US20140335815A1 - Policy decisions based on subscriber spending limits - Google Patents
Policy decisions based on subscriber spending limits Download PDFInfo
- Publication number
- US20140335815A1 US20140335815A1 US13/890,620 US201313890620A US2014335815A1 US 20140335815 A1 US20140335815 A1 US 20140335815A1 US 201313890620 A US201313890620 A US 201313890620A US 2014335815 A1 US2014335815 A1 US 2014335815A1
- Authority
- US
- United States
- Prior art keywords
- spending limit
- user equipment
- session
- request
- limit session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/88—Provision for limiting connection, or expenditure
- H04M15/886—Provision for limiting connection, or expenditure limit per terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
- H04L12/1407—Policy-and-charging control [PCC] architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1453—Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network
- H04L12/1467—Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network involving prepayment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/64—On-line charging system [OCS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/66—Policy and charging system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/765—Linked or grouped accounts, e.g. of users or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/852—Low balance or limit reached
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/853—Calculate maximum communication time or volume
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/854—Available credit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
Definitions
- a network service provider may monitor various metrics related to the performance of a communications networks. For instance, network service providers may monitor bandwidth utilization, packet drop statistics, and initial connection time wait, as some examples. Typical values for these performance metrics may be referred to as a performance baseline. By monitoring and recording these performance metrics, the network service provider may identify network problems, as well as identify functional aspects of the communications network that may be improved.
- FIG. 1 illustrates an exemplary system for providing charged network services.
- FIG. 2 illustrates an exemplary signaling diagram of the system for creation of a spending limit session that is active before processing a user request for network services.
- FIG. 3 illustrates an exemplary signaling diagram of the system for creation of a spending limit session that is not active before processing a user request for network services.
- FIG. 4 illustrates an exemplary signaling diagram of the system for termination of a spending limit session in which a spending limit session is active.
- FIG. 5 illustrates an exemplary signaling diagram of the system for termination of a spending limit session in which no spending limit session is active.
- FIG. 6 illustrates an exemplary process for creating a spending limit session for providing charged data services to user equipment.
- FIG. 7 illustrates an exemplary process for utilizing a spending limit session for providing charged data services to user equipment.
- FIG. 8 illustrates an exemplary process for querying the status of a spending limit session.
- Policy counters are a mechanism by which an online charging system (OCS) of a communications network may track usage applicable to billing for a network subscriber.
- OCS online charging system
- the OCS may maintain policy counters descriptive of subscriber network bandwidth usage or connection duration.
- a subscription profile repository (SPR) may include subscriber profiles that include indicators that allow a policy and charging rules function node (PCRF) of a network to determine whether a spending limit session (e.g., Sy session) is needed for the subscriber, and, if so which spending limit session dependent policies should be used for data sessions of the subscriber.
- the determined policies may be indicative of how to handle subscriber data flows, such as based on policy counter values received from the OCS that are indicative of how much of a subscriber's data allowance that the subscriber has consumed.
- the PCRF may be configured to send a spending limit request to the OCS to indicate policy counters for which the PCRF should receive status notifications, receive the spending limits associated with the subscriber, receive status notification values from the requested policy counters maintained in the OCS, and make policy decisions according to the received information.
- These systems may require the subscriber profile information from the SPR to make connection determinations, thereby blocking on requests to the SPR, with negative effect on performance baselines such as request response time.
- An improved system may make policy decisions based on subscriber spending limits in a way that does not impact these performance baselines.
- the system may utilize a single “spending limit session” that begins automatically upon establishment of an initial packet data connection from an item of user equipment, where the spending limit session is maintained until a last packet data connection of the user equipment has been terminated.
- the PCRF may utilize default spending limits values to perform an initial policy determination, potentially followed up by any necessary corrections to the determination upon later receipt of the actual subscriber information.
- Fourth Generation (4G) wireless networks as defined by the 3rd Generation Partnership Project (3GPP) standardization, are used herein to facilitate explanation of the spending limit sessions. Nevertheless, the disclosed examples are intended to be illustrative, not limiting, and the spending limit sessions may be applied to other types of packet-switched and/or wireless networks for which receipt of subscriber information may block connection requests.
- 3GPP 3rd Generation Partnership Project
- FIG. 1 illustrates an exemplary system 100 for providing charged network services.
- the system 100 may include a long term evolution (LTE) network 105 having one or more base stations 110 , where the base stations 110 may be in selective communication with one or more elements of user equipment 115 .
- the EPC 120 may be in communications with the base stations 110 and a packet data network 125 , and may serve as a gateway providing communications services of the packet data network 125 to the user equipment 115 .
- the EPC 120 may include a serving gateway (SGW) 130 and a packet data network (PDN) gateway (PGW) 140 .
- SGW serving gateway
- PGW packet data network gateway
- the system 100 may further include a policy and charging rule function node (PCRF) 170 of an Internet Protocol (IP) Multimedia Subsystem (IMS) in communication with a subscription profile repository (SPR) 150 maintaining subscriber profiles 155 , an online charging system (OCS) 160 maintaining policy counter 165 information, a bearer binding and event reporting function (BBERF) 135 of the SGW 130 , and a policy and charging enforcement function (PCEF) 145 of the PGW 140 .
- PCRF policy and charging rule function node
- IP Internet Protocol
- IMS Internet Multimedia Subsystem
- SPR subscription profile repository
- OCS online charging system
- BBERF bearer binding and event reporting function
- PCEF policy and charging enforcement function
- System 100 may take many different forms and include multiple and/or alternate components and facilities. While an exemplary system 100 is shown in FIG. 1 , the exemplary components illustrated in the Figure are not intended to be limiting. Indeed, additional or alternative components and/or implementations may be used.
- LTE networks 105 are a growing standard in mobile network technology, including enhancements over earlier global system for mobile communications (GSM), enhanced data for global evolution (EDGE) and universal mobile telecommunications system (UTMS) network technologies.
- GSM global system for mobile communications
- EDGE enhanced data for global evolution
- UTMS universal mobile telecommunications system
- An LTE network 105 may provide downlink peak rates on the order of 100 Mbit/s, uplink rates on the order of 50 Mbit/s and radio access network (RAN) round-trip times on the order of 10 milliseconds.
- the LTE network 105 may include one or more base stations 110 , such as eNode B (eNB) nodes, which may combine functionality of base station and radio access controllers (RNC) of 2G or 3G radio access networks.
- the base stations 110 may accordingly support the LTE network 105 air interface and may include functions for radio resource control, user plane ciphering and packet data convergence protocol (PDCP).
- PDCP packet data convergence protocol
- the base station or stations 110 of the LTE network 105 may provide communications services to one or more pieces of user equipment 115 .
- User equipment 115 may include any device or devices configured to be operated by one or more users, such as a cellular telephone, laptop computer, tablet computing device, or personal digital assistant, among other exemplary devices.
- user equipment 115 may include one or more components capable of receiving input such as voice and data entry from a user, and providing output to the user such as audible and/or visual output.
- the EPC 120 may be an Internet Protocol (IP) network and may be substantially packet-switched. Thus, services such as voice (e.g., voice over LTE) and Internet may accordingly be provided to the user equipment 115 as packet-switched communications via the packet data network 125 by way of the EPC 120 .
- the EPC 120 may further charge a subscriber associated with the user equipment 115 for use of provided data services and ensure that particular quality of service (QoS) standards are met.
- QoS quality of service
- the SGW 130 may be configured to operate as a gateway between the EPC 120 and the LTE network 105 , and may provide connectivity for user equipment 115 data entering the EPC 120 as well as management of mobility of user equipment 115 among the base stations 110 . While only one SGW 130 is illustrated, in many examples the EPC 120 may include multiple SGWs 130 in communication with various base stations 110 of the LTE network 105 .
- the SGW 130 may also include a bearer binding and event reporting function (BBERF) 135 configured to apply QoS rules to service data flows (e.g., packet flows from user equipment 115 of a particular service type) and binding of the service data flows to access bearers in the bearer-plane.
- BBERF bearer binding and event reporting function
- the PGW 140 may be configured to operate as the gateway between the EPC 120 and the packet data network 125 , and may provide connectivity for user equipment 115 data between the EPC 120 and the packet data network 125 .
- the PGW 140 may include a PCEF 145 that enforces policy and charging control (PCC) rules for the service data flows.
- PCC rules may include, for example, information sufficient to identify user sessions and to apply policy control and charging to the identified flows.
- the SPR 150 may be configured to store and retrieve QoS and charging subscription policies associated with subscribers or user equipment 115 connected to the system 100 .
- the SPR 150 may accordingly store subscriber profiles 155 including subscriber identifiers and indications of subscription information associated with each subscriber identifier, such as indicators that may be used to determine whether a spending limit session (e.g., Sy session) is needed for the subscriber, and, if so which spending limit session dependent policies should be used for data sessions of the subscriber.
- the determined policies may be indicative of how to handle subscriber data flows based on policy counter status information.
- the policy counter status information may be based on factors such as how much of the subscriber's monthly data allowance (e.g., in terms of money, volume, duration, etc.) the subscriber may have consumed.
- the policies may include throttling actions that may be performed on subscriber data flows according to the subscriber reaching subscriber spending limits.
- the SPR 150 may also be integrated with a home subscriber server database configured to store further user information and profiles to facilitate multimedia services such as SIP calling functionality.
- the OCS 160 may be configured to track spending in the form of policy counter 165 status for each subscriber or subscription.
- Policy counters 165 may include various mechanisms of the OCS 160 that may be used to track spending applicable to a subscriber.
- the OCS 160 may be further configured to report the policy counter 165 status values for the subscriber when requested to the PCRF 170 when a policy counter 165 status changes (e.g., exceeds a threshold value of usage), and report the change to the PCRF 170 .
- the PCRF 170 may be configured to make traffic policing and other policy and charging control decisions for data sent to and received by the user equipment 115 .
- the PCRF 170 may be configured to take into account spending limits when making the policy determinations. Accordingly, the PCRF 170 may be configured to request subscriber profiles 155 from the SPR 150 and policy counter 165 status information from the OCS 160 to make the policy determinations.
- the PCRF 170 may be further configured to perform additional control of the policy counter status information, such as to cancel, reset, or otherwise control spending limit reporting.
- the PCRF 170 may be further configured to provide charging and QoS rules to the PCEF 145 and QoS rules to the bearer binding and event reporting function (BBERF) 135 for enforcement.
- Exemplary policy enforcement actions may include one or more of dropping a connection that violates a policy or QoS rule, delaying the connection, or downgrading the connection (e.g., limiting a bandwidth rate of a connection associated with a subscriber exceeding a usage threshold of a subscriber profile 155 ).
- FIG. 2 illustrates an exemplary signaling diagram 200 of the system 100 for creation of a spending limit session that is active before processing a user request for network services.
- Creation of the exemplary spending limit session may be triggered by user equipment 115 connection to the network (e.g., an IMS attachment), where the spending limit session (in this example Sy session) may be created for those subscribers whose subscriber profiles 155 indicate that they are OCS 160 subscribers.
- This determination may be performed by sending an initial spending limit request PCRF 170 message to the OCS 160 while establishing an initial PDN connection (e.g., IMS PDN).
- IMS PDN initial PDN connection
- the single spending limit session for an OCS 160 subscriber may begin upon establishment of the initial PDN connection (e.g., to the IMS PDN), may be available to handle later user requests for data services (e.g., according to a created Internet PDN), and may end when the last PDN connection is terminated applicable to any PDN (e.g., according to a determination by the SGW 130 that no PDN connections remain to the attached user equipment 115 ).
- the Diameter protocol for authentication, authorization, and accounting is utilized in the examples below, but it should be noted that use of other protocols may be possible (e.g., the remote authentication dial in user service (RADIUS) protocol as one example).
- an IMS S5 create session request may be received by the PCEF 145 of the PGW 140 .
- an item of user equipment 115 may send an attach request to a base station 110 of the LTE network 105 , which may forward the request to the EPC 120 to generate the create session request message directed to the PGW 140 .
- the PCEF 145 may send a credit control request initiate (CCR-I) message over the Gx interface to the PCRF 170 .
- CCR messages may be used to request a credit authorization for use of a particular service
- the Gx interface may be configured to exchange policy decision information between the PCEF 145 and the PCRF 170 (e.g., over the Diameter protocol).
- the Gx interface may provide for receiving requests from user equipment 115 for application or service requests in the form of CCRs.
- the CCR message may include subscriber information indicative of the identity of the user equipment 115 (e.g., mobile station international subscriber directory number (MSISDN), international mobile subscriber identity (IMSI), etc.) originating the request sequence.
- MSISDN mobile station international subscriber directory number
- IMSI international mobile subscriber identity
- the PCRF 170 may send a user data request (UDR) message to the SPR 150 to request a subscriber profile 155 associated with the identity of the user equipment 115 .
- the UDR may be sent over an Sh interface between the PCRF 170 and the SPR 150 configured to facilitate the requesting of subscriber profile 155 or other subscription data, as well as for notification of the PCRF 170 of subscription data updates.
- the PCRF 170 may receive a user data answer (UDA) response from the SPR 150 including the requested subscriber profile 155 (e.g., over the Sh interface).
- UDA user data answer
- the PCRF 170 may perform policy evaluation and execution for the subscriber associated with the user equipment 115 making the connection.
- the PCRF 170 may send a credit control answer initiate (CCA-I) response over the Gx interface to the PCEF 145 , and substantially in parallel may send a spending limit request (SLR)-I to the OCS 160 .
- CCA messages are sent in response to CCR messages (such as the CCR message sent at index (B)), and are used to provides responses to requests for credit authorization for use of a particular service (e.g., whether or not the request has been granted).
- the spending limit request it should be noted that use of the SLR to the OCS 160 may be conditional on the contents of the subscriber's profile 155 being received from the SPR 150 . For example, the SLR may only be sent for subscribers whose subscriber profiles 155 indicate the use of OCS 160 functionality.
- the PCEF 145 returns an S5 create session response back to the PGW 140 responsive to receipt of the CCA-I response.
- a spending limit response or answer (SLA) may be received by the PCRF 170 (i.e., for subscribers that use the OCS 160 ).
- the Sy session may thus be created via the SLR/SLA exchange, regardless of whether any further user requests for services are made. Once created, the Sy session may be used to perform spending limit reporting from the OCS 160 to the PCEF 145 using the policy counters 165 of the OCS 160 .
- the Sy session accordingly enables transfer of status information relating to subscriber spending between the OCS 160 and the PCRF 170 (e.g., requests for policy counter status reporting from the PCRF 170 to the OCS 160 , notifications of policy counter 165 status changes from the OCS 160 to the PCRF 170 , cancellations of policy counter 165 status reporting from the PCRF 170 to the OCS 160 , etc.).
- status information relating to subscriber spending between the OCS 160 and the PCRF 170 e.g., requests for policy counter status reporting from the PCRF 170 to the OCS 160 , notifications of policy counter 165 status changes from the OCS 160 to the PCRF 170 , cancellations of policy counter 165 status reporting from the PCRF 170 to the OCS 160 , etc.
- the OCS 160 may inform the PCEF 145 via the Sy session of a policy counter 165 status change indicative of the daily spending limit being reached.
- the Sy session may be per-OSC 160 subscriber and not per access point, the spending limit request message may not include an access
- Further signaling may be triggered by user equipment 115 attachment to an Internet PDN (or to other PDNs subject to OCS 160 , e.g., a control function PDN).
- an S5 create session request Internet message may be received by the PGW 140 indicative of a user equipment 115 request for Internet services.
- the PCEF 145 may send an Internet credit control request (CCR) message over the Gx interface to the PCRF 170 .
- the PCRF 170 may perform policy evaluation and execution taking the already active spending limit session into account.
- the PCRF 170 may perform the policy evaluation without blocking on requests to the SPR 150 or on other aspects of the creation of the Sy session.
- PCRF 170 may send a CCA-I response over the Gx interface to the PCEF 145 responsive to the spending limit session and including Sy session-based PCC rules.
- the PCEF 145 sends a CCR-I message over the Gy interface to the OCS 160 .
- the Gy interface may be used for reporting and charging functionality, such as to be used by the PCEF 145 to retrieve policy counter 165 information for the subscriber.
- the OCS 160 receives a response to the CCR-I message over the Gy interface.
- the PCEF 145 returns an S5 create session response back to the PGW 140 responsive to receipt of the CCA-I response.
- FIG. 3 illustrates an exemplary signaling diagram 300 of the system 100 for creation of a spending limit session that is not active before processing a user request for network services.
- creation of the exemplary spending limit session may be triggered by user equipment 115 IMS attachment as described above with respect to indices (A) through (F).
- the response to the spending limit request (SLR)-I to the OCS 160 in diagram 300 at index (H) may not be received until after receipt of the S5 create_session_request Internet message at index (I) indicative of a user equipment 115 request for Internet or other network services.
- the PCEF 145 may send an Internet credit control request (CCR) message over the Gx interface to the PCRF 170 , but at index (K), because there is no spending limit session, the PCRF 170 is unable to perform policy evaluation and execution using the spending limit session for the subscriber. Nevertheless, to allow processing of the user request to proceed, the PCRF 170 may perform the policy evaluation and execution using default spending limit session information.
- default information may, for example, include relatively unrestricted policies that generally allow connections using criteria indicative of substantial use remaining and are not specific to the user equipment. Such permissive defaults may be used, for example, because most users are within their policy limits, so a policy that generally allows requests is likely to be correct in the majority of cases.
- the PCRF 170 may perform the policy evaluation using the aforementioned relatively unrestrictive defaults and without blocking on requests to the SPR 150 .
- PCRF 170 sends a CCA-I response over the Gx interface to the PCEF 145 indicative of the default PCC rules.
- a Sy session may be created.
- the PCRF 170 may send a re-authorize request (RAR) message to the PCEF 145 including the new policy information according to the received SLA.
- RAR re-authorize request
- the RAR message may include updated policy information such as PCC rules indicative of a lower spending limit for the subscriber than that of the default rules.
- a RAA message may be sent in response to the RAR message, and may inform the PCRF 170 sender of the RAR message of the disposition of the re-authorize request.
- the RAA may indicate whether the PCEF 145 has successfully executed the new PCC rules delivered through the RAR message.
- the PCEF 145 may further provide a re-authorize answer (RAA) message to the PCRF 170 indicative of any re-authorization action that may have been taken.
- RAA re-authorize answer
- the PCEF 145 sends a CCR-I message over the Gy interface to the OCS 160 , at index (P), the OCS 160 receives a response to the CCR-I message over the Gy interface, and at index (Q), the PCEF 145 returns an S5 create session response back to the PGW 140 responsive to the CCA-I response.
- creation of the exemplary spending limit session may be triggered early by user equipment 115 IMS attachment, thereby allowing user requests for services to be handled without blocking on receipt of subscriber information, regardless of whether the spending limit session is active before or after the initial receipt of a user request for services. Because blocking on user requests is eliminated, the system 100 may therefore improve response time and related performance metrics.
- Spending limit sessions may at certain times no longer be required and may be terminated to preserve network resources.
- an Sy session may be terminated by request of the PCRF 170 or the OCS 160 .
- One method of terminating the spending limit session by the OCS 160 may be performed by using a session notification request (SNR) message.
- SNR messages may be used to report policy counter changes from the OCS 160 to the PCRF 170 .
- the SNR may be sent from the OCS 160 to the PCRF 170 without containing a policy counter 165 status report. Once such a message is received by the PCRF 170 , two cases may occur depending on whether or not the PCRF 170 determines it has an active Sy session associated with the subscriber user equipment 115 .
- FIG. 4 illustrates an exemplary signaling diagram 400 of the system 100 for termination of a spending limit session in which a spending limit session is active.
- the OCS 160 may send an SNR with no policy-counter-status-report to the PCRF 170 to determine whether one of the Sy sessions stored in its internal database is active or stale.
- a Sy session may be stale if, for example, the associated user equipment 115 has been turned off or otherwise been detached from the network.
- the OCS 160 may send an SNR to the PCRF 170 including an identifier of the session being queried. The PCRF 170 may then determine whether any such session is available.
- the PCRF 170 may determine that it does have an Sy session associated to the session identifier, and therefore returns an SNA indicative of that result, e.g., result-code 2001 (i.e., DIAMETER_SUCCESS). Based on the SNA, the OCS 160 may accordingly determine that the Sy session is still active, and may retain a record of the session in its records of active sessions.
- result-code 2001 i.e., DIAMETER_SUCCESS
- FIG. 5 illustrates an exemplary signaling diagram 500 of the system 100 for termination of a spending limit session in which no spending limit session is active.
- the OCS 160 may send a SNR including an identifier of the session.
- the PCRF 170 may determine that it does not have an Sy session associated to the session identifier, and therefore returns an SNA indicative of that result, e.g., result-code 5002 (i.e., DIAMETER_UNKNOWN_SESSION_ID). Based on the SNA, the OCS 160 may accordingly determine that the Sy session is stale, and may delete a record of the session from its records of active sessions.
- result-code 5002 i.e., DIAMETER_UNKNOWN_SESSION_ID
- FIG. 6 illustrates an exemplary process 600 for creating a spending limit session for providing charged data services to user equipment 115 .
- the process 600 may be performed by various devices, such as by a PCRF 170 and an OCS 160 of an EPC 120 controlling access of user equipment 115 to a packet data network 125 .
- the PCRF 170 receives an indication of user equipment 115 connection to a network such as LTE network 105 .
- a network such as LTE network 105 .
- an item of user equipment 115 may send (e.g, by way of firmware or software of the user equipment 115 ) an attach request to a base station 110 of the LTE network 105 , which may forward the request to the EPC 120 to generate the create_session_request message directed to a PCEF 145 of a PGW 140 of the system 100 .
- the PCEF 145 may accordingly send a credit control request initiate (CCR-I) message over the Gx interface to the PCRF 170 .
- CCR-I credit control request initiate
- the PCRF 170 queries for a subscriber profile 155 .
- the PCRF 170 may send a UDR message to a SPR 150 of the system 100 to request a subscriber profile 155 associated with the identity of the user equipment 115 , and may receive a UDA response from the SPR 150 including the requested subscriber profile 155 .
- the PCRF 170 creates a spending limit session. For example, for subscribers that use the OCS 160 , an Sy session may be created via an SLR/SLA exchange between the PCRF 170 and the OCS 160 . Once created, the Sy session may be available to handle later user requests for data services. After block 606 , the process 600 ends.
- FIG. 7 illustrates an exemplary process 700 for utilizing a spending limit session for providing charged data services to user equipment.
- the process 700 may be performed by various devices, such as by a PCRF 170 and an OCS 160 of an EPC 120 controlling access of user equipment 115 to a packet data network 125 .
- the PCRF 170 receives a request from user equipment 115 for data services.
- the PCEF 145 may request data services, such as by way of sending an Internet or other type of CCR message over the Gx interface to the PCRF 170 .
- the PCRF 170 determines whether a spending limit session for the user equipment 115 exists. For example, the PCRF 170 may determine whether it has an active spending limit session (e.g., Sy session) associated with the user equipment 115 (e.g., looked up according to a subscriber identifier or session identifier included in the CCR message). If a spending limit session exists for the user equipment 115 , control passes to block 706 . Otherwise, control passes to block 708 .
- an active spending limit session e.g., Sy session
- the PCRF 170 responds to the request for data services using spending limit session rules of the spending limit session. For example, the PCRF 170 may send a CCA-I response over the Gx interface to the PCEF 145 responsive to the spending limit session and including Sy session based PCC rules. After block 706 , the process 700 ends.
- the PCRF 170 responds to the request for data services using default spending limit session rules. For example, PCRF 170 sends a CCA-I response over the Gx interface to the PCEF 145 indicative of the default PCC rules.
- the PCRF 170 receives an indication of creation of a spending limit session for the user equipment 115 .
- the PCRF 170 may receive a SLA response from the OCS 160 responsive to sending a spending limit request (SLR)-I request to the OCS 160 .
- SLR spending limit request
- the PCRF 170 determines whether a rule update is required based on the created spending limit session. For example, the PCRF 170 may compare the rules of the created spending limit session to the default rules, and may identify any rule differences that should be addressed. As an example, the created spending limit session may include a lower daily spending limit for a subscriber than that of the default rules. If a rule update is required, control passes to block 714 . Otherwise the process 700 ends.
- the PCRF 170 provides updated rules to the PCEF 145 .
- the PCRF 170 may send a RAR message to the PCEF 145 including the new policy information according to the received SLA.
- the PCEF 145 may further provide a RAA message to the PCRF 170 indicative of any re-authorization action that may have been taken.
- control instead may pass back to block 702 to wait for receipt of additional user requests for data services.
- FIG. 8 illustrates an exemplary process 800 for querying the status of a spending limit session.
- the process 800 may be performed by various devices, such as by a PCRF 170 and an OCS 160 of an EPC 120 controlling access of user equipment 115 to a packet data network 125 .
- the PCRF 170 receives an identifier of a spending limit session.
- the requester e.g., an OCS 160
- the requester may periodically send SNRs to the PCRF 170 to allow the requester to update its records of what spending limit sessions may still be active.
- the PCRF 170 queries for the identified spending limit session. For example, the PCRF 170 may determine whether or not it has an active spending limit session (e.g., Sy session) associated with the identifier of the session.
- an active spending limit session e.g., Sy session
- the PCRF 170 returns a status indicative of whether the spending limit session is active. For example, if the PCRF 170 determines that it does have an active session corresponding to the identifier, the PCRF 170 may respond to the SNR with an SNA indicative of that result, e.g., with result-code 2001 (i.e., DIAMETER_SUCCESS). Otherwise, if the PCRF 170 determines that it does not have an active session corresponding to the identifier, the PCRF 170 may respond to the SNR with an SNA indicative of that result, e.g., with result-code 5002 (i.e., DIAMETER_UNKNOWN_SESSION_ID).
- result-code 5002 i.e., DIAMETER_UNKNOWN_SESSION_ID
- the requester may update its records of what spending limit sessions may still be active based on the SNA result. For instance, based on the result-code returned in the SNA, the OCS 160 may selectively remove record of the queried for spending limit session from its own records. After block 806 , the process 800 ends.
- the system 100 may be configured to make policy decisions based on subscriber spending limits in a way that does not impact connection time performance baselines (e.g., time to respond to requests for Internet connections).
- the PCRF 170 may utilize default spending limits values to perform an initial policy determination without waiting for creation of the spending limit session, potentially followed up by any necessary corrections to the determination upon later receipt of the actual subscriber information of an identified spending limit session specifically corresponding to the user equipment 115 .
- policy decisions may no longer block waiting on subscriber profiles 155 information maintained by the SPR 150 , thereby improving performance baselines for user equipment service requests.
- computing systems and/or devices may employ any of a number of computer operating systems, including, but by no means limited to, versions and/or varieties of the Microsoft Windows® operating system, the Unix operating system (e.g., the Solaris® operating system distributed by Oracle Corporation of Redwood Shores, Calif.), the AIX UNIX operating system distributed by International Business Machines of Armonk, N.Y., the Linux operating system, the Mac OS X and iOS operating systems distributed by Apple Inc. of Cupertino, Calif., the BlackBerry OS distributed by Research In Motion of Waterloo, Canada, and the Android operating system developed by the Open Handset Alliance.
- the Unix operating system e.g., the Solaris® operating system distributed by Oracle Corporation of Redwood Shores, Calif.
- the AIX UNIX operating system distributed by International Business Machines of Armonk, N.Y.
- the Linux operating system e.g., the Mac OS X and iOS operating systems distributed by Apple Inc. of Cupertino, Calif.
- the BlackBerry OS distributed by Research In Motion of
- Computing devices such as the user equipment 115 , SGW 130 , PGW 140 , SPR 150 , OCS 160 , and PCRF 170 generally include computer-executable instructions, where the instructions may be executable by one or more processors of the computing devices.
- Computer-executable instructions may be compiled or interpreted from computer programs created using a variety of programming languages and/or technologies, including, without limitation, and either alone or in combination, JavaTM, C, C++, Visual Basic, Java Script, Perl, etc.
- a processor or microprocessor receives instructions, e.g., from a memory, a computer-readable medium, etc., and executes these instructions, thereby performing one or more processes, including one or more of the processes described herein.
- Such instructions and other data may be stored and transmitted using a variety of computer-readable media.
- a computer-readable medium includes any non-transitory (e.g., tangible) medium that participates in providing data (e.g., instructions) that may be read by a computer (e.g., by a processor of a computing device).
- a medium may take many forms, including, but not limited to, non-volatile media and volatile media.
- Non-volatile media may include, for example, optical or magnetic disks and other persistent memory.
- Volatile media may include, for example, dynamic random access memory (DRAM), which typically constitutes a main memory.
- Such instructions may be transmitted by one or more transmission media, including coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to a processor of a computer.
- Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- Databases, data repositories or other data stores described herein, such as the SPR 150 storing the subscriber profiles 155 may include various kinds of mechanisms for storing, accessing, and retrieving various kinds of data, including a hierarchical database, a set of files in a file system, an application database in a proprietary format, a relational database management system (RDBMS), etc.
- Each such data store is generally included within a computing device employing a computer operating system such as one of those mentioned above, and are accessed via a network in any one or more of a variety of manners.
- a file system may be accessible from a computer operating system, and may include files stored in various formats.
- An RDBMS generally employs the Structured Query Language (SQL) in addition to a language for creating, storing, editing, and executing stored procedures, such as the PL/SQL language mentioned above.
- SQL Structured Query Language
- system elements may be implemented as computer-readable instructions (e.g., software) on one or more computing devices (e.g., servers, personal computers, etc.), stored on computer readable media associated therewith (e.g., disks, memories, etc.).
- a computer program product may comprise such instructions stored on computer readable media for carrying out the functions described herein.
- software may be provided that when executed by one or more processors of the computing devices (e.g., the user equipment 115 , SGW 130 , PGW 140 , SPR 150 , OCS 160 , and PCRF 170 ) provides the operations described herein.
- the software may be provided as hardware or firmware, or combinations of software, hardware and/or firmware.
- a policy and charging function node 170 of the network may be implemented as a computing device including a processor configured to execute software or firmware instructions stored on a memory of the policy and charging function node 170 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- A network service provider may monitor various metrics related to the performance of a communications networks. For instance, network service providers may monitor bandwidth utilization, packet drop statistics, and initial connection time wait, as some examples. Typical values for these performance metrics may be referred to as a performance baseline. By monitoring and recording these performance metrics, the network service provider may identify network problems, as well as identify functional aspects of the communications network that may be improved.
-
FIG. 1 illustrates an exemplary system for providing charged network services. -
FIG. 2 illustrates an exemplary signaling diagram of the system for creation of a spending limit session that is active before processing a user request for network services. -
FIG. 3 illustrates an exemplary signaling diagram of the system for creation of a spending limit session that is not active before processing a user request for network services. -
FIG. 4 illustrates an exemplary signaling diagram of the system for termination of a spending limit session in which a spending limit session is active. -
FIG. 5 illustrates an exemplary signaling diagram of the system for termination of a spending limit session in which no spending limit session is active. -
FIG. 6 illustrates an exemplary process for creating a spending limit session for providing charged data services to user equipment. -
FIG. 7 illustrates an exemplary process for utilizing a spending limit session for providing charged data services to user equipment. -
FIG. 8 illustrates an exemplary process for querying the status of a spending limit session. - Policy counters are a mechanism by which an online charging system (OCS) of a communications network may track usage applicable to billing for a network subscriber. For instance, the OCS may maintain policy counters descriptive of subscriber network bandwidth usage or connection duration. A subscription profile repository (SPR) may include subscriber profiles that include indicators that allow a policy and charging rules function node (PCRF) of a network to determine whether a spending limit session (e.g., Sy session) is needed for the subscriber, and, if so which spending limit session dependent policies should be used for data sessions of the subscriber. The determined policies may be indicative of how to handle subscriber data flows, such as based on policy counter values received from the OCS that are indicative of how much of a subscriber's data allowance that the subscriber has consumed. The PCRF may be configured to send a spending limit request to the OCS to indicate policy counters for which the PCRF should receive status notifications, receive the spending limits associated with the subscriber, receive status notification values from the requested policy counters maintained in the OCS, and make policy decisions according to the received information. These systems may require the subscriber profile information from the SPR to make connection determinations, thereby blocking on requests to the SPR, with negative effect on performance baselines such as request response time.
- An improved system may make policy decisions based on subscriber spending limits in a way that does not impact these performance baselines. The system may utilize a single “spending limit session” that begins automatically upon establishment of an initial packet data connection from an item of user equipment, where the spending limit session is maintained until a last packet data connection of the user equipment has been terminated. Thus, upon receipt of a first request for data services by the user equipment, in many cases the spending limits associated with the subscriber may already be received by the PCRF and be available for use in policy determinations. Moreover, in cases in which the spending limits associated with the subscriber have not yet been received, the PCRF may utilize default spending limits values to perform an initial policy determination, potentially followed up by any necessary corrections to the determination upon later receipt of the actual subscriber information. By way of these enhancements, policy decisions may be performed without having to synchronously wait or block on subscriber spending limit information, thereby improving performance baselines for user equipment service requests.
- Fourth Generation (4G) wireless networks, as defined by the 3rd Generation Partnership Project (3GPP) standardization, are used herein to facilitate explanation of the spending limit sessions. Nevertheless, the disclosed examples are intended to be illustrative, not limiting, and the spending limit sessions may be applied to other types of packet-switched and/or wireless networks for which receipt of subscriber information may block connection requests.
-
FIG. 1 illustrates anexemplary system 100 for providing charged network services. Thesystem 100 may include a long term evolution (LTE)network 105 having one ormore base stations 110, where thebase stations 110 may be in selective communication with one or more elements ofuser equipment 115. The EPC 120 may be in communications with thebase stations 110 and apacket data network 125, and may serve as a gateway providing communications services of thepacket data network 125 to theuser equipment 115. To perform the gateway functions, the EPC 120 may include a serving gateway (SGW) 130 and a packet data network (PDN) gateway (PGW) 140. Thesystem 100 may further include a policy and charging rule function node (PCRF) 170 of an Internet Protocol (IP) Multimedia Subsystem (IMS) in communication with a subscription profile repository (SPR) 150 maintainingsubscriber profiles 155, an online charging system (OCS) 160 maintainingpolicy counter 165 information, a bearer binding and event reporting function (BBERF) 135 of the SGW 130, and a policy and charging enforcement function (PCEF) 145 of the PGW 140.System 100 may take many different forms and include multiple and/or alternate components and facilities. While anexemplary system 100 is shown inFIG. 1 , the exemplary components illustrated in the Figure are not intended to be limiting. Indeed, additional or alternative components and/or implementations may be used. -
LTE networks 105 are a growing standard in mobile network technology, including enhancements over earlier global system for mobile communications (GSM), enhanced data for global evolution (EDGE) and universal mobile telecommunications system (UTMS) network technologies. AnLTE network 105 may provide downlink peak rates on the order of 100 Mbit/s, uplink rates on the order of 50 Mbit/s and radio access network (RAN) round-trip times on the order of 10 milliseconds. TheLTE network 105 may include one ormore base stations 110, such as eNode B (eNB) nodes, which may combine functionality of base station and radio access controllers (RNC) of 2G or 3G radio access networks. Thebase stations 110 may accordingly support theLTE network 105 air interface and may include functions for radio resource control, user plane ciphering and packet data convergence protocol (PDCP). - The base station or
stations 110 of theLTE network 105 may provide communications services to one or more pieces ofuser equipment 115.User equipment 115 may include any device or devices configured to be operated by one or more users, such as a cellular telephone, laptop computer, tablet computing device, or personal digital assistant, among other exemplary devices. In addition to network functionality,user equipment 115 may include one or more components capable of receiving input such as voice and data entry from a user, and providing output to the user such as audible and/or visual output. - The EPC 120 may be an Internet Protocol (IP) network and may be substantially packet-switched. Thus, services such as voice (e.g., voice over LTE) and Internet may accordingly be provided to the
user equipment 115 as packet-switched communications via thepacket data network 125 by way of the EPC 120. The EPC 120 may further charge a subscriber associated with theuser equipment 115 for use of provided data services and ensure that particular quality of service (QoS) standards are met. - The SGW 130 may be configured to operate as a gateway between the EPC 120 and the
LTE network 105, and may provide connectivity foruser equipment 115 data entering the EPC 120 as well as management of mobility ofuser equipment 115 among thebase stations 110. While only one SGW 130 is illustrated, in many examples the EPC 120 may includemultiple SGWs 130 in communication withvarious base stations 110 of theLTE network 105. The SGW 130 may also include a bearer binding and event reporting function (BBERF) 135 configured to apply QoS rules to service data flows (e.g., packet flows fromuser equipment 115 of a particular service type) and binding of the service data flows to access bearers in the bearer-plane. - The PGW 140 may be configured to operate as the gateway between the EPC 120 and the
packet data network 125, and may provide connectivity foruser equipment 115 data between the EPC 120 and thepacket data network 125. The PGW 140 may include a PCEF 145 that enforces policy and charging control (PCC) rules for the service data flows. PCC rules may include, for example, information sufficient to identify user sessions and to apply policy control and charging to the identified flows. - The SPR 150 may be configured to store and retrieve QoS and charging subscription policies associated with subscribers or
user equipment 115 connected to thesystem 100. TheSPR 150 may accordinglystore subscriber profiles 155 including subscriber identifiers and indications of subscription information associated with each subscriber identifier, such as indicators that may be used to determine whether a spending limit session (e.g., Sy session) is needed for the subscriber, and, if so which spending limit session dependent policies should be used for data sessions of the subscriber. The determined policies may be indicative of how to handle subscriber data flows based on policy counter status information. The policy counter status information may be based on factors such as how much of the subscriber's monthly data allowance (e.g., in terms of money, volume, duration, etc.) the subscriber may have consumed. The policies may include throttling actions that may be performed on subscriber data flows according to the subscriber reaching subscriber spending limits. In some examples the SPR 150 may also be integrated with a home subscriber server database configured to store further user information and profiles to facilitate multimedia services such as SIP calling functionality. - The OCS 160 may be configured to track spending in the form of
policy counter 165 status for each subscriber or subscription.Policy counters 165 may include various mechanisms of the OCS 160 that may be used to track spending applicable to a subscriber. The OCS 160 may be further configured to report thepolicy counter 165 status values for the subscriber when requested to thePCRF 170 when apolicy counter 165 status changes (e.g., exceeds a threshold value of usage), and report the change to thePCRF 170. - The PCRF 170 may be configured to make traffic policing and other policy and charging control decisions for data sent to and received by the
user equipment 115. The PCRF 170 may be configured to take into account spending limits when making the policy determinations. Accordingly, the PCRF 170 may be configured to requestsubscriber profiles 155 from the SPR 150 andpolicy counter 165 status information from the OCS 160 to make the policy determinations. The PCRF 170 may be further configured to perform additional control of the policy counter status information, such as to cancel, reset, or otherwise control spending limit reporting. - Based on the policy determinations, the
PCRF 170 may be further configured to provide charging and QoS rules to thePCEF 145 and QoS rules to the bearer binding and event reporting function (BBERF) 135 for enforcement. Exemplary policy enforcement actions may include one or more of dropping a connection that violates a policy or QoS rule, delaying the connection, or downgrading the connection (e.g., limiting a bandwidth rate of a connection associated with a subscriber exceeding a usage threshold of a subscriber profile 155). -
FIG. 2 illustrates an exemplary signaling diagram 200 of thesystem 100 for creation of a spending limit session that is active before processing a user request for network services. Creation of the exemplary spending limit session may be triggered byuser equipment 115 connection to the network (e.g., an IMS attachment), where the spending limit session (in this example Sy session) may be created for those subscribers whose subscriber profiles 155 indicate that they areOCS 160 subscribers. This determination may be performed by sending an initial spendinglimit request PCRF 170 message to theOCS 160 while establishing an initial PDN connection (e.g., IMS PDN). The single spending limit session for anOCS 160 subscriber may begin upon establishment of the initial PDN connection (e.g., to the IMS PDN), may be available to handle later user requests for data services (e.g., according to a created Internet PDN), and may end when the last PDN connection is terminated applicable to any PDN (e.g., according to a determination by theSGW 130 that no PDN connections remain to the attached user equipment 115). The Diameter protocol for authentication, authorization, and accounting is utilized in the examples below, but it should be noted that use of other protocols may be possible (e.g., the remote authentication dial in user service (RADIUS) protocol as one example). - More specifically, with respect to the diagram 200 at index (A), an IMS S5 create session request may be received by the
PCEF 145 of thePGW 140. For example, an item ofuser equipment 115 may send an attach request to abase station 110 of theLTE network 105, which may forward the request to the EPC 120 to generate the create session request message directed to thePGW 140. - At index (B), the
PCEF 145 may send a credit control request initiate (CCR-I) message over the Gx interface to thePCRF 170. CCR messages may be used to request a credit authorization for use of a particular service, and the Gx interface may be configured to exchange policy decision information between thePCEF 145 and the PCRF 170 (e.g., over the Diameter protocol). Accordingly the Gx interface may provide for receiving requests fromuser equipment 115 for application or service requests in the form of CCRs. The CCR message may include subscriber information indicative of the identity of the user equipment 115 (e.g., mobile station international subscriber directory number (MSISDN), international mobile subscriber identity (IMSI), etc.) originating the request sequence. - At index (C), the
PCRF 170 may send a user data request (UDR) message to theSPR 150 to request asubscriber profile 155 associated with the identity of theuser equipment 115. For example, the UDR may be sent over an Sh interface between thePCRF 170 and theSPR 150 configured to facilitate the requesting ofsubscriber profile 155 or other subscription data, as well as for notification of thePCRF 170 of subscription data updates. At index (D), thePCRF 170 may receive a user data answer (UDA) response from theSPR 150 including the requested subscriber profile 155 (e.g., over the Sh interface). At index (E), based on thesubscriber profile 155 thePCRF 170 may perform policy evaluation and execution for the subscriber associated with theuser equipment 115 making the connection. - At index (F), the
PCRF 170 may send a credit control answer initiate (CCA-I) response over the Gx interface to thePCEF 145, and substantially in parallel may send a spending limit request (SLR)-I to theOCS 160. CCA messages are sent in response to CCR messages (such as the CCR message sent at index (B)), and are used to provides responses to requests for credit authorization for use of a particular service (e.g., whether or not the request has been granted). With respect to the spending limit request, it should be noted that use of the SLR to theOCS 160 may be conditional on the contents of the subscriber'sprofile 155 being received from theSPR 150. For example, the SLR may only be sent for subscribers whose subscriber profiles 155 indicate the use ofOCS 160 functionality. - At index (G), the
PCEF 145 returns an S5 create session response back to thePGW 140 responsive to receipt of the CCA-I response. At index (H), a spending limit response or answer (SLA) may be received by the PCRF 170 (i.e., for subscribers that use the OCS 160). The Sy session may thus be created via the SLR/SLA exchange, regardless of whether any further user requests for services are made. Once created, the Sy session may be used to perform spending limit reporting from theOCS 160 to thePCEF 145 using the policy counters 165 of theOCS 160. The Sy session accordingly enables transfer of status information relating to subscriber spending between theOCS 160 and the PCRF 170 (e.g., requests for policy counter status reporting from thePCRF 170 to theOCS 160, notifications ofpolicy counter 165 status changes from theOCS 160 to thePCRF 170, cancellations ofpolicy counter 165 status reporting from thePCRF 170 to theOCS 160, etc.). As a specific example, if a daily spending limit for a subscriber is reached, theOCS 160 may inform thePCEF 145 via the Sy session of apolicy counter 165 status change indicative of the daily spending limit being reached. As the Sy session may be per-OSC 160 subscriber and not per access point, the spending limit request message may not include an access point name (APN). - Further signaling may be triggered by
user equipment 115 attachment to an Internet PDN (or to other PDNs subject toOCS 160, e.g., a control function PDN). For example, as illustrated at index (I), an S5 create session request Internet message may be received by thePGW 140 indicative of auser equipment 115 request for Internet services. At index (J), thePCEF 145 may send an Internet credit control request (CCR) message over the Gx interface to thePCRF 170. At index (K), thePCRF 170 may perform policy evaluation and execution taking the already active spending limit session into account. Accordingly, as thesubscriber profile 155 spending limits have already been received by thePCRF 170, thePCRF 170 may perform the policy evaluation without blocking on requests to theSPR 150 or on other aspects of the creation of the Sy session. At index (L),PCRF 170 may send a CCA-I response over the Gx interface to thePCEF 145 responsive to the spending limit session and including Sy session-based PCC rules. - At index (M), the
PCEF 145 sends a CCR-I message over the Gy interface to theOCS 160. The Gy interface may be used for reporting and charging functionality, such as to be used by thePCEF 145 to retrievepolicy counter 165 information for the subscriber. At index (N), theOCS 160 receives a response to the CCR-I message over the Gy interface. At index (O), thePCEF 145 returns an S5 create session response back to thePGW 140 responsive to receipt of the CCA-I response. -
FIG. 3 illustrates an exemplary signaling diagram 300 of thesystem 100 for creation of a spending limit session that is not active before processing a user request for network services. As with the diagram 200, creation of the exemplary spending limit session may be triggered byuser equipment 115 IMS attachment as described above with respect to indices (A) through (F). However, as compared to the scenario in diagram 200, the response to the spending limit request (SLR)-I to theOCS 160 in diagram 300 at index (H) may not be received until after receipt of the S5 create_session_request Internet message at index (I) indicative of auser equipment 115 request for Internet or other network services. - Thus, at index (J), the
PCEF 145 may send an Internet credit control request (CCR) message over the Gx interface to thePCRF 170, but at index (K), because there is no spending limit session, thePCRF 170 is unable to perform policy evaluation and execution using the spending limit session for the subscriber. Nevertheless, to allow processing of the user request to proceed, thePCRF 170 may perform the policy evaluation and execution using default spending limit session information. Thus default information may, for example, include relatively unrestricted policies that generally allow connections using criteria indicative of substantial use remaining and are not specific to the user equipment. Such permissive defaults may be used, for example, because most users are within their policy limits, so a policy that generally allows requests is likely to be correct in the majority of cases. Thus, despite thesubscriber profile 155 spending limits not having been received by thePCRF 170, thePCRF 170 may perform the policy evaluation using the aforementioned relatively unrestrictive defaults and without blocking on requests to theSPR 150. At index (L),PCRF 170 sends a CCA-I response over the Gx interface to thePCEF 145 indicative of the default PCC rules. - At index (H) upon receipt of the SLA from the
OCS 160, a Sy session may be created. Moreover, if desired to correct any differences in the actual spending limits as compared to the defaults, at index (M) thePCRF 170 may send a re-authorize request (RAR) message to thePCEF 145 including the new policy information according to the received SLA. For instance, the RAR message may include updated policy information such as PCC rules indicative of a lower spending limit for the subscriber than that of the default rules. A RAA message may be sent in response to the RAR message, and may inform thePCRF 170 sender of the RAR message of the disposition of the re-authorize request. For example, the RAA may indicate whether thePCEF 145 has successfully executed the new PCC rules delivered through the RAR message. At index (N) thePCEF 145 may further provide a re-authorize answer (RAA) message to thePCRF 170 indicative of any re-authorization action that may have been taken. - Similar to as discussed above with respect to diagram 200, at index (O), the
PCEF 145 sends a CCR-I message over the Gy interface to theOCS 160, at index (P), theOCS 160 receives a response to the CCR-I message over the Gy interface, and at index (Q), thePCEF 145 returns an S5 create session response back to thePGW 140 responsive to the CCA-I response. - Thus, as illustrated in diagrams 200 and 300, creation of the exemplary spending limit session may be triggered early by
user equipment 115 IMS attachment, thereby allowing user requests for services to be handled without blocking on receipt of subscriber information, regardless of whether the spending limit session is active before or after the initial receipt of a user request for services. Because blocking on user requests is eliminated, thesystem 100 may therefore improve response time and related performance metrics. - Spending limit sessions may at certain times no longer be required and may be terminated to preserve network resources. For example, an Sy session may be terminated by request of the
PCRF 170 or theOCS 160. One method of terminating the spending limit session by theOCS 160 may be performed by using a session notification request (SNR) message. SNR messages may be used to report policy counter changes from theOCS 160 to thePCRF 170. Moreover, when used as an audit message in this method, the SNR may be sent from theOCS 160 to thePCRF 170 without containing apolicy counter 165 status report. Once such a message is received by thePCRF 170, two cases may occur depending on whether or not thePCRF 170 determines it has an active Sy session associated with thesubscriber user equipment 115. -
FIG. 4 illustrates an exemplary signaling diagram 400 of thesystem 100 for termination of a spending limit session in which a spending limit session is active. For example, based on internal audit criteria, theOCS 160 may send an SNR with no policy-counter-status-report to thePCRF 170 to determine whether one of the Sy sessions stored in its internal database is active or stale. A Sy session may be stale if, for example, the associateduser equipment 115 has been turned off or otherwise been detached from the network. At index (A), theOCS 160 may send an SNR to thePCRF 170 including an identifier of the session being queried. ThePCRF 170 may then determine whether any such session is available. At index (B), thePCRF 170 may determine that it does have an Sy session associated to the session identifier, and therefore returns an SNA indicative of that result, e.g., result-code 2001 (i.e., DIAMETER_SUCCESS). Based on the SNA, theOCS 160 may accordingly determine that the Sy session is still active, and may retain a record of the session in its records of active sessions. -
FIG. 5 illustrates an exemplary signaling diagram 500 of thesystem 100 for termination of a spending limit session in which no spending limit session is active. As with diagram 400, at index (A), theOCS 160 may send a SNR including an identifier of the session. However, at index (B), thePCRF 170 may determine that it does not have an Sy session associated to the session identifier, and therefore returns an SNA indicative of that result, e.g., result-code 5002 (i.e., DIAMETER_UNKNOWN_SESSION_ID). Based on the SNA, theOCS 160 may accordingly determine that the Sy session is stale, and may delete a record of the session from its records of active sessions. -
FIG. 6 illustrates anexemplary process 600 for creating a spending limit session for providing charged data services touser equipment 115. Theprocess 600 may be performed by various devices, such as by aPCRF 170 and anOCS 160 of an EPC 120 controlling access ofuser equipment 115 to apacket data network 125. - In
block 602, thePCRF 170 receives an indication ofuser equipment 115 connection to a network such asLTE network 105. For example, an item ofuser equipment 115 may send (e.g, by way of firmware or software of the user equipment 115) an attach request to abase station 110 of theLTE network 105, which may forward the request to the EPC 120 to generate the create_session_request message directed to aPCEF 145 of aPGW 140 of thesystem 100. ThePCEF 145 may accordingly send a credit control request initiate (CCR-I) message over the Gx interface to thePCRF 170. - In
block 604, thePCRF 170 queries for asubscriber profile 155. For example, thePCRF 170 may send a UDR message to aSPR 150 of thesystem 100 to request asubscriber profile 155 associated with the identity of theuser equipment 115, and may receive a UDA response from theSPR 150 including the requestedsubscriber profile 155. - In
block 606, thePCRF 170 creates a spending limit session. For example, for subscribers that use theOCS 160, an Sy session may be created via an SLR/SLA exchange between thePCRF 170 and theOCS 160. Once created, the Sy session may be available to handle later user requests for data services. Afterblock 606, theprocess 600 ends. -
FIG. 7 illustrates anexemplary process 700 for utilizing a spending limit session for providing charged data services to user equipment. As with theprocess 600, theprocess 700 may be performed by various devices, such as by aPCRF 170 and anOCS 160 of an EPC 120 controlling access ofuser equipment 115 to apacket data network 125. - In
block 702, thePCRF 170 receives a request fromuser equipment 115 for data services. For example, thePCEF 145 may request data services, such as by way of sending an Internet or other type of CCR message over the Gx interface to thePCRF 170. - In
decision point 704, thePCRF 170 determines whether a spending limit session for theuser equipment 115 exists. For example, thePCRF 170 may determine whether it has an active spending limit session (e.g., Sy session) associated with the user equipment 115 (e.g., looked up according to a subscriber identifier or session identifier included in the CCR message). If a spending limit session exists for theuser equipment 115, control passes to block 706. Otherwise, control passes to block 708. - In
block 706, thePCRF 170 responds to the request for data services using spending limit session rules of the spending limit session. For example, thePCRF 170 may send a CCA-I response over the Gx interface to thePCEF 145 responsive to the spending limit session and including Sy session based PCC rules. Afterblock 706, theprocess 700 ends. - In
block 708, thePCRF 170 responds to the request for data services using default spending limit session rules. For example,PCRF 170 sends a CCA-I response over the Gx interface to thePCEF 145 indicative of the default PCC rules. - In
block 710, thePCRF 170 receives an indication of creation of a spending limit session for theuser equipment 115. For example, thePCRF 170 may receive a SLA response from theOCS 160 responsive to sending a spending limit request (SLR)-I request to theOCS 160. - In
decision point 712, thePCRF 170 determines whether a rule update is required based on the created spending limit session. For example, thePCRF 170 may compare the rules of the created spending limit session to the default rules, and may identify any rule differences that should be addressed. As an example, the created spending limit session may include a lower daily spending limit for a subscriber than that of the default rules. If a rule update is required, control passes to block 714. Otherwise theprocess 700 ends. - In
block 714, thePCRF 170 provides updated rules to thePCEF 145. For example, thePCRF 170 may send a RAR message to thePCEF 145 including the new policy information according to the received SLA. ThePCEF 145 may further provide a RAA message to thePCRF 170 indicative of any re-authorization action that may have been taken. Afterblock 714, theprocess 700 ends. - Variations on the
process 700 may be possible. For example, rather than theprocess 700 ending after one or more ofblocks -
FIG. 8 illustrates anexemplary process 800 for querying the status of a spending limit session. As with theprocesses process 800 may be performed by various devices, such as by aPCRF 170 and anOCS 160 of an EPC 120 controlling access ofuser equipment 115 to apacket data network 125. - In
block 802, thePCRF 170 receives an identifier of a spending limit session. For example, the requester (e.g., an OCS 160) may send a SNR including an identifier of the session (e.g., Session-ID) to thePCRF 170. In some examples, the requester may periodically send SNRs to thePCRF 170 to allow the requester to update its records of what spending limit sessions may still be active. - In
block 804, thePCRF 170 queries for the identified spending limit session. For example, thePCRF 170 may determine whether or not it has an active spending limit session (e.g., Sy session) associated with the identifier of the session. - In
block 806, thePCRF 170 returns a status indicative of whether the spending limit session is active. For example, if thePCRF 170 determines that it does have an active session corresponding to the identifier, thePCRF 170 may respond to the SNR with an SNA indicative of that result, e.g., with result-code 2001 (i.e., DIAMETER_SUCCESS). Otherwise, if thePCRF 170 determines that it does not have an active session corresponding to the identifier, thePCRF 170 may respond to the SNR with an SNA indicative of that result, e.g., with result-code 5002 (i.e., DIAMETER_UNKNOWN_SESSION_ID). In some examples, the requester may update its records of what spending limit sessions may still be active based on the SNA result. For instance, based on the result-code returned in the SNA, theOCS 160 may selectively remove record of the queried for spending limit session from its own records. Afterblock 806, theprocess 800 ends. - Thus, by performing early creation of a spending limit session upon establishment of an initial packet data connection from an item of user equipment 115 (e.g. IMS PDN) rather than waiting for establishment of later PDNs (e.g., Internet PDN), and maintenance of the spending limit session until a last packet data connection of the
user equipment 115 has been terminated (e.g., IMS PDN, Internet PDN), thesystem 100 may be configured to make policy decisions based on subscriber spending limits in a way that does not impact connection time performance baselines (e.g., time to respond to requests for Internet connections). Due to the early creation based on the subscriber profile without waiting to receive a request from theuser equipment 115 for data services, upon receipt of a first request for data services by theuser equipment 115, in many cases the spending limits associated with the subscriber may already be received by thePCRF 170 and be available for use in policy determinations. Moreover, in cases in which the spending limits associated with the subscriber have not yet been received, thePCRF 170 may utilize default spending limits values to perform an initial policy determination without waiting for creation of the spending limit session, potentially followed up by any necessary corrections to the determination upon later receipt of the actual subscriber information of an identified spending limit session specifically corresponding to theuser equipment 115. By way of these enhancements, policy decisions may no longer block waiting onsubscriber profiles 155 information maintained by theSPR 150, thereby improving performance baselines for user equipment service requests. - In general, computing systems and/or devices, such as the
user equipment 115,SGW 130,PGW 140,SPR 150,OCS 160, andPCRF 170, may employ any of a number of computer operating systems, including, but by no means limited to, versions and/or varieties of the Microsoft Windows® operating system, the Unix operating system (e.g., the Solaris® operating system distributed by Oracle Corporation of Redwood Shores, Calif.), the AIX UNIX operating system distributed by International Business Machines of Armonk, N.Y., the Linux operating system, the Mac OS X and iOS operating systems distributed by Apple Inc. of Cupertino, Calif., the BlackBerry OS distributed by Research In Motion of Waterloo, Canada, and the Android operating system developed by the Open Handset Alliance. - Computing devices such as the
user equipment 115,SGW 130,PGW 140,SPR 150,OCS 160, andPCRF 170 generally include computer-executable instructions, where the instructions may be executable by one or more processors of the computing devices. Computer-executable instructions may be compiled or interpreted from computer programs created using a variety of programming languages and/or technologies, including, without limitation, and either alone or in combination, Java™, C, C++, Visual Basic, Java Script, Perl, etc. In general, a processor or microprocessor receives instructions, e.g., from a memory, a computer-readable medium, etc., and executes these instructions, thereby performing one or more processes, including one or more of the processes described herein. Such instructions and other data may be stored and transmitted using a variety of computer-readable media. - A computer-readable medium (also referred to as a processor-readable medium) includes any non-transitory (e.g., tangible) medium that participates in providing data (e.g., instructions) that may be read by a computer (e.g., by a processor of a computing device). Such a medium may take many forms, including, but not limited to, non-volatile media and volatile media. Non-volatile media may include, for example, optical or magnetic disks and other persistent memory. Volatile media may include, for example, dynamic random access memory (DRAM), which typically constitutes a main memory. Such instructions may be transmitted by one or more transmission media, including coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to a processor of a computer. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- Databases, data repositories or other data stores described herein, such as the
SPR 150 storing the subscriber profiles 155, may include various kinds of mechanisms for storing, accessing, and retrieving various kinds of data, including a hierarchical database, a set of files in a file system, an application database in a proprietary format, a relational database management system (RDBMS), etc. Each such data store is generally included within a computing device employing a computer operating system such as one of those mentioned above, and are accessed via a network in any one or more of a variety of manners. A file system may be accessible from a computer operating system, and may include files stored in various formats. An RDBMS generally employs the Structured Query Language (SQL) in addition to a language for creating, storing, editing, and executing stored procedures, such as the PL/SQL language mentioned above. - In some examples, system elements may be implemented as computer-readable instructions (e.g., software) on one or more computing devices (e.g., servers, personal computers, etc.), stored on computer readable media associated therewith (e.g., disks, memories, etc.). A computer program product may comprise such instructions stored on computer readable media for carrying out the functions described herein. In some example, software may be provided that when executed by one or more processors of the computing devices (e.g., the
user equipment 115,SGW 130,PGW 140,SPR 150,OCS 160, and PCRF 170) provides the operations described herein. Alternatively, the software may be provided as hardware or firmware, or combinations of software, hardware and/or firmware. For instance, a policy and chargingfunction node 170 of the network may be implemented as a computing device including a processor configured to execute software or firmware instructions stored on a memory of the policy and chargingfunction node 170. - With regard to the processes, systems, methods, heuristics, etc. described herein, it should be understood that, although the steps of such processes, etc. have been described as occurring according to a certain ordered sequence, such processes could be practiced with the described steps performed in an order other than the order described herein. It further should be understood that certain steps could be performed simultaneously, that other steps could be added, or that certain steps described herein could be omitted. In other words, the descriptions of processes herein are provided for the purpose of illustrating certain embodiments, and should in no way be construed so as to limit the claims.
- Accordingly, it is to be understood that the above description is intended to be illustrative and not restrictive. Many embodiments and applications other than the examples provided would be apparent upon reading the above description. The scope should be determined, not with reference to the above description, but should instead be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. It is anticipated and intended that future developments will occur in the technologies discussed herein, and that the disclosed systems and methods will be incorporated into such future embodiments. In sum, it should be understood that the application is capable of modification and variation.
- All terms used in the claims are intended to be given their broadest reasonable constructions and their ordinary meanings as understood by those knowledgeable in the technologies described herein unless an explicit indication to the contrary in made herein. In particular, use of the singular articles such as “a,” “the,” “said,” etc. should be read to recite one or more of the indicated elements unless a claim recites an explicit limitation to the contrary.
- The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/890,620 US8897749B1 (en) | 2013-05-09 | 2013-05-09 | Policy decisions based on subscriber spending limits |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/890,620 US8897749B1 (en) | 2013-05-09 | 2013-05-09 | Policy decisions based on subscriber spending limits |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140335815A1 true US20140335815A1 (en) | 2014-11-13 |
US8897749B1 US8897749B1 (en) | 2014-11-25 |
Family
ID=51865129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/890,620 Active US8897749B1 (en) | 2013-05-09 | 2013-05-09 | Policy decisions based on subscriber spending limits |
Country Status (1)
Country | Link |
---|---|
US (1) | US8897749B1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104735605A (en) * | 2015-02-06 | 2015-06-24 | 中国联合网络通信集团有限公司 | User service control method and device |
US20170237781A1 (en) * | 2016-02-12 | 2017-08-17 | Oracle International Corporation | Methods, systems, and computer readable media for clearing diameter session information |
US20170244842A1 (en) * | 2014-10-10 | 2017-08-24 | Redknee Inc. | Method, system and apparatus for managing communication sessions using joint storage |
WO2017144736A1 (en) * | 2016-02-23 | 2017-08-31 | Lantia Research, S.L. | System for m2m communication via prepayment |
WO2018044215A1 (en) | 2016-08-31 | 2018-03-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for policy management for temporary products in a telecommunications network |
EP3272065A4 (en) * | 2015-03-18 | 2018-03-21 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for managing subscription to a policy counter |
US20180176389A1 (en) * | 2015-06-12 | 2018-06-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and Apparatus for Managing Subscription to Policy Counters |
US10594499B1 (en) * | 2019-01-16 | 2020-03-17 | T-Mobile Usa, Inc. | Default data session for a wireless communication network |
CN112804716A (en) * | 2020-12-29 | 2021-05-14 | 联想未来通信科技(重庆)有限公司 | Method and device for configuring data limit value and storage medium |
US11638134B2 (en) | 2021-07-02 | 2023-04-25 | Oracle International Corporation | Methods, systems, and computer readable media for resource cleanup in communications networks |
US11709725B1 (en) | 2022-01-19 | 2023-07-25 | Oracle International Corporation | Methods, systems, and computer readable media for health checking involving common application programming interface framework |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3854029B1 (en) * | 2018-09-18 | 2023-11-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for providing a communication service in a communication network using preallocated usage units |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130084826A1 (en) * | 2011-10-03 | 2013-04-04 | Alcatel-Lucent Canada Inc. | Usage sharing across fixed line and mobile subscribers |
US20130246602A1 (en) * | 2010-06-07 | 2013-09-19 | Alcatel-Lucent | Framework for managing failures in outbound messages |
-
2013
- 2013-05-09 US US13/890,620 patent/US8897749B1/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130246602A1 (en) * | 2010-06-07 | 2013-09-19 | Alcatel-Lucent | Framework for managing failures in outbound messages |
US20130084826A1 (en) * | 2011-10-03 | 2013-04-04 | Alcatel-Lucent Canada Inc. | Usage sharing across fixed line and mobile subscribers |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170244842A1 (en) * | 2014-10-10 | 2017-08-24 | Redknee Inc. | Method, system and apparatus for managing communication sessions using joint storage |
US10257366B2 (en) * | 2014-10-10 | 2019-04-09 | Redknee Inc. | Method, system and apparatus for managing communication sessions using joint storage |
CN104735605A (en) * | 2015-02-06 | 2015-06-24 | 中国联合网络通信集团有限公司 | User service control method and device |
EP3272065A4 (en) * | 2015-03-18 | 2018-03-21 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for managing subscription to a policy counter |
US10103897B2 (en) | 2015-03-18 | 2018-10-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for managing subscription to a policy counter |
US20180176389A1 (en) * | 2015-06-12 | 2018-06-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and Apparatus for Managing Subscription to Policy Counters |
US10116807B2 (en) * | 2015-06-12 | 2018-10-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for managing subscription to policy counters |
US10277637B2 (en) * | 2016-02-12 | 2019-04-30 | Oracle International Corporation | Methods, systems, and computer readable media for clearing diameter session information |
US20170237781A1 (en) * | 2016-02-12 | 2017-08-17 | Oracle International Corporation | Methods, systems, and computer readable media for clearing diameter session information |
WO2017144736A1 (en) * | 2016-02-23 | 2017-08-31 | Lantia Research, S.L. | System for m2m communication via prepayment |
WO2018044215A1 (en) | 2016-08-31 | 2018-03-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for policy management for temporary products in a telecommunications network |
CN109891840A (en) * | 2016-08-31 | 2019-06-14 | 瑞典爱立信有限公司 | The method and apparatus of the tactical management of interim products in telecommunication network |
US11271761B2 (en) * | 2016-08-31 | 2022-03-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for policy management for temporary products in a telecommunications network |
EP3507952B1 (en) * | 2016-08-31 | 2022-12-14 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for policy management for temporary products in a telecommunications network |
US10594499B1 (en) * | 2019-01-16 | 2020-03-17 | T-Mobile Usa, Inc. | Default data session for a wireless communication network |
CN112804716A (en) * | 2020-12-29 | 2021-05-14 | 联想未来通信科技(重庆)有限公司 | Method and device for configuring data limit value and storage medium |
US11638134B2 (en) | 2021-07-02 | 2023-04-25 | Oracle International Corporation | Methods, systems, and computer readable media for resource cleanup in communications networks |
US11709725B1 (en) | 2022-01-19 | 2023-07-25 | Oracle International Corporation | Methods, systems, and computer readable media for health checking involving common application programming interface framework |
Also Published As
Publication number | Publication date |
---|---|
US8897749B1 (en) | 2014-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8897749B1 (en) | Policy decisions based on subscriber spending limits | |
US10498657B2 (en) | System and method for account level maximum bit rate enforcement | |
US9065660B2 (en) | Usage monitoring after rollover | |
US8620263B2 (en) | Methods, systems, and computer readable media for diameter routing agent (DRA) based credit status triggered policy control | |
US9894560B2 (en) | Method and device for controlling QOS and/or policy and charging control of a guest user | |
AU2011340125B2 (en) | Device, system and method of traffic detection | |
KR101414921B1 (en) | Managing ip -can subscriber sessions in response to changes related to the subscriber | |
WO2017193427A1 (en) | Packet switching service recognition method and terminal | |
US8995305B2 (en) | Sy session creation and recovering from inconsistent session state between PCRF and OCS | |
US8903974B2 (en) | Methods, systems, and computer readable media for user controlled policy sharing | |
US8989047B2 (en) | Rules system versions | |
KR101884048B1 (en) | Methods and nodes for managing network resources as well as a corresponding system and computer program | |
US20120250613A1 (en) | Rules system version cloning | |
US20120290713A1 (en) | Mid-session change support in usage monitoring | |
CN103220651A (en) | Method and equipment for carrying out charging control on application layer data | |
CN111130855B (en) | Problem positioning method and device | |
CN104254061A (en) | Method and equipment for strategy and charging control | |
CA2959553A1 (en) | Method, system and apparatus for managing communication sessions using joint storage | |
US9806893B2 (en) | Methods systems and computer readable media for providing real time data network usage information using subscription profile repository (SPR) | |
US11223492B2 (en) | Wireless communication method and device | |
EP4064756B1 (en) | Bandwidth throttling in a radio access network | |
US10326890B2 (en) | Method, system and apparatus for data session management in core mobile networks | |
US10237418B2 (en) | Methods, systems, and computer readable media for charging based on radio congestion in mobile networks | |
US20150222710A1 (en) | Policy decision point management | |
WO2014040254A1 (en) | Policy coordination between policy enforcement points |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CELLCO PARTNERSHIP D/B/A VERIZON WIRELESS, NEW JER Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EPHRAIM, ROBERT M.;CHEUK, HO YIN;CAKULEV, VIOLETA;REEL/FRAME:030385/0385 Effective date: 20130508 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |