CN110621019A - Method and device for preventing flow fraud - Google Patents
Method and device for preventing flow fraud Download PDFInfo
- Publication number
- CN110621019A CN110621019A CN201810638701.6A CN201810638701A CN110621019A CN 110621019 A CN110621019 A CN 110621019A CN 201810638701 A CN201810638701 A CN 201810638701A CN 110621019 A CN110621019 A CN 110621019A
- Authority
- CN
- China
- Prior art keywords
- network
- user equipment
- usage
- session
- authentication code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/47—Fraud detection or prevention means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请提供一种防止流量欺诈的方法和装置,该方法包括:在拜访网络上报网络使用情况的同时,用户设备也上报网络使用情况,归属网络通过比较二者上报网络使用情况,判断是否存在可能的流量欺诈,如果存在流量欺诈,则根据预设策略进行处理。通过本发明提供的技术方案,可以针对流量欺诈采取措施,从而尽可能减少用户与运营商之间的计费纠纷。
The present application provides a method and device for preventing traffic fraud. The method includes: when the visited network reports the network usage status, the user equipment also reports the network usage status, and the home network compares the network usage status reported by the two to determine whether there is a possibility Traffic fraud, if there is traffic fraud, it will be processed according to the preset policy. Through the technical solution provided by the invention, measures can be taken against traffic fraud, thereby reducing billing disputes between users and operators as much as possible.
Description
技术领域technical field
本申请涉及通信领域,更具体地,涉及通信领域中防止流量欺诈的方法及装置。The present application relates to the communication field, and more specifically, to a method and device for preventing traffic fraud in the communication field.
背景技术Background technique
随着通信系统的不断发展,基于服务的网络架构(service based architecture,SBA)得到的广泛的应用,在基于服务的网络架构中,根据能够提供的特定网络功能的网络实体称为网络功能(network function,NF)模块,网络功能可以以服务的方式提供。With the continuous development of communication systems, the service based architecture (SBA) has been widely used. In the service based network architecture, the network entities that can provide specific network functions are called network functions (network functions). function, NF) module, network functions can be provided as services.
如图1所示,在基于服务的网络架构中,任意两个网络功能模块可以通过服务化接口以网络功能服务调用的方式交互。用户在漫游时,对于归属网络路由的场景,用户的流量通过拜访网络的用户面网元(User Plane Function,vUPF)发给归属网络的hUPF,再由拜访网络的hUPF报给拜访网络hSMF,由hSMF把流量发给计费相关的网元。(后文中前缀v表示拜访网络,h表示归属网络)。As shown in Figure 1, in a service-based network architecture, any two network function modules can interact in the form of network function service calls through service interfaces. When the user is roaming, in the home network routing scenario, the user traffic is sent to the hUPF of the home network through the User Plane Function (vUPF) of the visited network, and then reported to the hSMF of the visited network by the hUPF of the visited network. The hSMF sends the traffic to the network elements related to charging. (The prefix v in the following text indicates the visited network, and h indicates the home network).
在漫游场景下,如果拜访网络根据使用收入分成的模式,拜访网络可能进行一些流量欺诈行为(比如向归属网络多谎报些流量),从而导致计费纠纷。In the roaming scenario, if the visited network uses a revenue sharing model, the visited network may perform traffic fraud (such as falsely reporting more traffic to the home network), which may lead to billing disputes.
发明内容Contents of the invention
本申请提供一种防止流量欺诈的方法和设备,在拜访网络上报网络使用情况的同时,UE也上报使用的网络使用情况,归属网络通过比较二者上报网络使用情况,判断是否存在可能的流量欺诈,如果存在流量欺诈,则根据预设策略进行处理。通过本发明提供的技术方案,可以针对流量欺诈采取措施,从而尽可能减少用户与运营商之间的计费纠纷。This application provides a method and device for preventing traffic fraud. When the visited network reports the network usage, the UE also reports the used network usage. The home network judges whether there is possible traffic fraud by comparing the two reported network usage. , if there is traffic fraud, it will be processed according to the preset policy. Through the technical solution provided by the invention, measures can be taken against traffic fraud, thereby reducing billing disputes between users and operators as much as possible.
第一方面,本申请提供了一种防止流量欺诈的方法,该方法包括:第一网元接收用户设备发送的第一网络使用情况,其中,所述第一网元为归属网络中的网元;所述第一网元获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。In a first aspect, the present application provides a method for preventing traffic fraud, the method includes: a first network element receives a first network usage condition sent by a user equipment, wherein the first network element is a network element in a home network ; The first network element obtains the second network usage information sent by the second network element, wherein the second network element is a network element in the visited network that provides services for the user equipment; if the first network If the usage situation does not match the second network usage situation, it will be processed according to a preset policy.
举例来说,第一网元可以是归属网络中的接入和移动性管理功能(Access andMobility Management Function,AMF),会话管理网元(Session Management Function,SMF)、安全边缘保护代理(Security Edge Protection Proxy,SEPP)、认证服务器(Authentication Server Function,AUSF)、或统一数据管理网元(Unified DataManagement,UDM)。第一网元可以是拜访网络中的AMF。For example, the first network element may be an access and mobility management function (Access and Mobility Management Function, AMF), a session management network element (Session Management Function, SMF), a security edge protection agent (Security Edge Protection) in the home network Proxy, SEPP), authentication server (Authentication Server Function, AUSF), or unified data management network element (Unified Data Management, UDM). The first network element may be an AMF in the visited network.
另外,需要指出的是,第一网络使用情况是UE侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息,或者是某个会话的业务使用信息。相应的,第二网络使用情况是网络侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息(比如某个切片使用的流量或收发数据包的数量),或者是某个会话的业务使用信息(比如某个会话使用的流量或收发数据包的数量)。举例来说,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。In addition, it should be pointed out that the first network usage is the traffic used by the UE within a preset time period, or the number of data packets sent and received within a preset time period, or the business of a certain slice Usage information, or service usage information of a certain session. Correspondingly, the second network usage status is the traffic used by the UE within the preset time period, or the number of data packets sent and received within the preset time period, or the service usage information of a certain slice (such as traffic used by a certain slice or the number of sent and received data packets), or service usage information of a certain session (such as the traffic used by a certain session or the number of sent and received data packets). For example, the first network usage is the network usage of the user equipment or the first slice or the first session collected by the user equipment; the second network usage is the second network element The network usage of the user equipment or the first slice or the first session is counted, wherein the network usage is traffic information, or the duration of network usage, or the number of data packets sent and received; wherein, the first The slice is any slice initiated by the user equipment; the first session is any session initiated by the user equipment.
结合第一方面,需要指出的是,UE为了保证自己上报的信息在传输过程中的完整性,会向所述第一网元发送第一消息鉴别码,其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的。相应的,所述第一网元接收所述用户设备发送的第一消息鉴别码;所述第一网元获取第二消息鉴别码,其中,所述第二消息鉴别码也是根据所述共享密钥和所述第二网络使用情况生成的;若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。In combination with the first aspect, it should be pointed out that, in order to ensure the integrity of the information reported by the UE during transmission, the UE will send a first message authentication code to the first network element, wherein the message authentication code is based on the shared The key and the first network usage are generated. Correspondingly, the first network element receives the first message authentication code sent by the user equipment; the first network element obtains a second message authentication code, where the second message authentication code is also based on the shared secret key and the second network usage; if the first message authentication code and the second message authentication code are the same, then determine whether the first network usage matches the second network usage.
可以理解的是,如果所述第一消息鉴别码和所述第二消息鉴别码相同,说明UE上报的消息在传输过程中没有被篡改。其中,所述判断所述第一网络使用情况与所述第二网络使用情况是否匹配,包括:判断所述第一网络使用情况与所述第二网络使用情况是否相同;或者,如果第一网络使用情况与所述第二网络使用情况均为数值的话,判断两个数值是否小于预设阈值。It can be understood that if the first message authentication code is the same as the second message authentication code, it means that the message reported by the UE has not been tampered with during transmission. Wherein, the judging whether the first network usage situation matches the second network usage situation includes: judging whether the first network usage situation is the same as the second network usage situation; or, if the first network usage situation If both the usage status and the second network usage status are numerical values, it is determined whether the two numerical values are smaller than a preset threshold.
进一步的,若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。其中,预设策略可以有一条或多条,比如可以释放会话,或者上报服务器等。举例来说,所述根据预设策略进行处理,包括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。Further, if the first network usage situation does not match the second network usage situation, processing is performed according to a preset policy. Among them, there can be one or more preset policies, for example, the session can be released, or the server can be reported. For example, the processing according to the preset policy includes: terminating the session, or reporting to the server, or recording a detailed log of the user's network usage.
结合第一方面,进一步需要指出的是,促使UE和拜访网络分别上报网络使用情况的机制有很多,比如可以是归属网络中的网元触发的,也有可能是vAMF触发的,也有可能是vUPF触发的,也有可能是hUPF触发的,在此不做限制。举例来说,所述第一网元接收用户设备发送的第一网络使用情况之前,所述方法还包括:所述第一网元向所述第二网元发送业务使用查询请求;所述业务使用查询请求用于指示所述第二网元反馈所述用户设备所使用的网络使用情况。Combining with the first aspect, it should be further pointed out that there are many mechanisms to prompt the UE and the visited network to report the network usage respectively, for example, it may be triggered by the network element in the home network, it may be triggered by vAMF, or it may be triggered by vUPF It may also be triggered by hUPF, which is not limited here. For example, before the first network element receives the first network usage information sent by the user equipment, the method further includes: the first network element sends a service usage query request to the second network element; the service The use query request is used to instruct the second network element to feed back the network usage used by the user equipment.
本发明第二方面公开了一种防止流量欺诈的方法,所述方法包括:第二网元接收用户设备发送的第一网络使用情况,其中,所述第二网元为拜访网络中的网元;所述第二网元获取所述拜访网络统计的第二网络使用情况;若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。The second aspect of the present invention discloses a method for preventing traffic fraud, the method includes: a second network element receives the first network usage information sent by the user equipment, wherein the second network element is a network element in the visited network ; The second network element obtains the second network usage statistics of the visited network; if the first network usage does not match the second network usage, process according to a preset policy.
需要指出的是,所述第二网元可以是vAMF。第一网络使用情况是UE侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息,或者是某个会话的业务使用信息。相应的,第二网络使用情况是网络侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息,或者是某个会话的业务使用信息。举例来说,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。It should be noted that the second network element may be a vAMF. The first network usage status is the traffic used by the UE within a preset time period, or the number of data packets sent and received within a preset time period, or the service usage information of a certain slice, or a certain The business usage information of the session. Correspondingly, the second network usage status is the traffic used by the UE within a preset time period, or the number of data packets sent and received within a preset time period, or the service usage information of a certain slice, which is counted by the network side, or It is the service usage information of a certain session. For example, the first network usage is the network usage of the user equipment or the first slice or the first session collected by the user equipment; the second network usage is the second network element The network usage of the user equipment or the first slice or the first session is counted, wherein the network usage is traffic information, or the duration of network usage, or the number of data packets sent and received; wherein, the first The slice is any slice initiated by the user equipment; the first session is any session initiated by the user equipment.
其中,所述判断所述第一网络使用情况与所述第二网络使用情况是否匹配,包括:判断所述第一网络使用情况与所述第二网络使用情况是否相同;或者,如果第一网络使用情况与所述第二网络使用情况均为数值的话,判断两个数值是否小于预设阈值。进一步的,若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。其中,预设策略可以有一条或多条,比如可以选释放会话,且在释放会话的消息中携带会话终结的原因值;再比如vAMF会继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;再比如,vAMF会向操作维护系统上报流量信息不一致信息;在比如,vAMF会向归属网络上报流量信息不一致信息。需要指出的是,针对上述多条预设策略,vAMF可以选择一种或多种进行操作。举例来说,所述根据预设策略进行处理,包括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。Wherein, the judging whether the first network usage situation matches the second network usage situation includes: judging whether the first network usage situation is the same as the second network usage situation; or, if the first network usage situation If both the usage status and the second network usage status are numerical values, it is determined whether the two numerical values are smaller than a preset threshold. Further, if the first network usage situation does not match the second network usage situation, processing is performed according to a preset policy. Among them, there can be one or more preset policies. For example, you can choose to release the session, and the message of releasing the session carries the reason value of the session termination; another example is that vAMF will continue to serve and record the specific service usage records of the UE for later use. Evidence is provided when a dispute arises; for another example, vAMF will report inconsistent traffic information to the operation and maintenance system; for example, vAMF will report inconsistent traffic information to the home network. It should be pointed out that, for the above multiple preset policies, the vAMF can select one or more to operate. For example, the processing according to the preset policy includes: terminating the session, or reporting to the server, or recording a detailed log of the user's network usage.
可以理解的是,在拜访网络侧将UE上报的网络使用情况与网络侧统计的所述UE的网络使用情况进行比较,是为了确定UE是否篡改了所述UE的网络使用情况的数据。进而拜访网络可以备案,以便后续进行查证。当然,也可以向归属网络发送比较结果,让归属网络也进行备案。It can be understood that the purpose of comparing the network usage reported by the UE with the network usage statistics of the UE at the network side is to determine whether the UE has tampered with the data of the UE's network usage. Furthermore, access to the network can be recorded for subsequent verification. Of course, the comparison result can also be sent to the home network, so that the home network can also record.
可以理解的是,为了让归属网络了解所述UE的网络使用情况是否正常,也向向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。进而由归属网络根据所述第一网络使用情况和所述第二网络使用情况判断是否存在流量统计的异常。It can be understood that, in order to let the home network know whether the network usage of the UE is normal, the first network usage and the second network usage are also sent to the first network element; wherein, the first The network element is a network element in the home network. Furthermore, the home network judges whether there is an abnormality in traffic statistics according to the first network usage situation and the second network usage situation.
进一步需要指出的是,如果归属网络订阅了查询UE的网络使用情况的消息,那么所述第二网元根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求。以便UE根据该流量查询请求反馈所述UE统计的所述UE的网络使用情况。It should further be pointed out that if the home network subscribes to the message of querying the network usage of the UE, then the second network element periodically sends a traffic query request to the user equipment according to the subscription information of the first network element . So that the UE feeds back the network usage statistics of the UE according to the traffic query request.
本发明第三方面公开了一种防止流量欺诈的方法,所述方法包括:用户设备根据网络使用情况以及共享密钥生成第一消息鉴别码;所述用户设备向拜访网络发送所述网络使用情况以及第一消息鉴别码。The third aspect of the present invention discloses a method for preventing traffic fraud. The method includes: the user equipment generates a first message authentication code according to the network usage and a shared key; the user equipment sends the network usage to the visited network and a first message authentication code.
可以理解的是,UE为了避免拜访网络随意篡改所述UE的网络使用情况,那么UE也会将自身网络使用情况以及消息鉴证码发送给拜访网络,再由拜访网络转发给归属网络,最后由归属网络判断UE上报的网络使用情况与拜访网络上报的所述UE的网络使用情况是否一致。It can be understood that, in order to prevent the visited network from arbitrarily tampering with the UE's network usage, the UE will also send its own network usage and message authentication code to the visited network, and then the visited network forwards it to the home network, and finally the home network The network judges whether the network usage reported by the UE is consistent with the network usage of the UE reported by the visited network.
可以理解的是,UE生成第一消息鉴别码是需要用到共享密钥的。也就说在生成第一消息鉴证码之前,是需要生成共享密钥的。该共享密钥是UE与归属网络之间共享的密钥,因此UE和归属网络是知道如何生成或获取共享密钥的。举例来说,所述用户设备根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。其中,所述第一消息鉴别码可以为一个或者多个;所述网络使用情况包括下述参数中的至少一个参数:所述用户设备的网络使用情况,第一切片的网络使用情况以及第一会话对应的网络使用情况;相应的,所述第一消息鉴别码与所述网络使用情况中的参数一一对应;其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。It can be understood that the UE needs to use the shared key to generate the first message authentication code. That is to say, before generating the first message authentication code, it is necessary to generate a shared key. The shared key is shared between the UE and the home network, so the UE and the home network know how to generate or obtain the shared key. For example, the user equipment generates the shared key according to the identifier of the visited network and an intermediate key; the intermediate key is a key generated during access authentication of the user equipment, and the identifier of the visited network includes the The name. Wherein, the first message authentication code may be one or more; the network usage includes at least one of the following parameters: the network usage of the user equipment, the network usage of the first slice, and the second A network usage status corresponding to a session; correspondingly, the first message authentication code corresponds to parameters in the network usage status; wherein, the network usage status is traffic information, or the duration of network usage, or The number of data packets sent and received; wherein, the first slice is any slice initiated by the user equipment; the first session is any session initiated by the user equipment.
进一步需要指出的是,归属网络比较完UE上报的网络使用情况与拜访网络上报的所述UE的网络使用情况之后,是会向UE反馈比较结果的,为了保证消息在传输过程中的完整性,也会反馈消息鉴证码。以便UE根据反馈的比较结果采取措施。具体的,所述用户设备接收所述拜访网络反馈的比对结果和第二消息鉴别码;所述用户设备对所述第二消息鉴别码进行验证;若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。其中,该用户设备可以根据共享密钥对所述消息鉴别码进行验证。It should be further pointed out that after the home network compares the network usage reported by the UE with the network usage of the UE reported by the visited network, it will feed back the comparison result to the UE. In order to ensure the integrity of the message during transmission, The message authentication code will also be fed back. So that the UE takes measures according to the feedback comparison result. Specifically, the user equipment receives the comparison result and the second message authentication code fed back by the visited network; the user equipment verifies the second message authentication code; if the second message authentication code is verified successfully , then process it according to the comparison result and the preset strategy. Wherein, the user equipment may verify the message authentication code according to the shared key.
本发明第四方面公开了一种装置(该装置为归属网络中的网元),该装置可用于执行第一方面所述的方法。具体的,所述装置包括:The fourth aspect of the present invention discloses a device (the device is a network element in the home network), which can be used to execute the method described in the first aspect. Specifically, the device includes:
接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为归属网络中的网元;获取单元,用于获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;The receiving unit is configured to receive the first network usage status sent by the user equipment, wherein the device is a network element in the home network; the acquiring unit is configured to acquire the second network usage status sent by the second network element, wherein the The second network element is a network element in the visited network that provides services for the user equipment;
处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。A processing unit, configured to perform processing according to a preset policy if the first network usage situation does not match the second network usage situation.
可选的,所述装置还包括判断单元;Optionally, the device further includes a judging unit;
所述接收单元,还用于接收所述用户设备发送的第一消息鉴别码;其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的;所述获取单元,还用于获取第二消息鉴别码,其中,所述第二消息鉴别码是根据所述共享密钥和所述第二网络使用情况生成的;所述判断单元,用于若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。The receiving unit is further configured to receive a first message authentication code sent by the user equipment; wherein, the message authentication code is generated according to a shared key and the usage of the first network; the obtaining unit is also Used to obtain a second message authentication code, wherein the second message authentication code is generated according to the shared key and the second network usage; the judging unit is configured to code is the same as the second message authentication code, it is judged whether the first network usage situation matches the second network usage situation.
可选的,所述装置还包括发送单元;Optionally, the device further includes a sending unit;
所述发送单元,用于向所述第二网元发送业务使用查询请求;The sending unit is configured to send a service usage query request to the second network element;
所述接收单元,用于接收第二网元发送的第二网络使用情况。The receiving unit is configured to receive the second network usage condition sent by the second network element.
本发明第五方面公开了一种装置(该装置为拜访网络中的网元,比如为AMF),该装置可用于执行第二方面所描述的方法。具体的,所述装置包括接收单元,获取单元以及处理单元;The fifth aspect of the present invention discloses a device (the device is a network element in the visited network, such as AMF), which can be used to execute the method described in the second aspect. Specifically, the device includes a receiving unit, an acquiring unit and a processing unit;
所述接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元;所述获取单元,用于获取所述拜访网络统计的第二网络使用情况;所述处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。The receiving unit is configured to receive the first network usage information sent by the user equipment, wherein the device is a network element in the visited network; the acquiring unit is configured to acquire the second network usage statistics of the visited network ; The processing unit is configured to perform processing according to a preset strategy if the first network usage situation does not match the second network usage situation.
可选的,所述装置还包括发送单元;Optionally, the device further includes a sending unit;
所述发送单元,用于向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。The sending unit is configured to send the first network usage situation and the second network usage situation to a first network element; wherein the first network element is a network element in a home network.
进一步的,所述发送单元,还用于根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求;所述接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元。Further, the sending unit is further configured to periodically send a traffic query request to the user equipment according to the subscription information of the first network element; the receiving unit is configured to receive the first network traffic information sent by the user equipment. A use case, wherein the device is a network element in a visited network.
本发明第六方面公开了一种用户设备,该用户设备用于执行第三方面所述的方法。具体的,所述用户设备包括生成单元和发送单元;A sixth aspect of the present invention discloses a user equipment, where the user equipment is configured to execute the method described in the third aspect. Specifically, the user equipment includes a generating unit and a sending unit;
所述生成单元,用于根据网络使用情况以及共享密钥生成第一消息鉴别码;The generating unit is configured to generate a first message authentication code according to network usage and a shared key;
所述发送单元,用于向拜访网络发送所述网络使用情况以及第一消息鉴别码。The sending unit is configured to send the network usage situation and the first message authentication code to the visited network.
可选的,所述生成单元,还用于根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。Optionally, the generating unit is further configured to generate the shared key according to the identifier of the visited network and an intermediate key; the intermediate key is a key generated during access authentication of the user equipment, and the identifier of the visited network includes The name of the visited network.
可选的,所述用户设备还包括接收单元,验证单元以及处理单元;Optionally, the user equipment further includes a receiving unit, a verification unit and a processing unit;
所述接收单元,用于接收所述拜访网络反馈的比对结果和第二消息鉴别码;所述验证单元,用于对所述第二消息鉴别码进行验证;所述处理单元,用于若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。The receiving unit is configured to receive the comparison result fed back by the visited network and the second message authentication code; the verification unit is configured to verify the second message authentication code; the processing unit is configured to if If the second message authentication code is successfully verified, it will be processed according to the comparison result and a preset policy.
第七方面,本申请提供了一种网元,该网元包括存储器、处理器、收发器及存储在该存储器上并可在该处理器上运行的计算机程序,当存储器中的计算机程序被执行时,该收发器和处理器执行上述第一方面或第一方面的任意可能的实现方式中的方法。In a seventh aspect, the present application provides a network element, which includes a memory, a processor, a transceiver, and a computer program stored in the memory and operable on the processor. When the computer program in the memory is executed , the transceiver and the processor execute the method in the foregoing first aspect or any possible implementation manner of the first aspect.
第八方面,本申请提供了一种网元,该网元包括存储器、处理器、收发器及存储在该存储器上并可在该处理器上运行的计算机程序,当存储器中的计算机程序被执行时,该收发器和处理器执行上述第二方面或第二方面的任意可能的实现方式中的方法。In an eighth aspect, the present application provides a network element, which includes a memory, a processor, a transceiver, and a computer program stored in the memory and operable on the processor. When the computer program in the memory is executed , the transceiver and the processor execute the method in the foregoing second aspect or any possible implementation manner of the second aspect.
第九方面,本申请提供了一种用户设备(比如手机,平板电脑、穿戴设备等具有收发信息的电子设备),该网元包括存储器、处理器、收发器及存储在该存储器上并可在该处理器上运行的计算机程序,当存储器中的计算机程序被执行时,该收发器和处理器执行上述第三方面或第三方面的任意可能的实现方式中的方法。In the ninth aspect, the present application provides a user equipment (such as a mobile phone, a tablet computer, a wearable device, and other electronic equipment capable of sending and receiving information), the network element includes a memory, a processor, a transceiver, and is stored in the memory and can be used in The computer program running on the processor, when the computer program in the memory is executed, the transceiver and the processor execute the method in the above third aspect or any possible implementation manner of the third aspect.
第十方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第一方面或第一方面的任意可能的实现方式中的方法的指令。In a tenth aspect, the present application provides a computer-readable medium for storing a computer program, where the computer program includes instructions for executing the method in the first aspect or any possible implementation manner of the first aspect.
第十一方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第二方面或第二方面的任意可能的实现方式中的方法的指令。In an eleventh aspect, the present application provides a computer-readable medium for storing a computer program, and the computer program includes instructions for executing the method in the second aspect or any possible implementation manner of the second aspect.
第十二方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第三方面或第三方面的任意可能的实现方式中的方法的指令。In a twelfth aspect, the present application provides a computer-readable medium for storing a computer program, where the computer program includes instructions for executing the method in the third aspect or any possible implementation manner of the third aspect.
第十三方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意可能的实现方式中的方法。In a thirteenth aspect, the present application provides a computer program product containing instructions, which, when run on a computer, cause the computer to execute the method in the above first aspect or any possible implementation manner of the first aspect.
第十四方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二方面或第二方面的任意可能的实现方式中的方法。In a fourteenth aspect, the present application provides a computer program product containing instructions, which, when run on a computer, cause the computer to execute the method in the above-mentioned second aspect or any possible implementation manner of the second aspect.
第十五方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第三方面或第三方面的任意可能的实现方式中的方法。In a fifteenth aspect, the present application provides a computer program product containing instructions, which, when run on a computer, cause the computer to execute the method in the above third aspect or any possible implementation manner of the third aspect.
第十六方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过总线相连,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述第一方面或第一方面的任意可能的实现方式中的方法。In a sixteenth aspect, the present application provides a chip, including: an input interface, an output interface, at least one processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through a bus, The processor is configured to execute codes in the memory, and when the codes are executed, the processor is configured to execute the method in the foregoing first aspect or any possible implementation manner of the first aspect.
第十七方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过总线相连,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述第二方面或第二方面的任意可能的实现方式中的方法。In a seventeenth aspect, the present application provides a chip, including: an input interface, an output interface, at least one processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through a bus, The processor is configured to execute codes in the memory, and when the codes are executed, the processor is configured to execute the method in the above second aspect or any possible implementation manner of the second aspect.
第十八方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过总线相连,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述第三方面或第三方面的任意可能的实现方式中的方法。In an eighteenth aspect, the present application provides a chip, including: an input interface, an output interface, at least one processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through a bus, The processor is configured to execute codes in the memory, and when the codes are executed, the processor is configured to execute the above third aspect or the method in any possible implementation manner of the third aspect.
附图说明Description of drawings
图1是本申请实施例提供的一种5G漫游架构图;FIG. 1 is a 5G roaming architecture diagram provided by an embodiment of the present application;
图2是本申请实施例提供的一种防止流量欺诈的方法的示意性流程图;FIG. 2 is a schematic flowchart of a method for preventing traffic fraud provided by an embodiment of the present application;
图3是本申请实施例提供的另一种防止流量欺诈的方法的示意性流程图;Fig. 3 is a schematic flowchart of another method for preventing traffic fraud provided by the embodiment of the present application;
图4是本申请实施例提供的一种归属网络的网元的逻辑结构图;FIG. 4 is a logical structural diagram of a network element of a home network provided by an embodiment of the present application;
图5是本申请实施例提供的一种拜访网络的网元的逻辑结构图;FIG. 5 is a logical structural diagram of a network element of a visited network provided by an embodiment of the present application;
图6是本申请实施例提供的一种用户设备的逻辑结构图;FIG. 6 is a logical structure diagram of a user equipment provided in an embodiment of the present application;
图7是本申请实施例的一种装置的物理结构图。Fig. 7 is a physical structure diagram of a device according to an embodiment of the present application.
具体实施方式Detailed ways
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below with reference to the accompanying drawings.
图1示出了本申请实施例提供的5G漫游架构的示意性框图。该网络架构以服务为基础,得到多种不同类型的网络功能模块,网络功能模块之间通过服务化接口以网络功能服务调用的方式进行交互。Fig. 1 shows a schematic block diagram of a 5G roaming architecture provided by an embodiment of the present application. The network architecture is based on services, and various types of network function modules are obtained, and the network function modules interact with each other through service interfaces in the form of network function service calls.
应理解,本申请实施例中的网络功能模块具有特定功能和网络接口,可以是专用硬件上的网元,也可以是专用硬件上运行的软件实例,还可以是相关平台(如云基础设施上)上的虚拟功能实例,本申请实施例对此不作限定。It should be understood that the network function modules in the embodiments of the present application have specific functions and network interfaces, and may be network elements on dedicated hardware, software instances running on dedicated hardware, or related platforms (such as on cloud infrastructure) ), which is not limited in this embodiment of the present application.
下面将结合图1对该基于服务的网络架构中的各个模块进行介绍:The following will introduce each module in the service-based network architecture with reference to Figure 1:
无线接入网络(radio access network,RAN):负责用户设备(user equipment,UE)的接入。可以理解的是,在实际表述过程中,RAN也可以简写为AN。Radio access network (radio access network, RAN): responsible for user equipment (user equipment, UE) access. It can be understood that, in the actual expression process, RAN can also be abbreviated as AN.
可选地,本申请实施例中的UE可以是移动的或固定的,该UE可以指接入终端、终端设备、移动终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。接入终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless localloop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)系统中的用户设备。Optionally, the UE in this embodiment of the present application may be mobile or fixed, and the UE may refer to an access terminal, a terminal device, a mobile terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, or a remote terminal , mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc. The access terminal can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a wireless communication function Handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, user equipment in future fifth generation (5th generation, 5G) systems or new radio (new radio, NR) systems.
访问与移动性管理功能(access and mobility management function,AMF)模块:负责与现有的移动管理实体(mobile management entity,MME)中的移动性管理类似的功能,用于控制UE对网络资源的访问和对UE的移动进行管理。AMF模块与RAN模块互相通信,以对接入网控制面进行处理,其中,N2不是服务化接口。Access and mobility management function (access and mobility management function, AMF) module: responsible for functions similar to the mobility management in the existing mobile management entity (mobile management entity, MME), used to control UE's access to network resources and manage the mobility of the UE. The AMF module and the RAN module communicate with each other to process the control plane of the access network, wherein N2 is not a service interface.
鉴权服务功能(authentication server function,AUSF)模块:负责密钥的生成,以及与UE之间的双向鉴权。Authentication server function (authentication server function, AUSF) module: responsible for key generation and two-way authentication with the UE.
会话管理功能(session management function,SMF)模块:负责管理UE的会话,包括会话的建立、修改和释放。Session management function (session management function, SMF) module: responsible for managing the session of the UE, including establishing, modifying and releasing the session.
网络开放功能(network exposure function,NEF)模块:负责将核心网内的网络功能服务安全地提供给外部网络实体服务,以及内外网信息转换等。Network exposure function (NEF) module: Responsible for securely providing network function services in the core network to external network entity services, as well as information conversion between internal and external networks.
网络功能(network fuction)模块:是指一个能够提供网络服务的网元,比如AUSF、AMF或UDM。Network function (network function) module: refers to a network element capable of providing network services, such as AUSF, AMF or UDM.
网络功能数据库功能(Network repository function,NRF)模块:负责服务发现等功能。当然,网络功能数据库的英文全称还可以是NF repository function.Network repository function (NRF) module: responsible for functions such as service discovery. Of course, the full English name of the network function database can also be NF repository function.
策略管控功能(policy control function,PCF)模块:负责管理网络行为的统一策略框架;提供策略规则给控制平面执行等功能。Policy control function (PCF) module: a unified policy framework responsible for managing network behavior; providing policy rules for control plane execution and other functions.
统一数据管理(unified data management,UDM)模块:包括前端(front end,FE)和用户数据库(user data repository,UDR)。其中,FE负责信用评级处理、位置管理、订阅管理等功能,并可以访问存储在UDR中的用户订阅数据,UDR是一个用户订阅数据存储服务器,负责向前端提供用户订阅数据。Unified data management (unified data management, UDM) module: including front end (front end, FE) and user database (user data repository, UDR). Among them, FE is responsible for credit rating processing, location management, subscription management and other functions, and can access user subscription data stored in UDR. UDR is a user subscription data storage server and is responsible for providing user subscription data to the front end.
应用功能(application function,AF)模块:提供应用服务。Application function (application function, AF) module: provides application services.
用户面功能(User Plane Function,UPF)模块:可提供数据包检测、转发、流量使用报告等功能。User Plane Function (UPF) module: It can provide functions such as data packet detection, forwarding, and traffic usage reporting.
其中,上述各个模块也可以解释为各个网元或功能网元。比如UDM可以理解为UDM网元或UDM功能网元,NRF可以理解为NRF网元或NRF功能网元。Wherein, each of the above modules can also be interpreted as each network element or functional network element. For example, UDM can be understood as a UDM network element or a UDM functional network element, and NRF can be understood as an NRF network element or an NRF functional network element.
如图1中所示,AMF模块具有服务化接口NAMF、SMF模块具有服务化接口NSMF、AUSF模块具有服务化接口NAUSF、NEF模块具有服务化接口NNEF、NRF模块具有服务化接口NNRF、PCF模块具有服务化接口NPCF、UDM模块具有服务化接口NUDM、AF模块具有服务化接口NAF。As shown in Figure 1, the AMF module has a service interface NAMF, the SMF module has a service interface NSMF, the AUSF module has a service interface NAUSF, the NEF module has a service interface NNEF, the NRF module has a service interface NNRF, and the PCF module has The service interface NPCF and the UDM module have a service interface NUDM, and the AF module has a service interface NAF.
应理解,本申请实施例中的各个网络功能模块的服务化接口的还可以为其它名称,本申请实施例对此不作限定。It should be understood that the service interface of each network function module in the embodiment of the present application may also have other names, which is not limited in the embodiment of the present application.
需要指出的是,在漫游场景下,如果拜访网络使用收入分成的模式(例如拜访网络根据用户使用的流量向归属网络结算收费),拜访网络可能进行一些流量欺诈行为。比如,vUPF在给hUPF转发流量时(带有v前缀的网元为拜访网络中的网元,带有h前缀的网元为归属网络中的网元),增加一些垃圾流量,就会造成用户实际使用的流量和拜访网络上报的流量不一致的情况,从而导致计费纠纷。It should be pointed out that in the roaming scenario, if the visited network adopts a revenue sharing model (for example, the visited network settles and charges the home network according to the traffic used by the user), the visited network may conduct some traffic fraud. For example, when vUPF forwards traffic to hUPF (network elements with v prefixes are network elements in the visited network, and network elements with h prefixes are network elements in the home network), some garbage traffic will be added, which will cause user Inconsistencies between the actual traffic used and the traffic reported by the visited network lead to billing disputes.
针对上述问题,本发明提供了一种解决方案:在拜访网络向归属网络上报网络使用情况(如流量数据,时长数据,消息报数)的同时,UE也会上报使用的网络使用情况,归属网络通过比较二者上报网络使用情况,判断是否存在可能的流量欺诈。可选的,归属网络可能会向所述拜访网络反馈判断结果。进一步的,为保护UE上报的网络使用情况不被拜访网络篡改,UE会对需要上报的网络使用情况进行完整性保护;如果归属网络验证UE发送的数据的完整性保护没问题,就会比较UE和拜访网络上报的网络使用情况。另外,需要指出的是,归属网络可以主动查询或者订阅UE漫游时的网络使用情况数据。Aiming at the above problems, the present invention provides a solution: while the visited network reports the network usage (such as traffic data, duration data, message number) to the home network, the UE will also report the network usage used, and the home network By comparing the network usage reported by the two, it is judged whether there is possible traffic fraud. Optionally, the home network may feed back the judgment result to the visited network. Further, in order to protect the network usage reported by the UE from being tampered with by the visited network, the UE will perform integrity protection on the network usage that needs to be reported; if the home network verifies that the integrity protection of the data sent by the UE is no problem, it will compare the UE and the network usage reported by the visiting network. In addition, it should be pointed out that the home network may actively query or subscribe to the network usage data when the UE roams.
另外,拜访网络也可以进行流量一致性的检测:归属网络中的vAMF主动查询UE统计的网络使用情况和vSMF统计的所述UE的网络使用情况,如果两者数据不一致或两者数据的差值大于预设阈值,拜访网络认为UE可能恶意上报流量信息,vAMF可以根据预设策略进行处理,比如选释放会话,或者拒绝给UE提供服务,或者继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据或和向操作维护系统上报流量信息不一致信息。另外,vAMF可能会向归属网络上报流量信息不一致信息。In addition, the visited network can also perform traffic consistency detection: the vAMF in the home network actively queries the network usage statistics of the UE and the network usage statistics of the UE statistics of the vSMF, if the two data are inconsistent or the difference between the two data If it is greater than the preset threshold, the visited network thinks that the UE may report traffic information maliciously, and the vAMF can handle it according to the preset policy, such as releasing the session, or refusing to provide services to the UE, or continuing to serve, and recording the specific service usage records of the UE, so that Provide evidence or inconsistent information with the flow information reported to the operation and maintenance system when disputes arise later. In addition, the vAMF may report inconsistent traffic information to the home network.
图2示出了本申请实施例提供的防止流量欺诈的方法的示意性流程图,该方法可以应用于如图1中所示的网络架构。所述方法包括:FIG. 2 shows a schematic flowchart of a method for preventing traffic fraud provided by an embodiment of the present application, and the method can be applied to the network architecture shown in FIG. 1 . The methods include:
S101.UE向vAMF发送网络使用情况;S101. UE sends network usage to vAMF;
需要指出的是,UE可以按照预设的时间间隔向vAMF发送网络使用情况;该预设的时间间隔可以是vAMF下发的,也可以是归属网络中的网元下发的。It should be pointed out that the UE may send the network usage status to the vAMF at a preset time interval; the preset time interval may be delivered by the vAMF or by a network element in the home network.
可选的,UE可以根据vAMF的指示向所述vAMF发送网络使用情况。比如,所述UE接收所述AMF发送的查询请求;响应于所述查询请求,所述UE向所述vAMF发送所述网络使用情况。Optionally, the UE may send the network usage status to the vAMF according to the instruction of the vAMF. For example, the UE receives a query request sent by the AMF; in response to the query request, the UE sends the network usage situation to the vAMF.
另外,需要指出的是,网络使用情况可以是所述UE在所述预设时间间隔内所述使用的流量。比如,UE需要每隔10分钟向vAMF发送一次网络使用情况,那么发送的网络使用情况就是这10分钟内UE所使用的流量。另外,10分钟只是举例,也可以是半个小时,一个小时等等,在此不对预设的时间间隔做限制。In addition, it should be noted that the network usage may be the traffic used by the UE within the preset time interval. For example, if the UE needs to send the network usage status to the vAMF every 10 minutes, then the sent network usage status is the traffic used by the UE within these 10 minutes. In addition, 10 minutes is just an example, and it may also be half an hour, an hour, etc., and there is no limit to the preset time interval here.
可选的,网络使用情况可以是某个切片的的业务使用信息(比如某个切片的流量使用情况)。Optionally, the network usage status may be service usage information of a certain slice (for example, the traffic usage status of a certain slice).
可选的,网络使用情况可以是某类型切片的的业务使用信息(比如某类型切换在预设时间段内的流量使用情况)。常见的类型包括eMBB(Enhanced Mobile Broadband,增强移动带宽)、URLLC(Ultra-Reliable and Low-Latency Communication,极高可靠极低时延通信)以及mMTC(massive machine type communication,海量物联网通信)。Optionally, the network usage may be service usage information of a certain type of slice (for example, the traffic usage of a certain type of handover within a preset time period). Common types include eMBB (Enhanced Mobile Broadband, enhanced mobile bandwidth), URLLC (Ultra-Reliable and Low-Latency Communication, extremely reliable and extremely low-latency communication), and mMTC (massive machine type communication, massive Internet of Things communication).
可选的,网络使用情况还可以是某个会话的流量使用情况。Optionally, the network usage may also be the traffic usage of a certain session.
另外,需要指出的是,在本发明的一种可能的实现方式中,归属网络中的网元(比如AMF、AUSF或hSEEP)可能订阅了某个用户的业务使用信息或者该用户某个切片的业务或者某个APN(access point name,接入点名称)的业务使用信息,那么该归属网络中的网元就会调用vAMF的服务接口以查询UE的网络使用情况。具体的,如果该归属网络中的网元订阅了某个用户的业务使用信息或者该用户某个切片的业务或者某个APN的业务使用信息,那么该vAMF中就会保存该订阅信息,后续该vAMF就会根据该订阅信息向所述UE发送网络使用情况获取请求;相应的,若UE收到该网络使用情况获取请求,就会向所述vAMF反馈所述网络使用情况。In addition, it should be pointed out that in a possible implementation of the present invention, a network element (such as AMF, AUSF or hSEEP) in the home network may have subscribed to the service usage information of a certain user or the information of a certain slice of the user. service or service usage information of a certain APN (access point name, access point name), then the network element in the home network will call the service interface of the vAMF to query the network usage status of the UE. Specifically, if the network element in the home network subscribes to the service usage information of a certain user or the service usage information of a certain slice of the user or the service usage information of a certain APN, then the subscription information will be saved in the vAMF, and the subsequent The vAMF will send a network usage acquisition request to the UE according to the subscription information; correspondingly, if the UE receives the network usage acquisition request, it will feed back the network usage status to the vAMF.
在本发明的一种可能的实现方式中,UE向vAMF发送第一消息,该第一消息中包括网络使用情况。比如,该网络使用情况可以是UE在预设时间段内使用的总流量,也可以是UE在预设时间段内收发数据包的数量;当然,还可以是某个切片或会话的计数值,可以理解的是,如果该网络使用情况是某个切片的计数值或者某个切片的使用的流量,那么该第一消息中应该包括该切片的标识。相应的,如果该网络使用情况是某个会话的计数值或者某个会话的使用的流量,那么该第一消息中应该包括该会话的标识。另外,为了保证UE发送的数据不被篡改,因此需要进行完整性保护,具体的,UE可以在第一消息中包含一个消息验证码,以使得归属网络的网元验证该消息验证码成功后,才会进一步比较UE发送的网络使用情况和拜访网络统计的该UE的网络使用情况。In a possible implementation manner of the present invention, the UE sends a first message to the vAMF, where the first message includes network usage conditions. For example, the network usage can be the total traffic used by the UE within a preset time period, or the number of data packets sent and received by the UE within a preset time period; of course, it can also be the count value of a certain slice or session, It can be understood that if the network usage is the count value of a certain slice or the traffic used by a certain slice, then the first message should include the identifier of the slice. Correspondingly, if the network usage is the count value of a certain session or the traffic used by a certain session, then the first message should include the identifier of the session. In addition, integrity protection is required to ensure that the data sent by the UE is not tampered with. Specifically, the UE may include a message verification code in the first message, so that after the network element of the home network verifies the message verification code successfully, Only then will the network usage sent by the UE be further compared with the network usage of the UE collected by the visited network.
结合上述可能的实现方式,需要指出的是,消息验证码生成的方式有很多,比如UE可以根据服务网络标识(serving network identity,SNID)生成该消息验证码;比如UE还可以根据Kausf和SNID生成该消息验证码;比如UE还可以根据会话标识生成消息验证码;再比如UE还可以根据切片标识生成消息验证码,在此不再一一列举。In combination with the above possible implementation methods, it should be pointed out that there are many ways to generate message verification codes. For example, the UE can generate the message verification code according to the serving network identity (SNID); for example, the UE can also generate the message verification code according to Kausf and SNID. The message verification code; for example, the UE can also generate a message verification code according to the session identifier; another example, the UE can also generate a message verification code according to the slice identifier, which will not be listed here.
其中,所述Kausf是所述UE被所述归属网络鉴权过程中生成的密钥。其中Kausf的生成过程包括:UE在接入网络的过程中,会向AMF发送UE的标识,之后AMF会向AUSF发送所述UE的标识以及服务网络标识(该服务网络标识可以是服务网络的名称),接着所述AUSF会向UDM发送所述UE的标识以及服务网络标识,再者UDM会基于所述服务网络标识生成Kausf,并向所述AUSF发送所述Kausf。具体的,Kausf的生成过程可参考TS33.501中的A.2章节。Wherein, the Kausf is a key generated during the authentication process of the UE by the home network. The process of generating Kausf includes: during the process of UE accessing the network, the UE will send the identity of the UE to the AMF, and then the AMF will send the identity of the UE and the identity of the serving network to the AUSF (the identity of the serving network can be the name of the serving network ), then the AUSF will send the UE ID and the serving network ID to the UDM, and the UDM will generate a Kausf based on the serving network ID, and send the Kausf to the AUSF. Specifically, the generation process of Kausf can refer to section A.2 in TS33.501.
另外,该N1Message中需要携带UE的标识,比如用户永久标识(SubscriptionPermanent Identifier,SUPI)或用户隐藏标识(Subscription Concealed Identifier,SUCI)。In addition, the N1Message needs to carry an identifier of the UE, such as a Subscription Permanent Identifier (SUPI) or a Subscription Concealed Identifier (SUCI).
S102、vAMF获取网络侧统计的所述UE的网络使用情况;S102. The vAMF obtains the network usage of the UE from the network side;
具体的,vAMF可以调用vSMF的服务接口或者使用接口消息以查询网络侧统计的所述UE的网络使用情况,如果存在多个vSMF为所述UE服务,则分别调用每个SMF的服务接口以查询网络侧统计的所述UE的网络使用情况。具体的,vSMF收到vAMF发送的查第一询消息后,所述vSMF向vUPF查询用户业务使用信息,如果存在一个vSMF对应多个vUPF的场景,则vSMF分别向多个vUPF发送第二查询消息;响应于所述第二查询消息,所述vUPF向vSMF返回网络侧的用户业务使用信息;响应于所述第一查询消息,vSMF向vAMF返回网络侧的用户业务使用信息.Specifically, the vAMF can call the service interface of the vSMF or use the interface message to query the network usage of the UE in the statistics of the network side. If there are multiple vSMFs serving the UE, call the service interface of each SMF to query The network usage of the UE collected by the network side. Specifically, after the vSMF receives the first query message sent by the vAMF, the vSMF queries the user service usage information from the vUPF. If there is a scenario where one vSMF corresponds to multiple vUPFs, the vSMF sends the second query message to multiple vUPFs respectively. ; In response to the second query message, the vUPF returns network-side user service usage information to the vSMF; in response to the first query message, the vSMF returns network-side user service usage information to the vAMF.
可选的,vAMF调用vSMF的服务时,还可以携带切片信息和或会话信息。Optionally, when the vAMF invokes the service of the vSMF, slice information and/or session information may also be carried.
可选的,vAMF会比较UE上报的网络使用情况和网络侧统计的网络使用情况。如果UE发送的网络使用情况和网络侧统计的所述UE的网络使用情况不匹配,则所述vAMF根据配置的策略进行处理。具体的,如果所述UE上报的网络使用情况和网络侧统计的所述UE的网络使用情况不匹配,vAMF会有很多可选的操作,比如选释放会话,可选的在释放会话的消息中携带会话终结的;再比如vAMF会继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;再比如,vAMF会向操作维护系统上报流量信息不一致信息;在比如,vAMF会向归属网络上报流量信息不一致信息。需要指出的是,针对上述可选的操作,vAMF可以选择一种进行操作,可以选择多种进行操作,比如继续向所述UE提供服务,记录所述UE的网络使用信息,以及向归属网络的网元发送流量信息不一致的告警提示。Optionally, the vAMF compares the network usage reported by the UE with the network usage statistics of the network side. If the network usage sent by the UE does not match the network usage of the UE collected by the network side, the vAMF handles it according to the configured policy. Specifically, if the network usage reported by the UE does not match the network usage of the UE reported by the network side, the vAMF will have many optional operations, such as selecting to release the session, and optionally in the message of releasing the session carry session termination; for example, vAMF will continue to serve, and record the specific service usage records of UE, so as to provide evidence in case of later disputes; for another example, vAMF will report traffic information inconsistency to the operation and maintenance system; for example, vAMF will send The home network reports inconsistent traffic information. It should be pointed out that, for the above optional operations, vAMF can choose one operation, and can choose multiple operations, such as continuing to provide services to the UE, recording the network usage information of the UE, and sending information to the home network. The network element sends an alarm prompt indicating that the traffic information is inconsistent.
S103、vAMF向归属网络发送所述UE上报的网络使用情况和拜访网络统计的所述UE的网络使用情况;S103. The vAMF sends the network usage reported by the UE and the network usage of the UE statistics by the visited network to the home network;
可以理解的是的,vAMF向归属网络的网元(如hAUSF、hAMF或hSEPP)发送第二消息;所述第二消息中包括UE上报的网络使用情况、拜访网络统计的所述UE的网络使用情况以及消息验证码;另外,所述第二消息中还包括所述UE的标识和拜访网络的标识。It can be understood that the vAMF sends a second message to a network element of the home network (such as hAUSF, hAMF or hSEPP); the second message includes the network usage reported by the UE and the network usage of the UE reported by the visited network. situation and a message authentication code; in addition, the second message also includes the identifier of the UE and the identifier of the visited network.
另外,可以理解的是,UE上报的网络使用情况、拜访网络统计的所述UE的网络使用情况以、消息验证码、所述UE的标识以及拜访网络的标识,上述参数可以通过一个消息发送,也可以分别发送。In addition, it can be understood that the network usage reported by the UE, the network usage of the UE statistics by the visited network, the message verification code, the identity of the UE, and the identity of the visited network, the above parameters can be sent in one message, It can also be sent separately.
另外,可以理解的是,UE上报的数据和vAMF获取的网络侧统计的数据可以分别发送给归属网络。比如,vAMF向归属网络发送UE上报消息,该UE上报的消息中包括所述UE的网络使用情况、消息验证码、UE的标识以及拜访网络的标识;vAMF还可以向归属网络发送所述拜访网络上报的消息,该拜访网络上报的消息包括所述拜访网络统计的所述UE的网络使用情况、UE的标识以及拜访网络的标识。In addition, it can be understood that the data reported by the UE and the statistical data obtained by the vAMF on the network side may be sent to the home network respectively. For example, the vAMF sends a UE report message to the home network, and the message reported by the UE includes the UE's network usage, message verification code, UE ID, and the ID of the visited network; the vAMF can also send the visited network ID to the home network. The message reported by the visited network includes the network usage of the UE, the identifier of the UE, and the identifier of the visited network collected by the visited network.
S104、所述归属网络根据所述UE上报的网络使用情况和拜访网络统计的所述UE的网络使用情况确定处理措施。S104. The home network determines a processing measure according to the network usage reported by the UE and the network usage of the UE collected by the visited network.
需要指出的是,在判断UE上报的数据与拜访网络上报的数据是否匹配之前,还需要验证UE上报的数据是否被修改,因此,需要验证消息验证码是否匹配。It should be pointed out that before judging whether the data reported by the UE matches the data reported by the visited network, it is also necessary to verify whether the data reported by the UE has been modified. Therefore, it is necessary to verify whether the message verification code matches.
具体的,归属网络的网元(如hAUSF、hAMF或hSEPP)收到第二消息后,首先根据与UE协商好的方法生成消息验证码(也就是说,归属网络的网元生成消息验证码的方法与UE生成消息验证码的方法是一样的),然后将生成的消息验证码与第二消息中消息验证码的比较,如果两个消息验证码不匹配,则说明UE上报的消息被修改,此时归属网络可以根据预先设置策略终结会话或上报服务器;Specifically, after receiving the second message, the network element of the home network (such as hAUSF, hAMF or hSEPP) first generates a message verification code according to the method negotiated with the UE (that is, the network element of the home network generates the message verification code. The method is the same as the method for UE to generate a message verification code), and then compare the generated message verification code with the message verification code in the second message, if the two message verification codes do not match, it means that the message reported by the UE has been modified, At this time, the home network can terminate the session or report to the server according to the preset policy;
如果两个消息验证码匹配,则比较UE上报的网络使用情况和拜访网络统计的网络使用情况,如果UE上报的网络使用情况和拜访网络统计的网络使用情况不匹配,则归属网络可以根据配置选释放会话,或上报服务器。If the two message verification codes match, compare the network usage reported by the UE with the network usage statistics of the visited network. If the network usage reported by the UE does not match the network usage statistics of the visited network, the home network can select Release the session, or report to the server.
可选的,归属网络向拜访网络vAMF返回比较结果,以使得vAMF根据所述比较结果和预设的策略进行操作。比如,如果比较结果指示UE上报的网络使用情况和拜访网络统计的所述UE的网络使用情况不匹配,则所述vAMF会选择释放会话;当然,vAMF也可能会继续服务,但是会记录该匹配结果异常。Optionally, the home network returns the comparison result to the vAMF of the visited network, so that the vAMF operates according to the comparison result and a preset policy. For example, if the comparison result indicates that the network usage reported by the UE does not match the network usage of the UE reported by the visited network, the vAMF will choose to release the session; of course, the vAMF may continue to serve, but will record the match The result is abnormal.
可选的,归属网络可以使用完整性加密密钥生成比较结果的消息鉴权码MAC-result;并向UE发送所述比较结果以及比较结果的消息鉴权码MAC-result。相应的,UE收到所述比较结果以及比较结果的消息鉴权码MAC-result后,会验证消息鉴权码是否被修改,并根据验证结果进行后续处理。Optionally, the home network may use the integrity encryption key to generate a message authentication code MAC-result of the comparison result; and send the comparison result and the message authentication code MAC-result of the comparison result to the UE. Correspondingly, after receiving the comparison result and the message authentication code MAC-result of the comparison result, the UE will verify whether the message authentication code has been modified, and perform subsequent processing according to the verification result.
从而可知,通过本发明实施例提供的技术方案,拜访网络中的网元可以获取UE上报的网络使用情况以及拜访网络统计的所述UE的网络使用情况,进而将两者进行匹配,再根据匹配结果和预设的策略进行处理;进一步,由于UE还会反馈所述UE的网络使用情况的消息鉴权码,因此归属网络可以通过该消息鉴权码验证所述UE反馈的数据是否被篡改,进而确定UE反馈数据的真实性;再者,通过UE反馈的网络使用情况可以验证拜访网络反馈的数据是否属实,进而减少计费纠纷的可能性。It can be seen that, through the technical solution provided by the embodiment of the present invention, the network element in the visited network can obtain the network usage reported by the UE and the network usage of the UE in the statistics of the visited network, and then match the two, and then according to the matching The result and the preset policy are processed; further, since the UE will also feed back the message authentication code of the UE's network usage, the home network can verify whether the data fed back by the UE has been tampered with through the message authentication code, Furthermore, the authenticity of the data fed back by the UE is determined; furthermore, the network usage fed back by the UE can be used to verify whether the data fed back by the visited network is true, thereby reducing the possibility of billing disputes.
基于图2所描述的防止流量欺诈的思想,图3示出了一种具体的防止流量欺诈的方法,该方法可以应用于如图1中所示的网络架构。所述方法包括:Based on the idea of preventing traffic fraud described in FIG. 2 , FIG. 3 shows a specific method for preventing traffic fraud, which can be applied to the network architecture shown in FIG. 1 . The methods include:
1.当满足预设策略时,UE发送N1接口消息(N1Message)给vAMF;1. When the preset policy is met, the UE sends an N1 interface message (N1Message) to the vAMF;
需要指出的是,预设策略可以是UE使用的流量达到预设阈值,或UE使用网络的时长达到预设使用时长,所述预设策略还可以是当前时间满足预设周期的要求(比如每个1小时上报一次,或每个5分钟上报一次,在此不对预设周期做限制)。It should be pointed out that the preset policy may be that the traffic used by the UE reaches a preset threshold, or that the UE uses the network for a preset usage time. The preset policy may also be that the current time meets the requirements of a preset period (for example, every Report once every 1 hour, or once every 5 minutes, there is no limit to the preset period here).
可选的,在步骤1之前,所述方法还包括:vAMF向所述UE发送流量查询请求;那么步骤1的实现方式可以是:响应于所述vAMF发送的流量查询请求,所述UE发送N1接口消息(N1Message)给vAMF。需要指出的是,如果归属网络的网元如(AUSF,hSEEP,UDM)调用vAMF的服务接口,那么vAMF就会向所述UE发送流量查询请求;另外,如果归属网络的网元订阅某个用户的业务使用信息,那么vAMF就会保存该订阅信息,并且根据订阅信息向UE发起流量查询请求,当然,可以理解的是,该流量查询请求可以周期性的,也可以使即时的,在此不做限制。还有一种场景,如果归属网络的网元查询某个用户的业务使用信息或者该用户某个切片的业务或者某个APN的业务使用信息,那么也会触发vAMF向UE发送业务使用情况查询请求,相应的,UE上报所述UE的网络流量使用情况或者某个切片或者某个APN下的业务使用信息。该业务使用信息可以是某个UE的网络流量使用情况,或者是某个UE在于预设时间段内收发数据包的数量,或者是某个切片的网络流量使用情况,或者是某个APN的网络流量使用情况,在此不对业务使用信息做限定。Optionally, before step 1, the method further includes: the vAMF sends a traffic query request to the UE; then the implementation of step 1 may be: in response to the traffic query request sent by the vAMF, the UE sends N1 Interface message (N1Message) to vAMF. It should be pointed out that if the network element of the home network (such as AUSF, hSEEP, UDM) calls the service interface of vAMF, then vAMF will send a traffic query request to the UE; in addition, if the network element of the home network subscribes to a user service usage information, then the vAMF will save the subscription information, and initiate a traffic query request to the UE according to the subscription information. Of course, it is understandable that the traffic query request can be periodic or real-time. Do limit. In another scenario, if the network element of the home network queries the service usage information of a certain user or the service usage information of a certain slice of the user or the service usage information of a certain APN, then the vAMF will also be triggered to send a service usage query request to the UE. Correspondingly, the UE reports the network traffic usage of the UE or the service usage information of a certain slice or a certain APN. The service usage information can be the network traffic usage of a certain UE, or the number of data packets sent and received by a certain UE within a preset time period, or the network traffic usage of a certain slice, or the network traffic of a certain APN Traffic usage, here is not limited to business usage information.
进一步需要指出的是,N1Message中携带UE-counter以及消息鉴别码(MAC,message authentication code)。该消息鉴别码是UE生成的,因此可以标记为MAC-UE。其中,UE-counter可以是UE使用的总流量或者收发包数量,或和是某个或者某些切片的流量或者收发包数量,或和是某个或者某些会话流量或者收发包数量,如果是切片或者某个会话的counter,UE在发给vAMF的消息中,会同时携带切片信息或者会话信息(如会话标识)。It should be further pointed out that the N1Message carries UE-counter and message authentication code (MAC, message authentication code). The message authentication code is generated by the UE, so it can be marked as MAC-UE. Among them, UE-counter can be the total traffic used by the UE or the number of sent and received packets, or the sum is the traffic or the number of sent and received packets of a certain or some slices, or the sum is the traffic or the number of sent and received packets of a certain or certain sessions, if For a slice or a counter of a certain session, the message sent by the UE to the vAMF will carry slice information or session information (such as a session identifier) at the same time.
在本发明的一种可能的实现方式中,UE可以根据预设密钥和UE-counter生成UE-MAC。其中,预设密钥Key是根据Kausf(相关解释可参照图2对应的实施例)和服务网络名称SNID推导得出,如Key=KDF(Kausf,SNID),相应的,UE-MAC可以根据所述预设密钥Key以及UE-counter得到,如MAC-UE=KDF(key,UE-counter);其中,KDF一种推演函数。In a possible implementation manner of the present invention, the UE can generate a UE-MAC according to a preset key and a UE-counter. Wherein, the preset key Key is derived according to Kausf (relevant explanation can refer to the embodiment corresponding to FIG. 2 ) and the service network name SNID, such as Key=KDF(Kausf, SNID). Obtain the preset key Key and UE-counter, such as MAC-UE=KDF(key, UE-counter); wherein, KDF is a derivation function.
2.vAMF收到UE上报的N1message后,会向vSMF发送流量查询请求;2. After vAMF receives the N1message reported by UE, it will send a traffic query request to vSMF;
具体的,vAMF可以调用vSMF的服务接口或者使用接口消息,查询网络侧统计的业务使用量,如果存在多个vSMF为UE服务,则分别调用每个SMF的服务接口,获取查询网络侧统计的业务使用量。Specifically, vAMF can call the service interface of vSMF or use the interface message to query the service usage statistics on the network side. If there are multiple vSMFs serving the UE, call the service interface of each SMF respectively to obtain and query the service statistics on the network side Usage amount.
可选的,vAMF调用vSMF的服务时,还可以携带与该SMF相关的切片信息和或会话信息。Optionally, when the vAMF invokes the service of the vSMF, it may also carry slice information and/or session information related to the SMF.
3、vSMF收到查询流量请求后,会向vUPF发送流量查询请求;3. After vSMF receives the traffic query request, it will send a traffic query request to vUPF;
具体的,vSMF通过N4接口(N4Message)向vUPF发送流量查询请求;如果存在一个vSMF对应多个vUPF的场景,则vSMF分别向多个vUPF发送查询请求;Specifically, the vSMF sends a traffic query request to the vUPF through the N4 interface (N4Message); if there is a scenario where one vSMF corresponds to multiple vUPFs, the vSMF sends query requests to the multiple vUPFs respectively;
4、vUPF向vSMF返回网络侧的流量查询结果;4. vUPF returns the traffic query result on the network side to vSMF;
5、vSMF向vAMF返回网络侧的流量查询结果;5. The vSMF returns the traffic query result on the network side to the vAMF;
具体的,vSMF可以通过Nsmf message response消息进行反馈。Specifically, the vSMF may give feedback through the Nsmf message response message.
需要指出的是,如果vSMF分别向多个vUPF发送查询请求,就会接收到多个vUPF反馈的数据,vSMF会将接收到的数据进行汇总,比如vUPF统计的数值vUPF-counter等于多个vUPF反馈的数值之和。可选的,vSMF可以将接收到的数据直接转发给vAMF,由vAMF对接收到的数据进行汇总以获得vUPF统计的数值vUPF-counter。It should be pointed out that if vSMF sends query requests to multiple vUPFs separately, it will receive data fed back by multiple vUPFs, and vSMF will summarize the received data. For example, the value vUPF-counter of vUPF statistics is equal to multiple vUPF feedbacks The sum of the values of . Optionally, the vSMF may directly forward the received data to the vAMF, and the vAMF summarizes the received data to obtain a value vUPF-counter for vUPF statistics.
6、vAMF比较UE上报的UE-counter和网络侧统计的vUPF-counter,如果两者差值大于预设阈值,则拜访网络认为UE可能恶意上报流量信息,vAMF可以根据配置信息进行处理。6. The vAMF compares the UE-counter reported by the UE with the vUPF-counter counted by the network side. If the difference between the two is greater than the preset threshold, the visited network believes that the UE may report malicious traffic information, and the vAMF can process it according to the configuration information.
可选的,vAMF可以选释放会话,其中,在释放会话的消息中携带会话终结的原因;Optionally, vAMF can choose to release the session, wherein the reason for session termination is carried in the message of releasing the session;
可选的,vAMF可以继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;Optionally, the vAMF can continue to serve and record the specific service usage records of the UE, so as to provide evidence when disputes arise later;
可选的,vAMF可以向操作维护系统上报流量信息不一致信息;Optionally, vAMF can report traffic information inconsistency information to the operation and maintenance system;
可选的,vAMF可以向归属网络上报流量信息不一致信息。Optionally, the vAMF may report traffic information inconsistency information to the home network.
其中,需要指出的是,vAMF可以选择上述一种或多种处理方式。Wherein, it should be pointed out that, the vAMF may select one or more of the above processing methods.
另外,可以理解的是,第六步为可选步骤,因为归属网络后续也会比较这两个数据,并将比较结果反馈给vAMF,vAMF可以根据归属网络反馈的比较结果进行后续的处理。In addition, it can be understood that the sixth step is an optional step, because the home network will compare the two data later, and feed back the comparison result to the vAMF, and the vAMF can perform subsequent processing according to the comparison result fed back by the home network.
7.vAMF向归属网络发送UE上报的UE-counter和网络侧统计的vUPF-counter;7. The vAMF sends the UE-counter reported by the UE and the vUPF-counter counted by the network side to the home network;
可理解的是,vAMF向归属网络发送上述两个数值是为了由归属网络进行验证两个数值是否匹配。It can be understood that, the purpose of the vAMF sending the above two values to the home network is for the home network to verify whether the two values match.
可选的,vAMF可以通过N32Nausf messge进行消息的发送。Optionally, vAMF can send messages through N32Nausf message.
可选的,所述消息中还包含用户标识、拜访网络ID以及UE-MAC。Optionally, the message also includes a user identifier, a visited network ID, and UE-MAC.
8、归属网络的网元收到消息后,进行UE-MAC的验证;8. After receiving the message, the network element of the home network performs UE-MAC verification;
具体的,归属网络的网元(如hAUSF或hSEPP或hAMF或hUDM)根据预设密钥Key(与UE侧的预设密钥相同)和UE-counter生成NET-MAC,并将所述NET-MAC与UE-MAC的比较,如果NET-MAC与UE-MAC不一致或者两者差值大于预设阈值,则说明UE上报的消息被修改,此时归属网络可以根据预先设置策略终结会话,或上报服务器;Specifically, the network element of the home network (such as hAUSF or hSEPP or hAMF or hUDM) generates a NET-MAC according to the preset key Key (the same as the preset key on the UE side) and the UE-counter, and sends the NET-MAC Comparison of MAC and UE-MAC, if NET-MAC is inconsistent with UE-MAC or the difference between the two is greater than the preset threshold, it means that the message reported by the UE has been modified. At this time, the home network can terminate the session according to the preset policy, or report server;
如果NET-MAC与UE-MAC一致或者两者差值小于或等于预设阈值,则比较UE上报的UE-counter和网络侧统计的vUPF-counter,如果UE上报的UE-counter和网络侧统计的vUPF-counter不匹配(不相等或两者的差值大于预设计数值),则归属网络可以根据配置,选释放会话,其中,在释放会话的消息中携带会话终结的原因。If the NET-MAC is consistent with the UE-MAC or the difference between the two is less than or equal to the preset threshold, then compare the UE-counter reported by the UE with the vUPF-counter calculated by the network side. If the vUPF-counters do not match (not equal or the difference between the two is greater than the preset value), the home network can choose to release the session according to the configuration, wherein the reason for the session termination is carried in the message of releasing the session.
9、归属网络向拜访网络vAMF返回比较结果;9. The home network returns the comparison result to the visited network vAMF;
其中,需要指出的是,可通过N32Nausf Message消息返回比较结果。Wherein, it should be pointed out that the comparison result can be returned through the N32Nausf Message.
其中,该比较结果可以是个字符串(比如true表示匹配,false表示不匹配);还可以是数值,比如1标识匹配,0标识不匹配,表征比较结果的方式有很多,在此不做限制。Wherein, the comparison result can be a character string (for example, true means match, false means no match); it can also be a value, such as 1 means match, 0 means no match, there are many ways to represent the comparison result, and there is no limitation here.
可选的,该比较结果还可以是网络侧统计的vUPF-counter,该消息中还可以包括比较结果的消息鉴权码MAC-result(根据预设密钥和比较结果生成的);Optionally, the comparison result can also be the vUPF-counter counted by the network side, and the message can also include the message authentication code MAC-result of the comparison result (generated according to the preset key and the comparison result);
需要指出的是,在第6步,vAMF将两个数值进行了比较,vAMF可以基于比较结果进行处理,当然,vAMF还可以先不进行处理,可以等待归属网络反馈的结果进行处理。如果当比较结果不一致(超出阈值后),vAMF可以根据本地的策略选择释放会话。It should be pointed out that in step 6, the vAMF compares the two values, and the vAMF can process based on the comparison result. Of course, the vAMF can wait for the result fed back by the home network to process. If the comparison result is inconsistent (after exceeding the threshold), the vAMF can choose to release the session according to the local policy.
10.vAMF向UE发送比较结果。10. The vAMF sends the comparison result to the UE.
需要指出的是,vAMF可以通过N1message response向UE反馈比较结果。It should be pointed out that the vAMF can feed back the comparison result to the UE through the N1message response.
可选的,该反馈消息中还可以包括MAC-result。Optionally, the feedback message may also include MAC-result.
另外,可以理解的是,如果第六步中,vAMF没有根据配置信息或预设策略进行处理,那么此时可以根据比较结果进行处理。如果比较结果指示两个数值不匹配,那么vAMF可以根据配置信息进行处理。In addition, it can be understood that if in the sixth step, the vAMF does not process according to the configuration information or the preset policy, then it can process according to the comparison result at this time. If the comparison result indicates that the two values do not match, the vAMF can handle it according to the configuration information.
可选的,vAMF可以选释放会话,其中,在释放会话的消息中携带会话终结的原因;Optionally, vAMF can choose to release the session, wherein the reason for session termination is carried in the message of releasing the session;
可选的,vAMF可以继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;Optionally, the vAMF can continue to serve and record the specific service usage records of the UE, so as to provide evidence when disputes arise later;
可选的,vAMF可以向操作维护系统上报流量信息不一致信息;Optionally, vAMF can report traffic information inconsistency information to the operation and maintenance system;
可选的,vAMF可以向归属网络上报流量信息不一致信息。Optionally, the vAMF may report traffic information inconsistency information to the home network.
其中,需要指出的是,vAMF可以选择上述一种或多种处理方式。Wherein, it should be pointed out that, the vAMF may select one or more of the above processing methods.
11.根据result的结果进行后续处理。11. Perform follow-up processing according to the result of result.
可选的,如果反馈消息中包括MAC-result,那么UE会使用预设密钥KEY对MAC-result进行完整性验证,如果验证通过,会继续根据result的结果进行后续处理。如果返回匹配失败的结论,UE就会终止会话,或者设置降低该PLMN(Public Land Mobile Network,公共陆地移动网络)的接入优先级或则禁止接入。Optionally, if the feedback message includes the MAC-result, the UE will use the preset key KEY to verify the integrity of the MAC-result, and if the verification passes, it will continue to perform subsequent processing according to the result of the result. If the conclusion of matching failure is returned, the UE will terminate the session, or set to lower the access priority of the PLMN (Public Land Mobile Network, public land mobile network) or prohibit access.
另外,需要指出的是,如果result是网络侧统计的vUPF-counter,那么就需要UE比较UE-counter和网络侧统计的vUPF-counter;进一步需要指出的是,比较UE-counter和网络侧统计的vUPF-counter,需要对MAC-result进行完整性验证。可以理解的是,比较MAC-UE和MAC-result是否一致,如果一致,则验证通过。In addition, it should be pointed out that if the result is the vUPF-counter counted by the network side, then the UE needs to compare the UE-counter with the vUPF-counter counted by the network side; vUPF-counter needs to verify the integrity of MAC-result. It can be understood that it is compared whether the MAC-UE and the MAC-result are consistent, and if they are consistent, the verification is passed.
结合上述实施例可知,通过该实施例提供的技术方案,拜访网络可以将UE上报的数据和网络侧获取的数据进行比对以确定UE是否篡改网络流量使用情况,如果确定UE篡改网络流量使用情况,可以及时采取应对措施,从而减少服务网络的损失;进一步的,归属网络可以通过验证UE-counter的消息鉴别码以确定UE的上报的信息是否被篡改,如果没有被篡改的话,可以进一步比较UE上报的UE-counter和网络侧统计的vUPF-counter,如果两个数据不一致,则可以立刻采取有效措施,以减少或避免后续的计费纠纷。In combination with the above embodiments, it can be seen that through the technical solution provided by this embodiment, the visited network can compare the data reported by the UE with the data acquired by the network side to determine whether the UE has tampered with the network traffic usage. If it is determined that the UE has tampered with the network traffic usage , can take countermeasures in time, thereby reducing the loss of the service network; further, the home network can verify the message authentication code of the UE-counter to determine whether the information reported by the UE has been tampered with, and if it has not been tampered, it can further compare UE If the reported UE-counter and the vUPF-counter counted by the network side are inconsistent, effective measures can be taken immediately to reduce or avoid subsequent billing disputes.
结合图3所示的实施例,本发明提供了另一种可能的实现方式。与图3所述的实施例相比,本实施例中是UPF触发的流量查询。具体的,所述方法包括:In combination with the embodiment shown in FIG. 3 , the present invention provides another possible implementation manner. Compared with the embodiment described in FIG. 3 , in this embodiment, UPF triggers traffic query. Specifically, the method includes:
1、vUPF向vAMF发送流量查询请求。1. The vUPF sends a traffic query request to the vAMF.
可选的,所述流量查询请求中可以携带UE的标识。Optionally, the traffic query request may carry the identifier of the UE.
可选的,所述流量查询请求中可以携带UE的标识以及会话标识。Optionally, the traffic query request may carry the ID of the UE and the ID of the session.
可选的,所述流量查询请求中可以携带UE的标识以及APN。Optionally, the traffic query request may carry the ID of the UE and the APN.
可选的,所述流量查询请求中可以也可以携带vUPF-counter。Optionally, the vUPF-counter may also be carried in the traffic query request.
2、vAMF向UE发送流量查询请求。2. The vAMF sends a traffic query request to the UE.
相应的,如果流量查询请求包含UE的标识,那么UE就要反馈所述UE的网络使用情况,比如预设时间段内的流量或收发数据包的数量等。如果流量查询请求包含UE的标识以及会话标识,那么UE就会反馈这个会话所对应的网络流量使用情况,比如预设时间段内使用的流量或收发的数据包。Correspondingly, if the traffic query request includes the identifier of the UE, the UE will feed back the network usage of the UE, such as the traffic or the number of sent and received data packets within a preset time period. If the traffic query request includes the UE ID and the session ID, the UE will feed back the network traffic usage corresponding to the session, such as the traffic used or the data packets sent and received within a preset time period.
3.所述UE向所述vAMF反馈UE统计的网络使用信息。3. The UE feeds back the network usage information collected by the UE to the vAMF.
需要指出的是,如果vUPF向vAMF发送的流量查询请求中没有vUPF-counter,那么,本实施例还会执行图3所示的2-5步,以通过vSMF获取vUPF-counter。如果vUPF向vAMF发送的流量查询请求中包含vUPF-counter,本实施例就跳过图3所示的2-5步。It should be pointed out that if there is no vUPF-counter in the traffic query request sent by vUPF to vAMF, then this embodiment will also perform steps 2-5 shown in FIG. 3 to obtain vUPF-counter through vSMF. If the traffic query request sent by the vUPF to the vAMF includes the vUPF-counter, steps 2-5 shown in FIG. 3 are skipped in this embodiment.
后续的步骤可参考图3实施例中的6-11步。Subsequent steps can refer to steps 6-11 in the embodiment of FIG. 3 .
上面结合图2至图3详细描述了本申请实施例提供的防止流量欺诈的方法,下面将结合图4至图6描述本申请实施例提供的防止流量欺诈的装置,图4至图6所示的装置可执行上述方法实施例所描述的方法。其中,图4所示的为归属网络中的网元(已在上述实施例中进行了举例说明),图5为拜访网络中的网元(比如AMF),图6为用户终端。The method for preventing traffic fraud provided by the embodiment of the present application has been described in detail above with reference to FIGS. 2 to 3 . The device for preventing traffic fraud provided by the embodiment of the present application will be described below in conjunction with FIGS. The device can execute the method described in the above method embodiment. Wherein, Fig. 4 shows network elements in the home network (illustrated in the above embodiments), Fig. 5 shows network elements in the visited network (such as AMF), and Fig. 6 shows user terminals.
具体的,如4所示,该装置400包括:Specifically, as shown in 4, the device 400 includes:
接收单元401,用于接收用户设备发送的第一网络使用情况,其中,所述装置为归属网络中的网元;The receiving unit 401 is configured to receive the first network usage information sent by the user equipment, wherein the device is a network element in the home network;
获取单元402,用于获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;An obtaining unit 402, configured to obtain a second network usage condition sent by a second network element, where the second network element is a network element in a visited network that provides services for the user equipment;
处理单元403,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。The processing unit 403 is configured to perform processing according to a preset policy if the first network usage situation does not match the second network usage situation.
可选的,所述装置400还包括判断单元404;Optionally, the device 400 further includes a judging unit 404;
接收单元401,还用于接收所述用户设备发送的第一消息鉴别码;其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的;The receiving unit 401 is further configured to receive a first message authentication code sent by the user equipment; wherein, the message authentication code is generated according to a shared key and the usage of the first network;
获取单元402,还用于获取第二消息鉴别码,其中,所述第二消息鉴别码是根据所述共享密钥和所述第二网络使用情况生成的;The acquiring unit 402 is further configured to acquire a second message authentication code, where the second message authentication code is generated according to the shared key and the second network usage;
判断单元404,用于若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。A judging unit 404, configured to judge whether the first network usage condition matches the second network usage condition if the first message authentication code is the same as the second message authentication code.
可选的,装置400还包括发送单元405;Optionally, the device 400 further includes a sending unit 405;
发送单元405,用于向所述第二网元发送业务使用查询请求;a sending unit 405, configured to send a service usage query request to the second network element;
接收单元401,用于接收第二网元发送的第二网络使用情况。The receiving unit 401 is configured to receive the second network usage condition sent by the second network element.
具体的,如图5所示,该装置500包括接收单元501,获取单元502以及处理单元503;Specifically, as shown in FIG. 5, the apparatus 500 includes a receiving unit 501, an acquiring unit 502, and a processing unit 503;
接收单元501,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元;The receiving unit 501 is configured to receive the first network usage situation sent by the user equipment, wherein the device is a network element in the visited network;
获取单元502,用于获取所述拜访网络统计的第二网络使用情况;An obtaining unit 502, configured to obtain the second network usage statistics of the visited network;
处理单元503,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。The processing unit 503 is configured to perform processing according to a preset strategy if the first network usage situation does not match the second network usage situation.
可选的,装置500还包括发送单元504;Optionally, the apparatus 500 further includes a sending unit 504;
发送单元504,用于向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。The sending unit 504 is configured to send the first network usage situation and the second network usage situation to a first network element; wherein the first network element is a network element in a home network.
可选的,发送单元504,还用于根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求;接收单元501,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元。Optionally, the sending unit 504 is further configured to periodically send a traffic query request to the user equipment according to the subscription information of the first network element; the receiving unit 501 is configured to receive the first network usage information sent by the user equipment. In this case, the device is a network element in the visited network.
如图6所示,该用户设备600包括生成单元601和发送单元602;As shown in FIG. 6, the user equipment 600 includes a generating unit 601 and a sending unit 602;
生成单元601,用于根据网络使用情况以及共享密钥生成第一消息鉴别码;A generating unit 601, configured to generate a first message authentication code according to network usage and a shared key;
发送单元602,用于向拜访网络发送所述网络使用情况以及第一消息鉴别码。A sending unit 602, configured to send the network usage situation and the first message authentication code to the visited network.
可选的,生成单元601,还用于根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。Optionally, the generating unit 601 is further configured to generate the shared key according to the identifier of the visited network and an intermediate key; the intermediate key is a key generated during access authentication of the user equipment, and the identifier of the visited network includes the Reports the name of the visited network.
可选的,用户设备600还包括接收单元603,验证单元604以及处理单元605;Optionally, the user equipment 600 further includes a receiving unit 603, a verification unit 604, and a processing unit 605;
接收单元603,用于接收所述拜访网络反馈的比对结果和第二消息鉴别码;A receiving unit 603, configured to receive the comparison result and the second message authentication code fed back by the visited network;
验证单元604,用于对所述第二消息鉴别码进行验证;a verification unit 604, configured to verify the second message authentication code;
处理单元605,用于若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。The processing unit 605 is configured to perform processing according to the comparison result and a preset policy if the second message authentication code is verified successfully.
应理解,这里的装置400、500以及600以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置400可以具体为上述图3所示的归属网络中的网元,装置400可以用于执行上述图3中归属网络网元为主体所执行流程和/或步骤,为避免重复,在此不再赘述。在一个可选例子中,本领域技术人员可以理解,装置500可以具体为上述图3所示的拜访网络中的AMF,装置500可以用于执行上述图3中AMF为主体所执行流程和/或步骤,为避免重复,在此不再赘述。在一个可选例子中,本领域技术人员可以理解,用户设备600可以具体为上述图3所示的UE,用户设备600可以用于执行上述图3中UE为主体所执行流程和/或步骤,为避免重复,在此不再赘述。It should be understood that the devices 400, 500 and 600 here are embodied in the form of functional units. The term "unit" herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a dedicated processor or a group of processors) for executing one or more software or firmware programs. processor, etc.) and memory, incorporated logic, and/or other suitable components to support the described functionality. In an optional example, those skilled in the art can understand that the device 400 may specifically be a network element in the home network shown in FIG. The processes and/or steps are not repeated here to avoid repetition. In an optional example, those skilled in the art can understand that the apparatus 500 may specifically be the AMF in the visited network shown in FIG. 3 above, and the apparatus 500 may be used to execute the process and/or The steps are not repeated here to avoid repetition. In an optional example, those skilled in the art can understand that the user equipment 600 may specifically be the UE shown in FIG. 3 above, and the user equipment 600 may be used to execute the process and/or steps performed by the UE as the main body in FIG. 3 above, To avoid repetition, details are not repeated here.
另外,需要指出的是,图4至6所示的逻辑单元均可依据图7所示的硬件架构来实现。该图7所示的硬件装置可以包括处理器710、收发器720和存储器730,该处理器710、收发器720和存储器730通过内部连接通路互相通信。In addition, it should be pointed out that the logic units shown in FIGS. 4 to 6 can all be implemented according to the hardware architecture shown in FIG. 7 . The hardware device shown in FIG. 7 may include a processor 710, a transceiver 720, and a memory 730, and the processor 710, the transceiver 720, and the memory 730 communicate with each other through an internal connection path.
具体的,图4中的处理单元、获取单元、判断单元所实现的相关功能可以由处理器710来实现,接收单元和发送单元所实现的相关功能可以由处理器710控制收发器720来实现。Specifically, related functions implemented by the processing unit, acquiring unit, and judging unit in FIG.
具体的,图5中的处理单元、获取单元所实现的相关功能可以由处理器710来实现,接收单元和发送单元所实现的相关功能可以由处理器710控制收发器720来实现。Specifically, the related functions implemented by the processing unit and the acquiring unit in FIG. 5 may be implemented by the processor 710 , and the related functions implemented by the receiving unit and the sending unit may be implemented by the processor 710 controlling the transceiver 720 .
具体的,图6中的处理单元、生成单元以及验证单元所实现的相关功能可以由处理器710来实现,接收单元和发送单元所实现的相关功能可以由处理器710控制收发器720来实现。Specifically, related functions implemented by the processing unit, generating unit, and verifying unit in FIG.
该处理器710可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。The processor 710 may include one or more processors, such as one or more central processing units (central processing unit, CPU). In the case where the processor is a CPU, the CPU may be a single-core CPU, or Can be a multi-core CPU.
该收发器720用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。The transceiver 720 is used to transmit and receive data and/or signals, and to receive data and/or signals. The transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
该存储器730包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable readonly memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器730用于存储相关指令及数据。The memory 730 includes but is not limited to random access memory (random access memory, RAM), read-only memory (read-only memory, ROM), erasable programmable memory (erasable programmable readonly memory, EPROM), read-only optical disc (compact disc read-only memory, CD-ROM), the memory 730 is used to store related instructions and data.
存储器730用于存储授权模块的程序代码和数据,可以为单独的器件或集成在处理器710中。The memory 730 is used to store program codes and data of the authorization module, and may be a separate device or integrated in the processor 710 .
可以理解的是,图7仅仅示出了授权模块的简化设计。在实际应用中,授权模块还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的授权模块都在本申请的保护范围之内。It can be understood that Fig. 7 only shows a simplified design of the authorization module. In practical applications, the authorization module can also contain other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all authorization modules that can implement this application are protected by this application. within range.
在一种可能的设计中,装置700可以为芯片,例如可以为可用于授权模块中的通信芯片,用于实现授权模块中处理器710的相关功能。该芯片可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。In a possible design, the device 700 may be a chip, for example, a communication chip that may be used in the authorization module, and is used to implement related functions of the processor 710 in the authorization module. The chip can be a field programmable gate array for realizing relevant functions, an application-specific integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, or a programmable controller or other integrated chips. The chip may optionally include one or more memories for storing program codes, which enable the processor to implement corresponding functions when the codes are executed.
另外,需要指出的是,图4至图6所涉及的网元,其构造均可如图7所示,包括处理器,收发器,存储器等部件,存储器中存储有程序代码,当所述程序代码被执行时,各个网元执行如图2或图3所示的功能。In addition, it should be pointed out that the structure of the network elements involved in Figure 4 to Figure 6 can be as shown in Figure 7, including processors, transceivers, memory and other components, and program codes are stored in the memory, when the program When the code is executed, each network element performs the functions shown in FIG. 2 or FIG. 3 .
应理解,本申请实施例中的归属网络中的网元以及拜访网络中的网元均为具有特定功能和网络接口,可以是同一个专用硬件上的不同网元,也可以是同一个专用硬件上运行的不同软件实例,还可以是同一个相关平台(如云基础设施上)上的不同虚拟功能实例,本申请实施例对此不作限定。It should be understood that the network elements in the home network and the network elements in the visited network in the embodiments of the present application both have specific functions and network interfaces, and may be different network elements on the same dedicated hardware, or may be the same dedicated hardware The different software instances running on the platform may also be different virtual function instances on the same related platform (such as on the cloud infrastructure), which is not limited in this embodiment of the present application.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriberline,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,数字通用光盘(digital versatiledisc,DVD))、或者半导体介质(例如SSD)等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present invention will be generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted via a computer-readable storage medium. The computer instructions can be transmitted from one website site, computer, server, or data center to another via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) A website site, computer, server or data center for transmission. The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, a digital versatile disc (digital versatile disc, DVD)), or a semiconductor medium (for example, SSD).
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或RAM、磁碟或者光盘等各种可存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments are realized. The processes can be completed by computer programs to instruct related hardware. The programs can be stored in computer-readable storage media. When the programs are executed , may include the processes of the foregoing method embodiments. The aforementioned storage medium includes: ROM or RAM, a magnetic disk or an optical disk, and other various media that can store program codes.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: various media capable of storing program codes such as U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the application, but the scope of protection of the application is not limited thereto. Anyone familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the application. Should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be determined by the protection scope of the claims.
Claims (28)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810638701.6A CN110621019A (en) | 2018-06-20 | 2018-06-20 | Method and device for preventing flow fraud |
PCT/CN2019/088881 WO2019242467A1 (en) | 2018-06-20 | 2019-05-28 | Method and apparatus for preventing traffic fraud |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810638701.6A CN110621019A (en) | 2018-06-20 | 2018-06-20 | Method and device for preventing flow fraud |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110621019A true CN110621019A (en) | 2019-12-27 |
Family
ID=68919860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810638701.6A Pending CN110621019A (en) | 2018-06-20 | 2018-06-20 | Method and device for preventing flow fraud |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110621019A (en) |
WO (1) | WO2019242467A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI738205B (en) * | 2020-02-06 | 2021-09-01 | 鑽贏雲股份有限公司 | System and execution method of cloud agent execution program |
WO2023041056A1 (en) * | 2021-09-18 | 2023-03-23 | 华为技术有限公司 | Network verification method and apparatus |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022203553A1 (en) * | 2021-03-26 | 2022-09-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Using user equipment to gather local break out network resource usage information for communication sessions |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859135A (en) * | 2006-03-13 | 2006-11-08 | 华为技术有限公司 | WAP service charging method |
CN101102596A (en) * | 2007-07-09 | 2008-01-09 | 向杰 | A method for generating detailed call records at user side |
CN102098648A (en) * | 2009-12-14 | 2011-06-15 | 中兴通讯股份有限公司 | Roaming charging method and system |
CN104507065A (en) * | 2015-01-14 | 2015-04-08 | 南京理工大学 | Non-repudiation charging method for heterogeneous wireless network |
CN104620617A (en) * | 2012-07-12 | 2015-05-13 | 诺基亚公司 | Methods and apparatus for authentication |
CN106817228A (en) * | 2015-11-27 | 2017-06-09 | 中兴通讯股份有限公司 | Data charging method and device |
CN107809411A (en) * | 2016-09-09 | 2018-03-16 | 华为技术有限公司 | Authentication method, terminal device, server and the network authentication entity of mobile network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108810298B (en) * | 2014-09-05 | 2021-01-15 | 华为技术有限公司 | Online charging method and equipment for cross-PLMN roaming data service |
CN107547212A (en) * | 2016-06-24 | 2018-01-05 | 中兴通讯股份有限公司 | A kind of charging method based on separation architecture, device and system |
-
2018
- 2018-06-20 CN CN201810638701.6A patent/CN110621019A/en active Pending
-
2019
- 2019-05-28 WO PCT/CN2019/088881 patent/WO2019242467A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859135A (en) * | 2006-03-13 | 2006-11-08 | 华为技术有限公司 | WAP service charging method |
CN101102596A (en) * | 2007-07-09 | 2008-01-09 | 向杰 | A method for generating detailed call records at user side |
CN102098648A (en) * | 2009-12-14 | 2011-06-15 | 中兴通讯股份有限公司 | Roaming charging method and system |
CN104620617A (en) * | 2012-07-12 | 2015-05-13 | 诺基亚公司 | Methods and apparatus for authentication |
CN104507065A (en) * | 2015-01-14 | 2015-04-08 | 南京理工大学 | Non-repudiation charging method for heterogeneous wireless network |
CN106817228A (en) * | 2015-11-27 | 2017-06-09 | 中兴通讯股份有限公司 | Data charging method and device |
CN107809411A (en) * | 2016-09-09 | 2018-03-16 | 华为技术有限公司 | Authentication method, terminal device, server and the network authentication entity of mobile network |
Non-Patent Citations (1)
Title |
---|
3GPP: "Study on the security aspects of the next generation system", 《3GPP TR 33.899》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI738205B (en) * | 2020-02-06 | 2021-09-01 | 鑽贏雲股份有限公司 | System and execution method of cloud agent execution program |
WO2023041056A1 (en) * | 2021-09-18 | 2023-03-23 | 华为技术有限公司 | Network verification method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
WO2019242467A1 (en) | 2019-12-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110798833B (en) | Method and device for verifying user equipment identification in authentication process | |
US11956361B2 (en) | Network function service invocation method, apparatus, and system | |
CN115065476B (en) | Communication method and communication device | |
US11601555B2 (en) | Methods and apparatuses for service layer charging correlation with underlying networks | |
CN111211912B (en) | Charging method and device | |
WO2021037175A1 (en) | Network slice management method and related device | |
CN114424600B (en) | A communication method, device, system and storage medium | |
CN109688586A (en) | A kind of method, apparatus and computer readable storage medium of network function certification | |
US12192879B2 (en) | Network access method and communication apparatus | |
WO2021197185A1 (en) | Communication method and communication device | |
CN110366159A (en) | A method and device for obtaining a security policy | |
CN103392353A (en) | Wireless network capacity open system, gateway, agent and method | |
WO2021057128A1 (en) | Nf-based communication method and device, and storage medium | |
US20230144435A1 (en) | Method, device and apparatus for controlling network slice authentication, and relevant storage medium | |
WO2019242467A1 (en) | Method and apparatus for preventing traffic fraud | |
CN113873455A (en) | Flow statistical method and system, computer readable storage medium | |
US10666812B2 (en) | Charging control apparatus, method, and system | |
CN113038467B (en) | A method for reporting event information and a communication device | |
JP2020529754A (en) | UE adapted to send service validation messages | |
CN115175118B (en) | Communication service complementary system and method based on cooperative WiFi | |
WO2016056020A1 (en) | A system and method for providing differential service scheme | |
WO2021253859A1 (en) | Slice authentication method and system | |
CN107027112B (en) | Authentication system and authentication method for integrating heterogeneous networks | |
CN116744284A (en) | Method, PCF, system and storage medium for providing QoS service | |
CN117319999A (en) | Communication equipment identification method, communication system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191227 |