN accesses net.Using the present invention, the advantages of believable access net is as target access network specifically can be preferentially selected.

Description

A kind of method, apparatus and terminal of preferably believable WLAN accesses net
Technical field
The present invention relates to field of communication technology more particularly to a kind of preferably believable WLAN access nets method, apparatus and Terminal.
Background technology
In order to cope with the challenge of wireless broad band technology, 3GPP is kept(Third Generation Partnership Project, third generation partner program)The leading superiority of network, 3GPP will have formulated mobile communications network in the end of the year 2004 LTE(Long Term Evolution, long term evolution), under the guidance of this evolution plan, define new mobile communications network Framework can be referred to as the 3GPP packet-switched domains of evolution.New 3GPP core networks not only support 3GPP access technologies, while Non-3 GPP access technology is supported, particularly with the UE for supporting a variety of access technologies(User Equipment, user equipment), UE can To carry out initial network selection by the network selection strategy being configured.
UE is based primarily upon PLMN (Public Land Mobile Network, public land mobile network) in the prior art Information and access network(WLAN(Wireless Local Area Networks, WLAN))Status information carries out target The selection of access point.Wlan network existing for around UE scannings obtains wlan network mark(Such as SSID(Server Set Identifier, service set identification)).The selection of configuration or user of the UE based on operator obtains the excellent of wlan network mark First grade list, then the priority list that the wlan network scanned is identified according to wlan network(That is SSID priority lists)Into Row sorts, and the PLMN corresponding to it is started a query at from the wlan network of highest priority.
However, UE carries out only considered PLMN information and the SSID letters in WLAN during target network selection in the prior art Breath, when there are during believable network access point, UE can not the corresponding net of preferably believable network access point in wlan network deployment Network can not realize the user demand of preferably believable access network, user data access target access network as target access network Security guarantee it is low, user experience effect is low.
Invention content
Method, apparatus and terminal an embodiment of the present invention provides a kind of preferably believable WLAN accesses net is, it can be achieved that excellent User demand of the credible access net as target access network is selected, ensures that secure user data reliably accesses target access network, Improve the user experience effect of user equipment selection target access net.
First aspect of the embodiment of the present invention provides a kind of method of preferably believable WLAN accesses net, may include:
According to the ownership place access network discovery of acquisition and selection function H-ANDSF strategies, judge that target or visited place are public Whether land mobile network V-PLMN supports credible access net altogether;
According to judging result, credible access net is obtained;
It is target access network to choose the credible access net.
With reference to first aspect, in the first possible implementation, it is described according to judging result, obtain credible access Net, including:
When judging result is when being, obtains what is included in visited place access network discovery and selection function V-ANDSF strategies Credible access net.
With reference to first aspect, it is described according to judging result in second of possible realization method, obtain credible access Net, including:
When judging result is no, the credible access net that the H-ANDSF strategies include is obtained.
The first possible realization method with reference to first aspect, in the third possible realization method, the H-ANDSF Strategy is that the first network selection strategy includes:
The PLMN lists of credible access net are supported in roaming relationships list;
It is described to judge whether visited place public land mobile network V-PLMN supports credible access net, including:
Whether judge in the roaming relationships list comprising the V-PLMN.
The third possible realization method with reference to first aspect, in the 4th kind of possible realization method, if described unrestrained It swims and contains the V-PLMN in relation list, then V-PLMN supports credible access net.
The first possible realization method with reference to first aspect, in the 5th kind of possible realization method, first choosing Net strategy includes service provider list, wherein the trusted status comprising PLMN indicates in the service provider list;
It is described to judge whether visited place public land mobile network V-PLMN supports credible access net, including:
The trusted status of the V-PLMN for judging to include in the service provider list is indicated whether to be credible.
5th kind of possible realization method with reference to first aspect, in the 6th kind of possible realization method, if the clothes The trusted status of the V-PLMN included in business provider list is designated as credible, then V-PLMN supports credible access net.
The first possible realization method with reference to first aspect, in the 7th kind of possible realization method, first choosing Net strategy includes the V-PLMN and supports the trusted status instruction of access net;
It is described to judge whether visited place public land mobile network V-PLMN supports credible access net, including:
Judge the trusted status of the access net of the V-PLMN included in the first network selection strategy supports is in indicating No is trusted status.
7th kind of possible realization method with reference to first aspect, in the 8th kind of possible realization method, if described The trusted status of access net that the V-PLMN that is included in one network selection strategy is supported is designated as credible, then V-PLMN is supported credible Access net.
With reference to first aspect to any in the 8th kind of possible realization method of first aspect, in the 9th kind of possible realization It is described to choose the credible net that accesses as target access network in mode, including:
It is the target access network that the credible access net is chosen from access train table, wherein, in the access train The priority of credible access net is higher than the priority of untrusted access net described in table.
The first possible realization method with reference to first aspect, in the tenth kind of possible realization method, the V-ANDSF Strategy is to be further included in the second network selection strategy:The SSID netted, the trusted status instruction of access net are accessed, the access is netted credible State includes:Credible or untrusted;
The credible access net included in V-ANDSF strategies that obtains includes:What is obtained from the V-ANDSF strategies connects Trusted status is designated as the mark of believable access net, as the first preferred access network in networking.
Second of possible realization method with reference to first aspect, in a kind of the tenth possible realization method, the H- ANDSF strategies are that the first network selection strategy includes:The trusted status instruction of the SSID, access net of net are accessed, the access net Trusted status includes:Credible or untrusted;
The credible access net that the acquisition H-ANDSF strategies include includes:Access net is obtained from the H-ANDSF strategies Middle trusted status is designated as the mark of believable access net, as the second preferred access network.
The first possible realization method with reference to first aspect, in the 12nd kind of possible realization method, described first In network selection strategy, further include:Routing iinformation;
The route-type of the routing iinformation, including home domain home-routed routings, local local-breakout roads At least one of by.
12nd kind of possible realization method with reference to first aspect, it is described in the 13rd various possible realization methods Routing iinformation connects for judging whether target access network needs to establish with home domain data gateway PGW, specially:
If the routing iinformation shows that the route-type is route for home-routed, the target access network is judged It needs to establish with the home domain PGW and connect;
If the routing iinformation shows that the route-type is route for local-breakout, the target access is judged Net is connected without being established with the home domain PGW.
13rd kind of possible realization method with reference to first aspect, in the 14th kind of possible realization method, described In two network selection strategies, that is, V-ANDSF strategies, further include:Access net in the second network selection strategy is described with that can connect The PLMN identification informations of PGW.
14th kind of possible realization method with reference to first aspect, it is described to obtain in the 15th kind of possible realization method The credible access net of the V-PLMN included in V-ANDSF strategies is taken, including:
Trusted status in the access net of the V-PLMN is obtained from the V-ANDSF strategies and is designated as believable access net Mark;
Routing iinformation in the first network selection strategy judges whether target access network needs and the home domain PGW Connection is established, if the determination result is YES, then judges that the credible access net in the V-ANDSF strategies is described with that can connect Whether identified in the PLMN identification informations of PGW comprising H-PLMN;
If the credible access net is established in the PLMN identification informations of connection with the PGW and is identified comprising the H-PLMN, The credible access net in the V-ANDSF strategies is then set as the first preferred access network.
With reference to first aspect the tenth kind of possible realization method or a kind of the tenth possible realization method of first aspect or It is any in the 15th kind of possible realization method of person's first aspect, in the 16th kind of possible realization method, described first The priority of preferred access network is higher than the priority of second preferred access network, and the priority of second preferred access network is high In the priority of untrusted access net.
Second aspect of the embodiment of the present invention provides a kind of device of preferably believable WLAN accesses net, may include:
Judgment module for the ownership place access network discovery according to acquisition and selection function H-ANDSF strategies, judges mesh Whether mark or visited place public land mobile network V-PLMN support credible access net;
Acquisition module for the judging result according to the judgment module, obtains credible access net;
Module is chosen, is target access network for choosing the credible access net that the acquisition module is got.
With reference to second aspect, in the first possible implementation, the acquisition module, including:
First acquisition unit, for when the judgment module judging result is to be, obtaining visited place access network discovery With the credible access net included in selection function V-ANDSF strategies;
Second acquisition unit, for when the judgment module judging result is no, obtaining the H-ANDSF strategies and including Credible access net.
The first possible realization method with reference to second aspect, in second of possible realization method, the H-ANDSF Strategy is that the first network selection strategy includes:
The PLMN lists of credible access net are supported in roaming relationships list;
The judgment module is when judging whether visited place public land mobile network V-PLMN supports credible access net, tool Body is used for:Whether judge in the roaming relationships list comprising the V-PLMN.
With reference to second of possible realization method of second aspect, in the third possible realization method, if the roaming The V-PLMN is included in relation list, then V-PLMN supports credible access net.
The first possible realization method with reference to second aspect, in the 4th kind of possible realization method, first choosing Net strategy includes service provider list, wherein the trusted status comprising PLMN indicates in the service provider list;
The judgment module has when judging whether visited place public land mobile network V-PLMN supports credible access net Body is used for:
The trusted status of the V-PLMN for judging to include in the service provider list is indicated whether to be credible.
With reference to the 4th kind of possible realization method of second aspect, in the 5th kind of possible realization method, if the service The trusted status of the V-PLMN included in provider's list is designated as credible, then V-PLMN supports credible access net.
The first possible realization method with reference to second aspect, in the 6th kind of possible realization method, first choosing Net strategy includes the V-PLMN and supports the trusted status instruction of access net;
The judgment module has when judging whether visited place public land mobile network V-PLMN supports credible access net Body is used for:
Judge the V-PLMN included in the first network selection strategy support access net trusted status instruction in whether For trusted status.
With reference to the 6th kind of possible realization method of second aspect, in the 7th kind of possible realization method, if described first It is credible that the V-PLMN included in network selection strategy supports that the trusted status of access net is designated as, then V-PLMN supports credible access Net.
With reference to any in the 7th kind of possible mode of second aspect to second aspect, in the 8th kind of possible realization In mode, the selection module is specifically used for when choosing the credible access net and being target access network:
It is the target access network that the credible access net is chosen from access train table, wherein, in the access train The priority of credible access net is higher than the priority of untrusted access net described in table.
The first possible realization method with reference to second aspect, in the 9th kind of possible realization method, the V-ANDSF Strategy is to be further included in the second network selection strategy:The SSID netted, the trusted status instruction of access net are accessed, the access is netted credible State includes:Credible or untrusted;
The first acquisition unit is specially in the credible access net included in obtaining V-ANDSF strategies:From the V- Trusted status is designated as the mark of believable access net, as the first preferred access network in the access net obtained in ANDSF strategies.
With reference to second of possible realization method of second aspect, in the tenth kind of possible realization method, the H-ANDSF Strategy is that the first network selection strategy includes:Access the trusted status instruction of the SSID, access net of net, the credible shape of the access net State includes:Credible or untrusted;
The second acquisition unit is specific when obtaining the credible access net of the H-PLMN that H-ANDSF strategies include For:The mark that trusted status in access net is designated as believable access net is obtained from the H-ANDSF strategies, as second is excellent Choosing access net.
With reference to second aspect in the first possible realization method, in a kind of the tenth possible realization method, described In one network selection strategy, further include:Routing iinformation;
The route-type of the routing iinformation, including in home-routed routings, local-breakout routings at least one Kind.
With reference to a kind of the tenth possible realization method of second aspect, in the 12nd kind of possible realization method, the road It is connected by information for judging whether target access network needs to establish with home domain PGW, specially:
If the routing iinformation shows that the route-type is route for home-routed, the target access network is judged It needs to establish with the home domain PGW and connect;
If the routing iinformation shows that the route-type is route for local-breakout, the target access is judged Net is connected without being established with the home domain PGW.
With reference to the 12nd kind of possible realization method of second aspect, in the 13rd kind of possible realization method, described In two network selection strategies, that is, V-ANDSF strategies, further include:Access net in the second network selection strategy is described with that can connect The PLMN identification informations of PGW.
With reference to the 13rd kind of possible realization method of second aspect, in the 14th kind of possible realization method, described One acquiring unit includes:
First processing subelement, for obtaining credible shape in the access net of the V-PLMN from the V-ANDSF strategies State is designated as the mark of believable access net;
Whether second processing subelement judges target access network for the routing iinformation in the first network selection strategy It needs to establish with the home domain PGW and connect, if the determination result is YES, then judge the credible access in the V-ANDSF strategies Whether net includes H-PLMN marks with the PLMN identification informations for the PGW that can be connect;
Third handles subelement, in the credible access net and the PLMN identification informations for the PGW that can be connect In comprising the H-PLMN mark when, the credible access net in the V-ANDSF strategies is set as the first preferred access network.
With reference to the 9th kind of possible realization method of second aspect either the tenth kind of possible realization method of second aspect or Any in possible realization method in second aspect the 14th, in the 15th kind of possible realization method, described first is excellent The priority of choosing access net is higher than the priority of second preferred access network, and the priority of second preferred access network is higher than The priority of untrusted access net.
The third aspect of the embodiment of the present invention provides a kind of terminal, may include:
Memory, for storing instruction;
Processor for reading instruction from the memory, and performs following operation according to described instruction:According to acquisition Ownership place access network discovery and selection function H-ANDSF strategy, judge target or visited place public land mobile network V- Whether PLMN supports credible access net, according to judging result, obtains credible access net, and it is target to choose the credible access net Access net.
With reference to the third aspect, in the first possible implementation, for the processor according to judging result, acquisition can It is specifically used for during letter access net:
When judging result is when being, obtains what is included in visited place access network discovery and selection function V-ANDSF strategies Credible access net.
With reference to the third aspect, in second of possible realization method, for the processor according to judging result, acquisition can It is specifically used for during letter access net:
When judging result is no, the credible access net that the H-ANDSF strategies include is obtained.
The first possible realization method with reference to the third aspect, in the third possible realization method, the H-ANDSF Strategy is that the first network selection strategy includes:
The PLMN lists of credible access net are supported in roaming relationships list;
The processor is specific when judging whether visited place public land mobile network V-PLMN supports credible access net For:
Whether judge in the roaming relationships list comprising the V-PLMN.
The third possible realization method with reference to the third aspect, in the 4th kind of possible realization method, if described unrestrained It swims and contains the V-PLMN in relation list, then V-PLMN supports credible access net.
The first possible realization method with reference to the third aspect, in the 5th kind of possible realization method, first choosing Net strategy includes service provider list, wherein the trusted status comprising PLMN indicates in the service provider list;
The processor is specific when judging whether visited place public land mobile network V-PLMN supports credible access net For:
The trusted status of the V-PLMN for judging to include in the service provider list is indicated whether to be credible.
With reference to the 5th kind of possible realization method of the third aspect, in the 6th kind of possible realization method, if the clothes The trusted status of the V-PLMN included in business provider list is designated as credible, then V-PLMN supports credible access net.
The first possible realization method with reference to the third aspect, in the 7th kind of possible realization method, first choosing Net strategy includes the V-PLMN and supports the trusted status instruction of access net;
The processor is specific when judging whether visited place public land mobile network V-PLMN supports credible access net For:
Judge the V-PLMN included in the first network selection strategy support access net trusted status instruction in whether For trusted status.
With reference to the 7th kind of possible realization method of the third aspect, in the 8th kind of possible realization method, if described It is credible that the V-PLMN included in one network selection strategy supports that the trusted status of access net is designated as, then V-PLMN supports credible connect It networks.
With reference to any in the 8th kind of possible realization method of the third aspect to the third aspect, in the 9th kind of possible realization In mode, the processor is specifically used for when choosing the credible access net and being target access network:
It is the target access network that the credible access net is chosen from access train table, wherein, in the access train The priority of credible access net is higher than the priority of untrusted access net described in table.
The first possible realization method with reference to the third aspect, in the tenth kind of possible realization method, the V-ANDSF Strategy is to be further included in the second network selection strategy:The SSID netted, the trusted status instruction of access net are accessed, the access is netted credible State includes:Credible or untrusted;
The processor is specifically used in the credible access net included in obtaining V-ANDSF strategies:From the V-ANDSF The mark that trusted status in access net is designated as believable access net, as the first preferred access network are obtained in strategy.
With reference to second of possible realization method of the third aspect, in a kind of the tenth possible realization method, the H- ANDSF strategies are that the first network selection strategy includes:The trusted status instruction of the SSID, access net of net are accessed, the access net Trusted status includes:Credible or untrusted;
The processor is specifically used for when obtaining the credible access net that H-ANDSF strategies include:From the H-ANDSF plans The slightly middle mark for obtaining trusted status in access net and being designated as believable access net, as the second preferred access network.
The first possible realization method with reference to the third aspect, in the 12nd in possible realization method, described first In network selection strategy, further include:Routing iinformation;
The route-type of the routing iinformation, including in home-routed routings, local-breakout routings at least one Kind.
With reference to the 12nd kind of possible realization method of the third aspect, in the 13rd kind of possible realization method, the road It is connected by information for judging whether target access network needs to establish with home domain PGW, specially:
If the routing iinformation shows that the route-type is route for home-routed, the target access network is judged It needs to establish with the home domain PGW and connect;
If the routing iinformation shows that the route-type is route for local-breakout, the target access is judged Net is connected without being established with the home domain PGW.
With reference to the 13rd kind of possible realization method of the third aspect, in the 14th kind of possible realization method, described In two network selection strategies, that is, V-ANDSF strategies, further include:Access net in the second network selection strategy is described with that can connect The PLMN identification informations of PGW.
With reference to the 14th kind of possible realization method of the third aspect, in the 15th kind of possible realization method, the place Device is managed in the credible access net of the V-PLMN included in obtaining V-ANDSF strategies, is specifically used for:
Trusted status in the access net of the V-PLMN is obtained from the V-ANDSF strategies and is designated as believable access net Mark;
Routing iinformation in the first network selection strategy judges whether target access network needs and the home domain PGW Connection is established, if the determination result is YES, then judges that the credible access net in the V-ANDSF strategies is described with that can connect Whether identified in the PLMN identification informations of PGW comprising H-PLMN;
If the credible access net is marked with including the H-PLMN in the PLMN identification informations for the PGW that can be connect Know, then the credible access net in the V-ANDSF strategies is set as the first preferred access network.The embodiment of the present invention can be according to obtaining The H-ANDSF strategies taken judge whether V-PLMN supports credible access net, and credible access net can preferentially be selected to be accessed as target Network can meet the user demand of preferably believable access network, improve user and search safe and reliable target access network Efficiency, improve search target access network user experience effect.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, for For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is the first embodiment flow signal of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention Figure;
Fig. 2 is the second embodiment flow signal of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention Figure;
Fig. 3 is the first embodiment structural representation of the device of preferably believable WLAN accesses net provided in an embodiment of the present invention Figure;
Fig. 4 is that a structure of the acquisition module of the device of preferably believable WLAN accesses net provided in an embodiment of the present invention is shown It is intended to;
Fig. 5 is the second embodiment structural representation of the device of preferably believable WLAN accesses net provided in an embodiment of the present invention Figure;
Fig. 6 is another structure of the acquisition module of the device of preferably believable WLAN accesses net provided in an embodiment of the present invention Schematic diagram;
Fig. 7 is the example structure schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment shall fall within the protection scope of the present invention.
It is the first embodiment stream of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention referring to Fig. 1 Journey schematic diagram, may include:
S101 according to the ownership place access network discovery of acquisition and selection function H-ANDSF strategies, judges target or visit Whether Public Land Mobile Network network V-PLMN supports credible access net.
S102 according to judging result, obtains credible access net.
S103, it is target access network to choose the credible access net.
In the specific implementation, before user equipment carries out access network selection, elder generation and PGW are needed(Packet Data Gateway, data gateway)Connection is established, the IP address of user equipment is obtained at PGW.User equipment from PGW with getting IP H-ANDSF can be then searched after location(Home Access Network Discovery and Selection Function, return Possession access network discovery and selection function)Server address, and establish IP with above-mentioned H-ANDSF servers and connect.Specifically, User equipment searches the mode of the IP address of H-ANDSF servers, it may include:First the mark static state of H-ANDSF servers is matched It puts in user equipment, the address of H-ANDSF servers is obtained by searching for the static configuration information of H-ANDSF servers, IP is established with H-ANDSF servers to connect;Alternatively, pass through DNS(Domain Name System, domain name system)Whois lookup The IP address of H-ANDSF servers, and establish IP with H-ANDSF servers and connect, etc..The present embodiment is not searched user equipment The scheme of H-ANDSF server address is limited, and the mode that user equipment searches the address of H-ANDSF servers includes but unlimited In above-mentioned lookup mode.
After user equipment establishes connection with H-ANDSF servers, then can send network selection strategy to H-ANDSF servers please Information is sought, to obtain the first network selection strategy of H-ANDSF server dispositions.Specifically, above-mentioned network selection strategy request information, can wrap It includes:The identification information of user equipment(Such as IP), the current location information of user equipment, the ability information of user equipment etc., In, the capability indication information of user equipment is included in the ability information of above-mentioned user equipment, such as user equipment support preferably may be used Instruction information of ability of letter access net etc..H-ANDSF servers receive the network selection strategy request information of user equipment transmission Later, then the first network selection strategy that can be disposed is sent to user equipment, and user equipment obtains H- at H-ANDSF servers Corresponding access network selection operation can be then done after first network selection strategy of ANDSF server dispositions according to the network selection strategy.Tool Body, the first network selection strategy of the H-ANDSF server dispositions that user equipment is got includes:Roaming relationships list, service Provider's list, the instruction of service provider is credible untrusted, V-PLMN(Visited Public Land Mobile Network, visited place public land mobile network)The access net trusted status instruction of deployment, accesses net at the SSID of access net The information such as trusted status instruction, wherein, above-mentioned roaming relationships list is to deploy the PLMN lists of credible access net, is wrapped in list Include one or more V-PLMN marks.The trusted status of above-mentioned access net includes:Credible or untrusted.Specifically, H- For ANDSF servers when disposing the first network selection strategy, the data information in the SSID that can be netted according to each access judges access net Access point it is whether safe and reliable, if judge learn that the access point of the access network is safe and reliable, may indicate that the access net Trusted status is credible;If judgement learns in the information that the access point of the access net includes there is uncertain factor, that is, include not Security information or safety not knowable information when, then the trusted status that may indicate that the access net is untrusted.Service provides Comprising PLMN identification informations in quotient's list, and indicate each PLMN whether it is credible access or untrusted access.Specifically, H-ANDSF servers are when disposing the first network selection strategy, if the access point for judging certain PLMN deployment can refer to for credible access point It is credible to show the PLMN;If judge certain PLMN deployment access point be untrusted access point, may indicate that the PLMN for it is non-can Letter does not give any instruction.
In the specific implementation, when user equipment is in roaming state(Default user of embodiment of the present invention equipment is in roaming State), user equipment also need to search V-ANDSF(Visited Access Network Discovery and Selection Function, visited place access network discovery and selection function)The IP address of server is serviced with V-ANDSF Device establishes IP connections.Specifically, the mode that user equipment searches V-ANDSF servers may include:V- is obtained by dns server IP address of ANDSF servers etc., the mode that the present embodiment does not search user equipment V-ANDSF servers are limited, comprising But it is not limited to above-mentioned lookup mode.User equipment and V-ANDSF servers are established after IP connect, then can be serviced to V-ANDSF Device sends network selection strategy request information, to obtain the second network selection strategy of V-NADSF server dispositions.V-ANDSF servers connect After the network selection strategy request information for receiving user equipment transmission, then the second network selection strategy that can be disposed is sent to user and sets Standby, user equipment can then do corresponding access network selection operation after getting the second network selection strategy according to the network selection strategy.Tool Body, above-mentioned second network selection strategy includes:The information such as the trusted status instruction of SSID, access net of net are accessed, wherein, access Net trusted status includes:Credible or untrusted.Specifically, V-ANDSF servers are when disposing the second network selection strategy, it can root Judge whether the access point of access net is safe and reliable according to the data information in the SSID of each access net, if judging to learn that this connects The access point for entering network is safe and reliable, then the trusted status that may indicate that the access net is credible;If the access net is learnt in judgement Have uncertain factor in the information that access point includes, that is, include non-safety information or safety not knowable information when, then The trusted status that may indicate that the access net is untrusted.
In some feasible embodiments, after user equipment gets the first network selection strategy and the second network selection strategy, The access point of the WLAN of surrounding can be then searched, obtains the access-in point information of the V-PLMN of current roaming, the access including V-PLMN The status information etc. of point SSID, access point.Wherein, the status information of above-mentioned access point includes:The current load value of access point, connects The bandwidth occupancy situation for networking current, the protocol type of access point instruction etc..
It, then can be according to the access point got after user equipment gets the access-in point information of the V-PLMN of current roaming Information carries out target access network selection with reference to the first network selection strategy and the second network selection strategy.Specifically, user equipment is from H- ANDSF servers get the first network selection strategy includes the roaming relationships list of access zone network, which includes one A or multiple V-PLMN marks, then can basis after user equipment gets the access-in point information of the V-PLMN of current roaming Access point identity in the access-in point information judges whether the V-PLMN is included in the roaming relationships list of above-mentioned access zone network In.If judging to learn, the V-PLMN of current roaming is included in the roaming relationships list of above-mentioned access zone network, can determine whether Know that V-PLMN supports credible access net, can preferentially select V-PLMN's from the second network selection strategy of V-ANDSF server dispositions Trusted status is designated as the mark of believable access net in access net, and using the credible access net as the first priority access net. Alternatively, user equipment from H-ANDSF servers get the first network selection strategy include service provider list and it is credible or Untrusted indicates.If the V-PLMN of current roaming is designated as credible access, preferentially from the second choosing of V-ANDSF server dispositions Trusted status is designated as the mark of believable access net in the access net of selection V-PLMN in net strategy, and by the believable access Net is as the first priority access net.If in addition, judge to learn access zone networks of the V-PLMN not in the first network selection strategy In roaming relationships list or V-PLMN is designated as untrusted in service provider list, then can determine whether to learn that the V-PLMN is disposed All access nets be untrusted access net, i.e. all access nets of V-ANDSF server dispositions are untrusted access net, At this point, user equipment searches whether to include credible access net from the first network selection strategy of H-ANDSF server dispositions, obtain Credible access net is as the second preferred access network in first network selection strategy of H-ANDSF server dispositions.It specifically, can be from first The trusted status instruction of each access net of H-ANDSF server dispositions is obtained in network selection strategy, therefrom obtains connecing for H-PLMN Trusted status is designated as the mark of believable access net in networking, and trusted status is designated as believable access net and is set as the Two preferred access networks.
In addition, in some feasible realization methods, it, can also be first from V- when user equipment searches credible access net Obtained in second network selection strategy of ANDSF server dispositions it is each access net mark, and according to it is above-mentioned it is each access net can Whether letter state instruction is judged in above-mentioned second network selection strategy comprising credible access net(I.e. credible state instruction is believable access Net).If judgement learns that the second network selection strategy includes credible access net, according further to H-ANDSF server dispositions The roaming relationships list of access zone network in first network selection strategy judges the V-PLMN marks belonging to above-mentioned believable access net Whether be included in above-mentioned access zone network roaming relationships list in or V-PLMN whether be designated as it is credible, if judging result is It is that the credible access net in the second network selection strategy is then set as the first preferred access network.If the second network selection strategy is learnt in judgement In not include credible access net, i.e., access net all in the second network selection strategy of V-ANDSF server dispositions is untrusted Access net, user equipment then can search believable access net from the first network selection strategy of H-ANDSF server dispositions, by Credible access net in one network selection strategy is set as the second preferred access network.
In some feasible embodiments, user equipment finds the access point of the WLAN of surrounding, and according to access point Status information and the first network selection strategy of the H-ANDSF server dispositions got in advance and V-ANDSF server dispositions The second network selection strategy set the first preferred access network, the second preferred access network and third preferred access network after, then may be used Each access net is subjected to priority ranking, establishes access train table.Wherein, above-mentioned third preferred access network, it may include H- The trusted status of H-ANDSF server dispositions is designated as the access of untrusted in first network selection strategy of ANDSF server dispositions The trusted status of V-ANDSF server dispositions is designated as untrusted in second network selection strategy of net and V-ANDSF server dispositions Access net.Specifically, when user equipment establishes access train table, it is excellent that above-mentioned first preferred access network is set as first first First grade list items assign the credible access net in the second network selection strategy of V-ANDSF server dispositions to highest priority, It is secondary be H-ANDSF server dispositions the first network selection strategy in credible access net, last untrusted access net.I.e. by first Preferred access network is set as accessing the first priority list item in net priority list, and above-mentioned second preferred access network is set For the second priority list item in access net priority list, above-mentioned third preferred access network is set as to access net priority Third priority list items in list.In some feasible embodiments, if the first preferred access network is more than one, i.e. V- Credible access net in second network selection strategy of ANDSF server dispositions is more than one, then can be in the middle part of the second network selection strategy Each access net in first preferred access network is carried out priority ranking by the priority orders of the access net of administration, if second is preferred Access net is more than one, then can will be in the second preferred access network according to the access net priority orders disposed in the first network selection strategy Each access net carry out priority ranking, if likewise, third priority access net it is more than one, can be according to the first network selection Strategy or the second network selection strategy in dispose access net priority orders by each access net in third preferred access network into Row major grade sorts.For example, if the credible access net in the second network selection strategy of V-ANDSF server dispositions is more than one, i.e., First preferred access network is more than one, for example, comprising tri- credible access nets of A, B, C, and V-ANDSF disposes the second network selection plan When slightly according to the access three-point state information of each access net, for example, when getting the access net access net access point it is current The current bandwidth occupancy situation of load value, access point or the information such as protocol type of access point instruction will access net A, B, C into Priority of having gone is ordered as A highest priorities, is secondly B, is finally C, then when user equipment establishes access train table, then may be used Access net A, B, C are ranked up according to the priority orders disposed in the second network selection strategy, i.e. access nets the priority of A most Height, then be B, it is finally C, and access the priority of priority each access net higher than in the second preferred access network of net C.Together Each access net in second preferred access network and third preferred access network can also be carried out priority ranking by reason, establish access Train table.
It, then can be according to access train after user equipment establishes access train table in some feasible embodiments Access net priority orders in table judge whether each access net can be with highest priority in PLMN priority lists successively PLMN connections.Specifically, user, which sets, standby the PLMN priority lists for obtaining static state is configured based on operator, the PLMN is excellent First grade list can static storage in user equipment, operator can also pass through I-WLAN MO(Interworking-WLAN Management Object, I-WLAN management entities)Or ANDSF servers are sent to user equipment.User equipment is excellent from highest The access net of first grade starts to judge whether the access net of highest priority can establish connection with the PLMN of highest priority, if sentencing Disconnected result is yes, then can above-mentioned access net be set as the final target access network of user equipment, otherwise continue to search for priority Whether other relatively low access nets can be established with the PLMN of highest priority connects, until being connected to highest priority PLMN.If all access nets in access train table not can connect to the PLMN of highest priority, from highest priority Access net start, judge highest priority access net whether can with the PLMN of secondary high priority establish connect, if judge As a result it is yes, then above-mentioned access net is set as to the target access network of user equipment, otherwise continues to search for relatively low its of priority He accesses whether net can establish connection with the PLMN of secondary high priority, so recycles, until finding final target access network Network.
The present embodiment can be according to the of the second network selection strategy of V-ANDSF server dispositions and H-ANDSF server dispositions The roaming relationships list of one network selection strategy and the access zone network in the first network selection strategy or the credible instructions of PLMN are selected credible The access net that selects as priority of access net, can also will be selected credible access net carry out priority ranking, preferred priority Higher access net has ensured that secure user data reliably accesses target network, has saved user and set as target access network The time of alternative access net enhances the user experience effect of user equipment selection target access net.
It is the second embodiment stream of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention referring to Fig. 2 Journey schematic diagram, may include:
S201 according to the H-ANDSF of acquisition strategies, judges whether V-PLMN supports credible access net, if judging result is It is then to perform step S202, if judging result is no, performs step S203.
S202 obtains the mark that trusted status in access net is designated as believable access net from the V-ANDSF strategies.
S203 obtains the mark that trusted status in access net is designated as believable access net from the H-ANDSF strategies, And the access net is set as the second preferred access network.
S204, the routing iinformation in the first network selection strategy judge whether target access network needs and the home domain PGW establishes connection, if the determination result is YES, then performs step S205.
S205, judge credible access net in V-ANDSF strategies in the PLMN identification informations for the PGW that can be connect Whether identified comprising H-PLMN, if the determination result is YES, then perform step S206.
S206, if the credible access net is with including the H- in the PLMN identification informations for the PGW that can be connect PLMN is identified, then the credible access net in the V-ANDSF strategies is set as the first preferred access network.
S207, it is the target access network that the credible access net is chosen from access train table.
In the specific implementation, before user equipment carries out access network selection, elder generation is needed to be established with PGW and is connected, is obtained at PGW The IP address of user equipment.User equipment can then search H-ANDSF server address after getting IP address from PGW, and with Above-mentioned H-ANDSF servers establish IP connections.Specifically, user equipment searches the mode of the IP address of H-ANDSF servers, it can Including:First by the mark static configuration to user equipment of H-ANDSF servers, by searching for the static state of H-ANDSF servers Configuration information obtains the address of H-ANDSF servers, and to establish IP with H-ANDSF servers connect;Alternatively, pass through DNS service Device searches the IP address of H-ANDSF servers, and establishes IP with H-ANDSF servers and connect, etc..The present embodiment does not set user The scheme for future reference for looking for H-ANDSF server address is limited, and the mode that user equipment searches the address of H-ANDSF servers includes But it is not limited to above-mentioned lookup mode.
After user equipment establishes connection with H-ANDSF servers, then can send network selection strategy to H-ANDSF servers please Information is sought, to obtain the first network selection strategy of H-ANDSF server dispositions.Specifically, above-mentioned network selection strategy request information, can wrap It includes:The identification information of user equipment(Such as IP), the current location information of user equipment, the ability information of user equipment etc., In, the capability indication information of user equipment is included in the ability information of above-mentioned user equipment, such as user equipment support preferably may be used Instruction information of ability of letter access net etc..H-ANDSF servers receive the network selection strategy request information of user equipment transmission Later, then the first network selection strategy that can be disposed is sent to user equipment, and user equipment obtains H- at H-ANDSF servers Corresponding access network selection operation can be then done after first network selection strategy of ANDSF server dispositions according to the network selection strategy.Tool Body, the first network selection strategy of the H-ANDSF server dispositions that user equipment is got includes:Roaming relationships list, service Provider's list, service provider is credible, and untrusted indicates, the instruction of access net trusted status, the access of V-PLMN deployment are netted The information such as the trusted status instruction that SSID, access are netted, wherein, above-mentioned roaming relationships list is to deploy the PLMN of credible access net List, list include one or more V-PLMN marks.The trusted status of above-mentioned access net includes:It is credible or it is non-can Letter.Specifically, H-ANDSF servers, when disposing the first network selection strategy, the data in the SSID that can be netted according to each access are believed Breath judges whether the access point of access net is safe and reliable, if judging to learn that the access point of the access network is safe and reliable, can refer to The trusted status for showing the access net is credible;If judgement learn in the information that the access point of the access net includes have it is uncertain because Element, that is, include non-safety information or safety not knowable information when, then it is non-for may indicate that the trusted status of the access net It is credible.Comprising PLMN identification informations in above-mentioned service provider list, and each PLMN is indicated its whether be credible access or Untrusted accesses.Specifically, H-ANDSF servers are when disposing the first network selection strategy, if judging the access point of certain PLMN deployment For credible access point, then it is credible for may indicate that the PLMN;If the access point for judging certain PLMN deployment is untrusted access point, The PLMN be may indicate that as untrusted or do not give any instruction.In addition, the route-type of above-mentioned routing iinformation, including:home- Routed is route, and local-breakout routings etc., routing iinformation user judges whether target access network needs and home domain PGW establishes connection, specially:If the routing iinformation shows that the route-type for home-routed, can determine whether target access network It needs to establish with home domain PGW and connect;If the routing iinformation shows that the route-type is route for local-breakout, can sentence The access net that sets the goal is connected without being established with home domain PGW.
In the specific implementation, when user equipment is in roaming state(Default user of embodiment of the present invention equipment is in roaming State), user equipment also need to search V-ANDSF servers IP address, establish IP with V-ANDSF servers and connect.Specifically , the mode that user equipment searches V-ANDSF servers may include:The IP of V-ANDSF servers is obtained by dns server Location etc., the mode that the present embodiment does not search user equipment V-ANDSF servers is limited, including but not limited to above-mentioned lookup side Formula.User equipment and V-ANDSF servers are established after IP connect, then can send network selection strategy request to V-ANDSF servers Information, to obtain the second network selection strategy of V-NADSF server dispositions.V-ANDSF servers receive user equipment transmission After network selection strategy request information, then the second network selection strategy that can be disposed is sent to user equipment, and user equipment is got Corresponding access network selection operation can be then done after second network selection strategy according to the network selection strategy.Specifically, above-mentioned second network selection Strategy includes:The information such as the trusted status instruction of SSID, access net of net are accessed, wherein, access net trusted status includes:It can Letter or untrusted.Specifically, the SSID that V-ANDSF servers when disposing the second network selection strategy, can be netted according to each access In data information judge access net access point it is whether safe and reliable, if judge learn the access network access point safety Reliably, then the trusted status that may indicate that the access net is credible;If judgement is learnt in the information that the access point of the access net includes Have uncertain factor, that is, include non-safety information or safety not knowable information when, then may indicate that the access net can Letter state is untrusted.In addition, in above-mentioned second network selection strategy, further include:Believable access net in second network selection strategy(The One access net)The PLMN identification informations of connection are established with PGW, which shows belonging to the PGW that the access net can connect PLMN information.
In some feasible embodiments, after user equipment gets the first network selection strategy and the second network selection strategy, The access point of the WLAN of surrounding can be then searched, obtains the access-in point information of the V-PLMN of current roaming, the access including V-PLMN The status information etc. of point SSID, access point.Wherein, the status information of above-mentioned access point includes:The current load value of access point, connects The bandwidth occupancy situation for networking current, the protocol type of access point instruction etc..
In some feasible embodiments, user equipment get the V-PLMN of current roaming access-in point information it Afterwards, then can target access network choosing be carried out with reference to the first network selection strategy and the second network selection strategy according to the access-in point information got It selects.Specifically, user equipment from H-ANDSF servers get the first network selection strategy include access zone network roaming close Series of tables, the list include one or more V-PLMN marks, and user equipment gets connecing for the V-PLMN of current roaming After access point information, then it can judge whether the V-PLMN is included in above-mentioned visit according to the access point identity in the access-in point information In the roaming relationships list of ground network.If judging to learn, the V-PLMN of current roaming is included in the roaming pass of above-mentioned access zone network In series of tables, then it can determine whether to learn that V-PLMN supports credible access net, it can be preferentially from the second network selection of V-ANDSF server dispositions Trusted status in the access net of V-PLMN is selected to be designated as the mark of believable access net in strategy, and the credible access net is made For the first priority access net.Alternatively, user equipment from H-ANDSF servers get the first network selection strategy includes service and carries For quotient's list and the instruction of credible or untrusted.If the V-PLMN of current roaming is designated as credible access, preferentially from V-ANDSF Trusted status in the access net of V-PLMN is selected to be designated as the mark that believable access is netted in second network selection strategy of server disposition Know.Specifically, after selecting the credible access net in the second network selection strategy, it can also be according to the routing iinformation in the first network selection strategy Judge whether target access network needs to establish with home domain PGW to connect, institute's judging result is yes, then can further judge the second choosing Whether the credible access net in net strategy is established in the PLMN identification informations of connection with PGW and is identified comprising H-PLMN, if including H- PLMN is identified, then shows that the credible access net in the second network selection strategy can be directly connected to home domain PGW, then can be by the second choosing Credible access net in net strategy is set as the first preferred access network, otherwise shows that the credible access net cannot connect home domain PGW, then not as preferred access network.If in addition, judge to learn access zone networks of the V-PLMN not in the first network selection strategy In roaming relationships list or V-PLMN is designated as untrusted in service provider list, then can determine whether to learn the V-PLMN portions All access nets of administration are untrusted access net, i.e. all access nets of V-ANDSF server dispositions are connecing for untrusted It networks, at this point, user equipment searches whether to include believable access from the first network selection strategy of H-ANDSF server dispositions Net, obtain H-ANDSF server dispositions the first network selection strategy in it is credible access net as the second preferred access network.Specifically, The trusted status instruction of each access net of H-ANDSF server dispositions can be obtained from the first network selection strategy, therefrom obtains H- Trusted status is designated as the mark of believable access net in the access net of PLMN, and trusted status is designated as believable access net It is set as the second preferred access network.
In addition, in some feasible realization methods, it, can also be first from V- when user equipment searches believable access net Obtained in second network selection strategy of ANDSF server dispositions it is each access net mark, and according to it is above-mentioned it is each access net can Whether letter state instruction is judged in above-mentioned second network selection strategy comprising credible access net(I.e. credible state instruction is believable access Net).If judgement learns that the second network selection strategy includes credible access net, according further to H-ANDSF server dispositions Access zone network roaming relationships list in first network selection strategy judges the access of the V-PLMN belonging to above-mentioned believable access net Whether point identification is included in the roaming relationships list of above-mentioned access zone network or whether V-PLMN is credible access, if judging knot Fruit is yes, then the believable access net in the second network selection strategy is set as the first preferred access network(Assuming that first access net with PGW is established in the PLMN identification informations of connection and is identified comprising H-PLMN, and specific deterministic process can refer to the judgement description of the preceding paragraph, Details are not described herein).If judgement, which is learnt, does not include believable access net, i.e. V-ANDSF server dispositions in the second network selection strategy The second network selection strategy in all access net be untrusted access net, user equipment then can be from H-ANDSF server dispositions The first network selection strategy in search credible access net, the credible access net in the first network selection strategy is set as the second preferred access Net.
In some feasible embodiments, user equipment finds the access point of the WLAN of surrounding, and according to access point Status information and the first network selection strategy of the H-ANDSF server dispositions got in advance and V-ANDSF server dispositions The second network selection strategy set the first preferred access network, the second preferred access network and third preferred access network after, then may be used Each access net is subjected to priority ranking, establishes access net priority list.Wherein, above-mentioned third preferred access network, can wrap The trusted status for including the H-ANDSF server dispositions in the first network selection strategy of H-ANDSF server dispositions is designated as untrusted Access net and V-ANDSF server dispositions the second network selection strategy in V-ANDSF server dispositions trusted status instruction Access net for untrusted.Specifically, when user equipment establishes access train table, above-mentioned first preferred access network is set first For the first priority list item, i.e., assign the credible access net in the second network selection strategy of V-ANDSF server dispositions to highest Priority, secondly the credible access net in the first network selection strategy of H-ANDSF server dispositions, the access of last untrusted Net.The first preferred access network is set as to access the first priority list item in train table, by the above-mentioned second preferred access Net is set as accessing the second priority list item in train table, and above-mentioned third preferred access network is set as accessing in train table Third priority list items.In some feasible embodiments, if the first preferred access network is more than one, i.e. V-ANDSF Credible access net in second network selection strategy of server disposition is more than one, then can be connect according to what is disposed in the second network selection strategy Each access net in first preferred access network is carried out priority ranking by the priority orders of networking, if the second preferred access network It is more than one, then it can will be each in the second preferred access network according to the access net priority orders disposed in the first network selection strategy Access net carries out priority ranking, if likewise, third priority access net is more than one, can according to the first network selection strategy or The access net priority orders disposed in person's the second network selection strategy are by each access net in third preferred access network into row major Grade sequence.For example, if the credible access net in the second network selection strategy of V-ANDSF server dispositions is more than one, i.e., first is excellent Choosing access net is more than one, for example, comprising tri- credible access nets of A, B, C, and root during V-ANDSF the second network selection strategies of deployment The access point of the access net current load when accessing the access three-point state information of net according to each, such as getting the access net The information such as the current bandwidth occupancy situation of value, access point or the protocol type of access point instruction will access net A, B, C and carry out Priority is ordered as A highest priorities, is secondly B, is finally C, then when user equipment establishes access train table, then can will connect Networking A, B, C are ranked up according to the priority orders disposed in the second network selection strategy, i.e. the highest priority of access net A, then It is B, is finally C, and accesses the priority of priority each access net higher than in the second preferred access network of net C.Similarly Can each access net in the second preferred access network and third preferred access network be subjected to priority ranking, establish access train Table.In addition, in the first network selection strategy of H-ANDSF server dispositions routing iinformation instruction home-routed routing or Person home-routed route with local-breakout routing can with when, can according to the second of V-ANDSF server dispositions choosing The PLMN identification informations of the first access net and PGW foundation connections in net strategy are deleted in credible access net not comprising H- PLMN is identified, i.e., cannot connect the believable access net of home domain PGW.
It, then can be according to access train after user equipment establishes access train table in some feasible embodiments Access net priority orders in table judge whether each access net can be with highest priority in PLMN priority lists successively PLMN connections.Specifically, configuration of the user equipment based on operator obtains static PLMN priority lists, the PLMN is preferential Grade list can static storage in user equipment, operator also can be sent to user by I-WLAN MO or ANDSF servers and set It is standby.User equipment judges whether the access net of highest priority can be with highest priority since the access net of highest priority PLMN establish connection, if the determination result is YES, then above-mentioned access net can be set as the final target access network of user equipment, Otherwise continue to search for whether other relatively low access nets of priority can establish connection with the PLMN of highest priority, until connection To the PLMN of highest priority.If all access nets in access train table not can connect to the PLMN of highest priority, Whether then since the access net of highest priority, judging the access net of highest priority can build with the PLMN of secondary high priority Above-mentioned access net, if the determination result is YES, is then set as the target access network of user equipment, otherwise continued to search for excellent by vertical connection Whether other relatively low access nets of first grade can be established with the PLMN of secondary high priority connects, and so recycles, final until finding Target access network.Or it using the access net of highest priority as target access network, is directly accessed.
The present embodiment can be according to the of the second network selection strategy of V-ANDSF server dispositions and H-ANDSF server dispositions The roaming relationships list of one network selection strategy and the access zone network in the first network selection strategy or V-PLMN is credible or untrusted refers to Show the access net that selected believable access net selects as priority, can also selected credible access net be subjected to priority ranking, The higher access net of preferred priority has ensured that secure user data reliably accesses target network as target access network, and And it can ensure that the access point of target access network supports home domain data gateway in the case where user equipment carries out the scene of home domain routing Connection, avoid access network reselection, save user equipment selection access net time, enhance user equipment selection target Access the user experience effect of net.
It is the first embodiment knot of the device of preferably believable WLAN accesses net provided in an embodiment of the present invention referring to Fig. 3 Structure schematic diagram.The device of preferred believable WLAN accesses net described in the present embodiment, including:
Judgment module 10 for the ownership place access network discovery according to acquisition and selection function H-ANDSF strategies, judges Whether target or visited place public land mobile network V-PLMN support credible access net.
Acquisition module 20 for the judging result according to the judgment module, obtains credible access net.
Module 30 is chosen, is target access network for choosing the credible access net that the acquisition module is got.
Wherein, acquisition module 20(Such as Fig. 4), including:
First acquisition unit 21, for being sent out in the judgment module judging result when being, to obtain visited place access network Now with the credible access net that is included in selection function V-ANDSF strategies.
Second acquisition unit 22, for when the judgment module judging result is no, obtaining the H-ANDSF strategies packet The credible access net contained.
In the specific implementation, concretely user sets the device of preferred believable WLAN access net described in the present embodiment It is standby etc..Before user equipment carries out access network selection, elder generation is needed to be established with PGW and is connected, the IP of user equipment is obtained at PGW Location.User equipment can then search H-ANDSF server address after getting IP address from PGW, and be serviced with above-mentioned H-ANDSF Device establishes IP connections.Specifically, user equipment searches the mode of the IP address of H-ANDSF servers, it may include:First by H- In the mark static configuration to user equipment of ANDSF servers, obtained by searching for the static configuration information of H-ANDSF servers The address of H-ANDSF servers is taken, establishing IP with H-ANDSF servers connect;Alternatively, H-ANDSF is searched by dns server The IP address of server, and establish IP with H-ANDSF servers and connect, etc..The present embodiment does not search H-ANDSF to user equipment The scheme of server address is limited, and user equipment searches the mode of the address of H-ANDSF servers including but not limited to above-mentioned Lookup mode.
After user equipment establishes connection with H-ANDSF servers, then can send network selection strategy to H-ANDSF servers please Information is sought, to obtain the first network selection strategy of H-ANDSF server dispositions.Specifically, above-mentioned network selection strategy request information, can wrap It includes:The identification information of user equipment(Such as IP), the current location information of user equipment, the ability information of user equipment etc., In, the capability indication information of user equipment is included in the ability information of above-mentioned user equipment, such as user equipment support preferably may be used Instruction information of ability of access net of letter etc..H-ANDSF servers receive the network selection strategy request letter of user equipment transmission After breath, then the first network selection strategy that can be disposed is sent to user equipment, and user equipment obtains at H-ANDSF servers Corresponding access network selection operation can be then done after first network selection strategy of H-ANDSF server dispositions according to the network selection strategy. Specifically, the first network selection strategy of the H-ANDSF server dispositions that user equipment is got includes:Roaming relationships list, clothes The list of business provider, service provider is credible, and untrusted indicates, the access net trusted status instruction of V-PLMN deployment, accesses what is netted The information such as the trusted status instruction that SSID, access are netted, wherein, above-mentioned roaming relationships list is to deploy the PLMN of credible access net List, list include one or more V-PLMN marks.The trusted status of above-mentioned access net includes:It is credible or it is non-can Letter.Specifically, H-ANDSF servers, when disposing the first network selection strategy, the data in the SSID that can be netted according to each access are believed Breath judges whether the access point of access net is safe and reliable, if judging to learn that the access point of the access network is safe and reliable, can refer to The trusted status for showing the access net is credible;If judgement learn in the information that the access point of the access net includes have it is uncertain because Element, that is, include non-safety information or safety not knowable information when, then it is non-for may indicate that the trusted status of the access net It is credible.Comprising PLMN identification informations in above-mentioned service provider list, and each PLMN is indicated its whether be credible access or Untrusted accesses.Specifically, H-ANDSF servers are when disposing the first network selection strategy, if judging the access point of certain PLMN deployment For credible access point, then it is credible for may indicate that the PLMN;If the access point for judging certain PLMN deployment is untrusted access point, The PLMN be may indicate that as untrusted or do not give any instruction.
In the specific implementation, when user equipment is in roaming state(Default user of embodiment of the present invention equipment is in roaming State), user equipment also need to search V-ANDSF servers IP address, establish IP with V-ANDSF servers and connect.Specifically , the mode that user equipment searches V-ANDSF servers may include:The IP of V-ANDSF servers is obtained by dns server Location etc., the mode that the present embodiment does not search user equipment V-ANDSF servers is limited, including but not limited to above-mentioned lookup side Formula.User equipment and V-ANDSF servers are established after IP connect, then can send network selection strategy request to V-ANDSF servers Information, to obtain the second network selection strategy of V-NADSF server dispositions.V-ANDSF servers receive user equipment transmission After network selection strategy request information, then the second network selection strategy that can be disposed is sent to user equipment, and user equipment is got Corresponding access network selection operation can be then done after second network selection strategy according to the network selection strategy.Specifically, above-mentioned second network selection Strategy includes:The information such as the trusted status instruction of SSID, access net of net are accessed, wherein, access net trusted status includes:It can Letter or untrusted.Specifically, the SSID that V-ANDSF servers when disposing the second network selection strategy, can be netted according to each access In data information judge access net access point it is whether safe and reliable, if judge learn the access network access point safety Reliably, then the trusted status that may indicate that the access net is credible;If judgement is learnt in the information that the access point of the access net includes Have uncertain factor, that is, include non-safety information or safety not knowable information when, then may indicate that the access net can Letter state is untrusted.
In some feasible embodiments, after user equipment gets the first network selection strategy and the second network selection strategy, The access point of WLAN around can then being searched by its judgment module 10 obtains the access-in point information of the V-PLMN of current roaming, Status information of access point SSID, access point including V-PLMN etc..Wherein, the status information of above-mentioned access point includes:Access Current bandwidth occupancy situation, the protocol type of access point instruction etc. are netted in the current load value of point, access.
In some feasible embodiments, user equipment get the V-PLMN of current roaming access-in point information it Afterwards, then can target access network choosing be carried out with reference to the first network selection strategy and the second network selection strategy according to the access-in point information got It selects.Specifically, user equipment from H-ANDSF servers get the first network selection strategy include access zone network roaming close Series of tables, the list include one or more V-PLMN marks, and the judgment module 10 of user equipment gets current roaming V-PLMN access-in point information after, then can judge whether the V-PLMN wraps according to the access point identity in the access-in point information It is contained in the roaming relationships list of above-mentioned access zone network.If the judgement of judgment module 10 learns that the V-PLMN of current roaming is included in In the roaming relationships list of above-mentioned access zone network, then it can determine whether to learn that V-PLMN supports credible access net, it can be by obtaining mould First acquisition unit 21 in block 20 preferentially selects the access of V-PLMN from the second network selection strategy of V-ANDSF server dispositions Trusted status is designated as the mark of believable access net in net, and using the credible access net as the first priority access net.In addition, If the judgement of judgment module 10 is learnt in the roaming relationships list of access zone networks of the V-PLMN not in the first network selection strategy, All access nets that can determine whether to learn V-PLMN deployment are untrusted access net, i.e., V-ANDSF server dispositions is all Access net is untrusted access net, at this point, then the second acquisition unit 22 in acquisition module 20 takes user equipment from H-ANDSF It searches whether to include credible access net in first network selection strategy of business device deployment, obtains the first of H-ANDSF server dispositions Credible access net is as the second preferred access network in network selection strategy.Specifically, it can be obtained by second in acquisition module 20 single Member 22 obtains the trusted status instruction of each access net of H-ANDSF server dispositions from the first network selection strategy, therefrom obtains Trusted status is designated as the mark of believable access net in the access net of H-PLMN, and trusted status in the first network selection strategy is referred to It is shown as believable access net and is set as the second preferred access network.It is preferably connect in the specific implementation, how acquisition module 20 selectes first It networks and the realization process of the second preferred access network can be found in preferably believable WLAN accesses net provided in an embodiment of the present invention Step S101-S103 in the first embodiment of method, details are not described herein.
In addition, in some feasible realization methods, when user equipment searches credible access net, it can also pass through judgment module 10 obtain the mark of each access net, and according to above-mentioned each from the second network selection strategy of V-ANDSF server dispositions first Whether the trusted status instruction of access net is judged in above-mentioned second network selection strategy comprising credible access net(I.e. credible state instruction is Believable access net).If judgement learns that the second network selection strategy includes credible access net V-PLMN, according further to H- The roaming relationships list of access zone network in first network selection strategy of ANDSF server dispositions judges above-mentioned believable access net The access point identity of V-PLMN whether be included in above-mentioned access zone network roaming relationships list or V-PLMN whether be designated as can Letter if the determination result is YES, then can obtain credible access net by the first acquisition unit 21 in acquisition module 20, and by second Credible access net in network selection strategy is set as the first preferred access network.If the judgement of judgment module 10 is learnt in the second network selection strategy Do not include believable access net, i.e., access net all in the second network selection strategy of V-ANDSF server dispositions is untrusted Access net, user equipment can then be looked by second acquisition unit 22 from the first network selection strategy of H-ANDSF server dispositions Credible access net is looked for, the credible access net in the first network selection strategy is set as the second preferred access network.It for details, reference can be made to this hair Step S101-S103 in the first embodiment of the method for preferred believable WLAN accesses net that bright embodiment provides, herein not It repeats again.
In some feasible embodiments, user equipment finds the access point of the WLAN of surrounding, and according to access point Status information and the first network selection strategy of the H-ANDSF server dispositions got in advance and V-ANDSF server dispositions The second network selection strategy set the first preferred access network, the second preferred access network and third preferred access network after, then may be used Each access net is subjected to priority ranking, establishes access train table.Wherein, above-mentioned third preferred access network, it may include H- The trusted status of H-ANDSF server dispositions in first network selection strategy of ANDSF server dispositions is designated as connecing for untrusted Networking, it is non-to be designated as with the trusted status of the V-ANDSF server dispositions in the second network selection strategy of V-ANDSF server dispositions Believable access net.Specifically, when user equipment establishes access train table, above-mentioned first preferred access network is set as the first It is preferential to assign the credible access net in the second network selection strategy of V-ANDSF server dispositions to highest for one priority list item Grade, secondly the credible access net in the first network selection strategy of H-ANDSF server dispositions, last untrusted access net.I.e. First preferred access network is set as to access the first priority list item in net priority list, by the above-mentioned second preferred access Net is set as accessing the second priority list item in net priority list, and above-mentioned third preferred access network is set as to access net Third priority list items in priority list.In some feasible embodiments, if the first preferred access network is more than one A, i.e., the credible access net in the second network selection strategy of V-ANDSF server dispositions is more than one, then can be according to the second network selection plan Each access net in first preferred access network is carried out priority ranking by the priority orders of the access net of slightly middle deployment, if the Two preferred access networks are more than one, then can preferably be connect second according to the access net priority orders disposed in the first network selection strategy Each access net in networking carries out priority ranking, if likewise, third priority access net is more than one, it can be according to the The access net priority orders disposed in one network selection strategy or the second network selection strategy meet each in third preferred access network It networks and carries out priority ranking.For example, if the credible access net in the second network selection strategy of V-ANDSF server dispositions is more than one A, i.e., the first preferred access network is more than one, for example, comprising tri- credible access nets of A, B, C, and V-ANDSF deployment second The access point of access net when accessing the access three-point state information of net according to each during network selection strategy, such as getting the access net The information such as the current bandwidth occupancy situation of current load value, access point or the protocol type of access point instruction will access net A, B, C have carried out priority and have been ordered as A highest priorities, secondly for B, are finally C, then when user equipment establishes access train table When, then access net A, B, C can be ranked up according to the priority orders disposed in the second network selection strategy, i.e., access net A's is excellent First grade highest, then be B, it is finally C, and access the excellent of the priority for netting C each access net higher than in the second preferred access network First grade.Similarly also can each access net in the second preferred access network and third preferred access network be subjected to priority ranking, Finally by each access net in the first preferred access network, each access net and third in the second preferred access network preferably connect Each access net in networking combines according to the priority orders of each access net, establishes access train table.Specific implementation In, the specific implementation process that user equipment establishes access train table can be found in preferably believable WLAN provided in an embodiment of the present invention The step S101-S103 in the first embodiment of the method for net is accessed, details are not described herein.
It, then can be by choosing module after user equipment establishes access train table in some feasible embodiments The 30 access net priority orders in access train table judge whether each access net can arrange with PLMN priority successively The PLMN connections of highest priority in table therefrom choose credible access net as target access network.Specifically, user equipment is based on The configuration of operator obtains static PLMN priority lists, the PLMN priority lists can static storage in user equipment, Operator also can be sent to user equipment by I-WLAN MO.User equipment can be by choosing module 30 from highest priority Access net starts to judge whether the access net of highest priority can establish connection with the PLMN of highest priority, if judging result It is yes, then above-mentioned access net can be set as the final target access network of user equipment, it is relatively low otherwise to continue to search for priority Whether other access nets can be established with the PLMN of highest priority connects, the PLMN until being connected to highest priority.If All access nets in access train table not can connect to the PLMN of highest priority, then is opened from the access net of highest priority Begin, judge whether the access net of highest priority can be established with the PLMN of secondary high priority and connect, if the determination result is YES, then Above-mentioned access net is set as to the target access network of user equipment, whether otherwise continues to search for other relatively low access nets of priority It can establish and connect with the PLMN of secondary high priority, so recycle, until finding final target access network.Specific implementation In, the specific implementation process for choosing module selected target access net can be found in preferably believable WLAN provided in an embodiment of the present invention The step S101-S103 in the first embodiment of the method for net is accessed, details are not described herein.
The device of preferred believable WLAN accesses net described in the present embodiment can be according to V-ANDSF server dispositions Access zone network in the first network selection strategy and the first network selection strategy of second network selection strategy and H-ANDSF server dispositions Roaming relationships list select the believable access net that selects as priority of access net, can also will be selected credible access net carry out Priority ranking, the higher access net of preferred priority have ensured that secure user data reliably accesses as target access network Target network saves the time of user equipment selection access net, enhances the user's body of user equipment selection target access net Test effect.
It is the second embodiment knot of the device of preferably believable WLAN accesses net provided in an embodiment of the present invention referring to Fig. 5 Structure schematic diagram.The device of preferred believable WLAN accesses net described in the present embodiment, including:
Judgment module 10 for the ownership place access network discovery according to acquisition and selection function H-ANDSF strategies, judges Whether target or visited place public land mobile network V-PLMN support credible access net.
Acquisition module 40 for the judging result according to the judgment module, obtains credible access net.
Module 30 is chosen, for the judging result according to the judgment module, obtains credible access net.
Wherein, acquisition module 40(Such as Fig. 6), including:
First acquisition unit 41, for being sent out in the judgment module judging result when being, to obtain visited place access network Now with the credible access net that is included in selection function V-ANDSF strategies.
Wherein, first acquisition unit 41, including:
First processing subelement 411, being designated as trusted status in the acquisition access net from the V-ANDSF strategies can The mark of the access net of letter.
Second processing subelement 412 judges target access network for the routing iinformation in the first network selection strategy Whether need to establish with the home domain PGW and connect, if the determination result is YES, then judge credible in the V-ANDSF strategies Net is accessed to identify with whether including H-PLMN in the PLMN identification informations for the PGW that can be connect.
Third handles subelement 413, believes for being identified in the credible access net with the PLMN of the PGW that can be connect When in breath comprising H-PLMN marks, the credible access net in the V-ANDSF strategies is set as the first preferred access network.
Second acquisition unit 42, for when the judgment module judging result is no, obtaining the H-ANDSF strategies packet The credible access net contained.
In the specific implementation, the device of the preferred believable WLAN accesses net described in the present embodiment can specifically be set with user It is standby etc..Before user equipment carries out access network selection, elder generation is needed to be established with PGW and is connected, the IP of user equipment is obtained at PGW Location.User equipment can then search H-ANDSF server address after getting IP address from PGW, and be serviced with above-mentioned H-ANDSF Device establishes IP connections.Specifically, user equipment searches the mode of the IP address of H-ANDSF servers, it may include:First by H- In the mark static configuration to user equipment of ANDSF servers, obtained by searching for the static configuration information of H-ANDSF servers The address of H-ANDSF servers is taken, establishing IP with H-ANDSF servers connect;Alternatively, H-ANDSF is searched by dns server The IP address of server, and establish IP with H-ANDSF servers and connect, etc..The present embodiment does not search H-ANDSF to user equipment The scheme of server address is limited, and user equipment searches the mode of the address of H-ANDSF servers including but not limited to above-mentioned Lookup mode.
After user equipment establishes connection with H-ANDSF servers, then can send network selection strategy to H-ANDSF servers please Information is sought, to obtain the first network selection strategy of H-ANDSF server dispositions.Specifically, above-mentioned network selection strategy request information, can wrap It includes:The identification information of user equipment(Such as IP), the current location information of user equipment, the ability information of user equipment etc., In, the capability indication information of user equipment is included in the ability information of above-mentioned user equipment, such as user equipment support preferably may be used Instruction information of ability of access net of letter etc..H-ANDSF servers receive the network selection strategy request letter of user equipment transmission After breath, then the first network selection strategy that can be disposed is sent to user equipment, and user equipment obtains at H-ANDSF servers Corresponding access network selection operation can be then done after first network selection strategy of H-ANDSF server dispositions according to the network selection strategy. Specifically, the first network selection strategy of the H-ANDSF server dispositions that user equipment is got includes:Roaming relationships list, clothes The list of business provider, service provider is credible, and untrusted indicates, the access net trusted status instruction of V-PLMN deployment, accesses what is netted The information such as the trusted status instruction that SSID, access are netted, wherein, above-mentioned roaming relationships list is to deploy the PLMN of credible access net List, list include one or more V-PLMN marks.In the specific implementation, it is further included in the first network selection strategy:Routing letter Breath and preferably credible access net instruction, wherein, preferably credible access net instruction may indicate that user equipment, and preferentially selection is safe and reliable Access network(I.e. believable access network), the present embodiment give tacit consent to the first network selection strategy include preferably it is credible access net refer to Show, i.e., preferentially select believable access net when user equipment selection accesses network.The trusted status of above-mentioned access net includes:It can Letter or untrusted.Specifically, the SSID that H-ANDSF servers when disposing the first network selection strategy, can be netted according to each access In data information judge access net access point it is whether safe and reliable, if judge learn the access network access point safety Reliably, then the trusted status that may indicate that the access net is credible;If judgement is learnt in the information that the access point of the access net includes Have uncertain factor, that is, include non-safety information or safety not knowable information when, then may indicate that the access net can Letter state is untrusted.Comprising PLMN identification informations in above-mentioned service provider list, and each PLMN is indicated its whether be Credible access or untrusted access.Specifically, H-ANDSF servers are when disposing the first network selection strategy, if judging certain PLMN portion The access point of administration is credible access point, then it is credible for may indicate that the PLMN;If judge certain PLMN deployment access point be it is non-can Believe access point, then may indicate that the PLMN as untrusted or do not give any instruction.In addition, the route-type of above-mentioned routing iinformation, Including:Home-routed is route, and local-breakout routings etc., routing iinformation user judges whether target access network needs It to establish and connect with home domain PGW, specially:If the routing iinformation shows that the route-type for home-routed, can determine whether Target access network, which needs to establish with home domain PGW, to be connected;If the routing iinformation shows that the route-type is local-breakout Routing then can determine that target access network is connected without being established with home domain PGW.
In the specific implementation, when user equipment is in roaming state(Default user of embodiment of the present invention equipment is in roaming State), user equipment also need to search V-ANDSF servers IP address, establish IP with V-ANDSF servers and connect.Specifically , the mode that user equipment searches V-ANDSF servers may include:The IP of V-ANDSF servers is obtained by dns server Location etc., the mode that the present embodiment does not search user equipment V-ANDSF servers is limited, including but not limited to above-mentioned lookup side Formula.User equipment and V-ANDSF servers are established after IP connect, then can send network selection strategy request to V-ANDSF servers Information, to obtain the second network selection strategy of V-NADSF server dispositions at V-ANDSF servers.V-ANDSF servers receive After the network selection strategy request information sent to user equipment, then the second network selection strategy that can be disposed is sent to user and sets Standby, user equipment can then do corresponding access network selection operation after getting the second network selection strategy according to the network selection strategy.Tool Body, above-mentioned second network selection strategy includes:The information such as the trusted status instruction of SSID, access net of net are accessed, wherein, access Net trusted status includes:Credible or untrusted.Specifically, V-ANDSF servers are when disposing the second network selection strategy, it can root Judge whether the access point of access net is safe and reliable according to the data information in the SSID of each access net, if judging to learn that this connects The access point for entering network is safe and reliable, then the trusted status that may indicate that the access net is credible;If the access net is learnt in judgement Have uncertain factor in the information that access point includes, that is, include non-safety information or safety not knowable information when, then The trusted status that may indicate that the access net is untrusted.In addition, in above-mentioned second network selection strategy, further include:Second network selection strategy In credible access net and PGW establish the PLMN identification informations of connection, which shows the PGW that the access net can connect Affiliated PLMN information.
In some feasible embodiments, after user equipment gets the first network selection strategy and the second network selection strategy, The access point of WLAN around can then being searched by judgment module 10 obtains the access-in point information of the V-PLMN of current roaming, packet Include the access point SSID of V-PLMN, status information of access point etc..Wherein, the status information of above-mentioned access point includes:Access point Current bandwidth occupancy situation, the protocol type of access point instruction etc. are netted in current load value, access.
In some feasible embodiments, user equipment gets the V-PLMN's of current roaming by judgment module 10 After access-in point information, then it can be carried out according to the access-in point information got with reference to the first network selection strategy and the second network selection strategy Target access network selects.Specifically, user equipment from H-ANDSF servers get the first network selection strategy includes visited place The roaming relationships list of network, the list include one or more V-PLMN marks, and the judgment module 10 of user equipment obtains After the access-in point information for getting the V-PLMN of current roaming, then can be judged according to the access point identity in the access-in point information should Whether V-PLMN is included in the roaming relationships list of above-mentioned access zone network.If judgement learns that the V-PLMN of current roaming is included In the roaming relationships list of above-mentioned access zone network, then it can determine whether to learn that V-PLMN supports credible access net, acquisition can be passed through First acquisition unit 41 in module 40 preferentially selects connecing for V-PLMN from the second network selection strategy of V-ANDSF server dispositions Trusted status is designated as the mark of believable access net in networking.Alternatively, user equipment from H-ANDSF servers get One network selection strategy includes service provider list and the instruction of credible or untrusted.Specifically, the first of acquisition module 40 obtains First processing units 411 in unit 41 can obtain each access net of V-ANDSF server dispositions from the second network selection strategy Trusted status instruction, therefrom select trusted status be designated as believable access net.Specifically, first processing units 411 are set After credible access net in second network selection strategy, second processing unit 412 then can be according to the routing in the first network selection strategy Information judges whether target access network needs to establish with home domain PGW and connects that institute's judging result is yes, then can further judge the Whether the credible access net in two network selection strategies is established in the PLMN identification informations of connection with PGW and is identified comprising H-PLMN, if packet It is identified containing H-PLMN, then shows that the credible access net in the second network selection strategy can be directly connected to home domain PGW, and then can lead to It crosses third processing unit 413 and the credible access net in second network selection strategy is set as the first preferred access network, otherwise show this Credible access net cannot connect home domain PGW, then not as preferred access network.In addition, if the V- is learnt in the judgement of judgment module 10 In access zone network roaming relationships lists of the PLMN not in the first network selection strategy or V-PLMN refers in service provider list Untrusted is shown as, then all access nets that can determine whether to learn V-PLMN deployment are untrusted access net, i.e. V-ANDSF is serviced All access nets of device deployment are the access net of untrusted, at this point, user equipment can then be obtained by the second of acquisition module 40 Unit 42 is taken to search whether to include credible access net from the first network selection strategy of H-ANDSF server dispositions, obtains H- Credible access net is as the second preferred access network in first network selection strategy of ANDSF server dispositions.It specifically, can be from the first choosing The trusted status instruction of each access net of H-ANDSF server dispositions is obtained in net strategy, therefrom obtains the access of H-PLMN Trusted status is designated as the mark of believable access net in net, and trusted status is designated as believable access net and is set as second Preferred access network.In the specific implementation, above-mentioned user equipment obtains the specific implementation of the first network selection strategy, the second network selection strategy Journey and the first preferred access network, the selected specific implementation process of the second preferred access network can be found in the embodiment of the present invention and carry The second embodiment of the method for preferred believable WLAN accesses net supplied, details are not described herein.
In addition, in some feasible realization methods, it, can also be first from V- when user equipment searches believable access net Obtained in second network selection strategy of ANDSF server dispositions it is each access net mark, and according to it is above-mentioned it is each access net can Whether letter state instruction is judged in above-mentioned second network selection strategy comprising credible access net(I.e. credible state instruction is believable access Net).If judgement learns that the second network selection strategy includes credible access net, according further to H-ANDSF server dispositions The roaming relationships list of access zone network in first network selection strategy judges the access of the V-PLMN belonging to above-mentioned credible access net Whether point identification is included in the roaming relationships list of above-mentioned access zone network or whether V-PLMN is credible access, if judging knot Fruit is yes, then the credible access net in the second network selection strategy is set as the first preferred access network(Assuming that the first access net and PGW It establishes in the PLMN identification informations of connection and is identified comprising H-PLMN, specific deterministic process can refer to the judgement description of the preceding paragraph, This is repeated no more).Do not include credible access net if judging to learn in the second network selection strategy, i.e. the of V-ANDSF server dispositions All access nets are untrusted access net in two network selection strategies, and user equipment then can be from the of H-ANDSF server dispositions Credible access net is searched in one network selection strategy, the credible access net in the first network selection strategy is set as the second preferred access network. Specific implementation process can be found in the second embodiment of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention, This is repeated no more.
In some feasible embodiments, user equipment finds the access point of the WLAN of surrounding, and according to access point Status information and the first network selection strategy of the H-ANDSF server dispositions got in advance and V-ANDSF server dispositions The second network selection strategy set the first preferred access network, the second preferred access network and third preferred access network after, then may be used Each access net is subjected to priority ranking, establishes access train table.Wherein, above-mentioned third preferred access network, it may include H- The trusted status of H-ANDSF server dispositions in first network selection strategy of ANDSF server dispositions is designated as connecing for untrusted Networking, it is non-to be designated as with the trusted status of the V-ANDSF server dispositions in the second network selection strategy of V-ANDSF server dispositions Believable access net.Specifically, when user equipment establishes access train table, above-mentioned first preferred access network can be set as first It is excellent to assign the credible access net in the second network selection strategy of V-ANDSF server dispositions to highest for first priority list item First grade, secondly the credible access net in the first network selection strategy of H-ANDSF server dispositions, last untrusted access net. First preferred access network can be set as accessing the first priority list item in train table, by above-mentioned second preferred access network It is set as accessing the second priority list item in train table, above-mentioned third preferred access network is set as accessing in train table Third priority list items.In some feasible embodiments, if the first preferred access network is more than one, i.e. V-ANDSF clothes The credible access net being engaged in the second network selection strategy of device deployment is more than one, then can be according to the access disposed in the second network selection strategy Each access net in first preferred access network is carried out priority ranking by the priority orders of net, if the second preferred access network is more In one, then each in the second preferred access network can be connect according to the access net priority orders disposed in the first network selection strategy Network and carry out priority ranking, if likewise, third priority access net is more than one, can according to the first network selection strategy or Each access net in third preferred access network is carried out priority by the access net priority orders disposed in the second network selection strategy Sequence.For example, if the credible access net in the second network selection strategy of V-ANDSF server dispositions is more than one, i.e., first preferably Access net is more than one, for example, comprising tri- credible access nets of A, B, C, and when V-ANDSF disposes the second network selection strategy according to The access three-point state information of each access net, such as the access point current load value of access net when getting the access net, The current bandwidth occupancy situation of access point or the information such as protocol type of access point instruction will access net A, B, C carried out it is excellent Grade is selected to be ordered as A highest priorities, is secondly B, is finally C, then when user equipment establishes access train table, then can will be accessed Net A, B, C are ranked up according to the priority orders disposed in the second network selection strategy, i.e. the highest priority of access net A, then be B is finally C, and accesses the priority of priority each access net higher than in the second preferred access network of net C.Similarly also may be used Each access net in second preferred access network and third preferred access network is subjected to priority ranking, establishes access train Table.In addition, in the first network selection strategy of H-ANDSF server dispositions routing iinformation instruction home-routed routing or Person home-routed route with local-breakout routing can with when, user equipment can be according to V-ANDSF server dispositions The second network selection strategy in the first access net and PGW establish the PLMN identification informations of connection and delete in credible access net not It is identified comprising H-PLMN, i.e., cannot connect the believable access net of home domain PGW.In the specific implementation, user equipment establishes access The specific implementation process of train table can be found in the second of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention Embodiment, details are not described herein.
In some feasible embodiments, after user equipment establishes access net priority list, module 30 is chosen It can then judge whether each access net can be with PLMN priority successively according to the access net priority orders in access train table The PLMN connections of highest priority in list.Specifically, the PLMN that configuration of the user equipment based on operator obtains static state is preferential Grade list, the PLMN priority lists can static storage in user equipment, operator can also pass through I-WLAN MO or ANDSF Server is sent to user equipment.The selection module 30 of user equipment judges that highest is preferential since the access net of highest priority Whether the access net of grade can be established with the PLMN of highest priority connects, if the determination result is YES, then can be by above-mentioned access net Be set as the final target access network of user equipment, otherwise continue to search for priority it is relatively low other access nets whether can with most The PLMN of high priority establishes connection, the PLMN until being connected to highest priority.If access all accesses in train table Net not can connect to the PLMN of highest priority, choose module 30 then since the access net of highest priority, judgement is preferential Whether the highest access net of grade can be established with the PLMN of secondary high priority connects, if the determination result is YES, then by above-mentioned access Net is set as the target access network of user equipment, and whether otherwise continue to search for other relatively low access nets of priority can be with secondary height The PLMN of priority establishes connection, so recycles, until finding final target access network.Or connecing highest priority It networks as target access network, is directly accessed.In the specific implementation, the specific implementation process for choosing module selected target access net can Referring to the second embodiment of the method for preferably believable WLAN accesses net provided in an embodiment of the present invention, details are not described herein.
The device of preferred believable WLAN accesses net described in the present embodiment can be according to V-ANDSF server dispositions Access zone network in the first network selection strategy and the first network selection strategy of second network selection strategy and H-ANDSF server dispositions Roaming relationships list select the believable access net that selects as priority of access net, can also will be selected credible access net carry out Priority ranking, the higher access net of preferred priority have ensured that secure user data reliably accesses as target access network Target network, and can ensure that the access point of target access network supports ownership in the case where user equipment carries out the scene of home domain routing The connection of numeric field data gateway avoids access network reselection, saves the time of user equipment selection access net, enhances user and set The user experience effect of alternative target access network.
It is the example structure schematic diagram of terminal provided in an embodiment of the present invention referring to Fig. 7.Described in the present embodiment Terminal, including:
Memory 100, for storing instruction.
Processor 200 for reading instruction from the memory, and performs following operation according to described instruction:According to Ownership place access network discovery and selection function the H-ANDSF strategy of acquisition judge target or visit Public Land Mobile Network Whether network V-PLMN supports credible access net, according to judging result, obtains credible access net, and chooses the credible access net and be Target access network.
In some feasible embodiments, the H-ANDSF strategies are that the first network selection strategy includes:
The PLMN lists of credible access net are supported in roaming relationships list;
The processor is specific when judging whether visited place public land mobile network V-PLMN supports credible access net For:
Whether judge in the roaming relationships list comprising the V-PLMN.
In some believable embodiments, if containing the V-PLMN, V-PLMN in the roaming relationships list Support credible access net.
In some feasible embodiments, the first network selection strategy includes service provider list, wherein described The trusted status comprising PLMN indicates in service provider list;
The processor is specific when judging whether visited place public land mobile network V-PLMN supports credible access net For:
The trusted status of the V-PLMN for judging to include in the service provider list is indicated whether to be credible.
In some feasible embodiments, if the V-PLMN's included in the service provider list is credible State instruction is credible, then V-PLMN supports credible access net.
In some feasible embodiments, the access net that the first network selection strategy includes the V-PLMN deployment can Believe state instruction;
The processor is specific when judging whether visited place public land mobile network V-PLMN supports credible access net For:
Judge the trusted status of the access net of the V-PLMN included in the first network selection strategy supports is in indicating No is trusted status.
In some feasible embodiments, if the V-PLMN supports included in the first network selection strategy connect The trusted status of networking is designated as credible, then V-PLMN supports credible access net.
In the specific implementation, terminal described in the present embodiment concretely user equipment etc..User equipment is accessed Before net selection, elder generation is needed to be established with PGW and is connected, the IP address of user equipment is obtained at PGW.User equipment is obtained from PGW H-ANDSF server address can be then searched, and establish IP with above-mentioned H-ANDSF servers and connect after to IP address.Specifically, User equipment searches the mode of the IP address of H-ANDSF servers, it may include:First the mark static state of H-ANDSF servers is matched It puts in user equipment, the address of H-ANDSF servers is obtained by searching for the static configuration information of H-ANDSF servers, IP is established with H-ANDSF servers to connect;Alternatively, the IP address of H-ANDSF servers is searched by dns server, and and H- ANDSF servers establish IP connections, etc..The scheme that the present embodiment does not search user equipment H-ANDSF server address limits System, user equipment search the mode of the address of H-ANDSF servers including but not limited to above-mentioned lookup mode.
After user equipment establishes connection with H-ANDSF servers, then can send network selection strategy to H-ANDSF servers please Information is sought, to obtain the first network selection strategy of H-ANDSF server dispositions.Specifically, above-mentioned network selection strategy request information, can wrap It includes:The identification information of user equipment(Such as IP), the current location information of user equipment, the ability information of user equipment etc., In, the capability indication information of user equipment is included in the ability information of above-mentioned user equipment, such as user equipment support preferably may be used Instruction information of ability of access net of letter etc..H-ANDSF servers receive the network selection strategy request letter of user equipment transmission After breath, then the first network selection strategy that can be disposed is sent to user equipment, and the processor 200 of user equipment is from H-ANDSF The first network selection strategy of H-ANDSF server dispositions is obtained at server then can do corresponding access according to the network selection strategy later Net selection operation.Specifically, the first network selection strategy of the H-ANDSF server dispositions that the processor 200 of user equipment is got Include:Roaming relationships list, service provider list, the instruction of service provider is credible untrusted, V-PLMN deployment access The information such as the trusted status instruction that the instruction of net trusted status, the SSID of access net, access are netted, wherein, above-mentioned roaming relationships list To deploy the PLMN lists of credible access net, list includes one or more V-PLMN marks.
In some feasible embodiments, in the first network selection strategy, further include:Routing iinformation;
The route-type of the routing iinformation, including in home-routed routings, local-breakout routings at least one Kind.
The routing iinformation connects for judging whether target access network needs to establish with home domain PGW, specially:
If the routing iinformation shows that the route-type is route for home-routed, the target access network is judged It needs to establish with the home domain PGW and connect;
If the routing iinformation shows that the route-type is route for local-breakout, the target access is judged Net is connected without being established with the home domain PGW.
In some feasible embodiments, in the second network selection strategy, that is, V-ANDSF strategies, further include:Described Credible access net in two network selection strategies establishes the PLMN identification informations of connection with the PGW that can be connect.
In the specific implementation, it is further included in the first network selection strategy:Routing iinformation and preferably credible access net instruction, wherein, it is excellent Credible access net instruction is selected to may indicate that user equipment preferentially selects safe and reliable access network(I.e. believable access network), this Embodiment gives tacit consent to the first network selection strategy and includes preferentially selecting during preferably credible access net instruction, i.e. user equipment selection access network Select believable access net.The trusted status of above-mentioned access net includes:Credible or untrusted.Specifically, H-ANDSF servers When disposing the first network selection strategy, can according to it is each access net SSID in data information judge access net access point whether Safe and reliable, if judging to learn that the access point of the access network is safe and reliable, the trusted status that may indicate that the access net is can Letter;If judge learn in the information that the access point of the access net includes there is uncertain factor, that is, include non-safety information or Safety not knowable information when, then may indicate that the access net trusted status be untrusted.In above-mentioned service provider list Comprising PLMN identification informations, and indicate each PLMN whether it is credible access or untrusted access.Specifically, H-ANDSF Server is when disposing the first network selection strategy, if the access point for judging certain PLMN deployment may indicate that this for credible access point PLMN is credible;If the access point for judging certain PLMN deployment is untrusted access point, may indicate that the PLMN for untrusted or Any instruction is not given.The route-type of above-mentioned routing iinformation, including:Home-routed is route, local-breakout routings Judge whether target access network needs to establish with home domain PGW to connect Deng, routing iinformation user, specially:If the routing is believed Breath shows that the route-type is home-routed, then can determine whether that target access network needs to establish with home domain PGW and connect;It if should Routing iinformation shows that the route-type is route for local-breakout, then can determine that target access network need not be with home domain PGW Establish connection.
In the specific implementation, when user equipment is in roaming state(Default user of embodiment of the present invention equipment is in roaming State), user equipment also need to search V-ANDSF servers IP address, establish IP with V-ANDSF servers and connect.Specifically , the mode that user equipment searches V-ANDSF servers may include:The IP of V-ANDSF servers is obtained by dns server Location etc., the mode that the present embodiment does not search user equipment V-ANDSF servers is limited, including but not limited to above-mentioned lookup side Formula.User equipment and V-ANDSF servers are established after IP connect, then can send network selection strategy request to V-ANDSF servers Information, to obtain the second network selection strategy of V-NADSF server dispositions.V-ANDSF servers receive user equipment transmission After network selection strategy request information, then the second network selection strategy that can be disposed is sent to user equipment, the processing of user equipment Device 200 can then do corresponding access network selection operation after getting the second network selection strategy according to the network selection strategy.On specifically, The second network selection strategy is stated to include:The information such as the trusted status instruction of SSID, access net of net are accessed, wherein, access net is credible State includes:Credible or untrusted.Specifically, V-ANDSF servers are when disposing the second network selection strategy, it can be according to each The data information accessed in the SSID of net judges whether the access point of access net is safe and reliable, if judging to learn the access network Access point it is safe and reliable, then it is credible for may indicate that the trusted status of the access net;If the access point of the access net is learnt in judgement Comprising information in have uncertain factor, that is, include non-safety information or safety not knowable information when, then may indicate that The trusted status of the access net is untrusted.In addition, in above-mentioned second network selection strategy, further include:In second network selection strategy can Letter access net establishes the PLMN identification informations of connection with PGW, which shows belonging to the PGW that the access net can connect PLMN information.
In some feasible embodiments, the processor 200 of user equipment gets the first network selection strategy and the second choosing After net strategy, then the access point of the WLAN of surrounding can be searched, the access-in point information of the V-PLMN of current roaming be obtained, including V- The access point SSID of PLMN, status information of access point etc..Wherein, the status information of above-mentioned access point includes:Access point is current Load value, access nets current bandwidth occupancy situation, protocol type of access point instruction etc..
In some feasible embodiments, the processor 200 of user equipment gets connecing for the V-PLMN of current roaming After access point information, then can mesh be carried out with reference to the first network selection strategy and the second network selection strategy according to the access-in point information got Mark access network selection.
In some feasible embodiments, the processor obtains specific during credible access net according to judging result For:
When judging result is when being, obtains what is included in visited place access network discovery and selection function V-ANDSF strategies Credible access net.
When judging result is no, the credible access net that the H-ANDSF strategies include is obtained.
Specifically, the processor 200 of user equipment from H-ANDSF servers get the first network selection strategy includes visiing The roaming relationships list of ground network is visited, which includes one or more V-PLMN marks, the processor 200 of user equipment After the access-in point information for getting the V-PLMN of current roaming, then it can be judged according to the access point identity in the access-in point information Whether the V-PLMN is included in above-mentioned access zone network roaming relationships list.If judgement learns that the V-PLMN of current roaming is included In above-mentioned access zone network roaming relationships list, then it can determine whether to learn that V-PLMN supports credible access net, it can be preferentially from V- Trusted status in the access net of V-PLMN is selected to be designated as believable access net in second network selection strategy of ANDSF server dispositions Mark, and using this it is credible access net as the first priority access net.
In some feasible embodiments, the V-PLMN that the processor includes in V-ANDSF strategies are obtained Credible access net when, be specifically used for:
The mark that trusted status in access net is designated as believable access net is obtained from the V-ANDSF strategies;
Routing iinformation in the first network selection strategy judges whether target access network needs and the home domain PGW Connection is established, if the determination result is YES, then judges that the credible access net in the V-ANDSF strategies is described with that can connect Whether identified in the PLMN identification informations of PGW comprising H-PLMN;
If the credible access net is marked with including the H-PLMN in the PLMN identification informations for the PGW that can be connect Know, then the credible access net in the V-ANDSF strategies is set as the first preferred access network.
Specifically, after processor 200 sets the credible access net in the second network selection strategy, it can also be according to the first network selection Routing iinformation in strategy judges whether target access network needs to establish with home domain PGW and connects that institute's judging result is yes, then may be used Further judge that the credible access net in the second network selection strategy establishes in the PLMN identification informations of connection whether include H- with PGW PLMN is identified, if being identified comprising H-PLMN, shows that the credible access net in the second network selection strategy can be directly connected to ownership Credible access net in second network selection strategy can be then set as the first preferred access network, otherwise show the credible access by domain PGW Net cannot connect home domain PGW, then not as preferred access network.In addition, if the judgement of processor 200 learns the V-PLMN not the In access zone network roaming relationships list in one network selection strategy or V-PLMN be designated as in service provider list it is non-can Letter, then all access nets that can determine whether to learn V-PLMN deployment are the access net of untrusted, i.e. V-ANDSF server dispositions All access nets be untrusted access net, at this point, the processor 200 of user equipment is then from H-ANDSF server dispositions The first network selection strategy in search whether to include credible access net, obtain the first network selection strategy of H-ANDSF server dispositions In it is credible access net as the second preferred access network.
In some feasible embodiments, the processor 200 of user equipment finds the access point of the WLAN of surrounding, and According to the status information of access point and the first network selection strategy and V-ANDSF of the H-ANDSF server dispositions got in advance Second network selection strategy of server disposition sets the first preferred access network, the second preferred access network and third preferred access network Later, then can each access net be subjected to priority ranking, establishes access train table.Wherein, above-mentioned third preferred access network, can The trusted status of H-ANDSF server dispositions in the first network selection strategy including H-ANDSF server dispositions be designated as it is non-can The access net of letter and the trusted status of the V-ANDSF server dispositions in the second network selection strategy are designated as the access net of untrusted. Specifically, when the processor 200 of user equipment establishes access train table, above-mentioned first preferred access network is set as first first Priority list item assigns the credible access net in the second network selection strategy of V-ANDSF server dispositions to highest priority, Secondly the credible access net in the first network selection strategy of H-ANDSF server dispositions, last untrusted access net.I.e. by One preferred access network is set as accessing the first priority list item in train table, and above-mentioned second preferred access network is set as connecing The second priority list item in networking list, the third that above-mentioned third preferred access network is set as in access train table are preferential Grade list items.In some feasible embodiments, if the first preferred access network is more than one, i.e. V-ANDSF server dispositions The second network selection strategy in credible access net it is more than one, then can according to disposed in the second network selection strategy access net it is preferential Each access net in first preferred access network is carried out priority ranking by grade sequence, if the second preferred access network is more than one, Then can according to disposed in the first network selection strategy access net priority orders by each access net in the second preferred access network into Row major grade sort, if likewise, third priority access net it is more than one, can according to the first network selection strategy or second select Each access net in third preferred access network is carried out priority ranking by the access net priority orders disposed in net strategy.Example Such as, if the believable access net in the second network selection strategy of V-ANDSF server dispositions is more than one, i.e. the first preferred access network It is more than one, for example, comprising tri- credible access nets of A, B, C, and connect during V-ANDSF the second network selection strategies of deployment according to each The access three-point state information of networking, for example, when getting the access net access net the current load value of access point, access point The information such as current bandwidth occupancy situation or the protocol type of access point instruction will access net A, B, C and carry out priority row Sequence is A highest priorities, is secondly B, is finally C, then when user equipment establish access train table when, then can will access net A, B, C is ranked up according to the priority orders disposed in the second network selection strategy, i.e. the highest priority of access net A, then be B, finally It is C, and accesses the priority of priority each access net higher than in the second preferred access network of net C.It similarly also can be by second Each access net in preferred access network and third preferred access network carries out priority ranking, establishes access train table.In addition, For the routing iinformation instruction home-routed routings in the first network selection strategy of H-ANDSF server dispositions or home- Routed route with local-breakout routing can with when, processor 200 can be according to the second of V-ANDSF server dispositions The first access net in network selection strategy, which is established with the PGW in the credible access net of PLMN identification informations deletion of connection, does not include H- PLMN is identified, i.e., cannot connect the believable access net of home domain PGW.
In some feasible embodiments, the processor has when choosing the credible access net and being target access network Body is used for:
It is the target access network that the credible access net is chosen from access train table, wherein, in the access train The priority of credible access net is higher than the priority of untrusted access net described in table.
It specifically, then can be according in access train table after the processor 200 of user equipment establishes access train table Access net priority orders judge whether each access net can be with the PLMN of highest priority in PLMN priority lists successively Connection.Specifically, configuration of the user equipment based on operator obtains static PLMN priority lists, the PLMN priority lists Can static storage in user equipment, operator also can be sent to user equipment by I-WLAN MO or ANDSF servers.With The processor 200 of family equipment judge since the access net of highest priority highest priority access net whether can with it is preferential The highest PLMN of grade establishes connection, if the determination result is YES, then can above-mentioned access net be set as the final target of user equipment Net is accessed, otherwise continues to search for whether other relatively low access nets of priority can establish connection with the PLMN of highest priority, PLMN until being connected to highest priority.If all access nets in access net priority list not can connect to preferentially The highest PLMN of grade, then since the access net of highest priority, judge whether the access net of highest priority can be with secondary height The PLMN of priority establishes connection, if the determination result is YES, then above-mentioned access net is set as to the target access network of user equipment, Otherwise it continues to search for whether other relatively low access nets of priority can establish connection with the PLMN of secondary high priority, so follows Ring, until finding final target access network.Or it using the access net of highest priority as target access network, directly connects Enter.
Terminal described in the present embodiment can be according to the second network selection strategy and H-ANDSF of V-ANDSF server dispositions The roaming relationships list of the first network selection strategy and the access zone network in the first network selection strategy of server disposition is selected credible The access net that selects as priority of access net, can also will be selected credible access net carry out priority ranking, preferred priority Higher access net has ensured that secure user data reliably accesses target network, and is set in user as target access network It can ensure that the access point of target access network supports the connection of home domain data gateway under the standby scene for carrying out home domain routing, avoid Network reselection is accessed, saves the time of user equipment selection access net, enhances the use of user equipment selection target access net Family experience effect.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in computer read/write memory medium In, the program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access Memory, RAM)Deng.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent variations made according to the claims of the present invention, is still within the scope of the present invention.

Claims (36)

  1. A kind of 1. method of preferably believable WLAN accesses net, which is characterized in that including:
    Ownership place access network discovery and selection function H-ANDSF strategies are obtained, the H-ANDSF strategies include supporting credible Access the PLMN lists netted or service provider list and the trusted status instruction it includes each service provider, each clothes The trusted status instruction of business provider includes credible or insincere;
    The PLMN lists or service provider list that the credible access of the support included according to the H-ANDSF strategies is netted And the trusted status instruction it includes each service provider, judging whether visited place public land mobile network V-PLMN supports can Letter access net;
    If the determination result is YES, then obtain included in visited place access network discovery and selection function V-ANDSF strategies it is credible Access net;
    If judging result is no, the credible access net included in the H-ANDSF strategies is obtained;
    It is included in the credible access net or the H-ANDSF strategies that are included from the V-ANDSF strategies of acquisition credible Target access network is chosen in access net.
  2. 2. the method as described in claim 1, which is characterized in that the H-ANDSF strategies include supporting credible access net PLMN lists;
    It is described to judge whether V-PLMN supports credible access net, including:
    Whether judge in the PLMN lists for supporting credible access net comprising the V-PLMN;
    If contain the V-PLMN in the PLMN lists for supporting credible access net, it is determined that the V-PLMN supports credible Access net.
  3. 3. the method as described in claim 1, which is characterized in that the H-ANDSF strategies include service provider list, institute It states service provider list and includes multiple public land mobile network PLMN as service provider, wherein the service carries It is indicated for the trusted status that each PLMN is included in quotient's list;
    It is described to judge whether V-PLMN supports credible access net, including:
    Judge in the service provider list trusted status comprising the V-PLMN and the V-PLMN indicate whether as It is credible;
    If the trusted status of the V-PLMN included in the service provider list is designated as credible, it is determined that the V- PLMN supports credible access net.
  4. 4. the method as described in claim 1, which is characterized in that the H-ANDSF strategies include the V-PLMN supports and connect Networking trusted status indicates;
    It is described to judge whether V-PLMN supports credible access net, including:
    Judge the V-PLMN included in the H-ANDSF strategies support access net trusted status instruction in whether be can Letter state;
    If the trusted status of access net that the V-PLMN that is included in the H-ANDSF strategies is supported be designated as it is credible, Determine that V-PLMN supports credible access net.
  5. 5. such as claim 1-4 any one of them methods, which is characterized in that the H-ANDSF strategies and/or the V- Net also is accessed comprising untrusted in ANDSF strategies, wherein, it is included in the H-ANDSF strategies and/or the V-ANDSF strategies Credible access net as target access network selection priority higher than untrusted access net.
  6. 6. method as claimed in claim 5, which is characterized in that further included in the V-ANDSF strategies:The SSID of access net, The trusted status instruction of access net, the trusted status of the access net include:Credible or untrusted;
    The credible access net included in V-ANDSF strategies that obtains includes:It is obtained from the V-ANDSF strategies in access net Trusted status is designated as the mark of believable access net, and using the marked access net of the mark as the of target access network One preferred access network.
  7. 7. method as claimed in claim 5, which is characterized in that further included in the H-ANDSF strategies:The SSID of access net, The trusted status instruction of access net, the trusted status of the access net include:Credible or untrusted;
    The credible access net that the acquisition H-ANDSF strategies include includes:Being obtained from the H-ANDSF strategies can in access net Believe mark of the state instruction for believable access net, and using the marked access net of the mark as the second of target access network Preferred access network.
  8. 8. method as claimed in claim 5, which is characterized in that in the H-ANDSF strategies, further include:Routing iinformation;
    The route-type of the routing iinformation, including in home domain home-routed routings, local local-breakout routings It is at least one.
  9. 9. method as claimed in claim 8, which is characterized in that the routing iinformation is used to judge whether target access network needs It establishes and connects with home domain data gateway PGW, specially:
    If the routing iinformation shows that the route-type is route for home-routed, the target access network needs are judged It establishes and connects with the home domain PGW;
    If the routing iinformation show the route-type for local-breakout route, judge the target access network without It need to establish and connect with the home domain PGW.
  10. 10. method as claimed in claim 9, which is characterized in that in the V-ANDSF strategies, further include:The V-ANDSF Access net and the PLMN identification informations for the PGW that can be connect in strategy.
  11. 11. method as claimed in claim 10, which is characterized in that described to obtain the credible access included in V-ANDSF strategies Net, including:
    The mark that trusted status in the access net of the V-PLMN is designated as believable access net is obtained from the V-ANDSF strategies Know;
    Routing iinformation in the H-ANDSF strategies judges whether target access network needs to establish with the home domain PGW Connection if the determination result is YES, then judges credible access net in the V-ANDSF strategies and the PGW's that can connect Whether identified in PLMN identification informations comprising H-PLMN;
    If the credible access net is identified with including the H-PLMN in the PLMN identification informations for the PGW that can be connect, Credible access net in the V-ANDSF strategies is set as to the first preferred access network of target access network.
  12. 12. such as claim 6 or 7 or 11 any one of them methods, which is characterized in that first preferred access network is as mesh The selection priority that tag splice networks is higher than the selection priority of second preferred access network, the choosing of second preferred access network Select selection priority of the priority higher than untrusted access net.
  13. 13. a kind of device of preferably believable WLAN accesses net, which is characterized in that including:
    Acquisition module, for obtaining ownership place access network discovery and selection function H-ANDSF strategies, the H-ANDSF strategies Include supporting the PLMN lists of credible access net or service provider list and the trusted status it includes each service provider Instruction, the trusted status of each service provider indicate to include credible or insincere;
    Judgment module, the PLMN lists or clothes that the credible access of the support for being included according to the H-ANDSF strategies is netted Business provider's list and the trusted status instruction it includes each service provider, judge visited place public land mobile network V- Whether PLMN supports credible access net;
    Acquisition module, for when the judging result of the judgment module is to be, obtaining visited place access network discovery and selection The credible access net included in function V-ANDSF strategies, is no in the judging result of the judgment module, obtains the H- The credible access net included in ANDSF strategies;
    Choose module, for the credible access net that is included from the V-ANDSF strategies that the acquisition module is got or Target access network is chosen in the credible access net included in the H-ANDSF strategies.
  14. 14. device as claimed in claim 13, which is characterized in that the H-ANDSF strategies include
    Support the PLMN lists of credible access net;
    The judgment module is used for:Whether judge in the PLMN lists for supporting credible access net comprising the V-PLMN, if The V-PLMN is included in the PLMN lists for supporting credible access net, it is determined that the V-PLMN supports credible access net.
  15. 15. device as claimed in claim 13, which is characterized in that the H-ANDSF strategies include service provider list, The service provider list includes multiple public land mobile network PLMN as service provider, wherein the service The trusted status comprising PLMN indicates in provider's list;
    The judgment module is used for:
    Judge in the service provider list trusted status comprising the V-PLMN and the V-PLMN indicate whether as It is credible, if the trusted status of the V-PLMN included in the service provider list be designated as it is credible, it is determined that the V- PLMN supports credible access net.
  16. 16. device as claimed in claim 13, which is characterized in that the H-ANDSF strategies include the V-PLMN and support Access the instruction of net trusted status;
    The judgment module is used for:
    Judge that the V-PLMN included in the H-ANDSF strategies supports whether in the trusted status instruction of access net be credible State, if to support that the trusted status of access net is designated as credible by the V-PLMN that is included in the H-ANDSF strategies, it is determined that V-PLMN supports credible access net.
  17. 17. such as claim 13-16 any one of them devices, which is characterized in that the H-ANDSF strategies and/or the V- Net also is accessed comprising untrusted in ANDSF strategies, wherein, it is included in the H-ANDSF strategies and/or the V-ANDSF strategies Credible access net as target access network selection priority higher than untrusted access net.
  18. 18. device as claimed in claim 17, which is characterized in that further included in the V-ANDSF strategies:Access net The trusted status instruction of SSID, access net, the trusted status of the access net include:Credible or untrusted;
    The acquisition module is used for:Trusted status in access net is obtained from the V-ANDSF strategies and is designated as believable access The mark of net, and using the marked access net of the mark as the first preferred access network of target access network.
  19. 19. device as claimed in claim 17, which is characterized in that further included in the H-ANDSF strategies:Access net The trusted status instruction of SSID, access net, the trusted status of the access net include:Credible or untrusted;
    The acquisition module is used for:Trusted status in access net is obtained from the H-ANDSF strategies and is designated as believable access The mark of net, and using the marked access net of the mark as the second preferred access network of target access network.
  20. 20. device as claimed in claim 17, which is characterized in that in the H-ANDSF strategies, further include:Routing iinformation;
    The route-type of the routing iinformation, including at least one of home-routed routings, local-breakout routings.
  21. 21. device as claimed in claim 20, which is characterized in that the routing iinformation is used to judge whether target access network needs It to establish and connect with home domain PGW, specially:
    If the routing iinformation shows that the route-type is route for home-routed, the target access network needs are judged It establishes and connects with the home domain PGW;
    If the routing iinformation show the route-type for local-breakout route, judge the target access network without It need to establish and connect with the home domain PGW.
  22. 22. device as claimed in claim 21, which is characterized in that in the V-ANDSF strategies, further include:The V-ANDSF Credible access net and the PLMN identification informations for the PGW that can be connect in strategy.
  23. 23. device as claimed in claim 22, which is characterized in that the acquisition module includes:
    First processing subelement, refers to for obtaining trusted status in the access net of the V-PLMN from the V-ANDSF strategies It is shown as the mark of believable access net;
    Second processing subelement, for the routing iinformation in the H-ANDSF strategies judge target access network whether needs Establish and connect with the home domain PGW, if the determination result is YES, then judge credible access net in the V-ANDSF strategies with Whether identified in the PLMN identification informations for the PGW that can be connected comprising H-PLMN;
    Third handle subelement, for it is described it is credible access net with being wrapped in the PLMN identification informations for the PGW that can be connect When being identified containing the H-PLMN, by the credible access net in the V-ANDSF strategies be set as target access network first preferably Access net.
  24. 24. the device as described in any one of claim 18 or 19 or 23, which is characterized in that first preferred access network is made Selection priority for target access network is higher than the selection priority of second preferred access network, second preferred access network Selection priority higher than untrusted access net selection priority.
  25. 25. a kind of terminal, which is characterized in that including:
    Memory, for storing instruction;
    Processor for reading instruction from the memory, and performs following operation according to described instruction:
    Ownership place access network discovery and selection function H-ANDSF strategies are obtained, the H-ANDSF strategies include supporting credible Access the PLMN lists netted or service provider list and the trusted status instruction it includes each service provider, each clothes The trusted status instruction of business provider includes credible or insincere;
    The PLMN lists or service provider list that the credible access of the support included according to the H-ANDSF strategies is netted And the trusted status instruction it includes each service provider, judging whether visited place public land mobile network V-PLMN supports can Letter access net;
    If the determination result is YES, then obtain included in visited place access network discovery and selection function V-ANDSF strategies it is credible Access net;
    If judging result is no, the credible access net included in the H-ANDSF strategies is obtained;
    It is included in the credible access net or the H-ANDSF strategies that are included from the V-ANDSF strategies of acquisition credible Target access network is chosen in access net.
  26. 26. terminal as claimed in claim 25, which is characterized in that the H-ANDSF strategies include
    Support the PLMN lists of credible access net;
    The processor is specifically used for when judging whether V-PLMN supports credible access net:
    Whether judge in the PLMN lists for supporting credible access net comprising the V-PLMN, if described support credible access Contain the V-PLMN in the PLMN lists of net, it is determined that the V-PLMN supports credible access net.
  27. 27. terminal as claimed in claim 25, which is characterized in that the H-ANDSF strategies include service provider list, The service provider list includes multiple public land mobile network PLMN as service provider, wherein the service The trusted status comprising PLMN indicates in provider's list;
    The processor is specifically used for when judging whether V-PLMN supports credible access net:
    Judge in the service provider list trusted status comprising the V-PLMN and the V-PLMN indicate whether as It is credible, if the trusted status of the V-PLMN included in the service provider list be designated as it is credible, it is determined that it is described V-PLMN supports credible access net.
  28. 28. terminal as claimed in claim 25, which is characterized in that the H-ANDSF strategies include the V-PLMN and support Access the instruction of net trusted status;
    The processor is specifically used for when judging whether V-PLMN supports credible access net:
    Judge whether included in the trusted status instruction for the access net that the V-PLMN included in the H-ANDSF strategies is supported Trusted status, if be designated as can for the trusted status of access net that the V-PLMN that is included in the H-ANDSF strategies is supported Letter, it is determined that V-PLMN supports credible access net.
  29. 29. such as claim 25-28 any one of them terminals, which is characterized in that the H-ANDSF strategies and/or the V- Net also is accessed comprising untrusted in ANDSF strategies, wherein, it is included in the H-ANDSF strategies and/or the V-ANDSF strategies Credible access net as target access network selection priority higher than untrusted access net.
  30. 30. terminal as claimed in claim 29, which is characterized in that further included in the V-ANDSF strategies:Access net The trusted status instruction of SSID, access net, the trusted status of the access net include:Credible or untrusted;
    The processor is specifically used in the credible access net included in obtaining V-ANDSF strategies:From V-ANDSF strategies The middle mark for obtaining trusted status in access net and being designated as believable access net, and using the marked access net of the mark as First preferred access network of target access network.
  31. 31. terminal as claimed in claim 29, which is characterized in that further included in the H-ANDSF strategies:Access net The trusted status instruction of SSID, access net, the trusted status of the access net include:Credible or untrusted;
    The processor is specifically used for when obtaining the credible access net that H-ANDSF strategies include:From the H-ANDSF strategies The mark that trusted status in access net is designated as believable access net is obtained, and using the marked access net of the mark as mesh The second preferred access network that tag splice networks.
  32. 32. terminal as claimed in claim 29, which is characterized in that in the H-ANDSF strategies, further include:Routing iinformation;
    The route-type of the routing iinformation, including at least one of home-routed routings, local-breakout routings.
  33. 33. terminal as claimed in claim 32, which is characterized in that the routing iinformation is used to judge whether target access network needs It to establish and connect with home domain PGW, specially:
    If the routing iinformation shows that the route-type is route for home-routed, the target access network needs are judged It establishes and connects with the home domain PGW;
    If the routing iinformation show the route-type for local-breakout route, judge the target access network without It need to establish and connect with the home domain PGW.
  34. 34. terminal as claimed in claim 33, which is characterized in that further included in the V-ANDSF strategies:The V-ANDSF Access net and the PLMN identification informations for the PGW that can be connect in strategy.
  35. 35. terminal as claimed in claim 34, which is characterized in that the processor included in V-ANDSF strategies are obtained During credible access net, it is specifically used for:
    The mark that trusted status in the access net of the V-PLMN is designated as believable access net is obtained from the V-ANDSF strategies Know;
    Routing iinformation in the H-ANDSF strategies judges whether target access network needs to establish with the home domain PGW Connection if the determination result is YES, then judges credible access net in the V-ANDSF strategies and the PGW's that can connect Whether identified in PLMN identification informations comprising H-PLMN;
    If the credible access net is identified with including the H-PLMN in the PLMN identification informations for the PGW that can be connect, Credible access net in the V-ANDSF strategies is set as to the first preferred access network of target access network.
  36. 36. such as claim 30 or 31 or 35 any one of them terminals, which is characterized in that the first preferred access network conduct The selection priority of target access network is higher than the selection priority of second preferred access network, second preferred access network Priority is selected higher than the selection priority of untrusted access net.
CN201380000953.1A 2013-07-17 2013-07-17 A kind of method, apparatus and terminal of preferably believable WLAN accesses net Active CN104521293B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/079549 WO2015006943A1 (en) 2013-07-17 2013-07-17 Method, apparatus and terminal for preferentially selecting trusted wlan access network

Publications (2)

Publication Number Publication Date
CN104521293A CN104521293A (en) 2015-04-15
CN104521293B true CN104521293B (en) 2018-06-15

Family

ID=52345707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380000953.1A Active CN104521293B (en) 2013-07-17 2013-07-17 A kind of method, apparatus and terminal of preferably believable WLAN accesses net

Country Status (2)

Country Link
CN (1) CN104521293B (en)
WO (1) WO2015006943A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017113385A1 (en) * 2015-12-31 2017-07-06 华为技术有限公司 Method for data distribution, and user equipment and system thereof
CN106912051B (en) * 2017-02-27 2020-05-15 工业和信息化部电信研究院 Method and client for automatically accessing network in operated open network
CN115379535A (en) * 2021-05-18 2022-11-22 华为技术有限公司 Method and device for determining network selection strategy

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060029027A1 (en) * 2004-08-09 2006-02-09 Adrian Buckley Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
CN101577909B (en) * 2008-05-05 2011-03-23 大唐移动通信设备有限公司 Method, system and device for acquiring trust type of non-3GPP access system
CN101945446B (en) * 2009-07-10 2013-12-04 中兴通讯股份有限公司 Method and system for processing strategy conflict by user equipment
US8971239B2 (en) * 2009-08-24 2015-03-03 Kabushiki Kaisha Toshiba PLMN selection and inter-system mobility policy conflict resolution for multi-interface user

Also Published As

Publication number Publication date
WO2015006943A1 (en) 2015-01-22
CN104521293A (en) 2015-04-15

Similar Documents

Publication Publication Date Title
CN105682015B (en) A kind of method and apparatus for being used to set up wireless connection
CN103891355B (en) A kind of method of service register and discovery, equipment and system
CN104980993B (en) Network access method, mobile communication terminal, network server and network access system
CN104853413B (en) A kind of method for network access and mobile communication terminal
CN104247505B (en) For the system and method using ANQP server-capabilities enhancing ANDSF
CN103428082B (en) Dynamic control of data Path Method and its gateway and network equipment
CN103299683A (en) System, method and apparatus for dynamic wireless network discovery
CN104066154B (en) Select WLAN WLAN operators and the method and user equipment of WLAN
WO2015154454A1 (en) Wireless network connection method and device
JP4714261B2 (en) Optimal selection of communication networks in the location area of terminal equipment
CN106465237B (en) Wireless communications method, processor and wireless terminal
CN104853404B (en) A kind of method for network access and mobile communication terminal
RU2011120457A (en) METHODS AND DEVICE FOR SELECTING A SYSTEM IN A MULTI-MODE WIRELESS DEVICE
CN103813415B (en) Network insertion and tactful sending method and equipment
CN110602765B (en) Network selection method and device
CN104521293B (en) A kind of method, apparatus and terminal of preferably believable WLAN accesses net
CN106255106A (en) A kind of wireless network connecting method and device
CN107094305A (en) A kind of cut-in method of wireless network, device and user terminal
CN111835638A (en) Policy rule issuing method, device and system
CN108834196A (en) A kind of sending, receiving method and equipment of the access information of wireless access point
CN103686929B (en) A kind of method and apparatus informing WAP Service Virtual provider
CN104703254A (en) Method and device for network access
CN104853412B (en) A kind of method for network access and mobile communication terminal
CN110234156A (en) A kind of method and apparatus of network selection
JP6478367B2 (en) INFORMATION MANAGEMENT DEVICE, LOCAL NETWORK SYSTEM, INFORMATION MANAGEMENT METHOD, AND INFORMATION MANAGEMENT PROGRAM

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant