CN1684426B - Method for network service entity for managing session affairs mark and its correspondent information - Google Patents

Method for network service entity for managing session affairs mark and its correspondent information Download PDF

Info

Publication number
CN1684426B
CN1684426B CN 200410033818 CN200410033818A CN1684426B CN 1684426 B CN1684426 B CN 1684426B CN 200410033818 CN200410033818 CN 200410033818 CN 200410033818 A CN200410033818 A CN 200410033818A CN 1684426 B CN1684426 B CN 1684426B
Authority
CN
China
Prior art keywords
tid
corresponding informance
database
information
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200410033818
Other languages
Chinese (zh)
Other versions
CN1684426A (en
Inventor
黄迎新
张文林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200410033818 priority Critical patent/CN1684426B/en
Priority to PCT/CN2005/000493 priority patent/WO2005101723A1/en
Publication of CN1684426A publication Critical patent/CN1684426A/en
Application granted granted Critical
Publication of CN1684426B publication Critical patent/CN1684426B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)

Abstract

This invention provides a method for a network service entity management session matter marker and its related information. The key point is that when a TID is invalid, it is not cancelled by NAF immediately but is kept for a period of time so as to prevent the network signaling resources from waste. When a user uses said invalid TID again, NAF can design the time for keeping the invalid TID and its related information to preserve the storage load of NAF at a reasonable situation.

Description

The method of a kind of Network entity management conversation affair mark and corresponding informance thereof
Technical field
The present invention relates to third generation wireless communication technology field, be meant the method for a kind of Network entity management conversation affair mark and corresponding informance thereof especially.
Background technology
In third generation wireless communication standard, general authentication framework is that of multiple applied business entity use is used to finish the universal architecture that user identity is verified, uses general authentication framework and can realize checking and identity verification using professional user.Above-mentioned multiple applied business can be that multicast/broadcast business, user certificate business, information provide business etc. immediately, it also can be agent service, for example a plurality of services link to each other with an agency, this general authentication framework also is used as a kind of business to the agency and is handled, institutional framework can be very flexible, and, can use general authentication framework too for later business newly developed and check and identity verification using professional user.
Figure 1 shows that the structural representation of general authentication framework.General authentication framework is made up of entity (BSF) 102, the user attaching webserver (HSS) 103 and the network application entity (NAF) 104 of user 101, the checking of execution user identity initial inspection usually.BSF 102 is used for carrying out mutual identity verification with user 101, generates BSF 102 and user's 101 shared key simultaneously; Store description (Profile) file that is used to describe user profile among the HSS 103, HSS 103 also has the function that produces authentication information concurrently simultaneously.
When the user need use certain professional, if it knows that this service needed carries out mutual authentication process to BSF, then directly carry out mutual authentication to BSF, otherwise, the user can at first get in touch with certain professional corresponding NAF, need the user to carry out authentication if this NAF uses general authentication framework, then notify the user to use general authentication framework and carry out authentication, otherwise carry out other respective handling to BSF.
The card process of recognizing each other between user and the BSF is: after BSF receives authentication request from the user, at first obtain this user's authentication information to HSS, then and carry out authentication between the user and key agreement protocol (AKA) carries out mutual authentication.Behind the authentication success, authenticated identity between user and the BSF mutually and generated shared key K s simultaneously.Afterwards, BSF distributes a conversation affair mark (TID) to give the user, and this TID is associated with Ks.
The user sends connection request to NAF after receiving this TID again, and has carried this TID in the request message.After NAF receives request, earlier at local this TID that whether has the user to carry of inquiry, if NAF can not then inquire about to BSF at local search to this TID.After BSF inquires this TID, is set effective time at first for the key information of this TID correspondence, the valid expiration date with this TID, this TID counterpart keys information and the key information that has been provided with is included in the success response message that sends to NAF then.After NAF receives success response message from BSF, think that promptly this user is the validated user through B SF authentication, NAF and user have also shared key information simultaneously, i.e. the Ks or the key of being derived by Ks.At this moment, NAF is kept at applied TID of this user and the key information corresponding with this TID in the local database, and local data base will respond according to the setting of self, and this preserves the operation success or not with notice NAF.Afterwards, NAF communicates by letter normally with this user.
If BSF can not then notify NAF not this user's information at local search to this TID, at this moment, NAF will notify the user to carry out authentication to BSF.
If NAF has arrived this TID at local search, then judge the pairing key K s of this TID again or whether be in the effective time that BSF sets by the key that Ks derives, if then communicate by letter normally with this user, otherwise send after this user authenticates the notice of new key more again to BSF, interrupt and this user's communications.Simultaneously, NAF is designated forbidding with this TID and pairing key information thereof, or directly deletes this TID and pairing key information thereof from this locality.
The defective of said method is: if NAF is designated forbidding with inefficacy TID and corresponding informance thereof, then NAF need preserve failed TID always, and the renewal of TID may be very frequent, NAF just need take a large amount of invalid TID of efficient resource preservation of itself so, makes also that simultaneously the speed of the local TID of retrieval is very slow.
If NAF directly deletes inefficacy TID and corresponding informance thereof, then following situation may appear: when the user uses expired TID requested service, because this TID information is not stored in NAF this locality, then must not retrieve less than BSF, because what NAF retrieved all is invalid information, this must cause the waste of signal resource; When using TID requested service out of date than the multi-user, with occur NAF frequent to lost efficacy the situation of TID of BSF retrieval, this will make the service ability of NAF itself descend, and can not the phenomenon of similar Denial of Service attack promptly will occur for NAF normally for the user provides service.
Summary of the invention
In view of this, the object of the present invention is to provide the method for a kind of Network entity management conversation affair mark and corresponding informance thereof.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of a kind of Network entity management conversation affair mark and corresponding informance thereof, this method may further comprise the steps:
A, the deletion condition is set for each lost efficacy TID and corresponding informance thereof;
When b, Network entity NAF preserve a new TID and corresponding informance thereof in this locality, judge whether local database is full, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise directly in local data base, preserve this new TID and corresponding informance thereof.
Preferably, the described deletion condition of step a is not access count value maximum; The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
Preferably, the computational methods of described not access count value are: if the TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the not access count value of this lost efficacy TID and corresponding informance thereof is subtracted 1.
Preferably, the described deletion condition of step a is for arriving deletion time or the most approaching deletion time; The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
Preferably, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
Preferably, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information,, then inquire about this new TID information to BSF if local do not have this new TID information; The Query Result that returns according to the entity B SF that carries out the checking of user identity initial inspection at described new TID information, judge whether described BSF inquires described new TID information, if, then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, before described step b, also comprise: judge whether described new TID lost efficacy, if then definite described new TID and corresponding informance thereof had lost efficacy and had continued to carry out described step b.
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
The method of a kind of Network entity management conversation affair mark and corresponding informance thereof, this method may further comprise the steps:
A, the deletion condition is set for each lost efficacy TID and corresponding informance thereof;
B, Network entity NAF are after a new TID and corresponding informance thereof is preserved in this locality, judge whether that the preservation failure reason value that receives from error processing system is the information of the full preservation failure of database, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise do not process.
Preferably, the described deletion condition of step a is not access count value maximum;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
Preferably, the computational methods of described not access count value are: if the new TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the not access count value of this lost efficacy TID and corresponding informance thereof is subtracted 1.
Preferably, the described deletion condition of step a is for arriving deletion time or the most approaching deletion time;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
Preferably, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
Preferably, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information,, then inquire about this new TID information to BSF if local do not have this new TID information; The Query Result that returns according to BSF at described new TID information, judge whether described BSF inquires described new TID information, if then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
Use the present invention, after certain TID lost efficacy, NAF was immediately with its deletion, but preserved after a period of time again with its deletion, thereby when having prevented that the user from reusing this invalid TID, the waste of the network signal resource that is brought.Simultaneously, NAF can set the time of preserving invalid TID and corresponding informance thereof neatly according to the size of local storage capacity, makes the memory load of NAF can remain on a more rational situation.In addition, though at NAF under the situation that BSF inquiry TID does not find, also this TID is carried out the preservation of a period of time, avoided the situation of the Denial of Service attack that may occur.
Description of drawings
Figure 1 shows that the structural representation of general authentication framework;
Figure 2 shows that the flow chart of using embodiments of the invention one;
Figure 3 shows that the flow chart of using embodiments of the invention two;
Figure 4 shows that the flow chart of using embodiments of the invention three;
Figure 5 shows that the flow chart of using embodiments of the invention four.
Embodiment
For making technical scheme of the present invention clearer, again the present invention is done detailed description further below in conjunction with accompanying drawing.
Thinking of the present invention is: after certain TID lost efficacy, NAF was immediately with its deletion, but it is preserved deletion again after a period of time.Thereby when having prevented that the user from reusing this invalid TID, the waste of the network signal resource that is brought.Simultaneously, NAF can set the time of preserving invalid TID and corresponding informance thereof neatly according to the size of local storage capacity, makes the memory load of NAF can remain on a more rational situation.In addition, though at NAF under the situation that BSF inquiry TID does not find, also this TID is carried out the preservation of a period of time, avoided the situation of the Denial of Service attack that may occur.
Among first and second embodiment below, suppose that NAF has safeguarded two databases, one of them deposits effective TID and corresponding information thereof, and another deposits failed TID and corresponding information thereof, and the maximum storage of depositing the database of inefficacy TID and corresponding informance thereof is fixed.After certain TID lost efficacy, this TID and corresponding informance thereof are designated forbidding, and it is transferred in the database of depositing inefficacy TID and corresponding informance thereof, if this database is full, before the TID and corresponding informance thereof of a new inefficacy of then every storage, the TID and the corresponding informance thereof of not accessed count value maximum in this database are deleted, or will be arrived TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time.Concrete realization flow is referring to Fig. 1 and Fig. 2.
Figure 2 shows that the flow chart of using embodiments of the invention one.
Step 201 after NAF receives the service request that comprises TID information, at first judges in the database of depositing effective TID and corresponding informance thereof whether this TID information that receives is arranged, if having, then execution in step 202, otherwise execution in step 207;
Step 202, whether judge that this TID is current lost efficacy, if then execution in step 203, otherwise execution in step 212 is communicated by letter normally with this user, and is handled according to old process;
Step 203 judges whether the database of depositing failed TID and corresponding informance thereof is full, if then execution in step 204, otherwise execution in step 205;
Step 204 is deleted the TID and the corresponding informance thereof of not access count value maximum in the database, or will arrive TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time, and then execution in step 205;
Step 205, this TID that receives is designated forbidding, and this TID and corresponding information thereof put into the database of depositing failed TID and corresponding informance thereof, simultaneously, this TID of deletion and corresponding informance thereof be not (if inquire this TID from BSF in the database of depositing effective TID and corresponding informance thereof, and the deletion condition of this TID is set step that should deletion then);
If the deletion condition is a not access count value, then the not access count value of this TID that deposits at last and corresponding informance thereof is set to 0, and the not access count value with TID all in this database and corresponding informance thereof adds 1 then; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 206, notice sends the user of service request, and after its applied TID had lost efficacy, execution in step 212 entered initial condition, handles according to old process;
Step 207 judges in the database of depositing failed TID and corresponding informance thereof whether this TID information is arranged, if having, then execution in step 208, otherwise execution in step 209;
Step 208, change deletion condition, if i.e. deletion condition is a not access count value, then the not access count value with this TID subtracts one, if the deletion condition is the deletion time, then the deletion time with this TID prolongs according to setting, execution in step 206 then;
Step 209, NAF inquires about this TID information to BSF;
Step 210, if BSF returns success the message that inquires TID information, then execution in step 211, otherwise return step 203;
Step 211, after NAF was saved in this TID and corresponding informance thereof in the database of depositing effective TID and corresponding informance thereof, execution in step 212 was communicated by letter normally with this user, and is handled by existing procedure;
Step 212 is handled by existing procedure.
Above-mentioned flow process is applicable to NAF judges at first whether the database of depositing lost efficacy TID and corresponding informance thereof is full, and then implements the situation of storage operation.
Figure 3 shows that the flow chart of using the embodiment of the invention two.
Step 301 after NAF receives the service request that comprises TID information, at first judges in the database of depositing effective TID and corresponding informance thereof whether this TID information that receives is arranged, if having, then execution in step 302, otherwise execution in step 307;
Step 302, whether judge that this TID is current lost efficacy, if then execution in step 303, otherwise execution in step 312 is communicated by letter normally with this user, and is handled according to old process;
Step 303 is designated forbidding with this TID, and this TID and corresponding information thereof are put into the database of depositing failed TID and corresponding informance thereof;
Step 304, judge whether system returns the successful message of preservation, if, then in the database of depositing effective TID and corresponding informance thereof, delete this TID and corresponding informance thereof (if from BSF, do not inquire this TID, then be not somebody's turn to do the step of deletion), and the deletion condition of this TID is set, otherwise, be the full failed message of database then execution in step 305 if system returns cause value;
If the deletion condition is a not access count value, then the not access count value of this TID that deposits at last and corresponding informance thereof is set to 0, and the not access count value with TID all in this database and corresponding informance thereof adds 1 then; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 305, TID and corresponding informance deletion thereof with not access count value maximum in the database, or will arrive the TID of deletion time or the most approaching deletion time and corresponding informance deletion thereof, perhaps, NAF sends warning message to system, the solicit operation maintenance console participates in, for example manually delete by the Operation and Maintenance personnel, some TID, and modification is provided with the parameter of deletion condition etc., can often be maintained in undersaturated condition so that preserve the database of inefficacy TID, return step 303 then;
Step 306, notice sends the user of service request, and after its applied TID had lost efficacy, execution in step 312 entered initial condition, handles according to old process;
Step 307 judges in the database of depositing failed TID and corresponding informance thereof whether this TID information is arranged, if having, then execution in step 308, otherwise execution in step 309;
Step 308, change deletion condition, if i.e. deletion condition is a not access count value, then the not access count value with this TID subtracts one, if the deletion condition is the deletion time, then the deletion time with this TID prolongs according to setting, execution in step 306 then;
Step 309, NAF inquires about this TID information to BSF;
Step 310, if BSF returns success the message that inquires this TID information, then execution in step 311, otherwise return step 303;
Step 311, after NAF was saved in this TID and corresponding informance thereof in the database of depositing effective TID and corresponding informance thereof, execution in step 312 was communicated by letter normally with this user, and is handled by existing procedure;
Step 312 is handled by existing procedure.
Above-mentioned flow process is applicable to that NAF did not judge the state of database when TID and corresponding informance thereof have been lost efficacy in preservation, but directly implements the situation of storage operation.If system returns owing to database is full and deposits failure information in, then according to the deletion condition deletion TID and the corresponding informance thereof that have been provided with, perhaps, NAF sends warning to system to NAF again, and the solicit operation attendant handles.
In third and fourth embodiment, suppose that NAF this locality has only a database.After certain TID lost efficacy, after this TID and corresponding informance thereof be designated forbidding, the deletion condition of this TID and corresponding informance thereof sign is set, if this database is full, before new TID and corresponding informance thereof of then every storage, the TID and the corresponding informance thereof of not accessed count value maximum in this database are deleted, or will be arrived TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time.Concrete realization flow such as Fig. 4 are shown in Figure 5.
Figure 4 shows that the flow chart of using embodiments of the invention three.
Step 401 after NAF receives the service request that comprises TID information, is judged the local information whether this TID is arranged, if having, then execution in step 402, otherwise execution in step 407;
Step 402, NAF judges whether the identification information of this TID is forbidding, if then execution in step 403, otherwise execution in step 404;
Step 403, change deletion condition, if i.e. deletion condition is a not access count value, then the not access count value with this TID subtracts one, if the deletion condition is the deletion time, then the deletion time with this TID prolongs according to setting, execution in step 406 then;
Whether step 404 is judged that this TID is current also to be in the term of validity, if then execution in step 415, otherwise execution in step 405;
Step 405 is designated forbidding with this TID, and the deletion condition of this TID is set;
If the deletion condition is a not access count value, then the not access count value of this TID that deposits at last and corresponding informance thereof is set to 0, then the TID of all sign forbiddings and the not access count value of corresponding informance thereof in this database is added 1; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 406, notice sends the user of service request, and after its applied TID had lost efficacy, execution in step 415 entered initial condition, handles according to old process;
Step 407, NAF inquires about this TID information to BSF;
Step 408 according to the Query Result that BSF returns, judges whether BSF inquires the information of this TID, if BSF inquires this TID information, then execution in step 412, if BSF does not inquire this TID information, then execution in step 409;
Step 409, NAF judges whether local data base is full, if then execution in step 410, otherwise execution in step 411;
Step 410 is deleted the TID and the corresponding informance thereof of not access count value maximum in the database, or will arrive TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time;
Step 411, this TID is designated forbidding, in database, preserve this TID, and the deletion condition of this TID is set, if i.e. deletion condition is a not access count value, then not access count value of this TID is set to 0, then the TID of all sign forbiddings and the not access count value of corresponding informance thereof in this database are added 1, if the deletion condition is the deletion time, the deletion time of this TID then is set, execution in step 406 then;
Step 412, NAF judges whether local data base is full, if then execution in step 413, otherwise execution in step 414;
Step 413 is deleted the TID and the corresponding informance thereof of not access count value maximum in the database, or TID and the corresponding informance thereof of the most approaching deletion time are deleted;
Step 414, with this TID and corresponding message identification thereof be available after, be kept in the local database, execution in step 406 then;
Step 415 is handled according to existing procedure.
Above-mentioned flow process is applicable to NAF judges at first whether the database of depositing lost efficacy TID and corresponding informance thereof is full, and then implements the situation of storage operation.
Figure 5 shows that the flow chart of using embodiments of the invention four.
Step 501 after NAF receives the service request that comprises TID information, is judged the local information whether this TID is arranged, if having, then execution in step 502, otherwise execution in step 507;
Step 502, NAF judges whether the identification information of this TID is forbidding, if then execution in step 503, otherwise execution in step 504;
Step 503, change deletion condition, if the deletion condition is a not access count value, then the not access count value with this TID subtracts one, if the deletion condition is the deletion time, then the deletion time with this TID prolongs according to setting, execution in step 506 then;
Whether step 504 is judged that this TID is current also to be in the term of validity, if then execution in step 513, otherwise execution in step 505;
Step 505 is designated forbidding with this TID, and the deletion condition of this TID is set;
If the deletion condition is a not access count value, then the not access count value of this TID and corresponding informance thereof is set to 0, then with all are designated the TID of forbidding and the not access count value of corresponding informance adds 1 in this database; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 506, notice sends the user of service request, and after its applied TID had lost efficacy, execution in step 513 entered initial condition, handles according to old process;
Step 507, NAF inquires about this TID information to BSF;
Step 508 according to the Query Result that BSF returns, judges whether BSF inquires the information of this TID, if BSF inquires this TID information, then execution in step 509, if BSF does not inquire this TID information, then execution in step 512;
Step 509 is designated this TID available, and this TID and corresponding informance thereof are kept in the local data base;
Step 510 judges whether system returns the successful message of preservation, if, then execution in step 513, communicate by letter normally with this user, and handle by existing procedure, to return cause value be then execution in step 511 of the full failed message of database in system else if;
Step 511, TID and corresponding informance deletion thereof with not access count value maximum in the database, or will arrive the TID of deletion time or the most approaching deletion time and corresponding informance deletion thereof, perhaps, NAF sends warning message to system, the solicit operation maintenance console participates in, for example manually delete by the Operation and Maintenance personnel, some TID, and modification is provided with the parameter of deletion condition etc., can often be maintained in undersaturated condition so that preserve the database of inefficacy TID, return step 509 then;
Step 512 is designated forbidding with this TID, and after the deletion condition of this TID and corresponding informance thereof is set, preserves this TID and corresponding informance thereof in local data base, returns step 510 then;
Step 513 is handled according to existing procedure.
Above-mentioned flow process is applicable to that NAF did not judge the state of database when TID and corresponding informance thereof have been lost efficacy in preservation, but directly implements the situation of storage operation.If system returns owing to database is full and deposits failure information in, then according to the deletion condition deletion TID and the corresponding informance thereof that have been provided with, perhaps, NAF sends warning to system to NAF again, and the solicit operation attendant handles.
For above-mentioned all embodiment, when the deletion condition is deletion during the time, as long as certain TID and corresponding information thereof arrive the deletion time, database also can be deleted this TID and corresponding information thereof automatically.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (16)

1. the method for Network entity management conversation affair mark and corresponding informance thereof is characterized in that this method may further comprise the steps:
A, failed session Transaction Identifier TID and corresponding informance thereof are provided with the deletion condition for each;
When b, Network entity NAF preserve a new TID and corresponding informance thereof in this locality, judge whether local database is full, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise directly in local data base, preserve this new TID and corresponding informance thereof.
2. method according to claim 1 is characterized in that,
The described deletion condition of step a is not access count value maximum;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
3. method according to claim 2, it is characterized in that, the computational methods of described not access count value are: if the TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
4. method according to claim 3 is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the not access count value of this lost efficacy TID and corresponding informance thereof is subtracted 1.
5. method according to claim 1 is characterized in that,
The described deletion condition of step a is for arriving deletion time or the most approaching deletion time;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
6. method according to claim 5, it is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
7. according to any described method of claim 1~6, it is characterized in that, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
8. method according to claim 7, it is characterized in that, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, if local do not have this new TID information, then inquire about this new TID information to BSF; The Query Result that returns according to the entity B SF that carries out the checking of user identity initial inspection at described new TID information, judge whether described BSF inquires described new TID information, if, then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
9. the method for Network entity management conversation affair mark and corresponding informance thereof is characterized in that this method may further comprise the steps:
A, the deletion condition is set for each lost efficacy TID and corresponding informance thereof;
B, Network entity NAF are after a new TID and corresponding informance thereof is preserved in this locality, judge whether that the preservation failure reason value that receives from error processing system is the information of the full preservation failure of database, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise do not process.
10. method according to claim 9 is characterized in that,
The described deletion condition of step a is not access count value maximum;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
11. method according to claim 10, it is characterized in that, the computational methods of described not access count value are: if the new TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
12. method according to claim 11, it is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the count value that visits of this lost efficacy TID and corresponding informance thereof is subtracted 1.
13. method according to claim 9 is characterized in that,
The described deletion condition of step a is for arriving deletion time or the most approaching deletion time;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
14. method according to claim 13, it is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
15. according to any described method of claim 9~14, it is characterized in that, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
16. method according to claim 15, it is characterized in that, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, if local do not have this new TID information, then inquire about this new TID information to BSF; The Query Result that returns according to BSF at described new TID information, judge whether described BSF inquires described new TID information, if then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
CN 200410033818 2004-04-14 2004-04-14 Method for network service entity for managing session affairs mark and its correspondent information Expired - Fee Related CN1684426B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200410033818 CN1684426B (en) 2004-04-14 2004-04-14 Method for network service entity for managing session affairs mark and its correspondent information
PCT/CN2005/000493 WO2005101723A1 (en) 2004-04-14 2005-04-13 A method for network application function to manage the session traffic identification and the corresponding information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410033818 CN1684426B (en) 2004-04-14 2004-04-14 Method for network service entity for managing session affairs mark and its correspondent information

Publications (2)

Publication Number Publication Date
CN1684426A CN1684426A (en) 2005-10-19
CN1684426B true CN1684426B (en) 2010-04-28

Family

ID=35150324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410033818 Expired - Fee Related CN1684426B (en) 2004-04-14 2004-04-14 Method for network service entity for managing session affairs mark and its correspondent information

Country Status (2)

Country Link
CN (1) CN1684426B (en)
WO (1) WO2005101723A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1321013A (en) * 2000-03-17 2001-11-07 索尼公司 Information announcing system, receiving apparatus, listing form, clearing and storing method
WO2002013016A1 (en) * 2000-08-08 2002-02-14 Wachovia Corporation Internet third-party authentication using electronic tickets
CN1410891A (en) * 2001-09-21 2003-04-16 Lg电子株式会社 Overload controlling method for use in realtime treating system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010055173A (en) * 1999-12-09 2001-07-04 오길록 System for controlling internetworking advanced intelligent network and internet in intelligent peripheral of advanced intelligent network and method using the same
JP4430213B2 (en) * 2000-08-22 2010-03-10 ミサワホーム株式会社 Component information processing method, apparatus, system, and recording medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1321013A (en) * 2000-03-17 2001-11-07 索尼公司 Information announcing system, receiving apparatus, listing form, clearing and storing method
WO2002013016A1 (en) * 2000-08-08 2002-02-14 Wachovia Corporation Internet third-party authentication using electronic tickets
CN1410891A (en) * 2001-09-21 2003-04-16 Lg电子株式会社 Overload controlling method for use in realtime treating system

Also Published As

Publication number Publication date
WO2005101723A1 (en) 2005-10-27
CN1684426A (en) 2005-10-19

Similar Documents

Publication Publication Date Title
US7877493B2 (en) Method of validating requests for sender reputation information
CN1711784B (en) System and method for sending SMS and text messages
CN101626563B (en) Data storage system in communication network and information processing method
CN104243472A (en) Network with MAC table overflow protection
CN105812482B (en) The sharing method and server platform of communication information
CN101627407A (en) Reachability realizing server, management system, management method and realization program
CN101552989B (en) A user data configuration method, system and mobile line configuration gateway
US20020120872A1 (en) Internet roaming method
CN107870982A (en) Data processing method, system and computer-readable recording medium
CN105991592A (en) Same-natural-person identity maintenance method and apparatus, and server
CN1300976C (en) Method for obtaining user identification information for network application entity
CN107426154A (en) A kind of method for managing black list
CN100576848C (en) Distribution-type data dynamic program agent method
WO2010131482A1 (en) Database device, database matching system, and database matching method
CN101605301A (en) A kind of group system and request message distribution method that carries out the multinode transaction
CN1684426B (en) Method for network service entity for managing session affairs mark and its correspondent information
KR20010046483A (en) Apparatus and method of processing mobility for packet services
CN100413248C (en) Improved method and system for carrying out charging based on flow
CN100512137C (en) A method for deleting session transaction ID and related information
US7881735B2 (en) Messaging gateway and method
CN102148688A (en) Charging method and NAS (Network Access Server)
CN115080994A (en) Block chain cross-chain gateway data interaction method based on time locking and middleboxes
CN101345648B (en) Solution method of data inconsistency
CN116095081A (en) Event processing method and device based on block chain system, equipment and medium
CN104918221A (en) Terminal peripheral login, logout and standby processing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100428

Termination date: 20200414

CF01 Termination of patent right due to non-payment of annual fee