CN114422998A - Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users - Google Patents

Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users Download PDF

Info

Publication number
CN114422998A
CN114422998A CN202111616501.9A CN202111616501A CN114422998A CN 114422998 A CN114422998 A CN 114422998A CN 202111616501 A CN202111616501 A CN 202111616501A CN 114422998 A CN114422998 A CN 114422998A
Authority
CN
China
Prior art keywords
user
s1ap
nsa
mme
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111616501.9A
Other languages
Chinese (zh)
Inventor
牛云
姜松
刘浩
李文云
李建钊
曹维华
邹洁
唐宏
高敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111616501.9A priority Critical patent/CN114422998A/en
Publication of CN114422998A publication Critical patent/CN114422998A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides a method and a device for identifying a non-independent networking user, electronic equipment and a computer storage medium, and relates to the technical field of mobile internet operation support. The method comprises the following steps: collecting S1-MME interface flow of a user; generating and storing a corresponding relation between an S1AP user identification and a unique identification code of a user based on an initial context establishment message between an LTE base station and an MME; and acquiring the S1AP user identification of the user based on the secondary wireless access technology data reported by the LTE base station by using the report message, thereby determining that the unique identification code corresponding to the S1AP user identification of the user is the NSA network-accessing user. The method includes the steps that information is collected through an S1-MME interface, the corresponding relation between the S1AP user identification of a user and a unique identification code is stored in advance, and when an NSA user accesses the Internet, the user corresponding to the user identification can be determined to be the NSA user based on the S1AP user identification of the user carried in a secondary wireless access technology data usage report message.

Description

Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users
Technical Field
The present disclosure relates to the field of mobile internet operation support technologies, and in particular, to a method and an apparatus for identifying a user who logs on a network through an independent networking, an electronic device, and a computer storage medium.
Background
In 5G (5th Generation Mobile Communication Technology, fifth Generation Mobile Communication Technology) NSA (Non-Standalone networking) Technology, an NSA base station is anchored on an LTE (Long Term Evolution) base station and interworks with an EPC (Packet Core network) Core network, a 4G (4th Generation Mobile Communication Technology, fourth Generation Mobile Communication Technology) user connects the LTE base station and accesses into the EPC by LTE, and a 5G NSA user connects to the LTE base station and the NSA base station by dual connection and accesses into the EPC; since 3GPP (3rd Generation Partnership Project) does not define a separate Radio Access Type (RAT) for NSA, it is impossible to directly distinguish whether a user is camping on NSA or LTE from internet traffic.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure aims to provide a NSA network-accessing user identification method, device, electronic device, and computer storage medium, which at least to some extent overcome the problem in the related art that it is impossible to directly identify and distinguish whether a user is accessing the network in NSA or LTE from the internet traffic.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to one aspect of the present disclosure, there is provided an NSA presence subscriber identification method, including:
collecting S1-MME interface flow of a user;
generating and storing a corresponding relation between an S1AP user identification and a unique identification code of a user based on an acquired initial context establishment message between an LTE base station and an MME;
acquiring an S1AP user identifier of a user based on a secondary wireless access technology data usage report message reported by an LTE base station;
and determining the unique identification code corresponding to the S1AP user identification of the user based on the stored corresponding relation between the S1AP user identification and the unique identification code, thereby determining that the user corresponding to the unique identification code is the NSA network-logging user.
In one embodiment, the S1AP user identity comprises an MME UE S1AP ID and/or an eNB UE S1AP ID, the unique identification code comprises an IMSI or IMEI;
the generating and storing the corresponding relationship between the S1AP user identifier and the unique identifier code of the user based on the initial context setup message between the LTE base station and the MME includes:
obtaining an S1AP user identification and a unique identification code of the user based on an initial context establishment request message sent by an MME to an LTE base station; and generating and storing the corresponding relation between the S1AP user identification of the user and the unique identification code.
In one embodiment, the S1AP user identity comprises an MME UE S1AP ID and/or an eNB UE S1AP ID, the unique identification code comprises an international mobile subscriber identity or an international mobile equipment identity, and the generating and storing a correspondence of the S1AP user identity of the user and the unique identification code based on the initial context setup message between the LTE base station and the MME comprises: acquiring an S1AP user identifier and a unique identification code of the user based on an initial context establishment response message sent to an MME by an LTE base station; and generating and storing the corresponding relation between the S1AP user identification of the user and the unique identification code.
In one embodiment, when a user attaches to a core network or modifies a bearer, an LTE base station is triggered to perform initial context setup message interaction with an MME.
In one embodiment, when a 5G NSA user logs on to the internet, the NSA base station generates a secondary radio access technology data usage report message, which carries the MME UE S1AP ID and eNB UE S1AP ID of the user, and reports the secondary radio access technology data usage report message to the MME through the LTE base station.
According to another aspect of the present disclosure, there is provided an NSA presence subscriber identification apparatus including:
the traffic collection module is used for collecting S1-MME interface traffic of a user;
a corresponding relation establishing module, configured to generate and store a corresponding relation between an S1AP user identifier of the user and the unique identifier code based on an initial context establishment message between the LTE base station and the MME;
a user identifier obtaining module, configured to obtain an S1AP user identifier of the user based on a secondary radio access technology data usage report message reported by an acquired LTE base station;
and the network-accessing user determining module is used for determining the unique identification code corresponding to the S1AP user identification of the user based on the stored corresponding relation between the S1AP user identification and the unique identification code, so that the user corresponding to the unique identification code is determined to be an NSA network-accessing user.
In one embodiment, the S1AP user identity comprises an MME UE S1AP ID and/or an eNB UE S1AP ID, the unique identification code comprises an international mobile subscriber identity or an international mobile equipment identity; the corresponding relation establishing module is used for generating and storing the corresponding relation between the S1AP user identification and the unique identification code of the user based on the initial context establishing request message or the initial context establishing response message between the LTE base station and the MME.
In an embodiment, the secondary radio access technology data usage report message is generated by the NSA base station and sent to the LTE base station when the 5G NSA user accesses the internet, and the secondary radio access technology data usage report message carries an MME UE S1AP ID and an eNB UE S1AP ID of the user.
According to another aspect of the present disclosure, there is provided an electronic device including:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to execute the NSA presence subscriber identification method described above via execution of the executable instructions.
According to another aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the NSA presence subscriber identification method described above.
According to the NSA network-login user identification method, the NSA network-login user identification device, the electronic equipment and the computer storage medium, the information is collected through the S1-MME interface, the corresponding relation between the S1AP user identification of the user and the unique identification code is stored in advance, when the NSA user accesses the Internet, the NSA base station generates a second-level wireless access technology data use report message, the second-level wireless access technology data use report message is reported to the MME through the LTE base station, and the corresponding user can be determined to be the NSA user based on the S1AP user identification of the user carried in the message.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
FIG. 1 shows a schematic diagram of a 5G NSA system in an embodiment of the present disclosure;
fig. 2 is a schematic system diagram illustrating an NSA log-on user identification method according to an embodiment of the present disclosure;
fig. 3 is a flowchart illustrating an NSA log-on user identification method in an embodiment of the present disclosure;
fig. 4 shows a signaling diagram for establishing a corresponding relationship between an S1AP user identifier and a unique identifier in an NSA network-accessing user identification method in an embodiment of the present disclosure;
fig. 5 shows a signaling diagram for determining that a subscriber is an NSA subscriber in an NSA subscriber identification method in an embodiment of the present disclosure;
fig. 6 is a schematic diagram illustrating an NSA presence subscriber identity module according to an embodiment of the present disclosure; and
fig. 7 shows a block diagram of a computer device in an embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 shows a schematic diagram of a 5G NSA system according to an embodiment of the present disclosure.
Referring to fig. 1, a 5G NSA system may include an EPC 14, an LTE base station 13 (may also be referred to as an LTE BS or eNB), an NR base station 12 (may also be referred to as an NR BS or a gNB), and a UE (user equipment) 11. The LTE base station 13 and the NR base station 12 may be connected to the EPC 14 and the UE 11, and the UE 11 may receive services from the LTE base station 13 and the NR base station 12 at the same time.
The UE 11 may perform RRC connection through the first BS, receive functions (e.g., connection management or mobility management functions) provided in the control plane, and receive additional radio resources for transmitting and receiving data through the second BS. The dual connectivity technique may be referred to as evolved universal terrestrial radio access (EN-DC-NR) dual connectivity. The present disclosure is not limited to EN-DC and may be applied to NR-E-UTRA dual connectivity (NE-DC) through which a first BS uses NR and a second BS uses LTE, and to any of various forms of multiple connectivity.
The present disclosure may be applied to a case where a first system using a first communication technology and a second system using a second communication technology are implemented in one device, or a case where a first BS and a second BS are located at the same geographical location.
Fig. 2 is a schematic system diagram illustrating an NSA log-on user identification method according to an embodiment of the present disclosure.
As shown in fig. 2, the system includes an NSA User terminal 21, an NSA base station 22, an LTE base station 23, an MME 24, and an SGW (Serving GateWay)/PGW (PDN GateWay)/UPF (User Port Function) 25; in addition, a new log-on user identification device 26 is also included. The user identification device 26 for logging on the network collects S1-MME interface flow, caches information such as MME UE S1AP ID, eNB UE S1AP ID and user identification IMSI of the user; when the NSA user 21 accesses the internet, the user plane traffic is transmitted to the EPC core network through the NSA base station 22, and the NSA base station 22 reports a Secondary RAT Data Usage Report (Secondary radio access technology Data Usage Report) message, and transmits the message to the MME 24 through the LTE base station 23 (S202); the Secondary RAT Data Usage Report message carries the user' S MME UE S1AP ID, eNB UE S1AP ID; the subscriber identity device 26 collects the message and identifies the MME UE S1AP ID and eNB UE S1AP ID, and associates the information with the subscriber information cached in the subscriber identity device 26, thereby identifying the subscriber as an NSA subscriber.
Fig. 3 is a flowchart illustrating an NSA log-on user identification method in an embodiment of the present disclosure.
As shown in fig. 3, S302, collects S1-MME interface traffic of the user. The S1 interface is a communication interface between an LTE eNodeB (base station) and an EPC (packet core network), and divides the LTE system into a radio access network and a core network. The S1 interface follows the idea of bearer and control separation, into two interfaces, one for the control plane (S1-MME) and one for the user plane (S1-U).
S304, establishing and storing the corresponding relation between the S1AP user identification and the unique identification code of the user based on the acquired initial context establishment message between the LTE base station and the MME. In one embodiment, the Initial Context Setup message includes, for example, an Initial Context Setup Request message and an Initial Context Setup Response message. In one embodiment, the S1AP user identities include, for example, MME UE S1AP ID and/or eNB UE S1AP ID. In one embodiment, the unique identification code comprises, for example, an IMSI (international mobile subscriber identity) or an IMEI (international mobile equipment identity).
S306, acquiring the user identification of the user S1AP based on the collected Secondary RAT Data Usage Report message reported by the LTE base station. In an embodiment, when a 5G NSA user goes online, the user plane traffic is transmitted to the EPC core network through the NSA base station, at this time, the NSA base station generates a Secondary RAT Data Usage Report message, and reports the Secondary RAT Data Usage Report message to the MME through the LTE base station, where the message carries an MME UE S1AP ID and an eNB UE S1AP ID of the user, and the Secondary RAT Data Usage Report message is analyzed to obtain an S1AP user identifier of the user, such as an MME UE S1AP ID and an eNB UE S1AP ID.
S308, determining the unique identification code corresponding to the S1AP user identification of the user based on the stored corresponding relation between the S1AP user identification and the unique identification code, thereby determining that the user corresponding to the unique identification code is an NSA network-logging user.
In the above embodiment, the information is collected at the S1-MME interface, the correspondence between the S1AP user identifier of the user and the unique identifier is pre-stored, when the NSA user accesses the internet, the NSA base station generates a secondary radio access technology data usage report message, reports the secondary radio access technology data usage report message to the MME through the LTE base station, and can determine the corresponding unique identifier based on the S1AP user identifier of the user carried in the message, thereby determining that the user is an NSA user, and realizing that the user is an NSA user based on the internet traffic. And the information is collected at the S1-MME interface, so that the data collection work can be reduced, and the influence on the system is small.
It is to be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the method according to an exemplary embodiment of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
In an embodiment, when a user attaches to a core network or modifies a bearer, a base station and an MME perform Initial Context Setup (Initial Context Setup) message interaction, carry information such as a user International Mobile Subscriber Identity (IMSI) or an International Mobile Equipment Identity (IMEI), a base station Tracking Area Code (TAC), and the like, and the MME and the base station allocate an MME UE S1AP ID and an eNB UE S1AP ID to each user independently, and at this time, an identification device collects and caches the S1AP user identities and performs association caching with a unique identification code such as an IMSI and the like carried in the Initial Context Setup message.
Fig. 4 shows a signaling diagram for establishing a correspondence relationship between a user identifier S1AP and a unique identifier in an NSA network-accessing user identification method in an embodiment of the present disclosure.
As shown in fig. 4, S401, RRC connection establishment. The RRC connection establishment procedure includes, for example, an RRC connection Setup Request message sent by the UE to the LTE base station, an RRC connection Setup Response message sent by the LTE base station to the UE, and an RRC connection Setup Complete message sent by the UE to the LTE base station.
S402, the LTE base station sends an Initial UE message to the MME. The Initial UE message includes, for example, Attach Request, PDN connectivity Request messages, and user information such as S-TMSI, IMSI, or IMEI.
S403, perform authentication and NAS (Non Access Stratum) encryption procedures.
S404, the MME sends an Initial Context Setup Request message to the LTE base station. The Initial Context Setup Request Message includes, for example, Attach Accept, active default EPS bearer Context Request, UE Capability information Indication, Message Type (Message Type), eNB UE S1AP ID, TAI, etc., IMSI or IMEI.
S405, the acquisition device (network user identification device) acquires the Initial Context Setup Request message, analyzes the message to obtain the information of the ID, IMSI or IMEI of the eNB UE S1AP, and stores the corresponding relation among the ID, IMSI or IMEI of the eNB UE S1 AP.
S407, air interface encryption, capability reporting and RRC connection reconfiguration.
S408, the LTE base station sends an Initial Context Setup Response message to the MME. The Initial Context Setup Response message includes, for example, Attach Complete, default EPS bearer Context accept, MME UE S1AP ID, eNB UE S1AP ID, IMSI, IMEI information.
In one embodiment, the method may further include the steps of:
s409, the acquisition device acquires the Initial Context Setup Response message, analyzes the message to obtain the information of the MME UE S1AP ID, the eNB UE S1AP ID, the IMSI and the IMEI, and stores the corresponding relation of the MME UE S1AP ID, the eNB UE S1AP ID and the IMSI.
Fig. 5 shows a signaling diagram for determining that a subscriber is an NSA subscriber in an NSA subscriber identification method in an embodiment of the present disclosure. In this embodiment, the user identifier apparatus for logging on the internet collects S1-MME interface traffic, and caches the correspondence between the user' S MME UE S1AP ID, eNB UE S1AP ID, and the user identifier IMSI.
As shown in fig. 5, in S502, the NR base station transmits a Secondary RAT Data Usage Report Message to the LTE base station, where the Message includes a Message Type (Message Type), an MME UE S1AP ID, an eNB UE S1AP ID, a Secondary radio access Type use case Report list (Secondary RAT Usage Report list), and User Location Information (User Location Information).
S504, the LTE base station sends a Secondary RAT Data Usage Report message to the MME.
S506, the acquisition device acquires a Secondary RAT Data Usage Report message.
S508, the acquisition device obtains the SIAP user identification MME UE S1AP ID and eNB UE S1AP ID of the user by analyzing the Secondary RAT Data Usage Report message.
And S508, the acquisition device acquires the unique identification code corresponding to the SIAP user identification of the user based on the stored corresponding relation, so that the NSA network-logging user is determined.
Fig. 6 is a schematic diagram illustrating an NSA presence subscriber identity module according to an embodiment of the present disclosure.
As shown in fig. 6, the NSA presence subscriber identity device includes:
the traffic collection module 61 is configured to collect S1-MME interface traffic of a user;
a corresponding relationship establishing module 62, configured to establish and store a corresponding relationship between the S1AP user identifier of the user and the unique identifier code based on the initial context establishment message between the LTE base station and the MME. The Initial Context Setup message includes, for example, an Initial Context Setup Request message and an Initial Context Setup Response message. The S1AP user identities include, for example, an MME UE S1AP ID and/or an eNB UE S1AP ID. The unique identification code comprises, for example, an IMSI or IMEI.
A user identifier obtaining module 63, configured to obtain an S1AP user identifier of the user based on the collected Secondary RAT Data Usage Report message reported by the LTE base station;
and the network-accessing user determining module 64 is configured to determine, based on the stored correspondence between the S1AP user identifier and the unique identifier, the unique identifier corresponding to the S1AP user identifier of the user, so as to determine that the user corresponding to the unique identifier is an NSA network-accessing user.
In the above embodiment, the traffic collection module collects a message at the S1-MME interface, the correspondence relationship establishment module prestores a correspondence relationship between the S1AP user identifier of the user and the unique identifier, when the NSA user accesses the internet, the NSA base station generates a secondary radio access technology data usage report message, the secondary radio access technology data usage report message is reported to the MME through the LTE base station, and the network-accessing user determination module can determine the corresponding unique identifier based on the S1AP user identifier of the user carried in the message, thereby determining that the user is an NSA user, and thus determining that the user is an NSA user based on the internet traffic.
Through the scheme disclosed by the invention, NSA network-logging users can be identified, users who do not log on the NSA network can also be identified, and differential accurate marketing can be carried out on the NSA network-logging users and the users who do not log on the NSA network, so that the popularization and the application of 5G are facilitated.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 700 according to this embodiment of the invention is described below with reference to fig. 7. The electronic device 700 shown in fig. 7 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, electronic device 700 is embodied in the form of a general purpose computing device. The components of the electronic device 700 may include, but are not limited to: the at least one processing unit 710, the at least one memory unit 720, and a bus 730 that couples various system components including the memory unit 720 and the processing unit 710.
Wherein the storage unit stores program code that is executable by the processing unit 710 such that the processing unit 710 performs the steps according to various exemplary embodiments of the present invention as described in the above section "exemplary method" of the present specification. For example, the processing unit 710 may execute S302 shown in fig. 3, and collect S1-MME interface traffic of the user; s304, generating and storing the corresponding relation between the S1AP user identification and the unique identification code of the user based on the acquired initial context establishment message between the LTE base station and the MME; s306, acquiring an S1AP user identifier of the user based on the collected secondary wireless access technology data usage report message reported by the LTE base station; s308, determining the unique identification code corresponding to the S1AP user identification of the user based on the stored corresponding relation between the S1AP user identification and the unique identification code, thereby determining that the user corresponding to the unique identification code is an NSA network-logging user.
The storage unit 720 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)7201 and/or a cache memory unit 7202, and may further include a read only memory unit (ROM) 7203.
The storage unit 720 may also include a program/utility 7204 having a set (at least one) of program modules 7205, such program modules 7205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 730 may be any representation of one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 700 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 600, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 700 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 650. Also, the electronic device 700 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 760. As shown, the network adapter 760 communicates with the other modules of the electronic device 700 via the bus 730. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above section "exemplary methods" of the present description, when said program product is run on the terminal device.
The present disclosure describes a program product for implementing the above method according to an embodiment of the present invention, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A NSA log-on user identification method for non-independent networking is characterized by comprising the following steps:
collecting S1-MME interface flow of a user;
generating and storing a corresponding relation between an S1 application protocol S1AP user identification and a unique identification code of the user based on an acquired initial context establishment message between a Long Term Evolution (LTE) base station and a Mobility Management Entity (MME);
acquiring an S1AP user identifier of the user based on a secondary wireless access technology data usage report message reported by an LTE base station;
and determining the unique identification code corresponding to the S1AP user identification of the user based on the stored corresponding relation between the S1AP user identification and the unique identification code, thereby determining that the user corresponding to the unique identification code is the NSA network-logging user.
2. The NSA network-entering user identification method of claim 1, wherein the S1AP user ID comprises MME UE S1APID and/or eNB UE S1APID, the unique identification code comprises International Mobile Subscriber Identity (IMSI) or International Mobile Equipment Identity (IMEI), and the generating and storing the corresponding relationship between the S1AP user ID and the unique identification code of the user based on the initial context setup message between the LTE base station and the MME comprises:
obtaining an S1AP user identification and a unique identification code of the user based on an initial context establishment request message sent by an MME to an LTE base station;
and generating and storing the corresponding relation between the S1AP user identification of the user and the unique identification code.
3. The NSA network-entering user identification method of claim 1, wherein the S1AP user ID comprises MME UE S1APID and/or eNB UE S1APID, the unique identification code comprises IMSI or IMEI, and the generating and storing the corresponding relationship between the S1AP user ID and the unique identification code of the user based on the initial context setup message between the LTE base station and the MME comprises:
acquiring an S1AP user identifier and a unique identification code of the user based on an initial context establishment response message sent to an MME by an LTE base station;
and generating and storing the corresponding relation between the S1AP user identification of the user and the unique identification code.
4. The NSA network-registering user identification method according to claim 2 or 3, characterized in that, when a user attaches to a core network or modifies a bearer, the LTE base station is triggered to perform initial context setup message interaction with the MME.
5. The NSA network-accessing user identification method of claim 1, wherein when a 5G NSA user accesses the network, the NSA base station generates a secondary radio access technology data usage report message to report to the MME through the LTE base station, and the secondary radio access technology data usage report message carries the user' S MME UE S1APID and eNB UE S1AP ID.
6. An NSA on-line user identification device for non-independent networking, comprising:
the traffic collection module is used for collecting S1-MME interface traffic of a user;
a correspondence establishing module, configured to generate and store a correspondence between an S1AP user identifier of the user and the unique identifier code based on an initial context establishment message between a long term evolution LTE base station and an MME;
a subscriber identity obtaining module, configured to obtain an S1 application assistant S1AP subscriber identity of the subscriber based on a secondary radio access technology data usage report message reported by an LTE base station;
and the network-accessing user determining module is used for determining the unique identification code corresponding to the S1AP user identification of the user based on the stored corresponding relation between the S1AP user identification and the unique identification code, so that the user corresponding to the unique identification code is determined to be an NSA network-accessing user.
7. The NSA presence subscriber identity device of claim 6, wherein the S1AP subscriber identity comprises an MME UE S1APID and/or an eNB UE S1APID, and the unique identification code comprises an International Mobile Subscriber Identity (IMSI) or an International Mobile Equipment Identity (IMEI);
the corresponding relation establishing module is used for generating and storing the corresponding relation between the S1AP user identification and the unique identification code of the user based on the initial context establishing request message or the initial context establishing response message between the LTE base station and the MME.
8. The NSA presence subscriber identity device of claim 6 or 7, wherein the secondary radio access technology data usage report message is generated by the NSA base station and sent to the LTE base station when a 5G NSA subscriber logs on the internet, and the secondary radio access technology data usage report message carries an MME UE S1APID and an eNB UE S1AP ID of the subscriber.
9. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to execute the NSA logon user identification method according to any one of claims 1 to 5 via execution of the executable instructions.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the NSA presence subscriber identification method according to any one of claims 1 to 5.
CN202111616501.9A 2021-12-27 2021-12-27 Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users Pending CN114422998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111616501.9A CN114422998A (en) 2021-12-27 2021-12-27 Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111616501.9A CN114422998A (en) 2021-12-27 2021-12-27 Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users

Publications (1)

Publication Number Publication Date
CN114422998A true CN114422998A (en) 2022-04-29

Family

ID=81269736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111616501.9A Pending CN114422998A (en) 2021-12-27 2021-12-27 Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users

Country Status (1)

Country Link
CN (1) CN114422998A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116017411A (en) * 2022-12-16 2023-04-25 中国联合网络通信集团有限公司 Terminal identification method, device, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688633A (en) * 2019-01-12 2019-04-26 深圳市恒扬数据股份有限公司 Core network data acquisition system, method, apparatus and terminal device
CN112566101A (en) * 2020-12-08 2021-03-26 中国联合网络通信集团有限公司 5G terminal determination method and device based on non-independent networking NSA
CN112637799A (en) * 2020-12-16 2021-04-09 中国联合网络通信集团有限公司 5G terminal identification method and device
CN113038404A (en) * 2019-12-09 2021-06-25 中国电信股份有限公司 Flow charging method and system under non-independent networking network
CN113133017A (en) * 2021-04-07 2021-07-16 中国移动通信集团陕西有限公司 Target user determination method, device, equipment and medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688633A (en) * 2019-01-12 2019-04-26 深圳市恒扬数据股份有限公司 Core network data acquisition system, method, apparatus and terminal device
CN113038404A (en) * 2019-12-09 2021-06-25 中国电信股份有限公司 Flow charging method and system under non-independent networking network
CN112566101A (en) * 2020-12-08 2021-03-26 中国联合网络通信集团有限公司 5G terminal determination method and device based on non-independent networking NSA
CN112637799A (en) * 2020-12-16 2021-04-09 中国联合网络通信集团有限公司 5G terminal identification method and device
CN113133017A (en) * 2021-04-07 2021-07-16 中国移动通信集团陕西有限公司 Target user determination method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "R3-184239", 3GPP TSG-RAN WG3 NR ADHOC 1807, 6 July 2018 (2018-07-06), pages 9 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116017411A (en) * 2022-12-16 2023-04-25 中国联合网络通信集团有限公司 Terminal identification method, device, server and storage medium
CN116017411B (en) * 2022-12-16 2024-03-01 中国联合网络通信集团有限公司 Terminal identification method, device, server and storage medium

Similar Documents

Publication Publication Date Title
EP3665877B1 (en) A private mobile edge computing data center in a telecommunication network
US11102827B2 (en) Information notification method and mobile communication system
EP3598791A1 (en) Communication system, base station, communication method, and non-transitory computer readable medium storing program
US20210219299A1 (en) Communication Method and Device
US20200275258A1 (en) Communications method and apparatus
EP4195744A1 (en) Measurement method and device, communication node, and storage medium
CN101600150A (en) A kind of mobile terminal positioning method and mobile positioning center
US20140323088A1 (en) Telecommunication method and telecommunication system
JPWO2018131413A1 (en) Mobile communication system and congestion control method
US20200187060A1 (en) Methods and Systems for Routing Mobile Data Traffic in 5G Networks
CN114726829A (en) Communication method, user plane gateway and communication system
JP6768116B2 (en) Communication control device selection method and communication system
CN114422998A (en) Method, device, electronic equipment and medium for identifying non-independent networking and network-climbing users
CN113039523A (en) Implementation of core cellular network stack on cloud infrastructure
Silveira et al. Tutorial on communication between access networks and the 5G core
CN114339872A (en) Method and device for identifying unmanned aerial vehicle, mobile management entity and base station
CN114302464A (en) QoS mapping method, device, storage medium and electronic equipment
CN110381495B (en) Roaming limiting method and device
KR102014101B1 (en) Method and Apparatus for Providing Roaming Service based on Network Slicing
CN115942239A (en) Positioning method, apparatus and storage medium
CN113453215B (en) Method and device for acquiring terminal identification
CN112449377B (en) Network data reporting method and device
CN114501304A (en) Near-field communication method, device, storage medium and electronic equipment
CN114025396B (en) Data processing method, device and medium
CN104580397B (en) Page access method and the network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination