CN106488428B - Policy control method of user equipment, network equipment and system - Google Patents

Policy control method of user equipment, network equipment and system Download PDF

Info

Publication number
CN106488428B
CN106488428B CN201510544215.4A CN201510544215A CN106488428B CN 106488428 B CN106488428 B CN 106488428B CN 201510544215 A CN201510544215 A CN 201510544215A CN 106488428 B CN106488428 B CN 106488428B
Authority
CN
China
Prior art keywords
user equipment
information
network
strategy
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510544215.4A
Other languages
Chinese (zh)
Other versions
CN106488428A (en
Inventor
黄震宁
朱琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510544215.4A priority Critical patent/CN106488428B/en
Publication of CN106488428A publication Critical patent/CN106488428A/en
Application granted granted Critical
Publication of CN106488428B publication Critical patent/CN106488428B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Abstract

The invention discloses a strategy control method of user equipment, network equipment and a system, wherein the method comprises the following steps: setting a visiting place strategy and corresponding identification information; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network; and selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy.

Description

Policy control method of user equipment, network equipment and system
Technical Field
The present invention relates to an access management technology in the field of wireless communication, and in particular, to a policy control method, a network device, and a system for a user equipment.
Background
In order to achieve the objectives of differentiated Service capability, resource grooming capability, network traffic optimization capability, etc., a Policy and Charging Control (PCC) system architecture is introduced into the existing packet network to perform Quality of Service (QoS) Control on packet data services according to the standard specification of the third Generation Partnership Project (3 GPP). The main network elements of the PCC architecture include: a Policy control and Charging Rules Function (PCRF), a Policy and Charging Enforcement Function (PCEF), an Application Function (AF), an Online Charging System/offline Charging System (OCS/OFCS), and a Subscription Profile Repository (SPR). Based on the above architecture, currently, a policy and charging method for performing a visited Access (Visit Access) S9 interface is as follows: and providing access service for the user by a policy control and charging rules function (V-PCRF) of the visited place.
In the scheme, the V-PCRF has no policy enforcement right in the process of taking the policy into effect for the user, namely the V-PCRF only can reject and forward the policy content of the H-PCRF to the PCEF/BBERF for taking the policy into effect. Thus, there are the following problems: the visited place user level control strategy needs to rely on the information collection of the visited place, and the synchronization of the information to the attribution places of all users can generate larger information overhead; the home PCRF executes all policy decisions, and the home PCRF also needs to rely on information collection of the visited place, so that the information is synchronized to the home places of all users to generate larger information overhead; the visited place PCEF is only connected with the visited place PCRF, and the user subscription data needs to be synchronized to the whole network PCRF/SPR, which may cause problems such as data resynchronization.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a method, a network device and a system for policy control of a ue, which can solve at least the above problems in the prior art.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the embodiment of the invention provides a strategy control method of user equipment, which is applied to first network equipment and comprises the following steps:
setting a visiting place strategy and corresponding identification information; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; the first network device belongs to a first mobile network;
acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network;
and selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy.
An embodiment of the present invention provides a network device, where the network device includes:
the storage unit is used for storing the set visiting place strategy and the corresponding identification information;
the processing unit is used for acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on relevant information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network; and selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy.
The embodiment of the invention provides a strategy control system of user equipment, which comprises:
the first network equipment belongs to the first mobile network, is equipment at least capable of providing the functions of visited place policy control and charging rules, and is used for setting a visited place policy and corresponding identification information thereof; acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network; selecting a corresponding first visitor location strategy for the user equipment based on the identification information of the visitor location strategy, and managing the first user equipment based on the first visitor location strategy;
and the second network equipment is used for providing the identification information of the visitor location strategy of the first user equipment for the first network equipment based on the relevant information of the first user equipment. .
According to the policy control method, the network device and the system of the user equipment, when request information containing relevant information of the first user equipment is received, identification information of a visited place policy is acquired from a second network device side based on the relevant information of the first user equipment, then a corresponding first visited place policy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place policy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, since the visited place can store the visited place policy in advance, the user equipment can be managed only by acquiring the identification information from the home place, so that the condition that a large amount of policy configuration data is stored in the home place can be avoided, the condition that the subscription data of the user is repeatedly synchronized can be avoided, and the data synchronization amount between the visited place and the home place is further reduced.
Drawings
Fig. 1 is a first flowchart illustrating a policy control method of a ue according to an embodiment of the present invention;
FIG. 2 is a first flowchart illustrating an embodiment of the present invention;
fig. 3 is a schematic flow chart of a policy control method of a ue according to an embodiment of the present invention;
FIG. 4 is a second flowchart illustrating an embodiment of the present invention;
FIG. 5 is a third flowchart illustrating an embodiment of the present invention;
fig. 6 is a schematic flow chart of a policy control method of a ue according to an embodiment of the present invention;
FIG. 7 is a fourth flowchart illustrating an embodiment of the present invention;
FIG. 8 is a first schematic diagram of a network device according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of a network device according to an embodiment of the present invention;
fig. 10 is a schematic diagram of a system configuration according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The first embodiment,
An embodiment of the present invention provides a policy control method for a user equipment, which is applied to a first network device, and as shown in fig. 1, the method includes:
step 11: setting a visiting place strategy and corresponding identification information; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; the first network device belongs to a first mobile network;
step 12: acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network;
step 13: and selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy.
Here, the first network device may be a policy control and charging rules function entity (V-PCRF) of a visited place of the first user equipment.
In the above embodiments, the first mobile Network may be a Public Land Mobile Network (PLMN), and the second mobile Network may be a PLMN different from an area where the first mobile Network is located. The second mobile network may be an H-PLMN of the first user equipment, i.e. a home public land mobile network of the first user equipment, and the first mobile network may be a V-PLMN of the first user equipment, i.e. a visited public land mobile network of the first user equipment, with respect to the first user equipment.
In addition, the visited place policy and the identification information corresponding to the visited place policy in the above embodiment may be as follows: the identification information of the visitor location policy may at least include: the name of the visited place, the name of the visited place policy, etc.; for example, the name of the visited place may be a city, and the name of the visited place policy may be a policy for a service, etc. The visited place strategy at least comprises the following steps: the execution configuration for the service may be, for example, a specific execution manner of the policy for the a service.
In step 12, the triggering manner of the request information including the related information of the first ue may be: and the user equipment performs an activation operation, wherein the activation operation can be an operation of initially accessing the first mobile network by the user equipment.
Preferably, the first network device may further extract and store the relevant information of the first user equipment while receiving the request information including the relevant information of the first user equipment.
The related information of the first user equipment may include identification information of the first user equipment, such as an IMSI and an MSISDN of the first user equipment;
in addition, the related information of the first user equipment may further include at least one of the following: geographical location information, terminal type information, radio access type information, etc. The related information of the first user equipment may further include: service usage information, network, radio status information, service request information, user location information, terminal type information, user IP information, user number information, PCEF/BBERF device information, SGW device information, APN information, IMSI prefix information, service type information, radio access information, time information, service priority information.
Before the obtaining, from the second network device side, the identification information of the visitor location policy for the first user equipment based on the relevant information of the first user equipment, the method further includes:
receiving activation information which is sent by third network equipment and contains relevant information of first user equipment; the third network equipment belongs to a first mobile network, and is equipment capable of providing at least policy execution and charging functions; for example, the third network device may be a PCEF;
and extracting the relevant information of the first user equipment from the activation information.
In addition, in step 12, the acquiring, from the second network device side, the identification information of the visitor location policy for the user equipment based on the relevant information of the first user equipment may be: and sending the relevant information containing the first user equipment to second network equipment, so that the second network equipment selects identification information corresponding to the corresponding visiting place strategy for the first user equipment according to the relevant information of the first user equipment in the received request information, and sends the identification information to the first network equipment. It can be understood that the identification information corresponding to the visitor location policy selected by the second network device may be: and selecting according to the identification information of the visited place strategy stored in the second network equipment and the relevant information of the user equipment corresponding to the identification information of the visited place strategy. For example, assuming that the user equipment a customizes the service a in the second mobile network where the second network equipment is located, the second network equipment may determine the identification information of the corresponding visited place policy with respect to the service a and the related information of the user equipment a.
In the step 13, the processing according to the selected first visitor location policy may include: and determining a PCC rule at least by combining the stored information of the third network equipment, the local time information and the wireless network information based on the first visiting place strategy, and sending the determined PCC rule to the third network equipment so that the third network equipment carries out processing based on the PCC rule.
In this embodiment, taking the third network device as the PCEF, the first network device as the V-PCRF, and the second network device as the H-PVRF, as shown in fig. 2, includes:
step 20, the V-PCRF and the H-PCRF are configured aiming at the visited place strategies needing to be effective, and the V-PCRF and the H-PCRF can judge whether the visited place strategies are consistent or not through the visited place strategy identification information;
step 21, in the activation process of the user, the PCEF sends activation (CCR-I) information to the V-PCRF;
step 22, the V-PCRF records the information carried by the PCEF in the session, and transmits the activation information to the H-PCRF;
step 23, the H-PCRF carries out user policy judgment and judges whether the visited place policy needs to be activated or not;
step 24, if the visited place strategy needs to be activated, the H-PCRF carries the visited place strategy in the CCA-I message and sends the CCA-I message to the V-PCRF;
and step 25, the V-PCRF judges the visited place policy content, judges whether the visited place policy content needs to be activated or not, and if so, sends down information such as PCC rules, QoS authorization information, charging information and the like through CCA-I according to visited place policy configuration and locally recorded PCEF information, local time and local other configuration information (such as local wireless congestion).
The present embodiment is applied to a PCC architecture under the 3GPP standard, and the components of the PCC architecture may include, in addition to the PCRF:
a PCEF: the charging function responsible for the detection, strategy execution and flow-based charging of the service data flow is generally arranged on GGSN or P-GW; AF: the dynamic policy/charging control is mainly carried out on the IP-CAN user plane behavior and is arranged on a service platform; SPR: the logic entity is used for storing information related to all signed users or signs, including services allowed by the signed users and the like; OCS/OFCS: for online/offline charging.
By adopting the scheme, when request information containing the relevant information of the first user equipment is received, the identification information of the visited place strategy is obtained from the second network equipment side based on the relevant information of the first user equipment, then the corresponding first visited place strategy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place strategy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, since the visited place can store the visited place policy in advance, the user equipment can be managed only by acquiring the identification information from the home place, so that the condition that a large amount of policy configuration data is stored in the home place can be avoided, the condition that the subscription data of the user is repeatedly synchronized can be avoided, and the data synchronization amount between the visited place and the home place is further reduced.
Example II,
The embodiment provides a policy control method for a user equipment, which is applied to a first network device, and as shown in fig. 3, the method includes:
step 31: setting a visiting place strategy and corresponding identification information; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; the first network device belongs to a first mobile network;
step 32: acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network;
step 33: selecting a corresponding first visitor location strategy for the user equipment based on the identification information of the visitor location strategy, and managing the first user equipment based on the first visitor location strategy;
step 34: receiving update information which is sent by third network equipment and contains related information of first user equipment; sending the update information to second network equipment, so that the second network equipment performs update operation or deletion operation on a first visited place strategy corresponding to the first user equipment based on the update information decision;
step 35: detecting that an updating instruction or a deleting instruction sent by the second network equipment is received; if an update instruction sent by the second network equipment is received, selecting an updated visitor location strategy as a first visitor location strategy for the first user equipment based on identification information of the updated visitor location strategy carried in the update instruction; and if a deletion instruction sent by the second network equipment is received, deleting the corresponding visited place strategy based on the identification information of the visited place strategy to be deleted, which is carried in the deletion instruction.
Here, the first network device may be a policy control and charging rules function entity (V-PCRF) of a visited place of the first user equipment.
In the above embodiments, the first mobile Network may be a Public Land Mobile Network (PLMN), and the second mobile Network may be a PLMN different from an area where the first mobile Network is located.
In addition, the visited place policy and the identification information corresponding to the visited place policy in the above embodiment may be as follows: the identification information of the visitor location policy may at least include: the name of the visited place, the name of the visited place policy, etc.; for example, the name of the visited place may be a city, and the name of the visited place policy may be a policy for a service, etc. The visited place strategy at least comprises the following steps: the execution configuration for the service may be, for example, a specific execution manner of the policy for the a service.
The update request including the relevant information of the first ue may be: the user equipment performs an update IP-CAN session procedure.
The related information of the first user equipment may include identification information of the first user equipment, such as an IMSI and an MSISDN of the first user equipment.
In addition, the acquiring, from the second network device side, the identification information of the updated visited place policy for the first user equipment based on the relevant information of the first user equipment may be: and sending the relevant information containing the first user equipment to second network equipment, so that the second network equipment selects corresponding identification information corresponding to the updated visiting place strategy for the first user equipment according to the relevant information of the first user equipment in the received request information, and sends the identification information to the first network equipment. It can be understood that the identification information corresponding to the visitor location policy selected by the second network device may be: and selecting according to the identification information of the visited place strategy stored in the second network equipment and the relevant information of the user equipment corresponding to the identification information of the visited place strategy.
The processing according to the selected first visitor location policy may include: and determining a PCC rule based on the first visited place policy and at least in combination with stored information of the third network device, local time information and wireless network information, and sending the determined PCC rule to the third network device, so that the third network device performs processing based on the PCC rule.
In this embodiment, based on the scenario shown in fig. 4, the PCEF initiates a session update, including:
step 41, in the process of updating the IP-CAN session by the user, the PCEF sends updating information (CCR-U) to the V-PCRF;
step 42, the V-PCRF updates the information carried by the PCEF in the session, and transmits the updated information to the H-PCRF;
step 43, the H-PCRF carries out user policy judgment and judges whether the visited place policy needs to be updated;
step 44, if the visited place strategy needs to be updated, the H-PCRF carries the updated visited place strategy in the CCA-U message and sends the CCA-U message to the V-PCRF;
and step 45, the V-PCRF judges the visited place policy content, judges whether the updated visited place policy content needs to be activated or not, and if so, sends down information such as PCC rules, QoS authorization information, charging information and the like through CCA-I according to visited place policy configuration and locally recorded PCEF information, local time and local other configuration information (such as local wireless congestion).
Preferably, based on the above scheme, the present embodiment further provides the following scenarios: the PCEF initiates session termination, as shown in fig. 5, including:
step 51, in the process of deleting the IP-CAN session, the PCEF sends a session termination (CCR-T) message to the V-PCRF;
step 52, the V-PCRF updates the information carried in the session and transparently transmits the CCR-T message to the H-PCRF;
step 53, the H-PCRF makes a user policy decision, for example, determines whether to activate or delete a visited place policy according to the geographical location information in the update session, etc.;
step 54, sending a notice containing a decision to the V-PCRF, if the visited place strategy needs to be activated, carrying the visited place strategy in a CCA-U message by the H-PCRF and sending the CCA-U message to the V-PCRF, if the visited place strategy needs to be deleted, carrying information for deleting the visited place strategy, and if the visited place strategy needs to be activated, carrying the activated visited place strategy;
and step 55, the V-PCRF judges the visited place policy content, judges whether the visited place policy content needs to be activated or not, and if so, sends down information such as PCC rules, QoS authorization information, charging information and the like through CCA-I according to visited place policy configuration and locally recorded PCEF information, local time and local other configuration information (such as local wireless congestion).
By adopting the scheme, when request information containing the relevant information of the first user equipment is received, the identification information of the visited place strategy is obtained from the second network equipment side based on the relevant information of the first user equipment, then the corresponding first visited place strategy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place strategy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, since the visited place can store the visited place policy in advance, the user equipment can be managed only by acquiring the identification information from the home place, so that the condition that a large amount of policy configuration data is stored in the home place can be avoided, the condition that the subscription data of the user is repeatedly synchronized can be avoided, and the data synchronization amount between the visited place and the home place is further reduced.
Example III,
The embodiment provides a policy control method for a user equipment, which is applied to a first network device, and as shown in fig. 6, the method includes:
step 61: setting a visiting place strategy and corresponding identification information; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; the first network device belongs to a first mobile network;
step 62: acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network;
and step 63: selecting a corresponding first visitor location strategy for the user equipment based on the identification information of the visitor location strategy, and managing the first user equipment based on the first visitor location strategy;
step 64: receiving management information aiming at the visited place strategy sent by the second network equipment;
step 65: and managing the set visiting place strategy according to the management information aiming at the visiting place strategy.
In this embodiment, the management information for the visitor location policy may include at least one of the following:
activation control information for the visitor location policy;
update control information for the visitor location policy;
and deleting control information aiming at the visited place strategy.
The deletion control information may be a request for deleting a specified policy initiated by a user to a home location according to an actual situation, and the policy deletion is controlled according to the request initiated by the user.
In the scenario of this embodiment, as shown in fig. 7, the PCRF initiates a session update, including:
step 71, the H-PCRF carries out user policy judgment due to local configuration or external triggering, and judges whether to activate, update or delete the visited place policy;
step 72, the H-PCRF sends an RAR message to the V-PCRF, if the visited place policy needs to be activated, the H-PCRF carries the visited place policy in the RAR message and issues the RAR message to the V-PCRF, if the visited place policy needs to be deleted, the information for deleting the visited place policy is carried, and if the visited place policy needs to be updated, the updated visited place policy is carried;
and 73, the V-PCRF judges the visited place policy content, judges whether the visited place policy content needs to be activated or not, and if so, sends down information such as PCC rules, QoS authorization information, charging information and the like through RAR according to visited place policy configuration and by combining locally recorded PCEF information, local time and local other configuration information (such as local wireless congestion).
Step 74, the PCEF returns the RAA message, responding to the information execution conditions of the PCC rule, the QoS authorization information, the charging information, and the like of the local decision;
and 75, returning the RAA message by the V-PCRF and responding to the execution condition of the policy of the visited place of the H-PCRF.
By adopting the scheme, when request information containing the relevant information of the first user equipment is received, the identification information of the visited place strategy is obtained from the second network equipment side based on the relevant information of the first user equipment, then the corresponding first visited place strategy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place strategy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, since the visited place can store the visited place policy in advance, the user equipment can be managed only by acquiring the identification information from the home place, so that the condition that a large amount of policy configuration data is stored in the home place can be avoided, the condition that the subscription data of the user is repeatedly synchronized can be avoided, and the data synchronization amount between the visited place and the home place is further reduced.
Example four,
An embodiment of the present invention provides a network device, as shown in fig. 8, where the network device includes:
the storage unit 81 is configured to store the set visited place policy and the identification information corresponding to the visited place policy;
a processing unit 82, configured to obtain, from a second network device side, identification information of a visited place policy for a first user equipment based on relevant information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network; and selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy.
Here, the network device may be a policy control and charging rules function entity (V-PCRF) of a visited place of the first user equipment.
In the above embodiments, the first mobile Network may be a Public Land Mobile Network (PLMN), and the second mobile Network may be a PLMN different from an area where the first mobile Network is located. The second mobile network may be an H-PLMN of the first user equipment, i.e. a home public land mobile network of the first user equipment, and the first mobile network may be a V-PLMN of the first user equipment, i.e. a visited public land mobile network of the first user equipment, with respect to the first user equipment.
In addition, the visited place policy and the identification information corresponding to the visited place policy in the above embodiment may be as follows: the identification information of the visitor location policy may at least include: the name of the visited place, the name of the visited place policy, etc.; for example, the name of the visited place may be a city, and the name of the visited place policy may be a policy for a service, etc. The visited place strategy at least comprises the following steps: the execution configuration for the service may be, for example, a specific execution manner of the policy for the a service.
Preferably, the network device further includes: a communication unit 83, configured to receive activation information sent by a third network device and including information related to a first user equipment; the third network equipment belongs to a first mobile network, and is equipment capable of providing at least policy execution and charging functions; correspondingly, the processing unit is configured to extract relevant information of the first user equipment from the activation information. For example, the third network device may be a PCEF.
The first network device may further extract and store the relevant information of the first user device while receiving the request information including the relevant information of the first user device.
The related information of the first user equipment may include identification information of the first user equipment, such as an IMSI and an MSID of the first user equipment; in addition, the related information of the first user equipment may further include at least one of the following: geographical location information, terminal type information, radio access type information, etc.
The obtaining of the identification information of the visited place policy for the user equipment from the second network equipment side based on the relevant information of the first user equipment may be: and sending request information containing the relevant information of the first user equipment to second network equipment, so that the second network equipment selects identification information corresponding to the corresponding visiting place strategy for the first user equipment according to the relevant information of the first user equipment in the received request information, and sends the identification information to the first network equipment. It can be understood that the identification information corresponding to the visitor location policy selected by the second network device may be: and selecting according to the identification information of the visited place strategy stored in the second network equipment and the relevant information of the user equipment corresponding to the identification information of the visited place strategy. For example, assuming that the user equipment a customizes the service a in the second mobile network where the second network equipment is located, the second network equipment may determine the identification information of the corresponding visited place policy with respect to the service a and the related information of the user equipment a.
The processing unit is configured to determine a PCC rule based on the first visited place policy and by combining stored information of a third network device, local time information, and wireless network information, and send the determined PCC rule to the third network device, so that the third network device performs processing based on the PCC rule.
By adopting the scheme, when request information containing the relevant information of the first user equipment is received, the identification information of the visited place strategy is obtained from the second network equipment side based on the relevant information of the first user equipment, then the corresponding first visited place strategy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place strategy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, the visited place can store the visited place strategy in advance, and the user equipment can be managed only by acquiring the identification information from the home place, so that the condition of repeated synchronization of the subscription data of the user is avoided, and the data synchronization quantity between the visited place and the home place is further reduced.
Example V,
This embodiment provides a network device, as shown in fig. 9, where the network device includes:
the storage unit 91 is used for storing the set visiting place strategy and the corresponding identification information;
a processing unit 92, configured to obtain, from a second network device side, identification information of a visited place policy for a first user equipment based on relevant information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network; and selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy.
Here, the first network device may be a policy control and charging rules function entity (V-PCRF) of a visited place of the first user equipment.
In the above embodiments, the first mobile Network may be a Public Land Mobile Network (PLMN), and the second mobile Network may be a PLMN different from an area where the first mobile Network is located.
The network device further includes: a communication unit 93, configured to receive activation information sent by a third network device and including information related to a first user equipment; the third network equipment belongs to a first mobile network, and is equipment capable of providing at least policy execution and charging functions;
correspondingly, the processing unit is configured to extract relevant information of the first user equipment from the activation information.
In addition, the visited place policy and the identification information corresponding to the visited place policy in the above embodiment may be as follows: the identification information of the visitor location policy may at least include: the name of the visited place, the name of the visited place policy, etc.; for example, the name of the visited place may be a city, and the name of the visited place policy may be a policy for a service, etc. The visited place strategy at least comprises the following steps: the execution configuration for the service may be, for example, a specific execution manner of the policy for the a service.
The update request including the relevant information of the first ue may be: the user equipment performs an update IP-CAN session procedure.
The related information of the first user equipment may include identification information of the first user equipment, such as an IMSI and an MSID of the first user equipment; in addition, the related information of the first user equipment may further include at least one of the following: geographical location information, terminal type information, radio access type information, etc.
In addition, the acquiring, from the second network device side, the identification information of the updated visited place policy for the first user equipment based on the relevant information of the first user equipment may be: and sending the relevant information containing the first user equipment to second network equipment, so that the second network equipment selects corresponding identification information corresponding to the updated visiting place strategy for the first user equipment according to the relevant information of the first user equipment in the received request information, and sends the identification information to the first network equipment. It can be understood that the identification information corresponding to the visitor location policy selected by the second network device may be: and selecting according to the identification information of the visited place strategy stored in the second network equipment and the relevant information of the user equipment corresponding to the identification information of the visited place strategy.
The processing according to the selected first visitor location policy may include: and determining a PCC rule based on the first visited place strategy and by combining the stored information of the third network equipment, the stored local time information and the stored wireless network information, and sending the determined PCC rule to the third network equipment so that the third network equipment performs processing based on the PCC rule.
The network device further includes: an updating unit 94, configured to receive update information sent by a third network device and including relevant information of the first user equipment;
and the communication unit is used for sending the updating information to the second network equipment. The processing unit is further configured to receive, through the communication unit, an update instruction or a delete instruction sent by the second network device; if an update instruction sent by the second network equipment is received, selecting an updated visitor location strategy as a first visitor location strategy for the first user equipment based on identification information of the updated visitor location strategy carried in the update instruction; and if a deletion instruction sent by the second network equipment is received, deleting the corresponding visited place strategy based on the identification information of the visited place strategy to be deleted, which is carried in the deletion instruction.
The processing unit is further configured to detect that processing information for the visitor location policy sent by the second network device is received; and processing the visited place strategy according to the processing information aiming at the visited place strategy.
Wherein the processing information for the visitor location policy may include at least one of: activation control information for the visitor location policy; update control information for the visitor location policy; and deleting control information aiming at the visited place strategy.
The deletion control information may be a request for deleting a specified policy initiated by a user to a home location according to an actual situation, and the policy deletion is controlled according to the request initiated by the user.
By adopting the scheme, when request information containing the relevant information of the first user equipment is received, the identification information of the visited place strategy is obtained from the second network equipment side based on the relevant information of the first user equipment, then the corresponding first visited place strategy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place strategy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, the visited place can store the visited place strategy in advance, and the user equipment can be managed only by acquiring the identification information from the home place, so that the condition of repeated synchronization of the subscription data of the user is avoided, and the data synchronization quantity between the visited place and the home place is further reduced.
Example six,
An embodiment of the present invention provides a policy control system for a user equipment, as shown in fig. 10, where the policy control system includes:
a first network device 1001, configured to set a visited place policy and identification information corresponding to the visited place policy; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; the first network device belongs to a first mobile network; if request information containing relevant information of first user equipment is received, acquiring identification information of a visited place strategy for the user equipment from a second network equipment side based on the relevant information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; selecting a corresponding first visiting place strategy for the user equipment based on the identification information of the visiting place strategy and the related information of the user equipment, and managing the first user equipment based on the first visiting place strategy;
the second network device 1002 is configured to provide, for the first network device, identification information of a visitor location policy of the first user device based on the relevant information of the first user device.
The function of the first network device in this embodiment is the same as that in the above embodiment, and is not described herein again.
By adopting the scheme, when request information containing the relevant information of the first user equipment is received, the identification information of the visited place strategy is obtained from the second network equipment side based on the relevant information of the first user equipment, then the corresponding first visited place strategy is selected for the user equipment based on the identification information, and the first user equipment is managed based on the first visited place strategy. Therefore, the synchronous data volume between the strategy control entity of the home location and the strategy control entity of the visited location is reduced due to a large amount of information overhead generated between the user equipment and the equipment of the home location when the user equipment is in the visited location; in addition, the visited place can store the visited place strategy in advance, and the user equipment can be managed only by acquiring the identification information from the home place, so that the condition of repeated synchronization of the subscription data of the user is avoided, and the data synchronization quantity between the visited place and the home place is further reduced.
The integrated module according to the embodiment of the present invention may also be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as an independent product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a base station, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (13)

1. A policy control method of a user equipment, applied to a first network device, is characterized in that the method comprises:
setting a visiting place strategy and corresponding identification information; wherein, the first network equipment is equipment at least capable of providing the functions of visited place policy control and charging rules; the first network device belongs to a first mobile network;
acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network;
selecting a corresponding first visiting place strategy for the first user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy; wherein the visitor policy at least comprises a first visitor policy, and the first visitor policy corresponds to the first user equipment.
2. The method of claim 1, wherein before the obtaining of the identification information of the visitor location policy for the first user equipment from the second network equipment side based on the related information of the first user equipment, the method further comprises:
receiving activation information which is sent by third network equipment and contains relevant information of first user equipment; the third network equipment belongs to a first mobile network, and is equipment capable of providing at least policy execution and charging functions;
and extracting the relevant information of the first user equipment from the activation information.
3. The method of claim 1, further comprising:
receiving update information which is sent by third network equipment and contains related information of first user equipment;
and sending the update information to second network equipment, so that the second network equipment performs update operation or deletion operation on the first visited place strategy corresponding to the first user equipment based on the decision of the update information.
4. The method of claim 3, wherein after sending the updated information to the second network device, the method further comprises:
receiving an updating instruction or a deleting instruction sent by the second network equipment;
if an update instruction sent by the second network equipment is received, selecting an updated visitor location strategy for the first user equipment based on identification information of the updated visitor location strategy carried in the update instruction, and taking the updated visitor location strategy as a first visitor location strategy;
and if a deletion instruction sent by the second network equipment is received, deleting the corresponding visited place strategy based on the identification information of the visited place strategy to be deleted, which is carried in the deletion instruction.
5. The method of claim 1, further comprising:
receiving management information aiming at the visited place strategy sent by the second network equipment;
and managing the set visiting place strategy according to the management information aiming at the visiting place strategy.
6. The method of claim 5, wherein the management information for the visitor location policy comprises at least one of:
activation control information for the visitor location policy;
update control information for the visitor location policy;
and deleting control information aiming at the visited place strategy.
7. A network device, characterized in that the network device comprises:
the storage unit is used for storing the set visiting place strategy and the corresponding identification information;
the processing unit is used for acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on relevant information of the first user equipment; wherein the network device belongs to a first mobile network, the first user equipment belongs to a second mobile network, and the second network device belongs to the second mobile network; the second mobile network is different from the first mobile network; selecting a corresponding first visiting place strategy for the first user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy; wherein the visitor policy at least comprises a first visitor policy, and the first visitor policy corresponds to the first user equipment.
8. The network device of claim 7, wherein the network device further comprises:
a communication unit, configured to receive activation information sent by a third network device and including information related to a first user equipment; the third network equipment belongs to a first mobile network, and is equipment capable of providing at least policy execution and charging functions;
correspondingly, the processing unit is configured to extract relevant information of the first user equipment from the activation information.
9. The network device of claim 7, wherein the network device further comprises:
the updating unit is used for receiving updating information which is sent by the third network equipment and contains the relevant information of the first user equipment;
and the communication unit is used for sending the updating information to the second network equipment.
10. The network device according to claim 9, wherein the processing unit is further configured to receive, through the communication unit, an update instruction or a delete instruction sent by the second network device; if an update instruction sent by the second network equipment is received, selecting an updated visitor location strategy for the first user equipment based on identification information of the updated visitor location strategy carried in the update instruction, and taking the updated visitor location strategy as a first visitor location strategy; and if a deletion instruction sent by the second network equipment is received, deleting the corresponding visited place strategy based on the identification information of the visited place strategy to be deleted, which is carried in the deletion instruction.
11. The network device of claim 7,
the processing unit is further configured to receive management information for the visitor location policy sent by the second network device; and managing the set visiting place strategy according to the management information aiming at the visiting place strategy.
12. The network device of claim 11, wherein the management information for the visitor location policy comprises at least one of:
activation control information for the visitor location policy;
update control information for the visitor location policy;
and deleting control information aiming at the visited place strategy.
13. A policy control system of a user equipment, the system comprising:
the first network equipment belongs to the first mobile network, is equipment at least capable of providing the functions of visited place policy control and charging rules, and is used for setting a visited place policy and corresponding identification information thereof; acquiring identification information of a visited place strategy for first user equipment from a second network equipment side based on related information of the first user equipment; wherein the first user equipment belongs to a second mobile network, and the second network equipment belongs to the second mobile network; the second mobile network is different from the first mobile network; selecting a corresponding first visiting place strategy for the first user equipment based on the identification information of the visiting place strategy, and managing the first user equipment based on the first visiting place strategy; wherein the visitor policy at least comprises a first visitor policy, and the first visitor policy corresponds to the first user equipment;
and the second network equipment is used for providing the identification information of the visitor location strategy of the first user equipment for the first network equipment based on the relevant information of the first user equipment.
CN201510544215.4A 2015-08-28 2015-08-28 Policy control method of user equipment, network equipment and system Active CN106488428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510544215.4A CN106488428B (en) 2015-08-28 2015-08-28 Policy control method of user equipment, network equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510544215.4A CN106488428B (en) 2015-08-28 2015-08-28 Policy control method of user equipment, network equipment and system

Publications (2)

Publication Number Publication Date
CN106488428A CN106488428A (en) 2017-03-08
CN106488428B true CN106488428B (en) 2020-10-09

Family

ID=58234897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510544215.4A Active CN106488428B (en) 2015-08-28 2015-08-28 Policy control method of user equipment, network equipment and system

Country Status (1)

Country Link
CN (1) CN106488428B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809667B (en) * 2017-05-02 2022-06-03 中兴通讯股份有限公司 PCRF entity, storage medium, and race condition relieving method and system
CN110650467B (en) * 2018-06-26 2022-03-29 华为技术有限公司 Method and device for managing user data
WO2024055175A1 (en) * 2022-09-13 2024-03-21 北京小米移动软件有限公司 Information processing methods and apparatuses, communication device and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272534B (en) * 2008-05-08 2012-07-18 中兴通讯股份有限公司 Policy charging control method for concealing visited place network topological structure
CN101662415B (en) * 2008-08-29 2012-11-07 华为技术有限公司 Policy control method, communication system and related equipment
CN102130773B (en) * 2011-02-25 2012-12-19 华为技术有限公司 Group communication method and device
CN104349297A (en) * 2013-08-02 2015-02-11 中兴通讯股份有限公司 Charging policy method of internetwork signing authorization and device thereof

Also Published As

Publication number Publication date
CN106488428A (en) 2017-03-08

Similar Documents

Publication Publication Date Title
EP2827623B1 (en) Policy and charging control method, and v-pcrf apparatus
CN101552682B (en) Method and system for controlling policy and charging control information
KR102048882B1 (en) Method and system for selecting pcef and pcrf in a wireless communication system
US8532125B2 (en) Method, system and apparatus for session association
CN103404185A (en) Temporary restrictions and rollback
CN101183958A (en) Charging control method, charging center and related equipment
EP4236391A1 (en) Charging method and device and session management entity
CN102045695B (en) Method and system for acquiring information on MTC (Microsoft Technology Center) server address
CN102547640A (en) Method and system for signing and executing consumption restriction business
CN111130855A (en) Problem positioning method and device
CN104955013A (en) Usage monitoring method, apparatus and system
CN106488428B (en) Policy control method of user equipment, network equipment and system
US9036631B2 (en) Identifying Gn/Gp mode at PCRF
CN108011725B (en) Policy control method, device and system
CN102480718B (en) Method for supporting sponsored data connectivity at roaming scene and system thereof
CN102547854B (en) Policy control method and device
CN108260118B (en) Network selection strategy processing method, PCRF, MME and system
CN110858957B (en) Information pushing system, method, device, medium and equipment
CN106507382B (en) Diameter message routing method and routing agent node
CN110890967B (en) Charging processing method, network element and network system
CN101753323A (en) Method, system and device for generating QoS policy
CN105722138A (en) Business processing method and business processing system
CN101998515A (en) Implementation method and implementation system for controlling PCRF load balancing
CN102421080A (en) Traffic monitoring method and policy and charging rules function entity
US20170026524A1 (en) Charging method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant