CN108307350B - A kind of method and apparatus accessing network example - Google Patents

A kind of method and apparatus accessing network example Download PDF

Info

Publication number
CN108307350B
CN108307350B CN201610867941.4A CN201610867941A CN108307350B CN 108307350 B CN108307350 B CN 108307350B CN 201610867941 A CN201610867941 A CN 201610867941A CN 108307350 B CN108307350 B CN 108307350B
Authority
CN
China
Prior art keywords
network
connection
request message
network example
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610867941.4A
Other languages
Chinese (zh)
Other versions
CN108307350A (en
Inventor
侯云静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Telecommunications Technology CATT
Datang Mobile Communications Equipment Co Ltd
Original Assignee
China Academy of Telecommunications Technology CATT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Telecommunications Technology CATT filed Critical China Academy of Telecommunications Technology CATT
Priority to CN201610867941.4A priority Critical patent/CN108307350B/en
Publication of CN108307350A publication Critical patent/CN108307350A/en
Application granted granted Critical
Publication of CN108307350B publication Critical patent/CN108307350B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a kind of method and apparatus for accessing network example, which comprises first network function receives the first request message that third party sends;The first network function triggers the operation authorized to UE access to target network example according to first request message, realizes third party's triggering network and authorizes to the specific network example of UE access, and establishes connection in target network example for UE.

Description

A kind of method and apparatus accessing network example
Technical field
The present invention relates to field of communication technology more particularly to a kind of method and apparatus for accessing network example.
Background technique
In order to provide more preferably service quality or special business, third party to high-priority users (such as Gold Subscriber) (such as service provider) can dispose target network example in the operator network, which can provide higher for user Service quality or special business, can only be accessed by high-priority users.
However, at present and unresolved when user changes priority, it is specific to UE access how third party triggers network Network example is authorized.
Summary of the invention
In view of above-mentioned technical problem, the embodiment of the present invention provides a kind of method and apparatus for accessing network example, solves net Network authorizes UE access target network example under third-party request.
In a first aspect, providing a kind of method for accessing network example, which comprises
First network function receives the first request message that third party sends;
The first network function awards UE access to target network example according to first request message triggering The operation of power.
Optionally, the method also includes:
If authorizing successfully, UE is redirected to target network example by the first network function triggering.
Optionally, UE is redirected to target network example by the first network function triggering, comprising:
The first network function sends the first connection release request message to UE;
The first network function receives the first connection that UE is sent after Connection Release and establishes request;
The first network function establishes request according to first connection, and triggering, which is established in target network example for UE, to be connected It connects.
Optionally, UE is redirected to target network example by the first network function triggering, comprising:
The first network function sends the second request message to the source network example that connection has been established in UE, and described second asks Ask message for requesting the source network example that the connection of UE is redirected to target network example.
Optionally, the first network function sends the first connection redirection to the source network example that connection has been established in UE and asks Message is sought, the first connection Redirection Request message sends the second connection to target network example for trigger source network example Redirection Request message;
The first network function receives the second connection redirected validation message that source network example is sent, and described second connects Connecing redirected validation message is that source network example is sent according to the first connection redirected validation message that target network example is sent 's.
Optionally, the first network function is policy control functions, and the first network function is asked according to described first The operation for asking message trigger to authorize the UE access to target network example, comprising:
The policy control functions send third request message, institute to the second network function according to first request message Third request message is stated for triggering the behaviour that second network function authorizes the UE access to target network example Make.
Optionally, what the policy control functions received second network function first replies message, and described first time Multiple message carries the Authorization result that second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
Optionally, if authorizing successfully, the policy control functions send the second Connection Release to second network function Request message, the second connection release request message is for triggering the notice source network example release of the second network function in source net The connection established in network example.
Optionally, the first network function is triggered according to first request message to the UE access to target network The operation that example is authorized, comprising:
The first network function according to first request message directly to the UE access to target network example into The operation of row authorization.
Optionally, the first network function sends third to the third party and replies message, and the third replies message Carry the Authorization result that the first network function authorizes the UE access to target network example.
Optionally, first request message includes but is not limited to: the identification information of UE, or
First request message includes but is not limited to: the identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
Optionally, the identification information is UE mark or the IP address of UE.
Second aspect additionally provides a kind of first network function, comprising:
Receiving module, for receiving the first request message of third party's transmission;
Authorization module, for what is authorized to UE access to target network example according to first request message triggering Operation.
Optionally, the first network function further include:
Redirection module, if UE is redirected to target network example by triggering for authorizing successfully.
Optionally, the redirection module is further used for: sending the first connection release request message to UE;UE is received to exist Request is established in the first connection sent after Connection Release;Request is established according to first connection, triggering is in target network reality Example is that UE establishes connection.
Optionally, the redirection module is further used for: the source network example that connection has been established to UE sends second and asks Message is sought, second request message is for requesting the source network example that the connection of UE is redirected to target network example.
Optionally, the redirection module is further used for: the source network example that connection has been established to UE sends first and connects Redirection Request message is connect, the first connection Redirection Request message is sent out for trigger source network example to target network example Send the second connection Redirection Request message;
Receive the second connection redirected validation message that source network example is sent, the second connection redirected validation message It is that source network example is sent according to the first connection redirected validation message that target network example is sent.
Optionally, the first network function is policy control functions, and the policy control functions are asked according to described first Message is asked to send third request message to the second network function, the third request message is for triggering second network function The operation that the UE access is authorized to target network example.
Optionally, what the policy control functions received second network function first replies message, and described first time Multiple message carries the Authorization result that second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
Optionally, if authorizing successfully, the policy control functions send the second Connection Release to second network function Request message, the second connection release request message is for triggering the notice source network example release of the second network function in source net The connection established in network example.
Optionally, the authorization module is further used for: directly being arrived to the UE access according to first request message The operation that target network example is authorized.
Optionally, first request message includes but is not limited to: the identification information of UE, or
First request message includes but is not limited to: the identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
Optionally, the identification information is UE mark or the IP address of UE.
A technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that realizing third party triggers net Network authorizes the specific network example of UE access, and establishes connection in target network example for UE.
Detailed description of the invention
Fig. 1 is the flow chart that the method for network example is accessed in the embodiment of the present invention one;
Fig. 2 is network architecture schematic diagram in the embodiment of the present invention two;
Fig. 3 is the schematic diagram of third party and network interaction process in the embodiment of the present invention two;
Fig. 4 is that third party triggers the schematic diagram that UE establishes connection in specific network example in the embodiment of the present invention three;
Fig. 5 is the schematic diagram that network-triggered UE establishes connection in specific network example in the embodiment of the present invention four;
Fig. 6 is network architecture schematic diagram in the embodiment of the present invention five;
Fig. 7 is one of third party and the interactive process schematic diagram of network in the embodiment of the present invention five;
Fig. 8 is two of the interactive process schematic diagram of third party and network in the embodiment of the present invention five;
Fig. 9 is that the schematic diagram that successfully scene lower network triggering connection redirects is authorized in the embodiment of the present invention six;
Figure 10 is the structural block diagram of first network function in the embodiment of the present invention seven.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
One skilled in the art will appreciate that embodiments of the present invention can be implemented as a kind of system, device, equipment, method Or computer program product.Therefore, the embodiment of the present invention can be with specific implementation is as follows: complete hardware, complete The form that software (including firmware, resident software, microcode etc.) or hardware and software combine.
A kind of method and apparatus for accessing network example is provided in embodiments of the present invention, and concrete mode is as follows: third Direction network sends request message, and the information of user, such as the MSISDN (shifting of user name or user can be carried in request message Dynamic platform ISDN number).In addition, being also possible to carry the information of network example, such as network example mark or APN in request message (access point name).After network receives request message, to UE access, the above-mentioned network example is authorized, and to third party Return replies message, reply message in can carry Authorization result, such as allow access or denied access.When allowing to access, The probable behavior of network is as follows:
Behavior one: the request message of release connection is sent to UE, the prompt information for rebuilding connection is carried in message.Connection After release, when UE sends connection foundation request to network again, network-triggered, which is established in specific network example for UE, to be connected It connects.
Behavior two: the network example (can be described as source network example) that connection has been established to UE for network sends request message, asks Ask source network example that the connection of UE is redirected to specific network example (can be described as target network example).Source network example to Target network example sends connection Redirection Request message, and target network example is that UE establishes the connection of user face, and to source network Example returns to confirmation message.Source network example returns to confirmation message to network.
Embodiment one
Referring to Fig. 1, a kind of method for accessing network example is shown in figure, the specific steps are as follows:
Step 101, first network function receive the first request message that third party sends;
Above-mentioned first network function is referred to as the first NF (Network Functions), or is referred to as One network equipment does not limit its concrete type specifically in the present embodiment.
Such as: first network function can be policy control functions, which can be according to the signing of user The information such as the information that information or third party provide are generated strategy, and policy execution entity is handed down to, by policy execution entity according to this Strategy is monitored and/or controls to the flow of UE.
Another example is: first network function can be general control network function, which can be by more A different network example or network are sliced the network function being used in conjunction with, and can be mobile management (Mobility Management, MM) function, authentication function, network slice selection function/network example selection function etc..
Above-mentioned third party can be IMS subsystem, application server (such as the service provider of contract is signed with operator The server of deployment), it is also not limited to this certainly.
Above-mentioned first request message is to need to trigger when UE is redirected to target network example by network by institute in third party State the transmission of third direction first network function.
It should be noted that network example in the present embodiment is: can be at, network example by one group of network functional group Core net is collectively constituted as core net, or with other network functions.The network example is referred to as network slice.
Step 102, first network function award UE access to target network example according to the triggering of the first request message The operation of power.
By step 101~step 102, solves third party's triggering network and the specific network example of UE access is awarded Power.
In the present embodiment, optionally, the method also includes:
If authorizing successfully, UE is redirected to target network example by first network function triggering, to realize the After tripartite's triggering network authorizes the specific network example of UE access, it can establish and connect for UE in target network example It connects.
In the present embodiment, one of the optional way of connection is established for UE in target network example:
First network function sends the first connection release request message to UE;First network function receives UE in Connection Release Request is established in the first connection sent later;First network function establishes request according to first connection, triggers in target network Network example is that UE establishes connection.
In the present embodiment, the two of the optional way of connection are established for UE in target network example:
First network function sends the second request message to the source network example that connection has been established in UE, and the second request message is used The connection of UE is redirected to target network example in the request source network example.
Specifically, first network function sends the first connection redirection request to the source network example that connection has been established in UE and disappears Breath, the first connection Redirection Request message send the second connection to target network example for trigger source network example and reset To request message;First network function receives the second connection redirected validation message that source network example is sent, and described second connects Connecing redirected validation message is that source network example is sent according to the first connection redirected validation message that target network example is sent 's.
In the present embodiment, optionally, if first network function is policy control functions, first network function is according to First request message triggers the operation authorized to the UE access to target network example, comprising:
Policy control functions are according to first request message to the second network function (or referred to as the 2nd NF, Huo Zhe Two network equipments) third request message is sent, the third request message is for triggering second network function to the UE It is linked into the operation that target network example is authorized.
It should be noted that above-mentioned second network function can be general control network function, the general control network function The network function being used in conjunction with can be sliced by multiple and different network examples or network.
In the present embodiment, optionally, the first of the second network function of the policy control functions reception replies message, institute It states first and replies message the authorization knot that carrying second network function authorizes the UE access to target network example Fruit;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
In the present embodiment, optionally, if authorizing successfully, the policy control functions are sent to second network function Second connection release request message, the first connection release request message are real for triggering the second network function notice source network The connection that example release is established in source network example.
In the present embodiment, optionally, the first network function is triggered according to first request message to the UE It is linked into the operation that target network example is authorized, comprising:
The first network function according to first request message directly to the UE access to target network example into The operation of row authorization.Above-mentioned first network function is general control network function.
In the present embodiment, optionally, the first network function sends third to the third party and replies message, described Third, which replies message, carries the Authorization result that the first network function authorizes the UE access to target network example.
In the present embodiment, optionally, first request message includes but is not limited to: the identification information of UE, or
First request message includes but is not limited to: the identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
In the present embodiment, optionally, the identification information is UE mark or the IP address of UE.
In the present embodiment, third party's triggering network is realized to authorize the specific network example of UE access, and Connection is established in target network example for UE.
Embodiment two
In the present embodiment, the specific network architecture is as shown in Figure 2.
UE has passed through first network example (or referred to as first network is sliced) and has been connected to third party, and UE wishes to obtain more Excellent service, therefore it is ordered to third party.In order to more preferably service to UE offer, third party determines that triggering network will UE is redirected in specific network example (such as the second network example, or referred to as the second network slice).Based on above-mentioned net The interactive process of network framework, third party and network is as shown in figure 3, below by taking first network function is policy control functions as an example.
Specific step is as follows:
Step 301, third direction policy control functions send the 4th request message, at least carry and use in the 4th request message The identification information (such as user name, the IP address etc. of UE) at family is also possible in the 4th request message carry network example information (such as Network example mark, APN) or network example selection information (such as business information).
Above-mentioned third party can be application server, such as the application server of service provider's deployment, certainly also not It is limited to this.
The information such as the information that above-mentioned policy control functions can be provided according to the signing information of user or third party formulate plan Slightly, it is handed down to policy execution entity, is monitored and/or is controlled according to flow of the strategy to UE by policy execution entity.
Step 302, policy control functions obtain UE mark according to the identification information of user, then to general control network function The 5th request message can be sent, includes that UE is identified in the 5th request message, network example information or network example select information.
Above-mentioned general control network function can be sliced the network being used in conjunction with by multiple and different network examples or network Function.
Step 303, general control network function select network example, and then to UE access, the network example is authorized.
Above-mentioned network example is referred to as network slice.
Step 304, general control network function return to policy control functions and the 4th reply message, and the 4th replies message Including Authorization result.
Above-mentioned general control network function is equivalent to the second network function in embodiment one.
Step 305, policy control functions return to the 5th to third party and reply message, and Authorization result is carried in message.
Embodiment three
The present embodiment describes the operation after authorizing successfully based on embodiment two.In the present embodiment, third party triggers UE Connection is established in specific network example.Detailed process is as shown in Figure 4, the specific steps are as follows:
Step 401, third party notify UE to be connected to target network example;
Step 402, UE send connection to general control network function and establish request, and connection, which is established, carries mesh in request message Mark the information of network example, such as network example mark or business information;
Above-mentioned general control network function is equivalent to the second network function in embodiment one.
Step 403, general control network function will be connected according to the information selection target network example of target network example Establish the control function that request is sent in target network example;
Step 404, the process for establishing connection for UE in target network example.
After the above process terminates, UE is communicated by the connection established in target network example with third party.
It should be noted that the release for the connection established in source network example, can trigger Connection Release process by UE, It network-triggered can discharge.
When network-triggered release, there are two types of methods to realize Connection Release:
Method one: policy control functions find that UE is established after new connection, and policy control functions are to general control network function Connection release request can be sent, Connection Release is sent from control function of the general control network function into source network example and is asked It asks, the connection in source of release network example.
Above-mentioned policy control functions are equivalent to the first network function in embodiment one.
Method two: general control network function finds that UE is established after new connection, the control function into source network example Connection release request, the connection in source of release network example can be sent.
Example IV
The present embodiment describes the operation after authorizing successfully based on embodiment two.In the present embodiment, network-triggered UE exists Connection is established in specific network example.Detailed process is as shown in Figure 5, the specific steps are as follows:
The control function of step 501, general control network function into source network example sends redirection request;
Above-mentioned general control network function is equivalent to the second network function in embodiment one.
Control function in step 502, source network example sends connection release request to UE, carries in connection release message Re-establish the prompt information of connection;
Step 503, Connection Release process;
Step 504, UE send connection to general control network function and establish request, carry in message network example information or Network example selects information.Wherein network example information can be the mark of target network example, and network example selects information can To be business information;
The control function of step 505, general control network function into target network example sends connection and establishes request;
Step 506, connection establishment process.
Embodiment five
In the present embodiment, the specific network architecture is as shown in Figure 6.
UE has passed through first network example and has been connected to third party, and UE wishes more preferably to be serviced, therefore it is to third Fang Jinhang is ordered.In order to more preferably service to UE offer, third party determines that UE is redirected to specific network by triggering network In example.Based on the above-mentioned network architecture, the interactive process of third party and network is as shown in Figure 7, the specific steps are as follows:
Step 701, third direction general control network function send the first request message, include at least user's in message Identification information (such as UE mark, UE IP address), it is also possible to real including network example information (such as network example mark) or network Example selection information (such as business information);
Above-mentioned general control network function is equivalent to the first network function in embodiment one.
Step 702, general control network function determine target network example according to the information that third party provides, to UE access Target network example is authorized;
Step 703, general control network function are replied message to third party, reply message in include Authorization result;
It should be noted that in the present embodiment, general control network function can be HSS (home subscriber server), Mobile management or other function.When general control network function is HSS, detailed process as shown in figure 8, specific steps such as Under:
Step 801, third direction HSS send request message, and the identification information of user is carried in request message, as UE is marked Know, UE IP address;
Step 802, HSS request aaa server (verifying, authorization and accounting server) receive specific network example to UE It is authorized;
Step 803 authorizes successfully, and HSS sends Redirection Request message to MM (mobile management), and UE mark is carried in message Know and network example information.
The process that redirects between step 804, MM triggering network example, specifically please refer to step 901 in embodiment six to Step 905.
Step 805, MM are replied message to HSS.
Step 806, HSS are replied message to third party.
Embodiment six
The present embodiment description authorizes the behavior that successfully scene lower network triggering connection redirects, as shown in figure 9, specific steps It is as follows:
Step 901, network send connection Redirection Request message to source network example, carry in message connection identifier and The information of target network example;
Step 902, source network example send connection redirection request to target network example;
Step 903, target network example select user plane functions, return to connection to source network example and redirect confirmation, disappear The information of user plane functions is carried in breath.
Step 904, source network example update link information, such as update the letter of the user plane functions stored in access device Breath.
Step 905, source network example send connection to network and redirect confirmation.
Step 906, network send confirmation message to third party.
Embodiment seven
Referring to Figure 10, the structure of first network function is shown in figure, which includes:
Receiving module 1001, for receiving the first request message of third party's transmission;
Authorization module 1002, for being awarded to UE access to target network example according to first request message triggering The operation of power.
In the present embodiment, optionally, the first network function further include:
Redirection module, if UE is redirected to target network example by triggering for authorizing successfully.
In the present embodiment, optionally, the redirection module is further used for: sending the first connection release request to UE Message;It receives the first connection that UE is sent after Connection Release and establishes request;Request, triggering are established according to first connection It is that UE establishes connection in target network example.
In the present embodiment, optionally, the redirection module is further used for: the source network that connection has been established to UE is real Example sends the second request message, and second request message is for requesting the source network example that the connection of UE is redirected to mesh Mark network example.
In the present embodiment, optionally, the redirection module is further used for: the source network that connection has been established to UE is real Example sends the first connection Redirection Request message, and the first connection Redirection Request message is used for trigger source network example to mesh It marks network example and sends the second connection Redirection Request message;
Receive the second connection redirected validation message that source network example is sent, the second connection redirected validation message It is that source network example is sent according to the first connection redirected validation message that target network example is sent.
In the present embodiment, optionally, the first network function is policy control functions, the policy control functions root Third request message is sent to the second network function according to first request message, the third request message is described for triggering The operation that second network function authorizes the UE access to target network example.
In the present embodiment, optionally, the first reply that the policy control functions receive second network function disappears Breath, described first, which replies message carrying second network function, awards the UE access to what target network example was authorized Weigh result;
The policy control functions send second to the third party and reply message, and described second replies message described in carrying Authorization result.
In the present embodiment, optionally,
If authorizing successfully, the policy control functions send the second connection release request to second network function and disappear Breath, the second connection release request message is for triggering the notice source network example release of the second network function in source network example The connection of interior foundation.
In the present embodiment, optionally, the authorization module is further used for: directly right according to first request message The operation that the UE access is authorized to target network example.
In the present embodiment, optionally, first request message includes but is not limited to: the identification information of UE, or
First request message includes but is not limited to: the identification information of the user of UE and with the target network example phase The network example information or network example of pass select information.
In the present embodiment, optionally, the identification information is UE mark or the IP address of UE.
In the present embodiment, third party's triggering network is realized to authorize the specific network example of UE access, and Connection is established in target network example for UE.
It should be understood that " one embodiment " or " embodiment " that specification is mentioned in the whole text mean it is related with embodiment A particular feature, structure, or characteristic is included at least one embodiment of the present invention.Therefore, occur everywhere in the whole instruction " in one embodiment " or " in one embodiment " not necessarily refer to identical embodiment.In addition, these specific features, knot Structure or characteristic can combine in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be appreciated that magnitude of the sequence numbers of the above procedures are not meant to execute suitable Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention Process constitutes any restriction.
In addition, the terms " system " and " network " are often used interchangeably herein.
It should be understood that the terms "and/or", only a kind of incidence relation for describing affiliated partner, expression can deposit In three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B. In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
In embodiment provided herein, it should be appreciated that " B corresponding with A " indicates that B is associated with A, can be with according to A Determine B.It is also to be understood that determine that B is not meant to determine B only according to A according to A, it can also be according to A and/or other information Determine B.
In several embodiments provided herein, it should be understood that disclosed method and apparatus, it can be by other Mode realize.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only For a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine Or it is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed phase Coupling, direct-coupling or communication connection between mutually can be through some interfaces, the INDIRECT COUPLING or communication of device or unit Connection can be electrical property, mechanical or other forms.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that the independent physics of each unit includes, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or first network function etc.) executes receives and dispatches described in each embodiment of the present invention The part steps of method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, Abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc. are various can be with Store the medium of program code.
Above-described is the preferred embodiment of the present invention, it should be pointed out that the ordinary person of the art is come It says, several improvements and modifications can also be made under the premise of not departing from principle of the present invention, these improvements and modifications also exist In protection scope of the present invention.

Claims (23)

1. a kind of method for accessing network example, which is characterized in that the described method includes:
First network function receives the first request message that third party sends;
The first network function authorizes UE access to target network example according to first request message triggering Operation;
The first network function is policy control functions, alternatively, the first network function is general control network function;
The third party is service provider.
2. the method according to claim 1, wherein the method also includes:
If authorizing successfully, UE is redirected to target network example by the first network function triggering.
3. according to the method described in claim 2, it is characterized in that, UE is redirected to target by first network function triggering Network example, comprising:
The first network function sends the first connection release request message to UE;
The first network function receives the first connection that UE is sent after Connection Release and establishes request;
The first network function establishes request according to first connection, and triggering is that UE establishes connection in target network example.
4. according to the method described in claim 2, it is characterized in that, UE is redirected to target by first network function triggering Network example, comprising:
The first network function sends the second request message to the source network example that connection has been established in UE, and second request disappears Breath is for requesting the source network example that the connection of UE is redirected to target network example.
5. according to the method described in claim 4, it is characterized in that,
The first network function sends the first connection Redirection Request message to the source network example that connection has been established in UE, described First connection Redirection Request message sends the second connection redirection request to target network example for trigger source network example Message;
The first network function receives the second connection redirected validation message that source network example is sent, the second connection weight Orientation confirmation message is that source network example is sent according to the first connection redirected validation message that target network example is sent.
6. the method according to claim 1, wherein the first network function be policy control functions, it is described First network function triggers the operation authorized to the UE access to target network example according to first request message, Include:
The policy control functions send third request message to the second network function according to first request message, and described the Three request messages are for triggering the operation that second network function authorizes the UE access to target network example.
7. according to the method described in claim 6, it is characterized in that,
What the policy control functions received second network function first replies message, and described first replies message and carry institute State the Authorization result that the second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message the carrying authorization As a result.
8. according to the method described in claim 6, it is characterized in that,
If authorizing successfully, the policy control functions send the second connection release request message, institute to second network function State the second connection release request message for trigger the second network function notice source network example discharge it is built-in in source network example Vertical connection.
9. the method according to claim 1, wherein the first network function is according to first request message Trigger the operation authorized to the UE access to target network example, comprising:
The first network function directly awards the UE access to target network example according to first request message The operation of power.
10. according to the method described in claim 9, it is characterized in that,
The first network function sends third to the third party and replies message, and the third replies message carrying described first The Authorization result that network function authorizes the UE access to target network example.
11. the method according to claim 1, wherein first request message includes but is not limited to: the mark of UE Know information, or
First request message includes but is not limited to: the identification information of the user of UE and relevant to the target network example Network example information or network example select information.
12. according to the method for claim 11, which is characterized in that the identification information is UE mark or the IP address of UE.
13. a kind of first network functional entity characterized by comprising
Receiving module, for receiving the first request message of third party's transmission;
Authorization module, for triggering the behaviour authorized to UE access to target network example according to first request message Make;
The first network functional entity is policy control functions, alternatively, the first network functional entity is general controls net Network function;
Wherein, the third party is service provider.
14. first network functional entity according to claim 13, which is characterized in that the first network functional entity is also Include:
Redirection module, if UE is redirected to target network example by triggering for authorizing successfully.
15. first network functional entity according to claim 14, which is characterized in that the redirection module is further used In: the first connection release request message is sent to UE;It receives the first connection that UE is sent after Connection Release and establishes request;Root Request is established according to first connection, triggering is that UE establishes connection in target network example.
16. first network functional entity according to claim 14, which is characterized in that the redirection module is further used In: the source network example that connection has been established to UE sends the second request message, and second request message is for requesting the source The connection of UE is redirected to target network example by network example.
17. first network functional entity according to claim 16, which is characterized in that the redirection module is further used In: the source network example that connection has been established to UE sends the first connection Redirection Request message, and first connection, which redirects, asks Message is asked to send the second connection Redirection Request message to target network example for trigger source network example;
The second connection redirected validation message that source network example is sent is received, the second connection redirected validation message is source Network example is sent according to the first connection redirected validation message that target network example is sent.
18. first network functional entity according to claim 13, which is characterized in that the first network functional entity is Policy control functions, the policy control functions send third request to the second network function according to first request message and disappear Breath, the third request message authorize the UE access to target network example for triggering second network function Operation.
19. first network functional entity according to claim 18, which is characterized in that
What the policy control functions received second network function first replies message, and described first replies message and carry institute State the Authorization result that the second network function authorizes the UE access to target network example;
The policy control functions send second to the third party and reply message, and described second replies message the carrying authorization As a result.
20. first network functional entity according to claim 18, which is characterized in that
If authorizing successfully, the policy control functions send the second connection release request message, institute to second network function State the second connection release request message for trigger the second network function notice source network example discharge it is built-in in source network example Vertical connection.
21. first network functional entity according to claim 13, which is characterized in that the authorization module is further used In: the operation that directly UE access is authorized to target network example according to first request message.
22. first network functional entity according to claim 13, which is characterized in that first request message include but It is not limited to: the identification information of UE, or
First request message includes but is not limited to: the identification information of the user of UE and relevant to the target network example Network example information or network example select information.
23. first network functional entity according to claim 22, which is characterized in that the identification information be UE identify or The IP address of UE.
CN201610867941.4A 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example Active CN108307350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610867941.4A CN108307350B (en) 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610867941.4A CN108307350B (en) 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example

Publications (2)

Publication Number Publication Date
CN108307350A CN108307350A (en) 2018-07-20
CN108307350B true CN108307350B (en) 2019-09-20

Family

ID=62871885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610867941.4A Active CN108307350B (en) 2016-09-29 2016-09-29 A kind of method and apparatus accessing network example

Country Status (1)

Country Link
CN (1) CN108307350B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167572A (en) * 2011-12-13 2013-06-19 中国移动通信集团公司 Registration method, system and server for accessing IP multimedia subsystem (IMS) based on wireless local area network (WLAN)
CN105164990A (en) * 2013-03-18 2015-12-16 皇家Kpn公司 Redirecting client device from first gateway to second gateway for accessing network node function
CN105828402A (en) * 2015-01-06 2016-08-03 中国移动通信集团江苏有限公司 Blind redirection method, core network and base station

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167572A (en) * 2011-12-13 2013-06-19 中国移动通信集团公司 Registration method, system and server for accessing IP multimedia subsystem (IMS) based on wireless local area network (WLAN)
CN105164990A (en) * 2013-03-18 2015-12-16 皇家Kpn公司 Redirecting client device from first gateway to second gateway for accessing network node function
CN105828402A (en) * 2015-01-06 2016-08-03 中国移动通信集团江苏有限公司 Blind redirection method, core network and base station

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
eFMSS use case for supporting third party owned (S)Gi-LAN service;China Mobile, Huawei;《3GPP TSG-SA WG1#71 S1-152682》;20150824;全文 *

Also Published As

Publication number Publication date
CN108307350A (en) 2018-07-20

Similar Documents

Publication Publication Date Title
CN104618226B (en) A kind of information processing method, client and server
CN104618312B (en) A kind of remote login methods, devices and systems of M2M application
CN104144402B (en) Realize the method and relevant apparatus of mobile terminal localized roaming
CN110169140A (en) System and method for session management
CN103974257B (en) The cut-in method and relevant device of access point
CN104980298B (en) A kind of abnormal prompt method, apparatus and system
CN109743467A (en) A kind of vehicles management method, system and server
CN106339632B (en) A kind of method, user equipment and system for distributing M2M equipment management permission
CN101990183A (en) Method, device and system for protecting user information
CN108540433A (en) User identity method of calibration and device
CN108632808A (en) Core network control surface device selection method and device
CN105898743B (en) A kind of method for connecting network, apparatus and system
CN109274779A (en) A kind of alias management method and equipment
CN109561429A (en) A kind of method for authenticating and equipment
CN107690795A (en) Intelligent terminal establishes method, intelligent terminal and the server of connection with body-building apparatus
CN105635124B (en) Flow control methods and device
CN106453349A (en) An account number login method and apparatus
CN106102064B (en) The authentication method and router of wireless network
CN109819439A (en) The method and related entities of key updating
CN105991553A (en) Message server and communication method
CN105336013B (en) It is a kind of that the method and system called the roll is realized by beacon broadcast
CN107087293A (en) A kind of cut-in method, terminal and server
CN104335619B (en) The remote de-locking of telecommunication apparatus function
CN108307350B (en) A kind of method and apparatus accessing network example
CN106656942A (en) Role token issuing method, access control method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee after: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210604

Address after: 100085 1st floor, building 1, yard 5, Shangdi East Road, Haidian District, Beijing

Patentee after: DATANG MOBILE COMMUNICATIONS EQUIPMENT Co.,Ltd.

Address before: 100191 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY