CN108307350A - A kind of method and apparatus of access network example - Google Patents

A kind of method and apparatus of access network example Download PDF

Info

Publication number
CN108307350A
CN108307350A CN201610867941.4A CN201610867941A CN108307350A CN 108307350 A CN108307350 A CN 108307350A CN 201610867941 A CN201610867941 A CN 201610867941A CN 108307350 A CN108307350 A CN 108307350A
Authority
CN
China
Prior art keywords
network
connection
request message
network function
network example
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610867941.4A
Other languages
Chinese (zh)
Other versions
CN108307350B (en
Inventor
侯云静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Telecommunications Technology CATT
Datang Mobile Communications Equipment Co Ltd
Original Assignee
China Academy of Telecommunications Technology CATT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Telecommunications Technology CATT filed Critical China Academy of Telecommunications Technology CATT
Priority to CN201610867941.4A priority Critical patent/CN108307350B/en
Publication of CN108307350A publication Critical patent/CN108307350A/en
Application granted granted Critical
Publication of CN108307350B publication Critical patent/CN108307350B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

An embodiment of the present invention provides it is a kind of access network example method and apparatus, the method includes:First network function receives the first request message that third party sends;The first network function triggers the operation authorized to target network example to UE access according to first request message, realizes third party's triggering network and is authorized to the specific network example of UE access, and establishes connection in target network example for UE.

Description

A kind of method and apparatus of access network example
Technical field
The present invention relates to field of communication technology more particularly to a kind of method and apparatus of access network example.
Background technology
In order to provide more preferably service quality or special business, third party to high-priority users (such as Gold Subscriber) (such as service provider) can dispose target network example in the operator network, which can provide to the user higher Service quality or special business, can only be accessed by high-priority users.
However, at present and unresolved when user changes priority, it is specific to UE access how third party triggers network Network example is authorized.
Invention content
In view of above-mentioned technical problem, the embodiment of the present invention provides a kind of method and apparatus of access network example, solves net Network authorizes UE access target network example under third-party request.
In a first aspect, a kind of method of access network example is provided, the method includes:
First network function receives the first request message that third party sends;
The first network function awards UE access to target network example according to first request message triggering The operation of power.
Optionally, the method further includes:
If authorizing successfully, UE is redirected to target network example by the first network function triggering.
Optionally, UE is redirected to target network example by the first network function triggering, including:
The first network function sends the first connection release request message to UE;
The first network function receives the first connection that UE is sent after Connection Release and establishes request;
The first network function establishes request according to first connection, and triggering, which is established in target network example for UE, to be connected It connects.
Optionally, UE is redirected to target network example by the first network function triggering, including:
The source network example that connection has been established to UE for the first network function sends the second request message, and described second asks Ask message for asking the source network example that the connection of UE is redirected to target network example.
Optionally, the first network function to UE have been established connection source network example send first connection redirect ask Message, the first connection Redirection Request message is asked to send the second connection to target network example for trigger source network example Redirection Request message;
The first network function receives the second connection redirected validation message that source network example is sent, and described second connects It is that source network example is sent according to the first connection redirected validation message that target network example is sent to connect redirected validation message 's.
Optionally, the first network function is policy control functions, and the first network function is asked according to described first The operation for asking message trigger to authorize the UE access to target network example, including:
The policy control functions send third request message, institute according to first request message to the second network function Third request message is stated for triggering the behaviour that second network function authorizes the UE access to target network example Make.
Optionally, the policy control functions receive the first of second network function and reply message, described first time Multiple message carries the Authorization result that second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
Optionally, if authorizing successfully, the policy control functions send the second Connection Release to second network function Request message, the second connection release request message is for triggering the notice source network example release of the second network function in source net The connection established in network example.
Optionally, the first network function is triggered according to first request message to the UE access to target network The operation that example is authorized, including:
The first network function according to first request message directly to the UE access to target network example into The operation that row authorizes.
Optionally, the first network function sends third to the third party and replies message, and the third replies message Carry the Authorization result that the first network function authorizes the UE access to target network example.
Optionally, first request message includes but not limited to:The identification information of UE, or
First request message includes but not limited to:The identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
Optionally, the identification information is UE marks or the IP address of UE.
Second aspect additionally provides a kind of first network function, including:
Receiving module, the first request message for receiving third party's transmission;
Authorization module, for what is authorized to target network example to UE access according to first request message triggering Operation.
Optionally, the first network function further includes:
Redirection module, if for authorizing successfully, UE is redirected to target network example by triggering.
Optionally, the redirection module is further used for:The first connection release request message is sent to UE;UE is received to exist Request is established in the first connection sent after Connection Release;Request is established according to first connection, triggering is in target network reality Example is that UE establishes connection.
Optionally, the redirection module is further used for:The source network example transmission second that connection has been established to UE is asked Message is sought, second request message is for asking the source network example that the connection of UE is redirected to target network example.
Optionally, the redirection module is further used for:The source network example that connection has been established to UE sends the first company Redirection Request message is connect, the first connection Redirection Request message is sent out for trigger source network example to target network example Send the second connection Redirection Request message;
Receive the second connection redirected validation message that source network example is sent, the second connection redirected validation message It is that source network example is sent according to the first connection redirected validation message that target network example is sent.
Optionally, the first network function is policy control functions, and the policy control functions are asked according to described first Message is asked to send third request message to the second network function, the third request message is for triggering second network function The operation that the UE access is authorized to target network example.
Optionally, the policy control functions receive the first of second network function and reply message, described first time Multiple message carries the Authorization result that second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
Optionally, if authorizing successfully, the policy control functions send the second Connection Release to second network function Request message, the second connection release request message is for triggering the notice source network example release of the second network function in source net The connection established in network example.
Optionally, the authorization module is further used for:Directly the UE access is arrived according to first request message The operation that target network example is authorized.
Optionally, first request message includes but not limited to:The identification information of UE, or
First request message includes but not limited to:The identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
Optionally, the identification information is UE marks or the IP address of UE.
A technical solution in above-mentioned technical proposal has the following advantages that or advantageous effect:It realizes third party and triggers net Network authorizes the specific network example of UE access, and establishes connection in target network example for UE.
Description of the drawings
Fig. 1 is the flow chart of the method for access network example in the embodiment of the present invention one;
Fig. 2 is network architecture schematic diagram in the embodiment of the present invention two;
Fig. 3 is the schematic diagram of third party and network interaction process in the embodiment of the present invention two;
Fig. 4 is that third party triggers the schematic diagram that UE establishes connection in specific network example in the embodiment of the present invention three;
Fig. 5 is the schematic diagram that network-triggered UE establishes connection in specific network example in the embodiment of the present invention four;
Fig. 6 is network architecture schematic diagram in the embodiment of the present invention five;
Fig. 7 is one of the interactive process schematic diagram of third party and network in the embodiment of the present invention five;
Fig. 8 is two of the interactive process schematic diagram of third party and network in the embodiment of the present invention five;
Fig. 9 is that the schematic diagram that successfully scene lower network triggering connection redirects is authorized in the embodiment of the present invention six;
Figure 10 is the structure diagram of first network function in the embodiment of the present invention seven.
Specific implementation mode
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
One skilled in the art will appreciate that embodiments of the present invention can be implemented as a kind of system, device, equipment, method Or computer program product.Therefore, the embodiment of the present invention can be with specific implementation is as follows:It is complete hardware, complete The form that software (including firmware, resident software, microcode etc.) or hardware and software combine.
A kind of method and apparatus of access network example is provided in embodiments of the present invention, and concrete mode is as follows:Third Direction network sends request message, and the information of user can be carried in request message, such as the MSISDN of user name or user (are moved Dynamic platform ISDN number).In addition, being also possible to carry the information of network example, such as network example mark or APN in request message (access point name).After network receives request message, to UE access, the above-mentioned network example authorizes, and to third party Return replies message, and Authorization result can be carried in replying message, such as allows access or denied access.When allowing to access, The probable behavior of network is as follows:
Behavior one:The request message of release connection is sent to UE, and the prompt message for rebuilding connection is carried in message.Connection After release, when UE sends connection foundation request to network again, network-triggered, which is established in specific network example for UE, to be connected It connects.
Behavior two:The network example (can be described as source network example) that connection has been established to UE for network sends request message, asks Ask source network example that the connection of UE is redirected to specific network example (can be described as target network example).Source network example to Target network example sends connection Redirection Request message, and target network example is that UE establishes user plane connection, and to source network Example returns to confirmation message.Source network example returns to confirmation message to network.
Embodiment one
Referring to Fig. 1, a kind of method of access network example is shown in figure, is as follows:
Step 101, first network function receive the first request message that third party sends;
Above-mentioned first network function is referred to as the first NF (Network Functions), or is referred to as One network equipment does not limit its concrete type specifically in the present embodiment.
Such as:First network function can be policy control functions, which can be according to the signing of user The information such as the information that information or third party provide are generated strategy, and policy execution entity is handed down to, by policy execution entity according to this Strategy is monitored and/or controls to the flow of UE.
In another example:First network function can be general control network function, which can be by more A different network example or network are sliced the network function being used in conjunction with, and can be mobile management (Mobility Management, MM) function, authentication function, network slice selection function/network example selection function etc..
Above-mentioned third party can be IMS subsystems, application server (such as the service provider of contract is signed with operator The server of deployment), it is also not limited to this certainly.
Above-mentioned first request message is to need to trigger when UE is redirected to target network example by network by institute in third party State the transmission of third direction first network function.
It should be noted that network example in the present embodiment is:It can be at, network example by one group of network functional group Core net is collectively constituted as core net, or with other network functions.The network example is referred to as network slice.
Step 102, first network function award UE access to target network example according to the triggering of the first request message The operation of power.
By step 101~step 102, solves third party's triggering network and the specific network example of UE access is awarded Power.
In the present embodiment, optionally, the method further includes:
If authorizing successfully, UE is redirected to target network example by first network function triggering, to realize the After tripartite's triggering network authorizes the specific network example of UE access, it can establish and connect for UE in target network example It connects.
In the present embodiment, one of the optional mode of connection is established for UE in target network example:
First network function sends the first connection release request message to UE;First network function receives UE in Connection Release Request is established in the first connection sent later;First network function establishes request according to first connection, triggers in target network Network example is that UE establishes connection.
In the present embodiment, the two of the optional mode of connection are established for UE in target network example:
The source network example that connection has been established to UE for first network function sends the second request message, and the second request message is used The connection of UE is redirected to target network example in asking the source network example.
Specifically, first network function to UE have been established connection source network example send first connection redirection request disappear Breath, the first connection Redirection Request message send the second connection to target network example for trigger source network example and reset To request message;First network function receives the second connection redirected validation message that source network example is sent, and described second connects It is that source network example is sent according to the first connection redirected validation message that target network example is sent to connect redirected validation message 's.
In the present embodiment, optionally, if first network function is policy control functions, first network function is according to First request message triggers the operation authorized to target network example to the UE access, including:
Policy control functions are according to first request message to the second network function (or referred to as the 2nd NF, Huo Zhe Two network equipments) third request message is sent, the third request message is for triggering second network function to the UE It is linked into the operation that target network example is authorized.
It should be noted that above-mentioned second network function can be general control network function, the general control network work( The network function being used in conjunction with can be sliced by multiple and different network examples or network.
In the present embodiment, optionally, the policy control functions receive the first of the second network function and reply message, institute It states first and replies message the mandate knot that carrying second network function authorizes the UE access to target network example Fruit;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
In the present embodiment, optionally, if authorizing successfully, the policy control functions are sent to second network function Second connection release request message, the first connection release request message are real for triggering the second network function notice source network The connection that example release is established in source network example.
In the present embodiment, optionally, the first network function is triggered according to first request message to the UE It is linked into the operation that target network example is authorized, including:
The first network function according to first request message directly to the UE access to target network example into The operation that row authorizes.Above-mentioned first network function is general control network function.
In the present embodiment, optionally, the first network function sends third to the third party and replies message, described Third, which replies message, carries the Authorization result that the first network function authorizes the UE access to target network example.
In the present embodiment, optionally, first request message includes but not limited to:The identification information of UE, or
First request message includes but not limited to:The identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
In the present embodiment, optionally, the identification information is UE marks or the IP address of UE.
In the present embodiment, third party's triggering network is realized to authorize the specific network example of UE access, and In target network example connection is established for UE.
Embodiment two
In the present embodiment, the specific network architecture is as shown in Figure 2.
UE is connected to third party by first network example (or referred to as first network is sliced), and UE wishes to obtain more Excellent service, therefore it is ordered to third party.In order to more preferably be serviced to UE offers, third party determines that triggering network will UE is redirected in specific network example (such as the second network example, or referred to as the second network slice).Based on above-mentioned net The interactive process of network framework, third party and network is as shown in figure 3, below by taking first network function is policy control functions as an example.
It is as follows:
Step 301, third direction policy control functions send the 4th request message, at least carry and use in the 4th request message The identification information (such as user name, the IP address etc. of UE) at family is also possible in the 4th request message carry network example information (such as Network example identifies, APN) or network example selection information (such as business information).
Above-mentioned third party can be application server, such as the application server that service provider disposes, certainly also not It is limited to this.
The information such as the information that above-mentioned policy control functions can be provided according to the signing information of user or third party formulate plan Slightly, it is handed down to policy execution entity, the flow of UE is monitored and/or is controlled according to the strategy by policy execution entity.
Step 302, policy control functions obtain UE marks according to the identification information of user, then to general control network work( The 5th request message can be sent, the 5th request message includes UE marks, and network example information or network example select information.
Above-mentioned general control network function can be sliced the network being used in conjunction with by multiple and different network examples or network Function.
Step 303, general control network function select network example, and then to UE access, the network example authorizes.
Above-mentioned network example is referred to as network slice.
Step 304, general control network function return to the 4th to policy control functions and reply message, during the 4th replies message Including Authorization result.
Above-mentioned general control network function is equivalent to the second network function in embodiment one.
Step 305, policy control functions return to the 5th to third party and reply message, and Authorization result is carried in message.
Embodiment three
The present embodiment describes the operation after authorizing successfully based on embodiment two.In the present embodiment, third party triggers UE Connection is established in specific network example.Detailed process is as shown in figure 4, be as follows:
Step 401, third party notify UE to be connected to target network example;
Step 402, UE send connection to general control network function and establish request, and connection, which is established, carries mesh in request message Mark the information of network example, such as network example mark or business information;
Above-mentioned general control network function is equivalent to the second network function in embodiment one.
Step 403, general control network function will be connected according to the information selection target network example of target network example Establish the control function that request is sent in target network example;
Step 404, the process for establishing connection for UE in target network example.
After the above process terminates, UE is communicated by the connection established in target network example with third party.
It should be noted that the release for the connection established in source network example, can trigger Connection Release process by UE, It network-triggered can discharge.
When network-triggered release, there are two types of methods to realize Connection Release:
Method one:Policy control functions find that UE is established after new connection, and policy control functions are to general control network work( Connection release request can be sent, sending Connection Release from control function of the general control network function into source network example asks It asks, the connection in source of release network example.
Above-mentioned policy control functions are equivalent to the first network function in embodiment one.
Method two:General control network function finds that UE is established after new connection, the control work(into source network example Connection release request, the connection in source of release network example can be sent.
Example IV
The present embodiment describes the operation after authorizing successfully based on embodiment two.In the present embodiment, network-triggered UE exists Connection is established in specific network example.Detailed process is as shown in figure 5, be as follows:
The control function of step 501, general control network function into source network example sends redirection request;
Above-mentioned general control network function is equivalent to the second network function in embodiment one.
Control function in step 502, source network example sends connection release request to UE, is carried in connection release message Re-establish the prompt message of connection;
Step 503, Connection Release process;
Step 504, UE send connection to general control network function and establish request, carry in message network example information or Network example selects information.Wherein network example information can be the mark of target network example, and network example selects information can To be business information;
The control function of step 505, general control network function into target network example sends connection and establishes request;
Process is established in step 506, connection.
Embodiment five
In the present embodiment, the specific network architecture is as shown in Figure 6.
UE is connected to third party by first network example, and UE wishes more preferably to be serviced, therefore it is to third Fang Jinhang is ordered.In order to more preferably be serviced to UE offers, third party determines that UE is redirected to specific network by triggering network In example.Based on the above-mentioned network architecture, the interactive process of third party and network is as shown in fig. 7, be as follows:
Step 701, third direction general control network function send the first request message, include at least user's in message Identification information (such as UE marks, UE IP address), it is also possible to real including network example information (such as network example mark) or network Example selection information (such as business information);
Above-mentioned general control network function is equivalent to the first network function in embodiment one.
Step 702, general control network function determine target network example according to the information that third party provides, to UE access Target network example is authorized;
Step 703, general control network function are replied message to third party, and it includes Authorization result to reply message;
It should be noted that in the present embodiment, general control network function can be HSS (home subscriber server), Mobile management or other functions.When general control network function is HSS, detailed process as shown in figure 8, specific steps such as Under:
Step 801, third direction HSS send request message, and the identification information of user is carried in request message, as UE is marked Know, UE IP address;
Step 802, HSS requests aaa server (verification, authorization and accounting server) receive specific network example to UE It is authorized;
Step 803 authorizes successfully, and HSS sends Redirection Request message to MM (mobile management), and UE marks are carried in message Know and network example information.
The process that redirects between step 804, MM triggering network examples, specifically please refer to step 901 in embodiment six to Step 905.
Step 805, MM are replied message to HSS.
Step 806, HSS are replied message to third party.
Embodiment six
The present embodiment description authorizes the behavior that successfully scene lower network triggering connection redirects, as shown in figure 9, specific steps It is as follows:
Step 901, network send connection Redirection Request message to source network example, carry in message connection identifier and The information of target network example;
Step 902, source network example send connection redirection request to target network example;
Step 903, target network example select user plane functions, and returning to connection to source network example redirects confirmation, disappears The information of user plane functions is carried in breath.
Step 904, source network example update the letter of the user plane functions stored in link information, such as update access device Breath.
Step 905, source network example send connection and redirect to network to be confirmed.
Step 906, network send confirmation message to third party.
Embodiment seven
Referring to Figure 10, the structure of first network function is shown in figure, which includes:
Receiving module 1001, the first request message for receiving third party's transmission;
Authorization module 1002, for being awarded to target network example to UE access according to first request message triggering The operation of power.
In the present embodiment, optionally, the first network function further includes:
Redirection module, if for authorizing successfully, UE is redirected to target network example by triggering.
In the present embodiment, optionally, the redirection module is further used for:The first connection release request is sent to UE Message;It receives the first connection that UE is sent after Connection Release and establishes request;Request, triggering are established according to first connection It is that UE establishes connection in target network example.
In the present embodiment, optionally, the redirection module is further used for:The source network that connection has been established to UE is real Example sends the second request message, and second request message is for asking the source network example that the connection of UE is redirected to mesh Mark network example.
In the present embodiment, optionally, the redirection module is further used for:The source network that connection has been established to UE is real Example sends the first connection Redirection Request message, and the first connection Redirection Request message is used for trigger source network example to mesh It marks network example and sends the second connection Redirection Request message;
Receive the second connection redirected validation message that source network example is sent, the second connection redirected validation message It is that source network example is sent according to the first connection redirected validation message that target network example is sent.
In the present embodiment, optionally, the first network function is policy control functions, the policy control functions root Third request message is sent to the second network function according to first request message, the third request message is described for triggering The operation that second network function authorizes the UE access to target network example.
In the present embodiment, optionally, the policy control functions receive the first of second network function and reply and disappear Breath, described first, which replies message carrying second network function, awards the UE access to what target network example was authorized Weigh result;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
In the present embodiment, optionally,
If authorizing successfully, the policy control functions send the second connection release request to second network function and disappear Breath, the second connection release request message is for triggering the notice source network example release of the second network function in source network example The connection of interior foundation.
In the present embodiment, optionally, the authorization module is further used for:It is directly right according to first request message The operation that the UE access is authorized to target network example.
In the present embodiment, optionally, first request message includes but not limited to:The identification information of UE, or
First request message includes but not limited to:The identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
In the present embodiment, optionally, the identification information is UE marks or the IP address of UE.
In the present embodiment, third party's triggering network is realized to authorize the specific network example of UE access, and In target network example connection is established for UE.
It should be understood that " one embodiment " or " embodiment " that specification is mentioned in the whole text mean it is related with embodiment A particular feature, structure, or characteristic includes at least one embodiment of the present invention.Therefore, occur everywhere in the whole instruction " in one embodiment " or " in one embodiment " not necessarily refer to identical embodiment.In addition, these specific feature, knots Structure or characteristic can in any suitable manner combine in one or more embodiments.
In various embodiments of the present invention, it should be appreciated that size of the sequence numbers of the above procedures is not meant to execute suitable The execution sequence of the priority of sequence, each process should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention Process constitutes any restriction.
In addition, the terms " system " and " network " are often used interchangeably herein.
It should be understood that the terms "and/or", only a kind of incidence relation of description affiliated partner, expression can deposit In three kinds of relationships, for example, A and/or B, can indicate:Individualism A exists simultaneously A and B, these three situations of individualism B. In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
In embodiment provided herein, it should be appreciated that " B corresponding with A " indicates that B is associated with A, can be with according to A Determine B.It is also to be understood that determine that B is not meant to determine B only according to A according to A, it can also be according to A and/or other information Determine B.
In several embodiments provided herein, it should be understood that disclosed method and apparatus, it can be by other Mode realize.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only For a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine Or it is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed phase Coupling, direct-coupling or communication connection between mutually can be by some interfaces, the INDIRECT COUPLING or communication of device or unit Connection can be electrical, machinery or other forms.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that the independent physics of each unit includes, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or first network function etc.) executes receives and dispatches described in each embodiment of the present invention The part steps of method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, Abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc. are various can be with Store the medium of program code.
Above-described is the preferred embodiment of the present invention, it should be pointed out that the ordinary person of the art is come It says, several improvements and modifications can also be made under the premise of not departing from principle of the present invention, these improvements and modifications also exist In protection scope of the present invention.

Claims (23)

1. a kind of method of access network example, which is characterized in that the method includes:
First network function receives the first request message that third party sends;
The first network function authorizes UE access to target network example according to first request message triggering Operation.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
If authorizing successfully, UE is redirected to target network example by the first network function triggering.
3. according to the method described in claim 2, it is characterized in that, UE is redirected to target by first network function triggering Network example, including:
The first network function sends the first connection release request message to UE;
The first network function receives the first connection that UE is sent after Connection Release and establishes request;
The first network function establishes request according to first connection, and triggering is that UE establishes connection in target network example.
4. according to the method described in claim 2, it is characterized in that, UE is redirected to target by first network function triggering Network example, including:
The source network example that connection has been established to UE for the first network function sends the second request message, and second request disappears Breath is for asking the source network example that the connection of UE is redirected to target network example.
5. according to the method described in claim 4, it is characterized in that,
The source network example that connection has been established to UE for the first network function sends the first connection Redirection Request message, described First connection Redirection Request message sends the second connection redirection request for trigger source network example to target network example Message;
The first network function receives the second connection redirected validation message that source network example is sent, the second connection weight Orientation confirmation message is that source network example is sent according to the first connection redirected validation message that target network example is sent.
6. according to the method described in claim 1, it is characterized in that, the first network function be policy control functions, it is described First network function triggers the operation authorized to target network example to the UE access according to first request message, Including:
The policy control functions send third request message according to first request message to the second network function, and described the Three request messages are for triggering the operation that second network function authorizes the UE access to target network example.
7. according to the method described in claim 6, it is characterized in that,
What the policy control functions received second network function first replies message, and described first replies message and carry institute State the Authorization result that the second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message the carrying mandate As a result.
8. according to the method described in claim 6, it is characterized in that,
If authorizing successfully, the policy control functions send the second connection release request message, institute to second network function State the second connection release request message for trigger the second network function notice source network example discharge it is built-in in source network example Vertical connection.
9. according to the method described in claim 1, it is characterized in that, the first network function is according to first request message The operation authorized to target network example to the UE access is triggered, including:
The first network function directly awards the UE access to target network example according to first request message The operation of power.
10. according to the method described in claim 9, it is characterized in that,
The first network function sends third to the third party and replies message, and the third replies message carrying described first The Authorization result that network function authorizes the UE access to target network example.
11. according to the method described in claim 1, it is characterized in that, first request message includes but not limited to:The mark of UE Know information, or
First request message includes but not limited to:The identification information of the user of UE and relevant with the target network example Network example information or network example select information.
12. according to the method for claim 11, which is characterized in that the identification information is UE marks or the IP address of UE.
13. a kind of first network function, which is characterized in that including:
Receiving module, the first request message for receiving third party's transmission;
Authorization module, for triggering the behaviour authorized to target network example to UE access according to first request message Make.
14. first network function according to claim 13, which is characterized in that the first network function further includes:
Redirection module, if for authorizing successfully, UE is redirected to target network example by triggering.
15. first network function according to claim 14, which is characterized in that the redirection module is further used for: The first connection release request message is sent to UE;It receives the first connection that UE is sent after Connection Release and establishes request;According to Request is established in first connection, and triggering is that UE establishes connection in target network example.
16. first network function according to claim 14, which is characterized in that the redirection module is further used for: The source network example that connection has been established to UE sends the second request message, and second request message is for asking the source network The connection of UE is redirected to target network example by example.
17. first network function according to claim 16, which is characterized in that the redirection module is further used for: The source network example that connection has been established to UE sends the first connection Redirection Request message, and the first connection redirection request disappears Breath sends the second connection Redirection Request message for trigger source network example to target network example;
The second connection redirected validation message that source network example is sent is received, the second connection redirected validation message is source Network example is sent according to the first connection redirected validation message that target network example is sent.
18. first network function according to claim 13, which is characterized in that the first network function is policy control Function, the policy control functions send third request message according to first request message to the second network function, described Third request message is for triggering the operation that second network function authorizes the UE access to target network example.
19. first network function according to claim 18, which is characterized in that
What the policy control functions received second network function first replies message, and described first replies message and carry institute State the Authorization result that the second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message the carrying mandate As a result.
20. first network function according to claim 18, which is characterized in that
If authorizing successfully, the policy control functions send the second connection release request message, institute to second network function State the second connection release request message for trigger the second network function notice source network example discharge it is built-in in source network example Vertical connection.
21. first network function according to claim 13, which is characterized in that the authorization module is further used for:Root The operation that directly UE access is authorized to target network example according to first request message.
22. first network function according to claim 13, which is characterized in that first request message includes but unlimited In:The identification information of UE, or
First request message includes but not limited to:The identification information of the user of UE and relevant with the target network example Network example information or network example select information.
23. first network function according to claim 22, which is characterized in that the identification information is UE marks or UE IP address.
CN201610867941.4A 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example Active CN108307350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610867941.4A CN108307350B (en) 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610867941.4A CN108307350B (en) 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example

Publications (2)

Publication Number Publication Date
CN108307350A true CN108307350A (en) 2018-07-20
CN108307350B CN108307350B (en) 2019-09-20

Family

ID=62871885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610867941.4A Active CN108307350B (en) 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example

Country Status (1)

Country Link
CN (1) CN108307350B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167572A (en) * 2011-12-13 2013-06-19 中国移动通信集团公司 Registration method, system and server for accessing IP multimedia subsystem (IMS) based on wireless local area network (WLAN)
CN105164990A (en) * 2013-03-18 2015-12-16 皇家Kpn公司 Redirecting client device from first gateway to second gateway for accessing network node function
CN105828402A (en) * 2015-01-06 2016-08-03 中国移动通信集团江苏有限公司 Blind redirection method, core network and base station

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167572A (en) * 2011-12-13 2013-06-19 中国移动通信集团公司 Registration method, system and server for accessing IP multimedia subsystem (IMS) based on wireless local area network (WLAN)
CN105164990A (en) * 2013-03-18 2015-12-16 皇家Kpn公司 Redirecting client device from first gateway to second gateway for accessing network node function
CN105828402A (en) * 2015-01-06 2016-08-03 中国移动通信集团江苏有限公司 Blind redirection method, core network and base station

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHINA MOBILE, HUAWEI: "eFMSS use case for supporting third party owned (S)Gi-LAN service", 《3GPP TSG-SA WG1#71 S1-152682》 *

Also Published As

Publication number Publication date
CN108307350B (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN104618226B (en) A kind of information processing method, client and server
CN104144402B (en) Realize the method and relevant apparatus of mobile terminal localized roaming
CN104618312B (en) A kind of remote login methods, devices and systems of M2M application
CN104917749B (en) account registration method and device
CN105898428B (en) User identity management method and device
CN106170771A (en) For managing the method for notice, system and the medium pointing to the multiple application being installed on subscriber equipment
KR20190018720A (en) Cyber security management system, method and apparatus
CN101990183A (en) Method, device and system for protecting user information
CN101160782A (en) Method, system and equipment for protecting application account of network service
CN101136915A (en) Method and system for implementing multi-service united safety authentication
CN106339632B (en) A kind of method, user equipment and system for distributing M2M equipment management permission
CN105871821A (en) Device binding method
CN107516179A (en) The method and device of express delivery
CN104883402A (en) Information processing method and cloud-end service platform
CN104980298A (en) Abnormity prompting method, device and system
CN107347054A (en) A kind of auth method and device
CN109274779A (en) A kind of alias management method and equipment
CN104284334B (en) A kind of control method and equipment of WiFi protection settings
CN109644154A (en) For the location-based access control of artificial dialogue entity
CN105959276A (en) Application control method, device, and terminal device based on third party account login
CN109561429A (en) A kind of method for authenticating and equipment
CN109388924A (en) A kind of auth method, device, server and storage medium
CN105635124B (en) Flow control methods and device
CN106453321A (en) Authentication server, system and method, and to-be-authenticated terminal
CN104009850B (en) A kind of method for authenticating user identity and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee after: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20210604

Address after: 100085 1st floor, building 1, yard 5, Shangdi East Road, Haidian District, Beijing

Patentee after: DATANG MOBILE COMMUNICATIONS EQUIPMENT Co.,Ltd.

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

TR01 Transfer of patent right