CN1684426B - Method for network service entity for managing session affairs mark and its correspondent information - Google Patents
Method for network service entity for managing session affairs mark and its correspondent information Download PDFInfo
- Publication number
- CN1684426B CN1684426B CN 200410033818 CN200410033818A CN1684426B CN 1684426 B CN1684426 B CN 1684426B CN 200410033818 CN200410033818 CN 200410033818 CN 200410033818 A CN200410033818 A CN 200410033818A CN 1684426 B CN1684426 B CN 1684426B
- Authority
- CN
- China
- Prior art keywords
- tid
- corresponding informance
- database
- information
- new
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
This invention provides a method for a network service entity management session matter marker and its related information. The key point is that when a TID is invalid, it is not cancelled by NAF immediately but is kept for a period of time so as to prevent the network signaling resources from waste. When a user uses said invalid TID again, NAF can design the time for keeping the invalid TID and its related information to preserve the storage load of NAF at a reasonable situation.
Description
Technical field
The present invention relates to third generation wireless communication technology field, be meant the method for a kind of Network entity management conversation affair mark and corresponding informance thereof especially.
Background technology
In third generation wireless communication standard, general authentication framework is that of multiple applied business entity use is used to finish the universal architecture that user identity is verified, uses general authentication framework and can realize checking and identity verification using professional user.Above-mentioned multiple applied business can be that multicast/broadcast business, user certificate business, information provide business etc. immediately, it also can be agent service, for example a plurality of services link to each other with an agency, this general authentication framework also is used as a kind of business to the agency and is handled, institutional framework can be very flexible, and, can use general authentication framework too for later business newly developed and check and identity verification using professional user.
Figure 1 shows that the structural representation of general authentication framework.General authentication framework is made up of entity (BSF) 102, the user attaching webserver (HSS) 103 and the network application entity (NAF) 104 of user 101, the checking of execution user identity initial inspection usually.BSF 102 is used for carrying out mutual identity verification with user 101, generates BSF 102 and user's 101 shared key simultaneously; Store description (Profile) file that is used to describe user profile among the HSS 103, HSS 103 also has the function that produces authentication information concurrently simultaneously.
When the user need use certain professional, if it knows that this service needed carries out mutual authentication process to BSF, then directly carry out mutual authentication to BSF, otherwise, the user can at first get in touch with certain professional corresponding NAF, need the user to carry out authentication if this NAF uses general authentication framework, then notify the user to use general authentication framework and carry out authentication, otherwise carry out other respective handling to BSF.
The card process of recognizing each other between user and the BSF is: after BSF receives authentication request from the user, at first obtain this user's authentication information to HSS, then and carry out authentication between the user and key agreement protocol (AKA) carries out mutual authentication.Behind the authentication success, authenticated identity between user and the BSF mutually and generated shared key K s simultaneously.Afterwards, BSF distributes a conversation affair mark (TID) to give the user, and this TID is associated with Ks.
The user sends connection request to NAF after receiving this TID again, and has carried this TID in the request message.After NAF receives request, earlier at local this TID that whether has the user to carry of inquiry, if NAF can not then inquire about to BSF at local search to this TID.After BSF inquires this TID, is set effective time at first for the key information of this TID correspondence, the valid expiration date with this TID, this TID counterpart keys information and the key information that has been provided with is included in the success response message that sends to NAF then.After NAF receives success response message from BSF, think that promptly this user is the validated user through B SF authentication, NAF and user have also shared key information simultaneously, i.e. the Ks or the key of being derived by Ks.At this moment, NAF is kept at applied TID of this user and the key information corresponding with this TID in the local database, and local data base will respond according to the setting of self, and this preserves the operation success or not with notice NAF.Afterwards, NAF communicates by letter normally with this user.
If BSF can not then notify NAF not this user's information at local search to this TID, at this moment, NAF will notify the user to carry out authentication to BSF.
If NAF has arrived this TID at local search, then judge the pairing key K s of this TID again or whether be in the effective time that BSF sets by the key that Ks derives, if then communicate by letter normally with this user, otherwise send after this user authenticates the notice of new key more again to BSF, interrupt and this user's communications.Simultaneously, NAF is designated forbidding with this TID and pairing key information thereof, or directly deletes this TID and pairing key information thereof from this locality.
The defective of said method is: if NAF is designated forbidding with inefficacy TID and corresponding informance thereof, then NAF need preserve failed TID always, and the renewal of TID may be very frequent, NAF just need take a large amount of invalid TID of efficient resource preservation of itself so, makes also that simultaneously the speed of the local TID of retrieval is very slow.
If NAF directly deletes inefficacy TID and corresponding informance thereof, then following situation may appear: when the user uses expired TID requested service, because this TID information is not stored in NAF this locality, then must not retrieve less than BSF, because what NAF retrieved all is invalid information, this must cause the waste of signal resource; When using TID requested service out of date than the multi-user, with occur NAF frequent to lost efficacy the situation of TID of BSF retrieval, this will make the service ability of NAF itself descend, and can not the phenomenon of similar Denial of Service attack promptly will occur for NAF normally for the user provides service.
Summary of the invention
In view of this, the object of the present invention is to provide the method for a kind of Network entity management conversation affair mark and corresponding informance thereof.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of a kind of Network entity management conversation affair mark and corresponding informance thereof, this method may further comprise the steps:
A, the deletion condition is set for each lost efficacy TID and corresponding informance thereof;
When b, Network entity NAF preserve a new TID and corresponding informance thereof in this locality, judge whether local database is full, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise directly in local data base, preserve this new TID and corresponding informance thereof.
Preferably, the described deletion condition of step a is not access count value maximum; The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
Preferably, the computational methods of described not access count value are: if the TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the not access count value of this lost efficacy TID and corresponding informance thereof is subtracted 1.
Preferably, the described deletion condition of step a is for arriving deletion time or the most approaching deletion time; The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
Preferably, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
Preferably, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information,, then inquire about this new TID information to BSF if local do not have this new TID information; The Query Result that returns according to the entity B SF that carries out the checking of user identity initial inspection at described new TID information, judge whether described BSF inquires described new TID information, if, then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, before described step b, also comprise: judge whether described new TID lost efficacy, if then definite described new TID and corresponding informance thereof had lost efficacy and had continued to carry out described step b.
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
The method of a kind of Network entity management conversation affair mark and corresponding informance thereof, this method may further comprise the steps:
A, the deletion condition is set for each lost efficacy TID and corresponding informance thereof;
B, Network entity NAF are after a new TID and corresponding informance thereof is preserved in this locality, judge whether that the preservation failure reason value that receives from error processing system is the information of the full preservation failure of database, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise do not process.
Preferably, the described deletion condition of step a is not access count value maximum;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
Preferably, the computational methods of described not access count value are: if the new TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the not access count value of this lost efficacy TID and corresponding informance thereof is subtracted 1.
Preferably, the described deletion condition of step a is for arriving deletion time or the most approaching deletion time;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
Preferably, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
Preferably, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
Preferably, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information,, then inquire about this new TID information to BSF if local do not have this new TID information; The Query Result that returns according to BSF at described new TID information, judge whether described BSF inquires described new TID information, if then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
Use the present invention, after certain TID lost efficacy, NAF was immediately with its deletion, but preserved after a period of time again with its deletion, thereby when having prevented that the user from reusing this invalid TID, the waste of the network signal resource that is brought.Simultaneously, NAF can set the time of preserving invalid TID and corresponding informance thereof neatly according to the size of local storage capacity, makes the memory load of NAF can remain on a more rational situation.In addition, though at NAF under the situation that BSF inquiry TID does not find, also this TID is carried out the preservation of a period of time, avoided the situation of the Denial of Service attack that may occur.
Description of drawings
Figure 1 shows that the structural representation of general authentication framework;
Figure 2 shows that the flow chart of using embodiments of the invention one;
Figure 3 shows that the flow chart of using embodiments of the invention two;
Figure 4 shows that the flow chart of using embodiments of the invention three;
Figure 5 shows that the flow chart of using embodiments of the invention four.
Embodiment
For making technical scheme of the present invention clearer, again the present invention is done detailed description further below in conjunction with accompanying drawing.
Thinking of the present invention is: after certain TID lost efficacy, NAF was immediately with its deletion, but it is preserved deletion again after a period of time.Thereby when having prevented that the user from reusing this invalid TID, the waste of the network signal resource that is brought.Simultaneously, NAF can set the time of preserving invalid TID and corresponding informance thereof neatly according to the size of local storage capacity, makes the memory load of NAF can remain on a more rational situation.In addition, though at NAF under the situation that BSF inquiry TID does not find, also this TID is carried out the preservation of a period of time, avoided the situation of the Denial of Service attack that may occur.
Among first and second embodiment below, suppose that NAF has safeguarded two databases, one of them deposits effective TID and corresponding information thereof, and another deposits failed TID and corresponding information thereof, and the maximum storage of depositing the database of inefficacy TID and corresponding informance thereof is fixed.After certain TID lost efficacy, this TID and corresponding informance thereof are designated forbidding, and it is transferred in the database of depositing inefficacy TID and corresponding informance thereof, if this database is full, before the TID and corresponding informance thereof of a new inefficacy of then every storage, the TID and the corresponding informance thereof of not accessed count value maximum in this database are deleted, or will be arrived TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time.Concrete realization flow is referring to Fig. 1 and Fig. 2.
Figure 2 shows that the flow chart of using embodiments of the invention one.
If the deletion condition is a not access count value, then the not access count value of this TID that deposits at last and corresponding informance thereof is set to 0, and the not access count value with TID all in this database and corresponding informance thereof adds 1 then; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 209, NAF inquires about this TID information to BSF;
Step 212 is handled by existing procedure.
Above-mentioned flow process is applicable to NAF judges at first whether the database of depositing lost efficacy TID and corresponding informance thereof is full, and then implements the situation of storage operation.
Figure 3 shows that the flow chart of using the embodiment of the invention two.
Step 301 after NAF receives the service request that comprises TID information, at first judges in the database of depositing effective TID and corresponding informance thereof whether this TID information that receives is arranged, if having, then execution in step 302, otherwise execution in step 307;
Step 303 is designated forbidding with this TID, and this TID and corresponding information thereof are put into the database of depositing failed TID and corresponding informance thereof;
If the deletion condition is a not access count value, then the not access count value of this TID that deposits at last and corresponding informance thereof is set to 0, and the not access count value with TID all in this database and corresponding informance thereof adds 1 then; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 307 judges in the database of depositing failed TID and corresponding informance thereof whether this TID information is arranged, if having, then execution in step 308, otherwise execution in step 309;
Step 312 is handled by existing procedure.
Above-mentioned flow process is applicable to that NAF did not judge the state of database when TID and corresponding informance thereof have been lost efficacy in preservation, but directly implements the situation of storage operation.If system returns owing to database is full and deposits failure information in, then according to the deletion condition deletion TID and the corresponding informance thereof that have been provided with, perhaps, NAF sends warning to system to NAF again, and the solicit operation attendant handles.
In third and fourth embodiment, suppose that NAF this locality has only a database.After certain TID lost efficacy, after this TID and corresponding informance thereof be designated forbidding, the deletion condition of this TID and corresponding informance thereof sign is set, if this database is full, before new TID and corresponding informance thereof of then every storage, the TID and the corresponding informance thereof of not accessed count value maximum in this database are deleted, or will be arrived TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time.Concrete realization flow such as Fig. 4 are shown in Figure 5.
Figure 4 shows that the flow chart of using embodiments of the invention three.
Step 401 after NAF receives the service request that comprises TID information, is judged the local information whether this TID is arranged, if having, then execution in step 402, otherwise execution in step 407;
Step 402, NAF judges whether the identification information of this TID is forbidding, if then execution in step 403, otherwise execution in step 404;
Step 403, change deletion condition, if i.e. deletion condition is a not access count value, then the not access count value with this TID subtracts one, if the deletion condition is the deletion time, then the deletion time with this TID prolongs according to setting, execution in step 406 then;
Whether step 404 is judged that this TID is current also to be in the term of validity, if then execution in step 415, otherwise execution in step 405;
Step 405 is designated forbidding with this TID, and the deletion condition of this TID is set;
If the deletion condition is a not access count value, then the not access count value of this TID that deposits at last and corresponding informance thereof is set to 0, then the TID of all sign forbiddings and the not access count value of corresponding informance thereof in this database is added 1; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 406, notice sends the user of service request, and after its applied TID had lost efficacy, execution in step 415 entered initial condition, handles according to old process;
Step 407, NAF inquires about this TID information to BSF;
Step 408 according to the Query Result that BSF returns, judges whether BSF inquires the information of this TID, if BSF inquires this TID information, then execution in step 412, if BSF does not inquire this TID information, then execution in step 409;
Step 409, NAF judges whether local data base is full, if then execution in step 410, otherwise execution in step 411;
Step 410 is deleted the TID and the corresponding informance thereof of not access count value maximum in the database, or will arrive TID and the corresponding informance deletion thereof of deletion time or the most approaching deletion time;
Step 411, this TID is designated forbidding, in database, preserve this TID, and the deletion condition of this TID is set, if i.e. deletion condition is a not access count value, then not access count value of this TID is set to 0, then the TID of all sign forbiddings and the not access count value of corresponding informance thereof in this database are added 1, if the deletion condition is the deletion time, the deletion time of this TID then is set, execution in step 406 then;
Step 412, NAF judges whether local data base is full, if then execution in step 413, otherwise execution in step 414;
Step 413 is deleted the TID and the corresponding informance thereof of not access count value maximum in the database, or TID and the corresponding informance thereof of the most approaching deletion time are deleted;
Step 414, with this TID and corresponding message identification thereof be available after, be kept in the local database, execution in step 406 then;
Step 415 is handled according to existing procedure.
Above-mentioned flow process is applicable to NAF judges at first whether the database of depositing lost efficacy TID and corresponding informance thereof is full, and then implements the situation of storage operation.
Figure 5 shows that the flow chart of using embodiments of the invention four.
Step 501 after NAF receives the service request that comprises TID information, is judged the local information whether this TID is arranged, if having, then execution in step 502, otherwise execution in step 507;
Whether step 504 is judged that this TID is current also to be in the term of validity, if then execution in step 513, otherwise execution in step 505;
Step 505 is designated forbidding with this TID, and the deletion condition of this TID is set;
If the deletion condition is a not access count value, then the not access count value of this TID and corresponding informance thereof is set to 0, then with all are designated the TID of forbidding and the not access count value of corresponding informance adds 1 in this database; If the deletion condition is the deletion time, it then is the time that this TID and corresponding informance thereof are provided with deletion;
Step 508 according to the Query Result that BSF returns, judges whether BSF inquires the information of this TID, if BSF inquires this TID information, then execution in step 509, if BSF does not inquire this TID information, then execution in step 512;
Step 509 is designated this TID available, and this TID and corresponding informance thereof are kept in the local data base;
Step 510 judges whether system returns the successful message of preservation, if, then execution in step 513, communicate by letter normally with this user, and handle by existing procedure, to return cause value be then execution in step 511 of the full failed message of database in system else if;
Step 512 is designated forbidding with this TID, and after the deletion condition of this TID and corresponding informance thereof is set, preserves this TID and corresponding informance thereof in local data base, returns step 510 then;
Step 513 is handled according to existing procedure.
Above-mentioned flow process is applicable to that NAF did not judge the state of database when TID and corresponding informance thereof have been lost efficacy in preservation, but directly implements the situation of storage operation.If system returns owing to database is full and deposits failure information in, then according to the deletion condition deletion TID and the corresponding informance thereof that have been provided with, perhaps, NAF sends warning to system to NAF again, and the solicit operation attendant handles.
For above-mentioned all embodiment, when the deletion condition is deletion during the time, as long as certain TID and corresponding information thereof arrive the deletion time, database also can be deleted this TID and corresponding information thereof automatically.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (16)
1. the method for Network entity management conversation affair mark and corresponding informance thereof is characterized in that this method may further comprise the steps:
A, failed session Transaction Identifier TID and corresponding informance thereof are provided with the deletion condition for each;
When b, Network entity NAF preserve a new TID and corresponding informance thereof in this locality, judge whether local database is full, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise directly in local data base, preserve this new TID and corresponding informance thereof.
2. method according to claim 1 is characterized in that,
The described deletion condition of step a is not access count value maximum;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
3. method according to claim 2, it is characterized in that, the computational methods of described not access count value are: if the TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
4. method according to claim 3 is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the not access count value of this lost efficacy TID and corresponding informance thereof is subtracted 1.
5. method according to claim 1 is characterized in that,
The described deletion condition of step a is for arriving deletion time or the most approaching deletion time;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
6. method according to claim 5, it is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
7. according to any described method of claim 1~6, it is characterized in that, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
8. method according to claim 7, it is characterized in that, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, if local do not have this new TID information, then inquire about this new TID information to BSF; The Query Result that returns according to the entity B SF that carries out the checking of user identity initial inspection at described new TID information, judge whether described BSF inquires described new TID information, if, then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
9. the method for Network entity management conversation affair mark and corresponding informance thereof is characterized in that this method may further comprise the steps:
A, the deletion condition is set for each lost efficacy TID and corresponding informance thereof;
B, Network entity NAF are after a new TID and corresponding informance thereof is preserved in this locality, judge whether that the preservation failure reason value that receives from error processing system is the information of the full preservation failure of database, if, after then satisfying the TID of inefficacy and corresponding informance thereof of deletion condition in the delete database, preserve this new TID and corresponding informance thereof again, otherwise do not process.
10. method according to claim 9 is characterized in that,
The described deletion condition of step a is not access count value maximum;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof of not access count value maximum in the delete database.
11. method according to claim 10, it is characterized in that, the computational methods of described not access count value are: if the new TID of current preservation is the TID that lost efficacy, then the not access count value of lost efficacy the TID and the corresponding informance thereof of current preservation is set to 0, after in database, whenever depositing a new TID of inefficacy and corresponding informance thereof in, the not access count value of all lost efficacy TID and corresponding informances thereof in this database is added 1.
12. method according to claim 11, it is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the count value that visits of this lost efficacy TID and corresponding informance thereof is subtracted 1.
13. method according to claim 9 is characterized in that,
The described deletion condition of step a is for arriving deletion time or the most approaching deletion time;
The TID of inefficacy and the corresponding informance thereof that satisfy the deletion condition in the described delete database of step b are: the TID of inefficacy and the corresponding informance thereof that have arrived deletion time or the most approaching deletion time in the delete database.
14. method according to claim 13, it is characterized in that, this method further comprises: use certain of preserving in the database to lose efficacy TID when NAF initiates service request as the user, the deletion time of this lost efficacy TID and corresponding informance thereof will prolong one predefined period.
15. according to any described method of claim 9~14, it is characterized in that, the database that described NAF local data base had not only been stored effective TID and corresponding informance thereof by one but also stored lost efficacy TID and corresponding informance thereof constitutes, perhaps, described NAF local data base is made of lost efficacy the database of TID and corresponding informance thereof of the database of storage effective TID and a corresponding informance thereof and storage.
16. method according to claim 15, it is characterized in that, when NAF this locality has only a database, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, if local do not have this new TID information, then inquire about this new TID information to BSF; The Query Result that returns according to BSF at described new TID information, judge whether described BSF inquires described new TID information, if then continue to carry out described step b, and when this new TID of described preservation and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is available; If not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding;
When NAF this locality has the database of an effective TID of storage and storage to lose efficacy the database of TID, also comprising before the described step b: after NAF receives the service request that comprises described new TID information, judge in the database of depositing effective TID and corresponding informance thereof whether described new TID information is arranged, if, judge whether described new TID lost efficacy, if, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding; If deposit in the database of effective TID and corresponding informance thereof and do not have described new TID information, then judge in the database of depositing failed TID and corresponding informance thereof whether described new TID information is arranged, if not, NAF inquires about described new TID information to BSF, judge whether BSF returns success the message that inquires described new TID information, if not, then continue to carry out described step b, and when preserving this new TID and corresponding informance thereof, the information that identifies this new TID and correspondence thereof is forbidding.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410033818 CN1684426B (en) | 2004-04-14 | 2004-04-14 | Method for network service entity for managing session affairs mark and its correspondent information |
PCT/CN2005/000493 WO2005101723A1 (en) | 2004-04-14 | 2005-04-13 | A method for network application function to manage the session traffic identification and the corresponding information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410033818 CN1684426B (en) | 2004-04-14 | 2004-04-14 | Method for network service entity for managing session affairs mark and its correspondent information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1684426A CN1684426A (en) | 2005-10-19 |
CN1684426B true CN1684426B (en) | 2010-04-28 |
Family
ID=35150324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410033818 Expired - Fee Related CN1684426B (en) | 2004-04-14 | 2004-04-14 | Method for network service entity for managing session affairs mark and its correspondent information |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1684426B (en) |
WO (1) | WO2005101723A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1321013A (en) * | 2000-03-17 | 2001-11-07 | 索尼公司 | Information announcing system, receiving apparatus, listing form, clearing and storing method |
WO2002013016A1 (en) * | 2000-08-08 | 2002-02-14 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
CN1410891A (en) * | 2001-09-21 | 2003-04-16 | Lg电子株式会社 | Overload controlling method for use in realtime treating system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010055173A (en) * | 1999-12-09 | 2001-07-04 | 오길록 | System for controlling internetworking advanced intelligent network and internet in intelligent peripheral of advanced intelligent network and method using the same |
JP4430213B2 (en) * | 2000-08-22 | 2010-03-10 | ミサワホーム株式会社 | Component information processing method, apparatus, system, and recording medium |
-
2004
- 2004-04-14 CN CN 200410033818 patent/CN1684426B/en not_active Expired - Fee Related
-
2005
- 2005-04-13 WO PCT/CN2005/000493 patent/WO2005101723A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1321013A (en) * | 2000-03-17 | 2001-11-07 | 索尼公司 | Information announcing system, receiving apparatus, listing form, clearing and storing method |
WO2002013016A1 (en) * | 2000-08-08 | 2002-02-14 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
CN1410891A (en) * | 2001-09-21 | 2003-04-16 | Lg电子株式会社 | Overload controlling method for use in realtime treating system |
Also Published As
Publication number | Publication date |
---|---|
WO2005101723A1 (en) | 2005-10-27 |
CN1684426A (en) | 2005-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7877493B2 (en) | Method of validating requests for sender reputation information | |
CN1711784B (en) | System and method for sending SMS and text messages | |
CN101626563B (en) | Data storage system in communication network and information processing method | |
CN104243472A (en) | Network with MAC table overflow protection | |
CN105812482B (en) | The sharing method and server platform of communication information | |
CN101627407A (en) | Reachability realizing server, management system, management method and realization program | |
CN101552989B (en) | A user data configuration method, system and mobile line configuration gateway | |
US20020120872A1 (en) | Internet roaming method | |
CN107870982A (en) | Data processing method, system and computer-readable recording medium | |
CN105991592A (en) | Same-natural-person identity maintenance method and apparatus, and server | |
CN1300976C (en) | Method for obtaining user identification information for network application entity | |
CN107426154A (en) | A kind of method for managing black list | |
CN100576848C (en) | Distribution-type data dynamic program agent method | |
WO2010131482A1 (en) | Database device, database matching system, and database matching method | |
CN101605301A (en) | A kind of group system and request message distribution method that carries out the multinode transaction | |
CN1684426B (en) | Method for network service entity for managing session affairs mark and its correspondent information | |
KR20010046483A (en) | Apparatus and method of processing mobility for packet services | |
CN100413248C (en) | Improved method and system for carrying out charging based on flow | |
CN100512137C (en) | A method for deleting session transaction ID and related information | |
US7881735B2 (en) | Messaging gateway and method | |
CN102148688A (en) | Charging method and NAS (Network Access Server) | |
CN115080994A (en) | Block chain cross-chain gateway data interaction method based on time locking and middleboxes | |
CN101345648B (en) | Solution method of data inconsistency | |
CN116095081A (en) | Event processing method and device based on block chain system, equipment and medium | |
CN104918221A (en) | Terminal peripheral login, logout and standby processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100428 Termination date: 20200414 |
|
CF01 | Termination of patent right due to non-payment of annual fee |