WO2006015548A1 - Methode de traitement fondee sur un evenement de declenchement de chargement et sur un evenement de reautorisation de flux de donnees de paquets - Google Patents
Methode de traitement fondee sur un evenement de declenchement de chargement et sur un evenement de reautorisation de flux de donnees de paquets Download PDFInfo
- Publication number
- WO2006015548A1 WO2006015548A1 PCT/CN2005/001238 CN2005001238W WO2006015548A1 WO 2006015548 A1 WO2006015548 A1 WO 2006015548A1 CN 2005001238 W CN2005001238 W CN 2005001238W WO 2006015548 A1 WO2006015548 A1 WO 2006015548A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- event
- tpf
- ocs
- authentication
- bearer
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/62—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on trigger specification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/66—Policy and charging system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/20—Technology dependant metering
- H04M2215/204—UMTS; GPRS
Definitions
- the present invention relates to the field of packet data charging, and more particularly to a processing method based on packet data flow charging trigger event and re-authentication event. Background of the invention
- FIG. 1 shows a packet data protocol context (PDP Context, Packet Data Protocol Context) activation, data transmission, deactivation flow diagram, as shown in Figure 1, in the General Packet Radio Service (GPRS, General Packet Radio Service), activated
- GPRS General Packet Radio Service
- PDN Packet Data Network
- deactivation flow diagram as shown in Figure 1, in the General Packet Radio Service (GPRS, General Packet Radio Service), activated
- GPRS General Packet Radio Service
- PDN Packet Data Network
- Step 101 The mobile terminal (MS) sends a PDP Context Request (Active PDP Context Request) to the Serving GPRS Support Node (SGSN), where the Activate PDP Context Request carries the network layer service access point identifier.
- NSAPI Network Layer Service Access Point Identifier
- information such as PDP type, access point name (APN, Access Point Name), required quality of service (QoS) parameter, transaction identifier ( ⁇ , Transaction Identifier), etc.
- NSAPI is The SGSN and the Gateway GPRS Support Node (GGSN) are used as part of the Tunnel Identifier (TID) to identify the PDP Context.
- the PDP type includes the end-to-end protocol (PPP, Peer- Peer Protocol type, Internet Protocol (IP) type, etc.;
- APN can be provided by the MS to the SGSN, and the SGSN is addressed to the corresponding GGSN according to the APN, and the GGSN is The MS may not provide the APN to the SGSN according to the APN.
- the SGSN may select the default APN according to the subscription information of the MS user.
- the QoS parameter is the quality requirement of the packet data service specified by the MS. ⁇ Used by the MS to identify a PDP context
- Step 102 After receiving the Activate PDP Context Request, the SGSN performs security check and encryption with the MS. This step is optional.
- Step 103 The SGSN parses the address information of the GGSN according to the APN. If the SGSN can parse the address information of the GGSN according to the APN, the TEID is created for the PDP Context, and the TEID can be an International Mobile Subscriber Identity (IMSI) and an NSAPI.
- the SGSN sends a PDP Context Request to the GGSN.
- the PDP Context Request contains the PDP type, PDP address, APN, QoS parameters, TEID, and selection mode.
- the PDP address can be MS.
- the IP address is an optional parameter.
- the PDP Context creation request may not carry the PDP address.
- the GGSN may assign an IP address to the MS in the subsequent processing, or may assign an IP to the MS by the PDN that finally establishes a connection with the MS. Address;
- the selection mode refers to the APN selection mode, that is, whether the APN is selected by the MS or selected by the SGSN. If the SGSN cannot resolve the address information of the GGSN according to the APN, the SGSN rejects the PDP Context activation request initiated by the MS.
- Step 104 After receiving the PDP Context creation request, the GGSN determines an external PDN according to the APN, then allocates a Charging ID, initiates charging, and negotiates QoS. If the GGSN can meet the quality of service requirements of the QoS parameter, the SGSN sends the SGSN to the SGSN.
- the PDP Context Create Response (Representation PDP Context Response), which carries the TEID, the PDP address, the Backbone Bearer protocol, the agreed QoS parameters, and the Charging ID. If the GGSN cannot meet the quality of service requirements of the QoS parameters, the GGSN rejects the PDP Context creation request initiated by the SGSN. The SGSN then rejects the PDP Context activation request initiated by the MS.
- Step 105 After receiving the PDP Context creation response, the SGSN inserts NSAPI and GGSN address information for identifying the PDP Context in the PDP Context, and selects a radio priority according to the agreed QoS parameter, and then returns a PDP Context activation response to the MS (Activate PDP Context Accept), the PDP Context activation response carries information such as PDP type, PDP address, TI, agreed QoS parameters, wireless priority, PDP configuration options, and the like. And, SG.SN starts charging.
- the MS Upon receiving the PDP Context activation response, the MS has established a direct route between the MS and the GGSN, and can perform packet data transmission.
- Step 106 The MS performs packet data interaction through the SGSN, the GGSN, and the PDN.
- PDP Context Deactivation Request Deactivate PDP Context Request
- Step 108 After receiving the PDP Context deactivation request, the SGSN performs security check and encryption with the MS. This step is an optional step.
- Steps 109 to 111 The SGSN sends a PDP Context Delete Request to the GGSN.
- the PDP Context delete request carries the TEID.
- the GGSN After receiving the PDP Context deletion request, the GGSN ends the charging of the MS, deletes the PDP Context corresponding to the TEID, and then sends a PDP Context Response (DDP) to the SGSN.
- the PDP Context delete response carries the TEID.
- the SGSN After receiving the PDP Context deletion response, the SGSN ends the charging of the MS, deletes the PDP Context corresponding to the TEID, and then sends a PDP Context Deactivation Response (Deactivate PDP Context Response) to the MS.
- the PDP Context deactivation response carries the TI. .
- the MS After receiving the PDP Context deactivation response, the MS deletes the PDP Context corresponding to TI.
- the charging termination point is set in the PDP Context.
- the MS can perform multiple services based on an activated PDP Context, that is, if the PDN can provide multiple services, such as email (email), Based on the WAP (Wireless Application Protocol) browsing service and the file transfer protocol (FTP) file transfer service, the MS can pass an activated PDP after establishing a transmission channel with the PDN.
- email email
- WAP Wireless Application Protocol
- FTP file transfer protocol
- the Context carries various services that the PDN can provide.
- the charging mode of the operator for various services is likely to adopt different charging methods.
- the e-mail receiving and sending events may be triggered by the secondary charging, and the WAP browsing service may be based on the flow accounting fee.
- the rate of the WAP browsing service and the rate of the file transfer service are different according to the flow rate. Therefore, according to the existing GPRS charging system, different services carried by the same PDP Context cannot be performed at all. Perform differentiated billing.
- IP Flow IP Data streams
- IP Flow IP Data streams
- the billing based on IP data stream can be considered to be in the same PDP Context through some filter similar to the sieve.
- the IP data streams of different services are separately filtered, and then the IP data streams filtered by different filters are separately charged to achieve separate charging for different service data flows.
- the fee granularity is much smaller than the billing granularity based on a PDP Context.
- the granularity can be regarded as the size of the sieve hole, based on a PDP Conte.
- the billing granularity of xt is a PDP Context is a
- the meshing granularity based on the IP data stream is an IP service data stream is a sieve hole, that is, a plurality of sieve holes are included for one PDP Context, and therefore, the charging and ratio based on the IP data stream is based on Compared to the charging of a PDP Context, IP data stream based charging can provide operators or service providers with more abundant charging means.
- the 3GPP describes the system structure, functional requirements and message interaction process of the FBC.
- the FBC system structure supporting online charging is shown in Figure 2A.
- the customized application based on mobile network enhanced logic (CAMEL, Customised Application for Mobile Network Enhanced Logic (SCP) Service Control Point (SCP) and Service Data Flow Based Credit Control Function (CCF) 202 constitute an online charging system (OCS, Online Charging System ) 206.
- the CCF 202 communicates with the Service Data Flow Based Charging Rule Function (CRF) 203 through the Ry interface, and the CRF 203 communicates with the Application Function Entity (AF) through the Rx interface.
- the CRF 203 communicates with the Traffic Plane Function (TPF) 205 through the Gx interface, and the CCF 202 communicates with the TPF 205 through the Gy interface.
- CCF Service Data Flow Based Charging Rule Function
- AF Application Function Entity
- TPF Traffic Plane Function
- the structure of the FBC system supporting offline charging is as shown in FIG. 2B.
- the CRJF 203 communicates with the AF 204 through the Rx interface, the CRF 203 communicates with the TPF 205 through the Gx interface, and the TPF 205 communicates with the charging gateway function entity through the Gz interface (CGF, Charging).
- the Gateway Function 207 is interworking with a Charging Collection Function (CCF) 208.
- CCF Charging Collection Function
- the TPF 205 carries the IP data stream.
- the TPF 205 sends a charging rule request to the CRF 203 through the Gx interface, where the charging rule request carries information related to the user and the MS, bearer characteristics, and Network related information, etc., wherein the information related to the user and the MS may be a mobile station international number (MSISDN), an international mobile subscriber identity (IMSI), etc., and the network related information may be a mobile network coding (MNC), a mobile country. Code (MCC), etc.
- MSISDN mobile station international number
- IMSI international mobile subscriber identity
- MNC mobile network coding
- MCC mobile country. Code
- the charging rules may be different, for example, the corresponding rate of the QoS parameter is decreased. decline.
- the TPF 205 may resend the charging rule request to the CRF 203 to request a new charging rule when the bearer is modified; the CRF 203 selects an appropriate charging rule according to the above input information provided by the TPF 205, and returns to the TPF 205.
- the selected charging rule includes charging mechanism, charging type, charging key, service data flow filter, and charging rule priority.
- the charging mechanism may be online charging or offline charging; the charging type may be charging based on the length of time or based on data traffic; the charging key is a parameter related to the rate, and the CRF 203 may not directly.
- the TPF 205 is provided with a rate, and only the rate-related parameters are provided to the TPF 205; the service data filter is used to indicate which IP data streams the TPF 205 filters, and then the TPF 205 filters the filtered IP data according to the charging rules. Billing.
- the service data filter may include an IP5 tuple, and the IP5 tuple may include a source/destination IP address, a source/destination port number (Port Number), a protocol identifier (Protocol ID), and the like.
- the CRF 203 indicates the TPF 205 to the source address. Filters the IP data stream of 10.0.0.1, the destination address is 10.0.0.2, the source/destination port number is 20, the protocol type is Transmission Control Protocol (TCP), and the filtered IP data stream is calculated according to the charging rule. fee.
- TCP Transmission Control Protocol
- the CRF 203 may provide a trigger event (Event Trigger) to the TPF 205 to request the TPF 205 to request a new charging rule from the CRF 205 when a specific event occurs, such as the CRF 203 requesting the TPF 205 to perform an event modification on some bearers. At the time, a new charging rule is requested from the CRF 203. Trigger events can be thought of as events related to billing rules.
- the CRF 203 may also select an appropriate charging rule based on the input information of the AF 204 or the OCS 206, such as the AF 204 notifying the CRF 203 of the current use by the user.
- the service type, CRF 203 selects the corresponding charging rule according to the service type.
- the OCS 206 is composed of two functional entities, the SCP 201 and the CCF (Service Data Flow-Based Credit Control Function) 202.
- the CCF (Service Data Flow Based Credit Control Function) 202 is a functional entity that performs credit control and is only applied to the online meter.
- the fee system can be implemented by adding new functions to the existing OCS 206.
- the CCF (Service Data Flow Based Credit Control Function) 202 manages and controls the user credit.
- the CCF (Service Data Flow Based Credit Control Function) 202 is in the user credit pool.
- the credit is authenticated, and the credit that the user can use is delivered to the TPF 205 through the Gy interface.
- the OCS 206 may request the TPF 205 to report to the re-authorisation triggers when they occur, and then the OCS 206 re-authenticates the user according to the corresponding re-authentication event reported by the TPF 205, and may recalculate the user. Credit. For example, after the user credit provided by the OCS 206 to the TPF 205 is used, the TPF 205 needs to report the allowed user credit usage expiration event to the OCS 206 according to the allowed credit expiration event in the re-authentication event, and the OCS 206 according to the remaining user account. Information, recalculate the credits allowed to be used by the user.
- the OCS 206 determines the rate according to the current location of the user, and calculates the credit of the user according to the rate; when the user moves to another location, if the SGSN changes, the TPF 205 needs to re-examine the basis.
- the SGSN change event in the right event reports the occurrence of the SGSN change event to the OCS 206, and the OCS 206 re-determines the rate according to the current location of the user update, and recalculates the user's credit.
- the OCS 206 determines the rate according to the current QoS parameter of the service used by the user
- the TPF 205 needs to report the occurrence of the bearer modification event to the OCS 206 according to the bearer modification event in the re-authentication event.
- the OCS 206 determines the rate based on the modified QoS parameters of the user and recalculates the credit of the user.
- the TPF 205 is a GGSN
- the AF is a service gateway or a service server in the PDN
- the CRF 203 is a new logical entity.
- TPF 205 is the charging rule
- the enforcement point, CRF 203 is the control point of the charging rule.
- the triggering event triggers the charging rule request process, that is, the TPF requests the charging rule from the CRF, and the triggering event triggers the TPF to request the charging rule from the CRF.
- the charging rule request process that is, the TPF requests the charging rule from the CRF
- the triggering event triggers the TPF to request the charging rule from the CRF.
- Step 301 The user equipment (UE) sends a Modify Bearer Service Request to the TPF.
- the GGSN receives the PDP Context Request (Update PDP Context Request).
- Step 302 After receiving the bearer modification request, the TPF matches the bearer modification event with the pre-stored trigger event. If yes, go to step 303; otherwise, continue to monitor the trigger event.
- Step 303 The TPF sends a Request Charging Rule to the CRF, where the charging rule request carries the input information for determining the charging rule by the CRF.
- Steps 304 to 305 After receiving the charging rule request, the CRF may, according to the input information carried in the charging rule request, select an appropriate charging rule according to the related input information provided by the AF, and then return the provisioning to the TPF. Provision Charging Rules, which can be carried with the selected charging rules and charging rule operation instructions.
- Step 306 After receiving the charging rule, the TPF performs corresponding operations on the charging rule selected by the CRJF according to the charging rule operation indication.
- Step 307 The TPF returns a Modify Bearer Service Accept to the UE, and continues the subsequent bearer modification process.
- the bearer modification triggers the re-authentication process, that is, the TPF requests the OCS to re-authenticate the user.
- the specific implementation process is shown in Figure 4:
- Step 401 The UE sends a Modify Bearer Service Request to the TPF.
- the GGSN receives a PDP Context Request (Update PDP Context Request).
- Step 402 After receiving the bearer modification request, the TPF matches the bearer modification event with the pre-stored re-authentication event. If yes, go to step 403. Otherwise, continue to monitor the occurrence of the re-authentication event.
- Step 403 The TPF sends a credit control request (Credit Control Request) to the OCS, where the credit control request carries the remaining credit of the user and related charging rule information, and requests the OCS to recalculate the credit of the user.
- the relevant charging rule information provided by the TPF to the OCS can be obtained from the CRF.
- Step 404 After receiving the credit control request, the OCS recalculates the credit of the user, and then returns a credit control response (Credit Control Answer) to the TPF. If the OCS calculates the credit of the user, the credit control response carries the OCS re The calculated user credit, if the OCS does not calculate the credit of the user, the credit control response may carry an error reason value.
- Step 405 After receiving the credit control response, the TPF returns a Modify Bearer Service Accept to the UE. If the credit control response carries the user's credit, the TPF accepts the bearer modification request initiated by the UE, and continues the subsequent bearer. Modifying the process; if the credit control response does not carry the user's credit, the UE-initiated bearer modification request is rejected.
- the specification describes the charging mode of the CRF that controls the TPF through the triggering event reporting mechanism, that is, the TPF reports the trigger event to the CRF, and the CRF learns the change of the bearer through the trigger event reported by the TPF, and then determines the corresponding meter.
- the fee rules are issued to the TPF.
- Trigger events defined in the specification may include: SGSN change events, QoS changes events, RAT type change events, transport stream template (TFT) changes ( TFT change) event.
- the specification also describes how the OCS controls the credit usage of the TPF through the mechanism reported by the re-authentication event, that is, the TPF reports to the OCS after the re-authentication event occurs.
- the OCS obtains the credit usage of the user and the change of the bearer through the re-authentication event reported by the TPF, and recalculates the credit of the user and delivers the credit to the TPF.
- the re-authentication event defined in the specification may include: a credit authorization lifetime expiry event, a user idle state timeout (idle timeout event), a charging rule is changed event, and may also include some GPRS events. , such as SGSN change event, QoS parameter change event, RAT type change event.
- both the trigger event and the re-authentication event include GPRS events, such as SGSN change events, QoS parameter change events, RAT type change events, etc., so that for a certain GPRS event, the TPF will use the GPRS event.
- the trigger event and the re-authentication event are matched. Therefore, the occurrence of the GPRS event needs to be reported to the CRF and the OCS respectively.
- the CRF may select a new charging rule according to the received triggering event, and deliver the selected new charging rule to the TPF.
- the new charging rule sent by the CRF to the TPF may match the charging rule change event in the re-authentication event, and the re-authentication process is triggered again, so that the first re-authentication process becomes redundant.
- the processing process wastes the interface resources between the TPF and the OCS in the FBC system.
- an object of the present invention is to provide a method for processing a packet data stream charging trigger event and a re-authentication event, and to improve a re-authentication process based on packet data flow charging.
- the present invention provides a processing method based on packet data flow charging trigger event and re-authentication event, the method comprising the following steps:
- the TPF determines whether the currently occurring bearer event matches the trigger event, and if yes, step B is performed; otherwise, step C is directly performed; B.
- the TPF triggers the charging rule request process;
- the TPF determines whether the re-authentication process needs to be triggered. If yes, the re-authentication process is triggered. Otherwise, the current process ends.
- the step B includes: The TPF requests an accounting rule from the CRF, and the CRF returns a selected charging rule to the TPF.
- the step B further includes: the TPF providing the CRF with the currently occurring bearer event. If the TPF determines that the currently occurring bearer event matches the triggering event, the determining whether the triggering re-authentication process needs to be triggered in step C is: determining whether the charging rule provided by the CRJF changes, and if so, triggering the re-authentication process ; Otherwise, the current process ends.
- the method further includes: determining whether the change of the charging rule needs to trigger the re-authentication process, and if yes, triggering the re-authentication process; otherwise, ending the current process.
- the method further includes: the TPF determining whether the currently occurring bearer event matches the re-authentication event, and if yes, triggering the re-authentication process, and further providing the OCS with the currently occurring bearer Event; otherwise, only the reauthentication process is triggered.
- the trigger re-authentication process further includes: the TPF providing the OCS with a changed charging rule. If the TPF determines that the currently occurring bearer event does not match the triggering event, the determining whether the triggering re-authentication process needs to be triggered in step C is: determining whether the currently occurring bearer event matches the re-authentication event, and if so, The re-authentication process is triggered; otherwise, the current process is ended.
- the trigger re-authentication process further includes: the TPF providing the OCS with the currently occurring bearer event.
- the trigger re-authentication process includes: the TPF requests a user credit from the OCS, and the OCS returns a recalculated user credit to the TPF.
- the trigger event is provided by the CRF to the TPF.
- the re-authentication event is provided by the OCS to the TPF, or is provided by the OCS through the CRF to the method according to the present invention.
- the TPF first determines whether the bearer event that occurs is matched with the trigger event, and if yes, The triggering event is reported to the CRF. Then, it is determined whether the occurrence of the bearer event matches the re-authentication event. If the match occurs, the re-authentication event of the re-authentication event is reported to the OCS, and the subsequent re-authentication process is continued.
- Figure 1 shows the PDP Context activation, data transmission, deactivation flowchart
- Figure 2A shows the structure of the FBC system supporting online charging
- Figure 2B shows a block diagram of an FBC system supporting offline charging
- FIG. 3 is a flow chart showing a triggering rule triggered by a trigger event TPF to a CRF in the prior art
- FIG. 4 is a flow chart showing a re-authentication of a TPF request OCS by a re-authentication event trigger in the prior art
- Fig. 5 is a flow chart showing the processing of the trigger event and the re-authentication event in the present invention
- Fig. 6 is a diagram showing the process message interaction of the trigger event and the re-authentication event in the present invention. Mode for carrying out the invention
- the TPF when a bearer event occurs, the TPF first determines whether the bearer event that occurred is Matching with the triggering event, if it matches, report the triggering event to the CRF; and then determine whether the occurrence of the bearer event matches the re-authentication event. If it matches, report the re-authentication event to the OCS, and continue to follow. Re-authentication process. In this way, only one re-authentication interaction needs to be performed between the TPF and the OCS, and the re-authentication process when the trigger event and the re-authentication event overlap are optimized.
- FIG. 5 is a flowchart of processing of a trigger event and a re-authentication event in the present invention. As shown in FIG. 5, the processing of the trigger event and the re-authentication event includes the following steps:
- Step 501 to step 502 The TPF monitors the occurrence of the bearer event, and determines whether the bearer event that occurs is matched with the trigger event. If yes, step 503 is performed; otherwise, step 507 is performed.
- Step 503 The TPF triggers the charging rule request process, that is, the TPF provides the CRF with the input information of the selected charging rule, and further provides the CRF with the currently occurring bearer event, to notify the CRF that the triggering event of the charging rule request process is triggered.
- the CRF is requested to provide a charging rule.
- the CRF After receiving the charging rule request, the CRF provides the selected charging rule and the charging rule operation instruction to the TPF according to the provisioning input information and the charging event selection charging rule.
- the TPF performs the corresponding operation on the charging rule selected by the CRF according to the charging rule operation instruction.
- Step 504 The TPF determines whether the charging rule provided by the CRF is changed. If yes, step 505 is performed; otherwise, step 507 is performed.
- Step 505 The TPF determines whether the change of the charging rule needs to trigger the re-authentication process. If yes, step 506 is performed; otherwise, step 507 is performed.
- Step 506 The TPF determines whether the currently occurring bearer event matches the re-authentication event. If yes, step 508 is performed; otherwise, step 509 is performed.
- Step 507 The TPF determines whether the currently occurring bearer event matches the re-authentication event. If yes, step 508 is performed; otherwise, the current process ends.
- the re-authentication event that currently triggers the re-authentication process; the OCS provides the recalculated user credit to the TPF and then ends the current process.
- Step 509 The TPF triggers the re-authentication process, that is, the TPF provides the OCS with the user's remaining credit and related charging rule information, and requests the OCS to recalculate the user's credit; the OCS provides the recalculated user credit to the TPF.
- Step 506 can also be performed at any time between steps 501 and 505. As long as the TPF determines that the currently occurring bearer event matches the re-authentication event, the next step 508 triggers the re-authentication process to further provide the OCS. The currently occurring bearer event is used to notify the OCS of the re-authentication event currently occurring.
- FIG. 6 shows a process message interaction diagram of a trigger event and a re-authentication event in the present invention.
- the message interaction process in the process of triggering event and re-authentication event processing includes the following steps:
- Step 601 is the same as step 301.
- Step 602 After receiving the bearer modification request, the TPF matches the currently occurring bearer modification event with the pre-stored trigger event. If yes, go to step 603; otherwise, go to step 608.
- the specific implementation process is as follows:
- the TPF sends a charging rule request to the CRF.
- the charging rule request carries the charging rule input information, such as the information of the UE, the bearer attribute, and
- the CRF selects the appropriate charging rule based on the received revenue information.
- the CRF can further determine the triggering event that needs to be monitored by the TPF according to the input information provided by the TPF, and then send the charging rule and the triggering event to the CRF. TPF.
- the CRF can also provide the TPF with a trigger that requires it to be monitored.
- the TPF reports the trigger event to the CRF.
- the CRF can continue to send a new trigger event to the TPF.
- the CRF receives the input information provided by the external entity, such as the AF and the OCS, it can also provide the TPF with a trigger event that requires it to be monitored. That is, the CRF can actively send a trigger event to the TPF.
- the TPF After receiving the charging rules and triggering events provided by the CRF, the TPF monitors the occurrence of the triggering event, filters out the corresponding IP data stream according to the filter in the charging rule, and then applies the corresponding charging rule to filter. The outgoing IP data stream is charged.
- the OCS can provide the TPF with a re-authentication event that requires it to be monitored. For example, in the authentication process, the TPF sends a credit request to the OCS. After receiving the credit request, the OCS calculates the credit of the user and returns it to the TPF. The returned credit response carries the user credit, and may further carry the weight of the woman. The event requires the TPF to monitor the re-authentication event provided. When the re-authentication event occurs, the re-authentication process is triggered, and the current re-authentication event is reported to the OCS. The OCS can also send re-authentication events to the TPF through the CRF.
- the TPF reports the re-authentication event that is currently occurring to the OCS. After receiving the re-authentication event reported by the TPF, the OCS can continue to send a new re-authentication event to the TPF.
- Step 603 The TPF sends a charging rule request to the CRF, where the charging rule request carries the input information for the CRF to determine the charging rule, where the charging rule request may further carry the currently occurring bearer related event, to notify The CR triggers a trigger event for the current charging rule request process.
- Steps 604 to 606 are the same as steps 304 to 306.
- Step 607 The TPF determines whether the charging rule provided by the CRF changes. If the charging rule changes, it continues to determine whether the change of the charging rule needs to trigger the re-authentication process. If yes, proceed to step 608; If there is no change or the change of the charging rule does not need to trigger the re-authentication process, step 608 is performed.
- Step 608 The TPF matches the currently occurring bearer modification event with the pre-stored re-authentication event. If yes, step 609 is performed; otherwise, the TPF continues to determine whether it is determined in step 607 whether the re-authentication process needs to be triggered. If necessary, step 609 is performed. If not, step 611 is directly performed.
- Step 609 The TPF sends a credit request (Credit Request) to the OCS, where the credit request carries the user's remaining credit and related charging rule information, and requests the OCS to recalculate the user's credit. If it is determined in step 607 that the re-authentication process needs to be triggered, the credit request sent by the TPF to the OCS may further carry the modified charging rule information. In addition, if it is determined in step 608 that the re-authentication process needs to be triggered, the bearer information modified in the bearer modification event may be further provided in the credit request message sent by the TPF to the OCS.
- Step 610 After receiving the credit request, the OCS recalculates the credit of the user, and then returns a credit response (Credit Answer) to the TPF. If the OCS calculates the credit of the user, the credit response carries the user credit recalculated by the OCS. If the OCS does not calculate the credit of the user, the credit response may carry an error reason value.
- Step 611 The TPF returns a bearer modification response to the UE, and determines whether to accept the bearer modification request initiated by the UE according to the foregoing processing result. If yes, the subsequent bearer modification process is continued; otherwise, the UE initiated bearer modification request is rejected, for example, if the credit If the response carries the user's credit, the TPF accepts the bearer modification request initiated by the UE, and continues the subsequent bearer modification process. If the credit response does not carry the user's credit, the UE initiates the bearer modification request.
- step 607 when the TPF determines that the charging rule changes, and the charging rule change event needs to trigger the re-authentication process, step 609 may be directly performed, and step 608 is not performed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Meter Arrangements (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
- Coin-Freed Apparatuses For Hiring Articles (AREA)
- Secondary Cells (AREA)
- Charge And Discharge Circuits For Batteries Or The Like (AREA)
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE200560006094 DE602005006094T2 (de) | 2004-08-11 | 2005-08-11 | Verarbeitungsverfahren auf der basis eines charging-trigger-ereignisses und eines neuauthorisationsereignisses eines paketdatenflusses |
EP20050772490 EP1693984B1 (en) | 2004-08-11 | 2005-08-11 | A processing method based on charging trigger event and re-authorisation event of packet data flow |
JP2007501099A JP4402714B2 (ja) | 2004-08-11 | 2005-08-11 | フローベース課金におけるイベント・トリガと再認証トリガを取り扱う方法 |
US10/563,023 US20080320564A1 (en) | 2004-08-11 | 2005-08-11 | Method for Handling Event Triggers and Re-Authorization Triggers in Flow Based Charging |
CA 2540922 CA2540922C (en) | 2004-08-11 | 2005-08-11 | A method for handling event triggers and re-authorization triggers in flow based charging |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200410059148.9 | 2004-08-11 | ||
CNB2004100591489A CN1260910C (zh) | 2004-08-11 | 2004-08-11 | 基于分组数据流计费触发事件和重授权事件的处理方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006015548A1 true WO2006015548A1 (fr) | 2006-02-16 |
Family
ID=34868765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2005/001238 WO2006015548A1 (fr) | 2004-08-11 | 2005-08-11 | Methode de traitement fondee sur un evenement de declenchement de chargement et sur un evenement de reautorisation de flux de donnees de paquets |
Country Status (8)
Country | Link |
---|---|
US (1) | US20080320564A1 (zh) |
EP (1) | EP1693984B1 (zh) |
JP (1) | JP4402714B2 (zh) |
CN (1) | CN1260910C (zh) |
AT (1) | ATE392768T1 (zh) |
CA (1) | CA2540922C (zh) |
DE (1) | DE602005006094T2 (zh) |
WO (1) | WO2006015548A1 (zh) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1303781C (zh) * | 2004-04-01 | 2007-03-07 | 华为技术有限公司 | 一种分组数据业务的计费控制方法 |
CN100397821C (zh) * | 2005-01-20 | 2008-06-25 | 华为技术有限公司 | 一种基于分组数据流计费中的处理方法 |
US7764623B2 (en) * | 2005-02-01 | 2010-07-27 | Telefonaktiebolaget L M Ericsson (Publ) | Automatic quality of service class management |
CN101087248B (zh) * | 2006-06-23 | 2010-08-18 | 中兴通讯股份有限公司 | 基于会话业务的网络侧发起承载建立的方法 |
CN101296094B (zh) * | 2007-04-26 | 2011-02-16 | 华为技术有限公司 | 检测承载事件的方法、系统和装置 |
CN101374055B (zh) * | 2007-08-20 | 2012-12-12 | 华为技术有限公司 | 计费处理方法和网络系统、分组数据网络网关及计费系统 |
CN101453380B (zh) * | 2007-11-28 | 2011-08-24 | 华为技术有限公司 | 应用事件检测的方法、系统以及分组流优化功能实体 |
CN101499911B (zh) | 2008-02-03 | 2013-02-06 | 华为技术有限公司 | 计费系统、装置和方法 |
CN101583152B (zh) * | 2008-05-15 | 2011-08-24 | 华为技术有限公司 | 一种信息传递方法、装置和系统 |
US20100284284A1 (en) * | 2009-05-08 | 2010-11-11 | Qualcomm Incorporated | VOICE OVER INTERNET PROTOCOL (VoIP) ACCESS TERMINAL |
CN102638355A (zh) * | 2011-02-14 | 2012-08-15 | 阿尔卡特朗讯 | 基于网络资源使用信息确定策略计费规则的方法和装置 |
WO2013139004A1 (zh) | 2012-03-21 | 2013-09-26 | 华为技术有限公司 | 一种建立演进分组系统承载的方法及基站 |
CN103402178B (zh) * | 2013-08-06 | 2019-05-31 | 百度在线网络技术(北京)有限公司 | 数据流量的控制方法、装置和移动终端 |
US20160198049A1 (en) * | 2013-08-12 | 2016-07-07 | Nec Corporation | Wireless communication system and method for charging control |
US20170163431A1 (en) * | 2014-06-06 | 2017-06-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Notification of Network Events Relevant for Policy and Charging Decisions |
KR20180099930A (ko) * | 2014-10-28 | 2018-09-05 | 콘비다 와이어리스, 엘엘씨 | 기본 네트워크들과의 서비스 계층 과금 상관을 위한 방법들 및 장치들 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07336464A (ja) * | 1994-06-08 | 1995-12-22 | Fujitsu Ltd | 通信サービス制御装置 |
US20030153333A1 (en) * | 2001-05-14 | 2003-08-14 | Ryo Shirai | Obile communication service charging apparatus and mobile communication service charging method |
CN1450749A (zh) * | 2002-04-10 | 2003-10-22 | 华为技术有限公司 | 一种分组数据业务的计费方法 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8699472B2 (en) * | 2000-05-24 | 2014-04-15 | Nokia Corporation | Common charging identifier for communication networks |
EP1223737A1 (en) * | 2001-01-15 | 2002-07-17 | Lucent Technologies Inc. | Providing prepaid service to a GPRS mobile station when roaming |
US6954631B2 (en) * | 2003-02-13 | 2005-10-11 | Hewlett-Packard Development Company, L.P. | Apparatus and method for telecommunications services |
US7720960B2 (en) * | 2003-03-04 | 2010-05-18 | Cisco Technology, Inc. | Method and apparatus providing prepaid billing for network services using explicit service authorization in an access server |
US7721296B2 (en) * | 2003-06-13 | 2010-05-18 | Ericsson Ab | Event based charging in a communications system |
GB0329502D0 (en) * | 2003-12-19 | 2004-01-28 | Nokia Corp | Control decisions in a communication system |
-
2004
- 2004-08-11 CN CNB2004100591489A patent/CN1260910C/zh active Active
-
2005
- 2005-08-11 CA CA 2540922 patent/CA2540922C/en active Active
- 2005-08-11 JP JP2007501099A patent/JP4402714B2/ja active Active
- 2005-08-11 EP EP20050772490 patent/EP1693984B1/en active Active
- 2005-08-11 WO PCT/CN2005/001238 patent/WO2006015548A1/zh active IP Right Grant
- 2005-08-11 AT AT05772490T patent/ATE392768T1/de not_active IP Right Cessation
- 2005-08-11 DE DE200560006094 patent/DE602005006094T2/de active Active
- 2005-08-11 US US10/563,023 patent/US20080320564A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07336464A (ja) * | 1994-06-08 | 1995-12-22 | Fujitsu Ltd | 通信サービス制御装置 |
US20030153333A1 (en) * | 2001-05-14 | 2003-08-14 | Ryo Shirai | Obile communication service charging apparatus and mobile communication service charging method |
CN1450749A (zh) * | 2002-04-10 | 2003-10-22 | 华为技术有限公司 | 一种分组数据业务的计费方法 |
Also Published As
Publication number | Publication date |
---|---|
CN1645806A (zh) | 2005-07-27 |
JP2007535833A (ja) | 2007-12-06 |
EP1693984A1 (en) | 2006-08-23 |
US20080320564A1 (en) | 2008-12-25 |
CN1260910C (zh) | 2006-06-21 |
EP1693984B1 (en) | 2008-04-16 |
EP1693984A4 (en) | 2006-12-06 |
CA2540922A1 (en) | 2006-02-16 |
DE602005006094T2 (de) | 2009-05-20 |
ATE392768T1 (de) | 2008-05-15 |
JP4402714B2 (ja) | 2010-01-20 |
CA2540922C (en) | 2010-06-22 |
DE602005006094D1 (de) | 2008-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006015548A1 (fr) | Methode de traitement fondee sur un evenement de declenchement de chargement et sur un evenement de reautorisation de flux de donnees de paquets | |
US8798575B2 (en) | Method for improving service data flow based charging and system thereof | |
US7889650B2 (en) | Method for establishing diameter session for packet flow based charging | |
EP1804419B1 (en) | A method for processing the re-authorisation based on the charging of the packet data flow | |
WO2006047965A1 (fr) | Procede de traitement de facturation en ligne | |
WO2005096547A1 (fr) | Procede permettant de commander la facturation d'un service de commutation de paquets | |
JP4891223B2 (ja) | パケットデータサービスの課金ルールを強化する方法及びその機能する方法 | |
WO2007143940A1 (fr) | procédé, système et équipement de contrôle des conditions d'utilisation et de la facturation lorsque l'utilisateur est mobile | |
WO2010108356A1 (zh) | 一种终端通过多接入网接入的计费方法和系统及上报方法 | |
WO2005109748A1 (fr) | Procede de selection de la regle de taxation destine a des utilisateurs | |
WO2011029289A1 (zh) | 漫游场景下承载控制模式的发送方法和系统 | |
WO2006050669A1 (fr) | Procede de chargement en fonction d'un flux de paquets de donnees | |
WO2013060170A1 (zh) | 一种提供基于lipa承载的计费支持的方法及装置 | |
WO2014094488A1 (zh) | 漫游本地业务的计费策略方法及装置 | |
WO2014107985A1 (zh) | 漫游本地业务的在线计费方法、h-ocs及v-ocs | |
WO2005101734A1 (fr) | Procede de facturation de services de donnees par paquets et de controle d'acces de flux de donnees de services | |
WO2010118673A1 (zh) | 策略和计费控制的处理方法、系统及设备 | |
WO2006015543A1 (en) | A processing method for re-authorization and re-authorization event and event triggers | |
WO2006060964A1 (fr) | Systeme et procede de traitement permettant une facturation en fonction du flux de paquets de donnees | |
WO2018228215A1 (zh) | 无线通信的方法和设备 | |
WO2013113263A1 (zh) | 一种应用检测控制功能模式的识别方法及系统 | |
WO2011127666A1 (zh) | 计费处理方法、计费处理装置和计费处理系统 | |
WO2006050670A1 (fr) | Procede de traitement de cle de taxation | |
WO2014079323A1 (zh) | 一种漫游本地业务功能实现方法、装置和系统 | |
WO2012041148A1 (zh) | 一种用量监测方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2540922 Country of ref document: CA Ref document number: 2005772490 Country of ref document: EP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2005772490 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007501099 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10563023 Country of ref document: US |
|
WWG | Wipo information: grant in national office |
Ref document number: 2005772490 Country of ref document: EP |