CN106303905B - Communication method and device - Google Patents

Communication method and device Download PDF

Info

Publication number
CN106303905B
CN106303905B CN201510275202.1A CN201510275202A CN106303905B CN 106303905 B CN106303905 B CN 106303905B CN 201510275202 A CN201510275202 A CN 201510275202A CN 106303905 B CN106303905 B CN 106303905B
Authority
CN
China
Prior art keywords
dsc
information
message
service
core network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510275202.1A
Other languages
Chinese (zh)
Other versions
CN106303905A (en
Inventor
焦斌
谌丽
秦飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Telecommunications Technology CATT
Datang Mobile Communications Equipment Co Ltd
Original Assignee
China Academy of Telecommunications Technology CATT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Telecommunications Technology CATT filed Critical China Academy of Telecommunications Technology CATT
Priority to CN201510275202.1A priority Critical patent/CN106303905B/en
Priority to PCT/CN2016/082328 priority patent/WO2016188346A1/en
Publication of CN106303905A publication Critical patent/CN106303905A/en
Application granted granted Critical
Publication of CN106303905B publication Critical patent/CN106303905B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Abstract

The invention discloses a communication method and equipment, comprising the following steps: receiving a communication request message of a terminal node on a distributed service center, wherein the communication request message carries an identifier of the terminal node; sending a communication processing message of the end node to a core network, wherein the communication processing message carries an identifier of the end node; and after receiving the communication processing message sent to the core network by the distributed service center, returning a communication response message to the end node. The invention can not only greatly reduce the burden of the access device on the core network storage and the signaling processing. And the control function is localized, so that the time delay caused by the control plane signaling process is greatly shortened.

Description

Communication method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a communication method and device for machine type devices.
Background
Fig. 1 is a schematic diagram of an architecture of a conventional cellular network, and as shown in the diagram, in the conventional cellular system, a terminal determines a serving base station according to a downlink pilot signal strength, and the serving base station is responsible for providing a data transmission service for an access terminal. And the service base station forwards the uplink data received from the terminal to the core network. The core network is responsible for verifying the terminal identity, storing the terminal context information and providing the access terminal with the connection service to the external network.
In the prior art, a terminal completes a registration process with a network through an Attach (Attach) process. In the process of registering the terminal with the network, a core network MME (Mobility Management Entity) Entity is responsible for storing state information of the terminal, including security context information, activation session information, location area information, and the like. The state information of the terminal is stored in the core network, and thus, if the access terminal is a machine type terminal, there are two problems.
First, since the number of machine type terminals will far exceed the number of existing terminals in the future (which is predicted to be on the order of 500 to 1000 billion), if a complete context is to be established for each machine type terminal in the core network, the core network will be overwhelmed with storage. In addition, the connection management function of the existing terminal also relates to the core network, which means that a large amount of signaling to the core network is generated each time the terminal enters a connection state, and a signaling storm is easily caused after a large amount of machine type terminals are accessed to the network.
Disclosure of Invention
The invention provides a communication method and equipment, which are used for reducing the burden of access equipment on core network storage and signaling processing.
The embodiment of the invention provides a communication method, which comprises the following steps:
receiving a communication request message of an EP on a DSC, wherein the communication request message carries an identification of the EP;
sending a communication processing message of the EP to a core network, wherein the communication processing message carries an identification of the EP;
a communication response message is returned to the EP.
The embodiment of the invention provides a communication method, which comprises the following steps:
sending a communication request message to the DSC, wherein the communication request message carries an identification of the EP;
and receiving a communication response message returned by the DSC.
The embodiment of the invention provides a communication method, which comprises the following steps:
receiving a communication processing message sent by a DSC to a core network, wherein the communication processing message carries an identification of an EP;
and returning a communication processing response message to the DSC, wherein the communication processing response message carries the identification of the EP.
An embodiment of the present invention provides a communication device, including:
a terminal information receiving module, configured to receive, on a DSC, a communication request message of an EP, where the communication request message carries an identifier of the EP;
a core network information sending module, configured to send a communication processing message of the EP to a core network, where the communication processing message carries an identifier of the EP;
and the terminal information sending module is used for returning the communication response message to the EP.
An embodiment of the present invention provides a communication device, including:
a DSC information sending module, configured to send a communication request message to a DSC, where the communication request message carries an identifier of an EP;
and the DSC information receiving module is used for receiving the communication response message returned by the DSC.
An embodiment of the present invention provides a communication device, including:
an information receiving module, configured to receive a communication processing message sent by a DSC to a core network, where the communication processing message carries an identifier of an EP;
and the information sending module is used for returning a communication processing response message to the DSC, wherein the communication processing response message carries the identification of the EP.
The invention has the following beneficial effects:
in the embodiment of the invention, the control function of the network to the terminal EP is transferred to the DSC on the local access network, so that the burden of the access equipment on the storage of the core network and the signaling processing can be greatly reduced. And the control function is localized, so that the time delay caused by the control plane signaling process is greatly shortened.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a diagram of a conventional cellular network architecture;
FIG. 2 is a block diagram of a wireless communication system according to an embodiment of the present invention;
FIG. 3 is a flow chart illustrating an implementation of a communication method implemented by the DSC in an embodiment of the present invention;
fig. 4 is a schematic flow chart of a communication method implemented on an EP according to an embodiment of the present invention;
fig. 5 is a schematic flow chart of a communication method implemented on a core network according to an embodiment of the present invention;
fig. 6 is a schematic flow chart of an EP attachment network according to an embodiment of the present invention;
fig. 7 is a schematic diagram of an implementation flow of triggering detachment of a terminal EP in the embodiment of the present invention;
fig. 8 is a schematic diagram illustrating an implementation flow of triggering periodic status update by a terminal EP according to an embodiment of the present invention;
fig. 9 is a schematic diagram of an implementation flow of triggering service activation of a terminal EP in the embodiment of the present invention;
fig. 10 is a schematic diagram of an implementation flow of service deactivation initiated by an MTC class terminal in an embodiment of the present invention;
fig. 11 is a schematic diagram of an implementation flow of service deactivation for a cluster triggered by a core network in an embodiment of the present invention;
fig. 12 is a schematic diagram illustrating an implementation flow of service disabling for a terminal triggered by a core network according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a communication device on the DSC in an embodiment of the present invention;
fig. 14 is a schematic diagram of a communication device on an EP in an embodiment of the present invention;
fig. 15 is a schematic structural diagram of a communication device on a core network according to an embodiment of the present invention;
FIG. 16 is a schematic view of a DSC structure in accordance with an embodiment of the present invention;
fig. 17 is a schematic diagram of an EP structure in an embodiment of the present invention.
Detailed Description
The following describes embodiments of the present invention with reference to the drawings.
In view of the quantity and the characteristics of the machine type terminals, the probability of signaling storm and the like is avoided in order to reduce the burden of a core network. In the technical scheme provided by the embodiment of the invention, the state context and the basic function of the machine type terminal are managed by accessing the local authorization equipment, and only a small amount of terminal subscription information, terminal basic state information and DSC information serving for the terminal are saved in a core network.
The following description will first be made of an implementation environment.
In a Bluetooth system of a MESH (self-organizing or non-fixed infrastructure) network model, a cluster head and a series of end nodes (EndPoint) form a cluster, and EndPoint communication in the cluster is controlled through cluster head equipment. The intra-cluster communication adopts a 2.4GHz public frequency band, and interference is avoided in a frequency hopping mode. And statically configured channels and security parameters are adopted between the cluster head and EndPoint. The clusters are independent from each other, and EndPoint members in different clusters cannot communicate with each other.
Fig. 2 is a schematic structural diagram of a wireless communication system, as shown, the wireless communication system includes: MESH access network, backhaul network and core network. The MESH access network is connected with the core network through a return network.
The MESH network supports the characteristics of air interface Multi-hop and direct communication between devices through an air interface, and the like, and the MESH access network in the embodiment of the invention has the characteristics of self-organized characteristic (self organized) and unfixed infrastructure (infrastructure) besides the characteristics of the traditional MESH network.
The backhaul networks include wired backhaul networks, wireless backhaul networks, and mobile cellular backhaul networks.
The core network is composed of various special and general servers, data centers, routers and other devices and is responsible for signing and managing various access devices, user identity verification, authentication, policy control, charging management and service management.
The MESH access network mainly provides services for machine type access devices (MTC), wherein Sensor devices (e.g., temperature sensors, pressure sensors, cameras, etc.), actuators (e.g., accelerators, brakes, steering gears, mechanical arms, etc.) and physical entities (e.g., automobiles, bicycles, helmets, glasses, smartwatches, unmanned aerial vehicles, etc.) may be bound to the EndPoint.
Before the specific system architecture is introduced, the interfaces in the following figure are introduced:
me1 interface: the interface established between DSC and NSC.
Me2 interface: an interface established between the DSC and DSC.
Me3 interface: DSC and EP (end node).
Me4 interface: an interface established between the EP and the EP.
The MESH access network comprises at least one DSC and at least one EP, and the core network comprises at least one NSC.
Each entity is described separately below.
1. End node EndPoint (EP):
the EP is an MTC type access device or wearable device with a communication function, and obtains data transmission service through accessing a cluster. Can bind to specific physical equipment such as various sensor sensors, actuators, accelerators, arresting gear, mechanical arms, aircraft, car, bicycle, safety helmet, smart glasses, smart watch, etc. Depending on the particular physical device to which it is bound, an EP having a different communication function may be selected. A general EP is a communication scenario oriented to short range (e.g., less than 100m), low data rates (e.g., less than 1000 bits/s). Embodiments of the present invention are equally applicable to long-range high-rate EP's.
2. Distributed service center (dsc):
the DSC is used for transmitting information related to the EP in the corresponding cluster with the core network through the backhaul network; wherein a DSC is linked to each EP in the corresponding cluster. The DSC as a function can be configured to various apparatuses including hardware apparatuses such as a mobile terminal apparatus, a base station apparatus, and a server apparatus.
The DSC forms clusters (Cluster) with surrounding and DSC-linked EndPoints.
The DSC is responsible for managing and maintaining the clusters. Specifically, the DSC manages EPs in the corresponding cluster, and coordinates communication with other neighboring clusters, as well as performs interference management.
If the MESH access network shares radio resources with other wireless networks, the DSC may also coordinate interference with neighboring or co-covering inter-system radio resource control entities and perform inter-system communication with inter-systems. For example, the DSC may notify surrounding DSCs or LSCs of time or frequency information of radio resources allocated for "intra-cluster communication";
accordingly, surrounding DSCs, LSCs avoid using the same time or frequency for communication.
The DSC can also inform surrounding DSCs or LSCs of interference information measured by the DSC per se or EP in the cluster; correspondingly, surrounding DSCs or LSCs determine that they interfere with other clusters or "local access network" communications, and may reduce interference by reducing transmission power.
In terms of business layer and cluster member management: the DSC is responsible for participating in maintaining the member list, verifying the identity of the cluster members and maintaining the equipment types and service requirements associated with EndPoint.
MESH access network layer: the DSC is also responsible for coordinating communications with other neighboring clusters, as well as interference management, as a control point for the clusters.
In terms of cross-system collaboration: for the case that the MESH access network shares radio resources with other wireless networks (e.g., cellular), the DSC is also responsible for coordinating interference with neighboring or co-covering inter-system radio resource control entities and cross-system communication (e.g., the DSC is responsible for coordinating interference coordination with base stations).
In summary, DSC is mainly: the DSC forms clusters (Cluster) with neighboring EndPoints, and the DSC is responsible for managing the "clusters". DSC supports software and hardware decoupling and software configurable functionality. The DSC is responsible for forwarding the authentication information obtained from the EP terminal equipment to the core network and providing access service for the terminal after the EP terminal passes the core network authentication. In addition, the DSC is responsible for notifying the core network of "cluster" information managed by the DSC itself, where the cluster information may include intra-cluster terminal identification information and service information activated by intra-cluster terminals.
3. Network service center (nsc):
the NSC is responsible for terminating the interface from the access network to the control plane of the core network, and supports software and hardware decoupling and software configurable functions. The method comprises the following specific steps:
and the NSC is used for transmitting the received DSC information to the core network through a return network. That is, in terms of connection management, the NSC is responsible for terminating the control plane connection of the MESH access network to the core network.
In the aspect of network layer security, the NSC is responsible for performing identity authentication on the DSC and establishing a secure tunnel.
Specifically, the NSC may authenticate the DSCs, and establish a secure tunnel for transmitting data through the backhaul network between the DSCs after the DSCs pass authentication. For example, the NSC and the DSC realize identity authentication through a certificate mechanism, and establish an IPsec security channel to ensure the security of an Me1 interface.
The NSC may also manage EPs and specific access devices connected to the DSC at the Service layer (Service) and identity layer (identity).
The network controller is responsible for processing control plane signaling received from the MESH access network and the cellular access network, including identity authentication of the EP and the Device, authentication and activation processes of a Device type and a service type associated with the EP, activation of a session to a specific external network for the Device, and the like.
For example, the NSC is responsible for managing the state information of the EP, including trace management (information about "clusters" currently accessed by the EP), session management (e.g., currently activated service of the EP), and identity management (e.g., device type and service type subscribed to by the EP).
In an implementation, the NSCs belong to a central control unit, while the DSCs belong to distributed control units.
In management, the DSC is responsible for controlling local functions with high latency requirements. And the NSC is responsible for controlling functions which are global, have low requirements on time delay and have high requirements on safety.
The core network itself may deploy one or more NSCs, with different NSCs being equal to each other.
The technical scheme provided by the embodiment of the invention has the key points that the signing scheme of the EP terminal is more flexible, and the operator core network can store the identity verification information of the EP terminal and/or the equipment information (signing service information) of the EP terminal obtained from an actual user and store the basic state information after the EP terminal accesses the network. The core network performs managed management on the EP type access terminal through an Authorized Device (Authorized Device) configured with the DSC function. The authorization equipment only needs to sign a contract with an operator, the operator configures the authorization equipment to support the DSC distributed service center function in a software mode, and the authorization equipment configured with the DSC function and the EP type access terminal can form a dynamic network in a self-organizing mode and are managed by the DSC. The DSC reports "group information" (or called "cluster information") of the dynamic network managed by the DSC as a whole to the core network, and the core network can perform functions such as charging, policy control, and the like according to the "group information" or the "cluster information". In addition, the core network can also carry out charging according to the on-network time and the activated service type of the EP type terminal.
Unlike the prior art, the EP-type terminal is visible to the core network, but the operator's subscription management for the EP is more flexible than the prior art, including the EP terminal accessing the network without the need for an advanced USIM (Universal Subscriber identity module) card (e.g., the actual user of the EP, including a factory administrator or a car factory, may synchronize the authentication information of the EP-type terminal to the operator authentication server after purchasing the EP-type terminal and before the EP terminal accesses the network). During the process of accessing the EP network, the DSC notifies the core network of the accessed EP authentication information, and the core network authenticates the EP device according to the EP authentication information obtained from the user (e.g., a factory manager, or a car factory). In the aspect of charging policy, the operator may charge the cluster managed by the DSC as a whole, or may charge the EP terminal separately.
By transferring the control function of the network to the terminal to the local access network, the burden of the access equipment on the storage and signaling processing of the core network can be greatly reduced. And the control function is localized, so that the time delay caused by the control plane signaling process is greatly shortened. The following describes a specific embodiment.
In the description process, the DSC, EP and core network side will be described separately, and then the matching implementation of the three in each stage will be described by way of example, where the stages are: the method comprises a terminal attachment (Attach) network process, a terminal triggered detachment (Detach logout) process, a terminal touch periodic state updating process, a terminal triggered service Activation (Activation) process, an MTC terminal initiated service Deactivation (Deactivation) process, a core network triggered service Deactivation process aiming at a cluster, and a core network triggered service disabling process aiming at a terminal.
It is obvious that the separate description does not mean that the three parts must be implemented together, and actually, when the three parts are implemented separately, the problems of the DSC, EP and the core network side are solved separately, and only when the three parts are used in combination, a better technical effect is obtained.
Fig. 3 is a schematic flow chart of an implementation of the communication method implemented on the DSC, and as shown in the figure, the method may include the following steps:
step 301, receiving a communication request message of an EP on a DSC, where the communication request message carries an identification of the EP;
step 302, sending a communication processing message of the EP to a core network, where the communication processing message carries an identifier of the EP;
step 303, returning a communication response message to the EP.
Fig. 4 is a schematic flow chart of an implementation of a communication method implemented on an EP, which may include the following steps as shown in the figure:
step 401, sending a communication request message to the DSC, where the communication request message carries an EP identifier;
step 402, receiving a communication response message returned by the DSC.
Fig. 5 is a schematic flow chart of an implementation of a communication method implemented on a core network, which may include the following steps as shown in the figure:
step 501, receiving a communication processing message sent by a DSC to a core network, where the communication processing message carries an EP identifier;
step 502, returning a communication processing response message to the DSC, where the communication processing response message carries the identifier of the EP.
Example one
This embodiment is used to illustrate the implementation of an EP attached terminal (Attach) network, and in this flow, DSC, EP, and core network are as follows:
1. on DSC:
when an EP accesses a network, a communication request message received on a DSC is an attachment request message of the EP, and the message also carries identity authentication information of the EP;
the communication processing message sent to the core network is an identity authentication request message of the EP, and the message also carries identity authentication information of the EP;
after the core network returns the identity authentication passing response message, the communication response message returned to the EP is an attachment response message, and a temporary identifier is allocated to the EP.
In the implementation, when the core network returns the response message that the authentication passes and also returns the core network authentication information, the method may further include:
and sending core network verification information to the EP, wherein the core network verification information is used for verifying the legality of the accessed network by the EP.
In practice, in order for the EP to know how to access the DSC, the method may further include:
and broadcasting the attachment information, wherein the information carries information required by accessing the DSC.
Receiving a communication request message of an EP at the DSC, wherein the information carried in the communication request message is the information required by the broadcasting attachment information to access the DSC.
In implementation, after allocating the temporary identifier to the EP and returning the attach response message, the method may further include:
the status information of each accessed EP stored in the DSC is updated.
In the implementation, after updating the state information of each accessed terminal stored in the DSC, the method may further include:
and sending the updated state information of each EP to a core network.
2. On EP:
when an EP accesses a network, a communication request message sent to a DSC is an attachment request message, and the message also carries identity authentication information of the EP;
the communication response message returned by the receiving DSC is an attach response message, and the DSC assigned temporary identity.
In the implementation, the method can further comprise the following steps:
and receiving broadcast attachment information sent by the DSC, wherein the information carries information required by accessing the DSC.
And sending a communication request message to the DSC, wherein the information carried in the communication request message is the information required by the broadcasted attachment information to access the DSC.
In implementation, for the case that multiple DSCs are optional at the same time, when receiving broadcast attachment information sent by multiple DSCs, the DSC to be accessed may also be determined according to the access required information of each DSC and the access requirement of the EP;
the sending of the communication request message to the DSC is the sending of the communication request message to the DSC to be accessed.
In implementation, after receiving the attach response message returned by the DSC and the temporary identifier assigned by the DSC, the method may further include:
an attach complete message is sent to the DSC.
In implementation, when the attach response message carries core network authentication information, before sending an attach complete message to the DSC, the method may further include:
verifying the legality of the accessed network according to the core network verification information;
the sending of the attach complete message to the DSC is sent after the authentication is passed.
3. On the core network side:
a communication processing message sent by the DSC to the core network is an identity authentication request message of the EP, and the message also carries identity authentication information of the EP;
and after the EP passes the authentication according to the identification and/or the authentication information of the EP and the stored subscription information of the EP, the communication processing response message returned to the DSC is an authentication passing response message.
In implementation, when an authentication pass response message is returned to the DSC, the method may further include:
and sending core network verification information to the DSC, wherein the core network verification information is used for verifying the legality of the accessed network by the EP.
In implementation, after returning the authentication passing response message to the DSC, the method may further include:
storing the on-line status information of the EP and the DSC information providing services for the EP.
In the implementation, the method can further comprise the following steps:
receiving the state information of each EP transmitted by the DSC;
and updating the state information of each EP according to the state information of each EP.
In this embodiment, in the attach process, the core network performs authentication on the EP terminal according to authentication information of the EP terminal obtained from a user (e.g., a plant manager or a car factory), and after the EP terminal passes the authentication of the core network, the DSC is responsible for providing an access service for the EP terminal according to the device type of the EP or the service list subscribed by the EP. The core network may perform charging based on the collected on-network status of the EP class terminal (e.g., based on the length of time the EP class terminal is attached to the network).
The following is a description by way of example.
Fig. 6 is a schematic flow chart of an EP attachment network, which may be as follows as shown in the figure:
step 601: the DSC transmits system broadcast information in a broadcast manner, which may carry a network identifier, a DSC identifier, DSC supported service list information, and configuration information required by a terminal to initiate an access procedure.
Step 602: according to the network identifier, the DSC identifier and the DSC support service list information carried in the broadcast message, the terminal can perform a network selection process according to the type of its own device and the type of the network to be accessed, and initiate a network access process according to access configuration information obtained from the system broadcast message after the network selection is completed. In the network access process, the terminal sends an attachment request message to the DSC, wherein the attachment request message carries the fixed identification information of the terminal and the terminal identity authentication information.
Step 603: the DSC sends an authentication request to the core network, wherein the authentication request carries the fixed identifier of the terminal and the terminal authentication information.
Step 604: the core network performs identity authentication (for example, authentication is performed through a security certificate mechanism or the like) on the terminal according to the terminal fixed identifier received from the DSC, the terminal identity authentication information, and the originally stored terminal subscription information. After the terminal identity information is verified, the on-line state information (for example, normal attachment state) of the terminal is saved, and in addition, the service DSC information of the terminal is also saved.
Step 605: after the core network completes the terminal identity authentication, the core network sends the authentication completion to the DSC, and can carry the terminal fixed identifier, the core network authentication information, the security context information aiming at the terminal, and a terminal signing service list.
Step 606: the DSC allocates a terminal temporary identifier for the terminal, establishes a context for the terminal, and stores terminal fixed identifier information, terminal temporary identifier information, terminal security context information and a terminal subscription service list. And the DSC sends an attachment response message to the terminal, wherein the attachment response message carries the temporary identification information of the terminal, the fixed identification information of the terminal and the verification information of the core network.
Step 607: and verifying the network validity by the terminal according to the received core network verification information and in combination with the security context pre-stored by the terminal. The terminal stores the temporary identity information of the slave terminal.
Step 608: after the network validity is verified, the terminal sends an attachment completion message to the DSC, wherein the terminal temporary identification information can be carried.
Step 609: the DSC updates the locally-saved terminal state information (e.g., attached state).
Step 610: and the DSC sends terminal state information to the core network, wherein the terminal state information comprises terminal fixed identification information and terminal on-network state information. The core network (such as a subscription center) stores the network state information of the terminal.
Example two
This embodiment is used to illustrate the implementation of terminal EP triggering Detach (Detach deregistration), in this flow, DSC, EP, and core network are as follows:
1. on DSC:
the communication request message received on the DSC is an attachment removal request message of an EP, and the message also carries a temporary identifier of the EP;
the communication processing message of the EP sent to the core network is a state updating message of the EP;
the communication response message returned to the EP is a detach response message.
2. On EP:
the communication request message sent to the DSC is a detach request message, and the message also carries a temporary identifier of the EP;
the communication response message returned by the receiving DSC is a detach response message.
3. On the core network side:
receiving an EP state updating message sent to a core network by a DSC;
the state information of the EP is updated according to the state information of the EP.
The following is a description by way of example.
Fig. 7 is a schematic diagram of an implementation flow of triggering detachment of a terminal EP, as shown in the figure, it can be as follows:
step 701: the detach (deregistration) procedure is triggered, for example, before the terminal is to be removed or powered off.
Step 702: the terminal sends a detach request message to the DSC, where the terminal temporary identity may be carried.
Step 703: the DSC sends a terminal status update message to the core network, carrying the terminal fixed identity and the on-network status information (e.g., off-line status). The core network (such as a subscription center HSS) updates the on-network state of the terminal to the off-network state.
Step 704: the DSC deletes the locally stored terminal context information.
Step 705: the DSC sends a detach response message to the terminal, and can carry the temporary identifier of the terminal.
EXAMPLE III
This embodiment is used to describe the implementation of triggering periodic status update by a terminal EP, in this flow, DSC, EP, and core network are as follows:
1. on DSC:
the communication request message of the EP received on the DSC is a state update request message periodically sent by the EP, and the message also carries a temporary identifier of the EP;
the communication processing message sent to the core network is a terminal state updating request message;
the communication response message returned to the EP is a status update response message.
In the implementation, the method can further comprise the following steps:
the timer for updating the state information of the EP is reset according to the temporary identification of the EP.
2. On EP:
the communication request message sent to the DSC is a state update request message sent periodically, and the message also carries a temporary identifier of the EP;
the communication response message returned by the receiving DSC is a status update response message.
3. On the core network side:
receiving a terminal state updating request message of an EP (Internet protocol) sent to a core network by a DSC (dynamic stability control) and carrying an identification of the EP;
and updating the state information of the EP according to the terminal state information and the identification of the EP.
In this embodiment, after the terminal successfully attaches to the network, the terminal side and the DSC will respectively start the status update timer. The terminal initiates a state updating process to the network after the timer is overtime, if the DSC does not receive the state updating message of the terminal after the timer T1 is overtime, the DSC considers that the terminal is in an abnormal attachment state, and implicitly releases the context of the terminal after the timer T2 is overtime.
The following is a description by way of example.
Fig. 8 is a schematic diagram of a terminal EP triggering periodic status update implementation flow, as shown in the figure, as follows:
step 801: and after the state updating timer is overtime, the terminal triggers a periodic state updating process.
Step 802: the terminal sends a status update request message to the DSC, and can carry the temporary identifier of the terminal at the same time.
Step 803: and the DSC determines the context of the terminal according to the temporary identifier of the terminal and updates the state information of the terminal in the context of the terminal. Including resetting the local state update timing T1.
Step 804: the DSC sends a status update response message to the terminal, and may simultaneously carry the temporary identifier of the terminal.
Step 805: and the DSC sends a terminal state updating message to the core network, wherein the terminal fixed identification information and the terminal on-network state updating information are carried. And the core network updates the stored terminal on-network state information.
Example four
This embodiment is used to describe the implementation of the terminal EP trigger service Activation (Activation), in this process, the DSC, the EP, and the core network are respectively as follows:
1. on DSC:
the communication request message received on the DSC is a service activation request message, and the message also carries service identification information;
when the DSC is authorized to provide the service corresponding to the service identification for the EP in the cluster, the communication response message returned to the EP is a service activation response message;
or, when the DSC is not authorized to provide the service corresponding to the service identifier to the EP in the cluster, the communication processing message sent to the core network is a service authorization update request message, and after being authorized, the communication response message returned to the EP is a service activation response message.
In the implementation, after returning the service activation response message to the EP, the method may further include:
and updating the state information of each accessed EP activation service saved on the DSC.
2. On EP:
the communication request message sent to the DSC is a service activation request message, and the message also carries service identification information;
the communication response message returned by the receiving DSC is a service activation response message.
3. On the core network side:
the communication processing message sent by the DSC to the core network is a service authorization update request message;
when determining that the service authorization is performed on the cluster managed by the DSC, the communication processing response message returned to the DSC is a service authorization response message, and the service authorization response message is used for indicating the service type provided by the DSC to the EP in the cluster.
In implementation, after returning the service authorization response message to the DSC, the method may further include:
record the cluster-activated traffic type managed by the DSC.
In this embodiment, since the information of the terminal itself is visible to the core network, and the DSC may notify the state information of the EP terminal and the activation service information to the core network, the core network may perform charging according to the on-network state of the EP terminal and whether to activate the service state.
The following is a description by way of example.
Fig. 9 is a schematic diagram of an implementation flow of triggering service activation of a terminal EP, as shown in the figure, it may be as follows:
step 901: the terminal initiates a service activation request under the condition that a new service needs to be activated, and carries service identification information or terminal type information through a service request message. For example, the terminal is a camera device and requests a real-time video return service; for another example, the terminal is a sensor and requests real-time return service for data samples acquired by the sensor.
Step 902: according to the received terminal identification information and the activated service type, if the DSC pre-stores the terminal subscription service list, the DSC first determines whether the terminal is authorized to activate the service type. In addition, the DSC determines whether it is authorized by the core network to provide corresponding services (e.g., real-time video backhaul) to the members in the cluster (in the group). If authorized, step 904 is performed directly, otherwise step 903 is performed.
Step 903: if the DSC is not authorized by the core network to provide the corresponding service (e.g., real-time video backhaul) to the members in the cluster (in the group). The DSC initiates a cluster (group) service authorization update request procedure to the core network. The core network will indicate whether the DSC can provide a new service type within the cluster. The core network records the cluster-activated traffic types managed by the DSC. The DSC will update its own locally stored cluster (group) authorization service list information.
Step 904: if the DSC gets the core network authorization to provide the corresponding service type (e.g., real-time video backhaul). The DSC transmits a service activation response message to the terminal. And may carry the terminal temporary identification information for terminal reception.
Step 905: and after the service is activated, the terminal sends a service activation completion message to the DSC, and carries the terminal temporary identifier.
Step 906: and the DSC updates the state information of the terminal activation service in the locally stored terminal context.
Step 907: and the DSC sends a terminal state updating message to a core network, wherein the terminal state updating message carries a terminal fixed identifier and a terminal activation service identifier, and the core network stores the terminal activation service information.
EXAMPLE five
This embodiment is used to illustrate the implementation of service Deactivation (Deactivation) initiated by an MTC terminal, in this flow, DSC, EP, and core network are as follows:
1. on DSC:
the communication request message received on the DSC is a service deactivation request message of the EP, and the message also carries service identification information;
the communication processing message sent to the core network is a cluster service authorization update message;
the communication response message returned to the EP is a service deactivation message.
In the implementation, after returning the service deactivation message to the EP, the method may further include:
and updating the state information of each accessed EP activation service saved on the DSC.
In the implementation, after returning the service activation response message to the EP, the method may further include:
and updating the state information of each accessed EP activation service saved on the DSC.
2. On EP:
the communication request message sent to the DSC is a service deactivation request message, and the message also carries service identification information;
the communication response message returned by the receiving DSC is a service deactivation message.
In implementation, after receiving the service deactivation message returned by the DSC, the method may further include:
a traffic deactivation complete message is sent to the DSC.
3. On the core network side:
receiving an EP state updating message sent to a core network by a DSC;
the state information of the EP is updated according to the state information of the EP.
The following is a description by way of example.
Fig. 10 is a schematic view of an implementation flow of service deactivation initiated by an MTC terminal, as shown in the figure, the following is shown:
step 1001: after the terminal determines to deactivate the service, the terminal sends a service deactivation request to the DSC, which may carry service identification information or terminal type information. In addition, the portable terminal temporary identification information helps the DSC identify the terminal.
Step 1002: and the DSC determines the service type to be deactivated by the terminal according to the service identifier or the terminal type, and updates the terminal activation service type information stored in the terminal context.
Step 1003: the DSC transmits a service deactivation command to the terminal, where temporary identification information of the terminal can be carried.
Step 1004: the terminal sends a service activation completion message to the DSC, where the terminal temporary identification information can be carried.
Step 1005: the DSC determines whether the authorization service list needs to be updated. For example, if the DSC authorization list includes (video live backhaul service), there is no terminal in the cluster that the DSC is responsible for managing that activates the service. The DSC may initiate a cluster (group) service authorization update procedure to the core network to update the DSC authorization service list.
Step 1006: after the DSC determines to update the authorization service list information, the DSC initiates a cluster (group) service authorization update process to the core network.
Step 1007: the DSC sends a terminal state updating message to a core network, wherein the terminal state updating message carries a terminal fixed identifier and a deactivation service identifier, and the core network updates terminal activation service information stored by the core network.
EXAMPLE six
This embodiment is used to illustrate the implementation of service deactivation for a cluster triggered by a core network, in this flow, a DSC, an EP, and a core network are respectively as follows:
1. on DSC:
receiving a cluster service authorization updating message sent by a core network;
determining an EP according to the cluster service authorization update message, wherein the service activated on the EP is an unauthorized service;
a traffic deactivation message is sent to the EP.
2. On EP:
and receiving a service deactivation message sent by the DSC.
3. On the core network side:
determining a service authorization execution state of a cluster managed by a DSC;
and sending a cluster service authorization update message to the DSC according to the execution state.
The following is a description by way of example.
Fig. 11 is a schematic diagram of a service deactivation implementation flow triggered by a core network and directed to a cluster, as shown in the figure, the service deactivation implementation flow may be as follows:
step 1101: in the case that part or all of the service authorization authorized by the core network for a specific DSC is overtime or invalid (for example, the service authorization based on time is overtime, or a user account corresponding to the DSC is owed), the core network may initiate a cluster (group) service authorization update procedure.
Step 1102: the DSC locally saves the updated cluster (group) service authorization information.
Step 1103: the DSC determines whether a cluster (group) terminal activates an unauthorized service. If there is a terminal with unauthorized activated service still in the activated state, the DSC will trigger the service deactivation process for the specific terminal.
Step 1104: the DSC sends a service deactivation command to the terminal, and if the terminal activates a plurality of services at the same time, the DSC can carry the service deactivation identification information. In addition, the portable terminal temporary identifier is used for judging whether the message is directed to the portable terminal.
Step 1105: after the service deactivation is completed, the terminal sends a service deactivation completion message to the DSC, and the terminal temporary identification information can be carried.
Step 1106: and after receiving the service deactivation completion message, the DSC updates the service activation information in the locally stored terminal context.
Step 1107: if the state of the service activated by the terminal changes (for example, is deactivated), the DSC sends a terminal state update message to the core network, and can carry the terminal fixed identifier and the deactivation service identifier.
EXAMPLE seven
This embodiment is used to describe implementation of service disabling for a terminal triggered by a core network, in this flow, DSC, EP, and the core network are respectively as follows:
1. on DSC:
receiving a service forbidding indication message sent by a core network, wherein the message carries an EP (Internet protocol) identifier and a forbidden service identifier;
determining the EP according to the EP identifier and the forbidden service identifier;
and sending a service deactivation message aiming at the service to the EP according to the forbidden service identification.
2. On EP:
and receiving a service deactivation message sent by the DSC.
3. On the core network side:
sending a service forbidding indication message to the DSC, wherein the message carries an EP identifier and a forbidden service identifier;
receiving a service forbidding completion message sent by a DSC, wherein the message carries an EP identifier and a forbidden service identifier;
and updating the state information of the EP according to the identification of the EP and the forbidden service identification.
In this embodiment, the core network may trigger a service disabling process for the terminal when discovering that the terminal subscription service is invalid (for example, the time of the user subscription service is one week), or discovering that the service activated by the terminal is inconsistent with the subscription service (for example, the terminal is subscribed with the sensor data acquisition service and actually activated is the video data acquisition service).
The following is a description by way of example.
Fig. 12 is a schematic diagram of an implementation flow of service disabling for a terminal triggered by a core network, as shown in the figure, the following may be implemented:
step 1201: and under the condition that the subscription of the terminal to the specific service is invalid or the service activated by the terminal is inconsistent with the subscription activation service, the core network triggers the service process of the terminal. The core network determines the DSC of the terminal service according to the terminal state information stored by the core network, and sends a service forbidding indication message to the target DSC, wherein the service forbidding indication message carries a terminal fixed identifier, a forbidden service identifier and service list information signed by the terminal.
Step 1202: the DSC locally saves the terminal subscription service list information and triggers a deactivation process for the forbidden service.
Step 1203: the DSC sends a service deactivation command to the terminal, wherein the service deactivation command carries identification information of the deactivation service and can carry temporary identification information of the terminal.
Step 1204: and after finishing the service deactivation operation, the terminal sends a service deactivation completion message to the DSC, wherein the temporary identification information of the terminal can be detailed.
Step 1205: and the DSC sends a service forbidding completion message to the core network, wherein the service forbidding completion message carries the terminal fixed identification information. And the core network stores the updated terminal activation service information.
Step 1206: the DSC determines whether the authorization service list needs to be updated. For example, if the DSC authorization list includes (video live backhaul service), there is no terminal in the cluster that the DSC is responsible for managing that activates the service. The DSC may initiate a cluster (group) service authorization update procedure to the core network to update the DSC authorization service list.
Step 1207: after the DSC determines to update the authorization service list information, the DSC initiates a cluster (group) service authorization update process to the core network.
Based on the same inventive concept, the embodiment of the present invention further provides a communication device, and as the principle of solving the problem of these devices is similar to that of a communication method, the implementation of these devices may refer to the implementation of the method, and repeated details are not described again.
Fig. 13 is a schematic structural diagram of a communication device on a DSC, as shown, it may include:
a terminal information receiving module 1301, configured to receive, on a DSC, a communication request message of an EP, where the communication request message carries an identifier of the EP;
a core network information sending module 1302, configured to send a communication processing message of the EP to a core network, where the communication processing message carries an identifier of the EP;
and a terminal information sending module 1303, configured to return a communication response message to the EP.
In implementation, the terminal information receiving module is further configured to receive an attachment request message of the EP on the DSC when the EP accesses the network, where the message also carries the authentication information of the EP;
the core network information sending module is further used for sending an identity authentication request message of the EP to a core network, wherein the message also carries identity authentication information of the EP;
the terminal information sending module is further used for returning an attachment response message to the EP and allocating a temporary identifier to the EP after the core network returns an authentication passing response message.
In implementation, the terminal information sending module is further configured to send core network authentication information to the EP when the core network returns an authentication pass response message and also returns core network authentication information, where the core network authentication information is used for the EP to perform validity authentication on an accessed network.
In implementation, the terminal information sending module is further configured to broadcast the attachment information, where the information carries information required for accessing the DSC;
the terminal information receiving module is further configured to receive, at the DSC, a communication request message of the EP, where information carried in the communication request message is information required by the broadcasted attachment information to access the DSC.
In an implementation, the DSC information updating module 1304 is configured to, after assigning a temporary identifier to an EP and returning an attach response message, update the state information of each accessed EP stored in the DSC.
In an implementation, the core network information sending module is further configured to, after updating the state information of each accessed terminal stored in the DSC, send the updated state information of each EP to the core network.
In implementation, the terminal information receiving module is further configured to receive a detach request message of the EP on the DSC, where the message also carries a temporary identifier of the EP;
the core network information sending module is further used for sending the state updating information of the EP to a core network;
the terminal information sending module is further used for returning a detach response message to the EP.
In implementation, the terminal information receiving module is further configured to receive, on the DSC, a status update request message periodically sent by the EP, where the message also carries a temporary identifier of the EP;
the core network information sending module is further used for sending a terminal state updating request message to the core network;
the terminal information sending module is further used for returning a status update response message to the EP.
In an implementation, the DSC information update module is further configured to reset a timer for updating the status information of an EP according to the temporary identifier of the EP.
In implementation, the terminal information receiving module is further configured to receive a service activation request message on the DSC, where the message also carries service identification information;
the terminal information sending module is further used for returning a service activation response message to the EP when the DSC is authorized to provide the service corresponding to the service identifier for the EP in the cluster;
or, the core network information sending module is further configured to send a service authorization update request message to the core network when the DSC is not authorized to provide the service corresponding to the service identifier for the EP in the cluster;
the terminal information sending module is further used for returning a service activation response message to the EP after the authorization is obtained.
In implementation, the DSC information updating module is further configured to update the state information of each EP activation service that is accessed and stored on the DSC after returning a service activation response message to the EP.
In the implementation, the method can further comprise the following steps:
a core network information receiving module 1305, configured to receive a cluster service authorization update message sent by a core network;
the terminal information sending module is further used for sending a service deactivation message to the EP after determining the EP according to the cluster service authorization update message, wherein the service activated on the EP is an unauthorized service.
In the implementation, the method can further comprise the following steps:
a core network information receiving module, configured to receive a service disabling indication message sent by a core network, where the message carries an EP identifier and a disabled service identifier;
the terminal information sending module is further configured to send a service deactivation message for the service to the EP according to the disabled service identifier after determining the EP according to the identifier of the EP and the disabled service identifier.
In implementation, the terminal information receiving module is further configured to receive a service deactivation request message of the EP on the DSC, where the message also carries service identification information;
the core network information sending module is further used for sending a cluster service authorization updating message to the core network;
the terminal information sending module is further used for returning a service deactivation message to the EP.
In implementation, the DSC information updating module may further be configured to update the state information of each EP activation service that is accessed and stored on the DSC after a service deactivation message is returned to the EP.
In implementation, the DSC information updating module may further be configured to update the state information of each EP activation service accessed by the DSC after returning a service activation response message to the EP.
Fig. 14 is a schematic structural diagram of a communication device on an EP, which may include:
a DSC information sending module 1401, configured to send a communication request message to a DSC, where the communication request message carries an identifier of an EP;
and a DSC information receiving module 1402, configured to receive a communication response message returned by the DSC.
In implementation, the DSC information sending module is further configured to send an attach request message to the DSC when the EP accesses the network, where the message also carries the identity authentication information of the EP;
the DSC information receiving module is further used for receiving DSC return attach response message, and DSC assigned temporary identification.
In implementation, the DSC information receiving module is further configured to receive broadcast attachment information sent by the DSC, where the information carries information required to access the DSC.
The DSC information sending module is further configured to send a communication request message to the DSC, where information carried in the communication request message is information required by the broadcasted attachment information to access the DSC.
In implementation, the DSC information sending module may be further configured to determine, when receiving broadcast attachment information sent by multiple DSCs, a DSC to be accessed according to access required information of each DSC and an access requirement of an EP; and sends a communication request message to the DSC to be accessed.
In an implementation, the DSC information sending module may be further configured to send an attach complete message to the DSC after receiving an attach response message returned by the DSC and the temporary identifier assigned by the DSC.
In implementation, the DSC information sending module may be further configured to, when the attach response message carries core network verification information, perform validity verification on an accessed network according to the core network verification information; and sending an attachment completion message after the verification is passed.
In implementation, the DSC information sending module is further configured to send an detach request message to the DSC, where the message also carries a temporary identifier of the EP;
the DSC information receiving module is further configured to receive a detach response message returned by the DSC.
In implementation, the DSC information sending module is further configured to periodically send a status update request message to the DSC, where the message also carries a temporary identifier of the EP;
the DSC information receiving module is further configured to receive a DSC return status update response message.
In implementation, the DSC information sending module is further configured to send a service activation request message to the DSC, where the message also carries service identification information;
the DSC information receiving module is further configured to receive a service activation response message returned by the DSC.
In an implementation, the DSC information receiving module may be further configured to receive a service deactivation message sent by the DSC.
In implementation, the DSC information sending module is further configured to send a service deactivation request message to the DSC, where the message also carries service identification information;
the DSC information receiving module is further configured to receive a service deactivation message returned by the DSC.
In implementation, the DSC information sending module is further configured to send a service deactivation complete message to the DSC after receiving the service deactivation message returned by the DSC.
Fig. 15 is a schematic structural diagram of a communication device on a core network, as shown in the figure, the communication device may include:
an information receiving module 1501, configured to receive a communication processing message sent by the DSC to the core network, where the communication processing message carries an identifier of an EP;
an information sending module 1502 is configured to return a communication processing response message to the DSC, where the communication processing response message carries an identifier of the EP.
In implementation, the information receiving module is further configured to receive an authentication request message of an EP sent by the DSC to the core network, where the message also carries authentication information of the EP;
the information sending module is further configured to return an authentication passing response message to the DSC after the EP passes authentication according to the identification and/or authentication information of the EP and the stored subscription information of the EP.
In implementation, the information sending module may further be configured to send core network authentication information to the DSC when an authentication pass response message is returned to the DSC, where the core network authentication information is used for the EP to perform validity authentication on an accessed network.
In the implementation, the method can further comprise the following steps:
the core network information updating module 1503 is configured to store the online status information of the EP and information of the DSC providing the EP with services after returning an authentication pass response message to the DSC.
In implementation, the information receiving module is further configured to receive status information of each EP sent by the DSC;
the core network information updating module is further configured to update the state information of each EP according to the state information of each EP.
In implementation, the information receiving module is further configured to receive a status update message of an EP sent by the DSC to the core network;
the core network information updating module is further configured to update the state information of the EP according to the state information of the EP.
In implementation, the information receiving module is further configured to receive a terminal status update request message of an EP sent by the DSC to the core network, where the message carries an identifier of the EP;
the core network information updating module is further used for updating the state information of the EP according to the terminal state information and the identification of the EP.
In implementation, the information receiving module is further configured to receive a service authorization update request message sent by the DSC to the core network;
the information sending module is further configured to, when it is determined to perform service authorization on the cluster managed by the DSC, return a service authorization response message to the DSC, where the service authorization response message is used to indicate a service type provided by the DSC to an EP in the cluster.
In implementation, the core network information updating module may be further configured to record the service type of cluster activation managed by the DSC after returning a service authorization response message to the DSC.
In implementation, the information sending module may be further configured to determine a service authorization execution state of a cluster managed by the DSC; and sending a cluster service authorization update message to the DSC according to the execution state.
In implementation, the information sending module is further configured to send a service disabling indication message to the DSC, where the message carries an EP identifier and a disabled service identifier;
the information receiving module is further configured to receive a service disabling completion message sent by the DSC, where the message carries an EP identifier and a disabled service identifier;
the core network information updating module is further used for updating the state information of the EP according to the identification of the EP and the forbidden service identification.
For convenience of description, each part of the above-described apparatus is separately described as being functionally divided into various modules or units. Of course, the functionality of the various modules or units may be implemented in the same one or more pieces of software or hardware in practicing the invention.
When the technical scheme provided by the embodiment of the invention is implemented, the implementation can be carried out as follows.
Fig. 16 is a schematic structural diagram of a DSC, as shown, the DSC comprises:
a processor 1600 for reading the program and the like in the memory 1620 and performing data processing in cooperation with the transceiver;
a transceiver 1610 configured to transmit data under control of the processor 1600, the following processes being performed:
receiving a communication request message of an EP, wherein the communication request message carries an identification of the EP;
sending a communication processing message of the EP to a core network, wherein the communication processing message carries an identification of the EP;
a communication response message is returned to the EP.
In the implementation, when an EP accesses a network, a communication request message received on a DSC is an attachment request message of the EP, and the message also carries identity authentication information of the EP;
the communication processing message sent to the core network is an identity authentication request message of the EP, and the message also carries identity authentication information of the EP;
after the core network returns the identity authentication passing response message, the communication response message returned to the EP is an attachment response message, and a temporary identifier is allocated to the EP.
In the implementation, when the core network returns the response message of passing the authentication and also returns the authentication information of the core network, the method further includes:
and sending core network verification information to the EP, wherein the core network verification information is used for verifying the legality of the accessed network by the EP.
In the implementation, the method can further comprise the following steps:
broadcasting attachment information, wherein the information carries information required by accessing the DSC;
receiving a communication request message of an EP at the DSC, wherein the information carried in the communication request message is the information required by the broadcasting attachment information to access the DSC.
In the implementation, after allocating the temporary identifier to the EP and returning the attach response message, the method further includes:
the status information of each accessed EP stored in the DSC is updated.
In the implementation, after updating the state information of each accessed terminal stored in the DSC, the method may further include:
and sending the updated state information of each EP to a core network.
In the implementation, the communication request message received by the DSC is an detach request message of an EP, and the message also carries a temporary identifier of the EP;
the communication processing message of the EP sent to the core network is a state updating message of the EP;
the communication response message returned to the EP is a detach response message.
In the implementation, the communication request message of the EP received on the DSC is a state update request message periodically sent by the EP, and the message also carries a temporary identifier of the EP;
the communication processing message sent to the core network is a terminal state updating request message;
the communication response message returned to the EP is a status update response message.
In the implementation, the method can further comprise the following steps:
the timer for updating the state information of the EP is reset according to the temporary identification of the EP.
In implementation, the communication request message received on the DSC is a service activation request message, and the message also carries service identification information;
when the DSC is authorized to provide the service corresponding to the service identification for the EP in the cluster, the communication response message returned to the EP is a service activation response message; when the DSC is not authorized to provide the service corresponding to the service identification to the EP in the cluster, the communication processing message sent to the core network is a service authorization update request message, and after authorization is obtained, the communication response message returned to the EP is a service activation response message.
In the implementation, after returning the service activation response message to the EP, the method may further include:
and updating the state information of each accessed EP activation service saved on the DSC.
In the implementation, the method can further comprise the following steps:
receiving a cluster service authorization updating message sent by a core network;
determining an EP according to the cluster service authorization update message, wherein the service activated on the EP is an unauthorized service;
a traffic deactivation message is sent to the EP.
In the implementation, the method can further comprise the following steps: receiving a service forbidding indication message sent by a core network, wherein the message carries an EP (Internet protocol) identifier and a forbidden service identifier;
determining the EP according to the EP identifier and the forbidden service identifier;
and sending a service deactivation message aiming at the service to the EP according to the forbidden service identification.
In implementation, the communication request message that may also be received on the DSC is a service deactivation request message of an EP, where the message also carries service identification information;
the communication processing message sent to the core network is a cluster service authorization update message;
the communication response message returned to the EP is a service deactivation message.
In the implementation, after returning the service deactivation message to the EP, the method may further include:
and updating the state information of each accessed EP activation service saved on the DSC.
In the implementation, after returning the service activation response message to the EP, the method may further include:
and updating the state information of each accessed EP activation service saved on the DSC.
In fig. 16, among other things, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by the processor 1600 and various circuits of the memory represented by the memory 1620 linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1610 can be a plurality of elements including a transmitter and a transceiver providing a means for communicating with various other apparatus over a transmission medium. The processor 1600 is responsible for managing the bus architecture and general processing, and the memory 1620 may store data used by the processor 1600 in performing operations.
Fig. 17 is a schematic diagram of an EP, wherein the EP includes:
a processor 1700 for reading the program and the like in the memory 1720 and performing data processing in cooperation with the transceiver;
a transceiver 1710 for transmitting data under the control of the processor 1700, performing the following processes:
sending a communication request message to the DSC, wherein the communication request message carries an identification of the EP;
and receiving a communication response message returned by the DSC.
In implementation, when an EP accesses a network, a communication request message sent to a DSC is an attach request message, and the message also carries identity authentication information of the EP;
the communication response message returned by the receiving DSC is an attach response message, and the DSC assigned temporary identity.
In the implementation, the method can further comprise the following steps:
and receiving broadcast attachment information sent by the DSC, wherein the information carries information required by accessing the DSC.
And sending a communication request message to the DSC, wherein the information carried in the communication request message is the information required by the broadcasted attachment information to access the DSC.
In implementation, when receiving broadcast attachment information sent by a plurality of DSCs, determining a DSC to be accessed according to access required information of each DSC and access requirements of an EP;
the sending of the communication request message to the DSC is the sending of the communication request message to the DSC to be accessed.
In implementation, after receiving the attach response message returned by the DSC and the temporary identifier assigned by the DSC, the method may further include:
an attach complete message is sent to the DSC.
In implementation, when the attach response message carries core network authentication information, before sending an attach complete message to the DSC, the method may further include:
verifying the legality of the accessed network according to the core network verification information;
the sending of the attach complete message to the DSC is sent after the authentication is passed.
In implementation, the communication request message sent to the DSC is a detach request message, and the message also carries the temporary identifier of the EP;
the communication response message returned by the receiving DSC is a detach response message.
In implementation, the communication request message sent to the DSC is a state update request message sent periodically, and the message also carries a temporary identifier of an EP;
the communication response message returned by the receiving DSC is a status update response message.
In implementation, the communication request message sent to the DSC is a service activation request message, and the message also carries service identification information;
the communication response message returned by the receiving DSC is a service activation response message.
In the implementation, the method can further comprise the following steps:
and receiving a service deactivation message sent by the DSC.
In implementation, the communication request message sent to the DSC is a service deactivation request message, and the message also carries service identification information;
the communication response message returned by the receiving DSC is a service deactivation message.
In implementation, after receiving the service deactivation message returned by the DSC, the method may further include:
a traffic deactivation complete message is sent to the DSC.
In fig. 17, among other things, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by processor 1700 and various circuits of memory represented by memory 1720 being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1710 may be a number of elements including a transmitter and a receiver, providing a means for communicating with various other apparatus over a transmission medium. The user interface 1730 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 1700 is responsible for managing the bus architecture and general processing, and the memory 1720 may store data used by the processor 1700 in performing operations.
In summary, in the technical solution provided in the embodiment of the present invention, there are mainly provided:
and the DSC access terminal carries out local management. The method comprises the steps of distributing a temporary identifier for the terminal, storing the state context and the security context of the terminal, and controlling the process of activating the service by the terminal. And the core network assists the DSC to authenticate the identity of the terminal and controls the terminal activation service according to the terminal subscription. And the DSC notifies the core network of the terminal on-network state information and the terminal activation service information in a terminal state updating mode, and the core network stores the terminal on-network state information, the activation service information and the service DSC information. The service disabling process triggered by the core network and aiming at the specific terminal comprises a method for determining a target DSC by the core network and a process for indicating the service disabling information of the terminal to the DSC, wherein the DSC stores a service disabling strategy received from the core network and is executed locally.
By the scheme, the control function of the traditional cellular network to the terminal is transferred to the local access network, so that the burden of the access equipment on core network storage and signaling processing can be greatly reduced. And the control function is localized, so that the time delay caused by the control plane signaling process is greatly shortened. In addition, the DSC function and the authorization equipment realize the decoupling of software and hardware, and a dynamic network formed between the DSC and the access equipment has the characteristic of strong flexibility.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (31)

1. A method of communication, comprising:
receiving a communication request message of an end node (EP) on a Distributed Service Center (DSC), wherein the communication request message carries an identification of the EP;
sending a communication processing message of the EP to a core network, wherein the communication processing message carries an identification of the EP;
returning a communication response message to the EP;
the DSC and the EP type access terminal form a dynamic network in a self-organizing way, managed cluster information is reported to a core network as a whole, the cluster information comprises in-cluster terminal identification information and service information activated by the in-cluster terminal, and the DSC can be configured to various devices including mobile terminal devices, base station devices and server devices.
2. The method of claim 1,
when an EP accesses a network, a communication request message received on a DSC is an attachment request message of the EP, and the message also carries identity authentication information of the EP;
the communication processing message sent to the core network is an identity authentication request message of the EP, and the message also carries identity authentication information of the EP;
after the core network returns the response message of passing the identity authentication, the communication response message returned to the EP is an attachment response message, and a temporary identifier is distributed to the EP;
alternatively, the first and second electrodes may be,
the communication request message received on the DSC is an attachment removal request message of an EP, and the message also carries a temporary identifier of the EP;
the communication processing message of the EP sent to the core network is a state updating message of the EP;
the communication response message returned to the EP is a detach response message;
alternatively, the first and second electrodes may be,
the communication request message of the EP received on the DSC is a state update request message periodically sent by the EP, and the message also carries a temporary identifier of the EP;
the communication processing message sent to the core network is a terminal state updating request message;
the communication response message returned to the EP is a status update response message;
alternatively, the first and second electrodes may be,
the communication request message received on the DSC is a service activation request message, and the message also carries service identification information;
when the DSC is authorized to provide the service corresponding to the service identification for the EP in the cluster, the communication response message returned to the EP is a service activation response message; when the DSC is not authorized to provide the service corresponding to the service identification for the EP in the cluster, the communication processing message sent to the core network is a service authorization updating request message, and after authorization is obtained, the communication response message returned to the EP is a service activation response message;
alternatively, the first and second electrodes may be,
the communication request message received on the DSC is a service deactivation request message of the EP, and the message also carries service identification information;
the communication processing message sent to the core network is a cluster service authorization update message;
the communication response message returned to the EP is a service deactivation message.
3. The method of claim 2, wherein when the core network returns the authentication passing response message and also returns the core network authentication information, further comprising:
and sending core network verification information to the EP, wherein the core network verification information is used for verifying the legality of the accessed network by the EP.
4. The method of claim 2 or 3, further comprising:
broadcasting attachment information, wherein the information carries information required by accessing the DSC;
receiving a communication request message of an EP at the DSC, wherein the information carried in the communication request message is the information required by the broadcasting attachment information to access the DSC.
5. The method of claim 2, further comprising:
the timer for updating the state information of the EP is reset according to the temporary identification of the EP.
6. The method of claim 1,
further comprising:
receiving a cluster service authorization updating message sent by a core network;
determining an EP according to the cluster service authorization update message, wherein the service activated on the EP is an unauthorized service;
sending a service deactivation message to the EP;
alternatively, the first and second electrodes may be,
further comprising:
receiving a service forbidding indication message sent by a core network, wherein the message carries an EP (Internet protocol) identifier and a forbidden service identifier;
determining the EP according to the EP identifier and the forbidden service identifier;
and sending a service deactivation message aiming at the service to the EP according to the forbidden service identification.
7. A method of communication, comprising:
sending a communication request message to a DSC, wherein the communication request message carries an identification of an EP, the DSC and an EP type access terminal form a dynamic network in a self-organizing manner, managed cluster information is reported to a core network as a whole, the cluster information comprises cluster terminal identification information and service information activated by the cluster terminals, and the DSC can be configured to various devices including mobile terminal devices, base station devices and server devices;
and receiving a communication response message returned by the DSC.
8. The method of claim 7,
when an EP accesses a network, a communication request message sent to a DSC is an attachment request message, and the message also carries identity authentication information of the EP;
the communication response message returned by the DSC is an attachment response message and the temporary identification allocated by the DSC;
alternatively, the first and second electrodes may be,
the communication request message sent to the DSC is a detach request message, and the message also carries a temporary identifier of the EP;
receiving that the communication response message returned by the DSC is a detach response message;
alternatively, the first and second electrodes may be,
the communication request message sent to the DSC is a state update request message sent periodically, and the message also carries a temporary identifier of the EP;
receiving that the communication response message returned by the DSC is a state updating response message;
alternatively, the first and second electrodes may be,
the communication request message sent to the DSC is a service activation request message, and the message also carries service identification information;
receiving a communication response message returned by the DSC, wherein the communication response message is a service activation response message;
alternatively, the first and second electrodes may be,
the communication request message sent to the DSC is a service deactivation request message, and the message also carries service identification information;
the communication response message returned by the receiving DSC is a service deactivation message.
9. The method according to claim 8, wherein before the communication request message sent to the DSC is an attach request message, further comprising:
receiving broadcast attachment information sent by a DSC, wherein the information carries information required by accessing the DSC;
and sending a communication request message to the DSC, wherein the information carried in the communication request message is the information required by the broadcasted attachment information to access the DSC.
10. The method according to claim 9, wherein upon receiving broadcast attachment information sent by a plurality of DSCs, determining a DSC to be accessed according to access required information of each DSC and access requirements of an EP;
the sending of the communication request message to the DSC is the sending of the communication request message to the DSC to be accessed.
11. The method according to claim 8, wherein when the attach response message carries core network authentication information, before sending an attach complete message to the DSC, further comprising:
verifying the legality of the accessed network according to the core network verification information;
the sending of the attach complete message to the DSC is sent after the authentication is passed.
12. The method of claim 7, further comprising:
and receiving a service deactivation message sent by the DSC.
13. A method of communication, comprising:
receiving a communication processing message sent by a DSC to a core network, wherein the communication processing message carries an identification of an EP, the DSC and an EP type access terminal form a dynamic network in a self-organizing manner, managed cluster information is reported to the core network as a whole, the cluster information comprises cluster terminal identification information and service information activated by the cluster terminals, and the DSC can be configured to various devices including mobile terminal devices, base station devices and server devices;
and returning a communication processing response message to the DSC, wherein the communication processing response message carries the identification of the EP.
14. The method of claim 13,
a communication processing message sent by the DSC to the core network is an identity authentication request message of the EP, and the message also carries identity authentication information of the EP;
after the EP passes the authentication according to the identification and/or the authentication information of the EP and the stored subscription information of the EP, a communication processing response message returned to the DSC is an authentication passing response message;
alternatively, the first and second electrodes may be,
the communication processing message sent by the DSC to the core network is a service authorization update request message;
when determining that the service authorization is performed on the cluster managed by the DSC, the communication processing response message returned to the DSC is a service authorization response message, and the service authorization response message is used for indicating the service type provided by the DSC to the EP in the cluster.
15. The method according to claim 14, further comprising, when returning an authentication pass response message to the DSC:
and sending core network verification information to the DSC, wherein the core network verification information is used for verifying the legality of the accessed network by the EP.
16. The method of claim 13,
further comprising:
receiving the state information of each EP transmitted by the DSC;
updating the state information of each EP according to the state information of each EP;
alternatively, the first and second electrodes may be,
further comprising:
receiving an EP state updating message sent to a core network by a DSC;
updating the state information of the EP according to the state information of the EP;
alternatively, the first and second electrodes may be,
further comprising:
receiving a terminal state updating request message of an EP (Internet protocol) sent to a core network by a DSC (dynamic stability control) and carrying an identification of the EP;
updating the state information of the EP according to the terminal state information and the identification of the EP;
alternatively, the first and second electrodes may be,
further comprising:
determining a service authorization execution state of a cluster managed by a DSC;
sending a cluster service authorization update message to the DSC according to the execution state;
alternatively, the first and second electrodes may be,
further comprising:
sending a service forbidding indication message to the DSC, wherein the message carries an EP identifier and a forbidden service identifier;
receiving a service forbidding completion message sent by a DSC, wherein the message carries an EP identifier and a forbidden service identifier;
and updating the state information of the EP according to the identification of the EP and the forbidden service identification.
17. A communication device, comprising:
a terminal information receiving module, configured to receive, on a DSC, a communication request message of an EP, where the communication request message carries an identifier of the EP;
a core network information sending module, configured to send a communication processing message of the EP to a core network, where the communication processing message carries an identifier of the EP;
the terminal information sending module is used for returning a communication response message to the EP;
the DSC and the EP type access terminal form a dynamic network in a self-organizing mode, managed cluster information is reported to a core network as a whole, the cluster information comprises cluster terminal identification information and service information activated by the cluster terminals, and the DSC can be configured on various devices including mobile terminal devices, base station devices and server devices.
18. The apparatus of claim 17,
the terminal information receiving module is further used for receiving an attachment request message of the EP on the DSC when the EP accesses the network, wherein the message also carries the identity authentication information of the EP;
the core network information sending module is further used for sending an identity authentication request message of the EP to a core network, wherein the message also carries identity authentication information of the EP;
the terminal information sending module is further used for returning an attachment response message to the EP and allocating a temporary identifier to the EP after the core network returns an identity verification passing response message;
alternatively, the first and second electrodes may be,
the terminal information receiving module is further configured to receive an detach request message of the EP on the DSC, where the message also carries a temporary identifier of the EP;
the core network information sending module is further used for sending the state updating information of the EP to a core network;
the terminal information sending module is further used for returning a detaching response message to the EP;
alternatively, the first and second electrodes may be,
the terminal information receiving module is further configured to receive, on the DSC, a status update request message periodically sent by the EP, where the message also carries a temporary identifier of the EP;
the core network information sending module is further used for sending a terminal state updating request message to the core network;
the terminal information sending module is further used for returning a state updating response message to the EP;
alternatively, the first and second electrodes may be,
the terminal information receiving module is further configured to receive a service activation request message on the DSC, where the message also carries service identification information;
the terminal information sending module is further used for returning a service activation response message to the EP when the DSC is authorized to provide the service corresponding to the service identifier for the EP in the cluster;
or, the core network information sending module is further configured to send a service authorization update request message to the core network when the DSC is not authorized to provide the service corresponding to the service identifier for the EP in the cluster;
the terminal information sending module is further used for returning a service activation response message to the EP after the authorization is obtained;
alternatively, the first and second electrodes may be,
the core network information receiving module is used for receiving the cluster service authorization updating message sent by the core network;
the terminal information sending module is further used for sending a service deactivation message to the EP after determining the EP according to the cluster service authorization update message, wherein the service activated on the EP is unauthorized;
alternatively, the first and second electrodes may be,
a core network information receiving module, configured to receive a service disabling indication message sent by a core network, where the message carries an EP identifier and a disabled service identifier;
the terminal information sending module is further used for sending a service deactivation message aiming at the service to the EP according to the forbidden service identification after determining the EP according to the identification of the EP and the forbidden service identification;
alternatively, the first and second electrodes may be,
the terminal information receiving module is further configured to receive a service deactivation request message of the EP on the DSC, where the message also carries service identification information;
the core network information sending module is further used for sending a cluster service authorization updating message to the core network;
the terminal information sending module is further used for returning a service deactivation message to the EP.
19. The apparatus according to claim 18, wherein if the terminal information sending module is further configured to return the core network authentication information after the core network returns the authentication pass response message, the terminal information sending module is further configured to send the core network authentication information to the EP, where the core network authentication information is used for the EP to perform the validity authentication on the accessed network.
20. The apparatus according to claim 18, wherein the terminal information sending module is further configured to broadcast attachment information, where the information carries information required for accessing the DSC;
the terminal information receiving module is further configured to receive, at the DSC, a communication request message of the EP, where information carried in the communication request message is information required by the broadcasted attachment information to access the DSC.
21. The apparatus according to claim 19, wherein the terminal information sending module is further configured to broadcast attachment information, where the information carries information required for accessing the DSC;
the terminal information receiving module is further configured to receive, at the DSC, a communication request message of the EP, where information carried in the communication request message is information required by the broadcasted attachment information to access the DSC.
22. The apparatus according to any of claims 17 to 21, wherein the DSC information updating module is configured to update the status information of each accessed EP saved on the DSC after assigning a temporary identifier to an EP and returning an attach response message.
23. A communication device, comprising:
a DSC information sending module, configured to send a communication request message to a DSC, where the communication request message carries an identifier of an EP;
the DSC information receiving module is used for receiving a communication response message returned by the DSC;
the DSC and the EP type access terminal form a dynamic network in a self-organizing mode, managed cluster information is reported to a core network as a whole, the cluster information comprises cluster terminal identification information and service information activated by the cluster terminals, and the DSC can be configured on various devices including mobile terminal devices, base station devices and server devices.
24. The apparatus of claim 23,
the DSC information sending module is further used for sending an attachment request message to the DSC when the EP accesses the network, wherein the message also carries the identity authentication information of the EP;
the DSC information receiving module is further used for receiving the DSC return attachment response message and the temporary identification allocated by the DSC;
alternatively, the first and second electrodes may be,
the DSC information receiving module is further used for receiving broadcast attachment information sent by the DSC, wherein the information carries information required by accessing the DSC;
the DSC information sending module is further configured to send a communication request message to the DSC, where information carried in the communication request message is information required by the broadcasted attachment information to access the DSC;
alternatively, the first and second electrodes may be,
the DSC information sending module is further used for sending an detach request message to the DSC, wherein the message also carries the temporary identification of the EP;
the DSC information receiving module is further used for receiving a detaching response message returned by the DSC;
alternatively, the first and second electrodes may be,
the DSC information sending module is further used for periodically sending a state updating request message to the DSC, wherein the message also carries the temporary identification of the EP;
the DSC information receiving module is further used for receiving a DSC return state updating response message;
alternatively, the first and second electrodes may be,
the DSC information sending module is further configured to send a service activation request message to the DSC, where the message also carries service identification information;
the DSC information receiving module is further used for receiving a service activation response message returned by the DSC;
alternatively, the first and second electrodes may be,
the DSC information receiving module is further used for receiving a service deactivation message sent by the DSC;
alternatively, the first and second electrodes may be,
the DSC information sending module is further configured to send a service deactivation request message to the DSC, where the message also carries service identification information;
the DSC information receiving module is further configured to receive a service deactivation message returned by the DSC.
25. The apparatus of claim 24, wherein the DSC information sending module is further configured to, when receiving broadcast attachment information sent by multiple DSCs, determine a DSC to be accessed according to access requirement information of each DSC and access requirement of an EP; and sends a communication request message to the DSC to be accessed.
26. The apparatus of claim 24, wherein the DSC information sending module is further configured to send an attach complete message to the DSC after receiving an attach response message returned by the DSC and the DSC-assigned temporary identifier.
27. The apparatus according to claim 26, wherein the DSC information sending module is further configured to, when the attach response message carries core network authentication information, perform validity authentication on an accessed network according to the core network authentication information; and sending an attachment completion message after the verification is passed.
28. A communication device, comprising:
an information receiving module, configured to receive a communication processing message sent by a DSC to a core network, where the communication processing message carries an identifier of an EP;
an information sending module, configured to return a communication processing response message to the DSC, where the communication processing response message carries an identifier of the EP;
the DSC and the EP type access terminal form a dynamic network in a self-organizing mode, managed cluster information is reported to a core network as a whole, the cluster information comprises cluster terminal identification information and service information activated by the cluster terminals, and the DSC can be configured on various devices including mobile terminal devices, base station devices and server devices.
29. The apparatus of claim 28,
the information receiving module is further configured to receive an authentication request message of the EP sent by the DSC to the core network, where the message also carries authentication information of the EP;
the information sending module is further configured to return an authentication passing response message to the DSC after the EP passes authentication according to the identification and/or authentication information of the EP and the stored subscription information of the EP;
alternatively, the first and second electrodes may be,
the information receiving module is further used for receiving the state information of each EP transmitted by the DSC;
the core network information updating module is further used for updating the state information of each EP according to the state information of each EP;
alternatively, the first and second electrodes may be,
the information receiving module is further used for receiving the state updating message of the EP sent to the core network by the DSC;
the core network information updating module is further used for updating the state information of the EP according to the state information of the EP;
alternatively, the first and second electrodes may be,
the information receiving module is further configured to receive a terminal state update request message of an EP sent by the DSC to the core network, where the message carries an identifier of the EP;
the core network information updating module is further used for updating the state information of the EP according to the terminal state information and the identification of the EP;
alternatively, the first and second electrodes may be,
the information receiving module is further used for receiving a service authorization update request message sent by the DSC to the core network;
the information sending module is further configured to return a service authorization response message to the DSC when determining that service authorization is performed on the cluster managed by the DSC, where the service authorization response message is used to indicate a service type provided by the DSC to an EP in the cluster;
alternatively, the first and second electrodes may be,
the information sending module is further used for determining the service authorization execution state of the cluster managed by the DSC; sending cluster service authorization update information to the DSC according to the execution state;
alternatively, the first and second electrodes may be,
the information sending module is further configured to send a service disabling indication message to the DSC, where the message carries an EP identifier and a disabled service identifier;
the information receiving module is further configured to receive a service disabling completion message sent by the DSC, where the message carries an EP identifier and a disabled service identifier;
the core network information updating module is further used for updating the state information of the EP according to the identification of the EP and the forbidden service identification.
30. The apparatus of claim 29, wherein the information sending module is further configured to send core network authentication information to the DSC when an authentication pass response message is returned to the DSC, where the core network authentication information is used for the EP to perform validity authentication on the accessed network.
31. The apparatus of claim 29, further comprising:
and the core network information updating module is used for storing the on-network state information of the EP and the DSC information for providing services for the EP after returning an identity authentication passing response message to the DSC.
CN201510275202.1A 2015-05-26 2015-05-26 Communication method and device Active CN106303905B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510275202.1A CN106303905B (en) 2015-05-26 2015-05-26 Communication method and device
PCT/CN2016/082328 WO2016188346A1 (en) 2015-05-26 2016-05-17 Method and device for communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510275202.1A CN106303905B (en) 2015-05-26 2015-05-26 Communication method and device

Publications (2)

Publication Number Publication Date
CN106303905A CN106303905A (en) 2017-01-04
CN106303905B true CN106303905B (en) 2020-04-10

Family

ID=57392472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510275202.1A Active CN106303905B (en) 2015-05-26 2015-05-26 Communication method and device

Country Status (2)

Country Link
CN (1) CN106303905B (en)
WO (1) WO2016188346A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111417104B (en) * 2019-01-07 2023-03-28 中国移动通信有限公司研究院 Data processing method, network equipment and terminal
CN111278034B (en) * 2020-01-21 2022-08-12 北京佰才邦技术股份有限公司 Information backup method and device, storage medium and computer equipment
WO2021146913A1 (en) * 2020-01-21 2021-07-29 北京佰才邦技术有限公司 Information backup method and apparatus, storage medium and computer device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469458B (en) * 2010-11-19 2015-08-12 中兴通讯股份有限公司 Group authentication method in a kind of M2M communication and system
KR101929533B1 (en) * 2011-04-01 2018-12-17 인터디지탈 패튼 홀딩스, 인크 System and method for sharing a common pdp context
CN103108377B (en) * 2011-11-15 2016-03-30 中国移动通信集团公司 A kind of communication means of MTC terminal, system and center control nodes
CN102647704B (en) * 2012-04-23 2014-10-22 中国联合网络通信集团有限公司 Data transmission processing method, base station and system
CN102752740B (en) * 2012-06-29 2015-07-22 中国联合网络通信集团有限公司 Data interaction processing method, device and system based on clustered architecture of base station
US8923880B2 (en) * 2012-09-28 2014-12-30 Intel Corporation Selective joinder of user equipment with wireless cell
CN103781114A (en) * 2012-10-24 2014-05-07 中兴通讯股份有限公司 Network access method, device and system
US10334416B2 (en) * 2013-03-15 2019-06-25 Alcatel Lucent Control of group triggers for MTC services
US10034321B2 (en) * 2013-06-20 2018-07-24 Telefonaktiebolaget Lm Ericsson (Publ) Machine type communication virtual shared mobile apparatus and method

Also Published As

Publication number Publication date
CN106303905A (en) 2017-01-04
WO2016188346A1 (en) 2016-12-01

Similar Documents

Publication Publication Date Title
CN106304395B (en) Communication method and device
WO2018014741A1 (en) Data transmission, reception and transfer method and apparatus
CN107635258B (en) data or signaling sending and transmitting method and device
KR102294659B1 (en) Method for supporting ue access control
CN109076410A (en) The program of network slice is supported in a wireless communication system
US20200252837A1 (en) Method for checking change in wireless connection type of terminal in third-party application server
US20190116529A1 (en) Method and device for accessing network by user equipment, chip, and user equipment
CN103024924A (en) Connection establishment method, device and system for D2D (device-to-device) terminals
CN110366224A (en) A kind of signaling optimization method and apparatus
CN103096290A (en) Method for establishing connection from device to device, appliance for the same and system for the same
US20230379856A1 (en) Wireless device authorization by uncrewed aerial system service supplier
US20180324564A1 (en) Method and device for transmitting data in internet of vehicles system
CN106303905B (en) Communication method and device
CN111684829A (en) Opportunistic and efficient spectrum sharing between priority access users and general access users
CN116438823A (en) Authentication and authorization of an aeronautical system
CN105025593B (en) Method and equipment for releasing entity
CN103228025B (en) Cut-in method, the apparatus and system of machine type communication terminal
CN109041078A (en) A kind of service data transmission method and device
CN109819530B (en) Communication method and device
WO2021038443A1 (en) Relation indication for multi-sim devices
CN108934067A (en) A kind of method and device obtaining paging parameters
CN106304062B (en) Method and equipment for managing terminal
CN106304204B (en) Method and equipment for managing service quality
CN111866872B (en) Communication method and device
CN102300309B (en) The distribution method of the identifying information of mobile radio station and device under idle pulley

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee after: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20210531

Address after: 100085 1st floor, building 1, yard 5, Shangdi East Road, Haidian District, Beijing

Patentee after: DATANG MOBILE COMMUNICATIONS EQUIPMENT Co.,Ltd.

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

TR01 Transfer of patent right