WO2006024218A1 - Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 - Google Patents

Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 Download PDF

Info

Publication number
WO2006024218A1
WO2006024218A1 PCT/CN2005/001232 CN2005001232W WO2006024218A1 WO 2006024218 A1 WO2006024218 A1 WO 2006024218A1 CN 2005001232 W CN2005001232 W CN 2005001232W WO 2006024218 A1 WO2006024218 A1 WO 2006024218A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
server
charging
user
information
Prior art date
Application number
PCT/CN2005/001232
Other languages
English (en)
French (fr)
Inventor
Hongguang Guan
Jin Wang
Yongqiang Huang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=35999696&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2006024218(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to EP05772879A priority Critical patent/EP1777872B1/en
Priority to AT05772879T priority patent/ATE459148T1/de
Priority to DE602005019576T priority patent/DE602005019576D1/de
Publication of WO2006024218A1 publication Critical patent/WO2006024218A1/zh
Priority to US11/677,915 priority patent/US8813217B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1485Tariff-related aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/35Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/167Adaptation for transition between two IP versions, e.g. between IPv4 and IPv6

Definitions

  • the present invention relates to the field of network communication technologies, and in particular, to a method for implementing authorization and charging for a multi-address user in an IPv6 network. Background of the invention
  • authentication, authorization and charging for host users accessing the network are an important part of user management.
  • the network operator For different users accessing the network, the network operator first needs to authorize the user, allows the user to access the corresponding service, and then separately performs charging based on different services accessed by different users.
  • the billing for the same service that the same user accesses at different times can also be different.
  • the network operator is required to be able to obtain various billing data of users accessing the network.
  • the IETF In an IPv4 network, the IETF (Internet Engineering Task Force) defines RFC2865, RFC2866 (RFC, Request for Comments) and other related RADIUS (Remote Authentication Dial-In User Service) protocols to ensure unified accounting for users.
  • RFC2865 and RFC2866 RFC3162 In IPv6 networks, the IETF defines RFC2865 and RFC2866 RFC3162 to describe the authentication and accounting procedures for IPv6 and IPv4 users.
  • one or more unicast addresses can be assigned to the host user (unicast addresses are used for unicast transmission.
  • unicast transmission a separate data transmission path is established for the source user to each destination user).
  • the actual needs of the network operator may need to be On the RADIUS server, PHCP (Dynamic Host Configuration Protocol) server, or other server, different authorizations are provided for different addresses assigned by the host user, and different charging policies are adopted. For example, when different IP addresses of host users are used to access different services, each service uses different charging rates for the host users.
  • PHCP Dynamic Host Configuration Protocol
  • the object of the present invention is to provide a method for implementing multi-IP address authorization and accounting for a user in an IPy6 network, so that different authorizations can be performed according to different IP addresses of the host, and different charging policies are adopted. Billing is performed separately.
  • the method for implementing authorization and charging for a multi-address user in an IPv6 network includes:
  • the network access server and the authorized charging server obtain the authorized charging information of each address in the packet.
  • the network access server and the authorized charging server respectively perform corresponding authorized charging operations on each address of the user.
  • the authorized accounting server includes: a remote authentication dial-up user service RADIUS server.
  • the authorization charging information includes the following attributes: Type Type, length Length, The number of sub-attributes Attr-Count and/or the sub-attribute content String.
  • the sub-attribute content String includes the following attributes: type Type, length Length, and/or value Value.
  • the value of the value includes one of the following attributes: Host IP address Framed-IP-Address; Host IPv6 address Framed-IPv6-Prefix; Login host IPv6 address Login-IPv6-Host.
  • the value Value includes at least one of the following attributes or any combination: Level Class; State State; Session Duration Session-Timeout; Session Ending Action Flag Termination-Action ; Host Gateway Routing Framed-Routingo
  • the step of performing the interaction between the authorized charging information of each address of the multi-address user and the packet of the expandable field content between the network access server and the authorized charging server according to the step A includes: The server carries the authorization information in an access confirmation message and sends the information to the network access server of the multi-address user.
  • the value Value includes one or any combination of at least the following attributes: a charging session identifier Acct-Session-Id; a meter in units of bytes Charge downstream traffic Acct-Input-Octets; billing upstream traffic Acct-Output-Octets in bytes; billing downstream traffic Acct-Input-Packets in packet packets; packet count The unit's billing upstream traffic Acct-Output-Packets.
  • the step of performing the interaction between the authorized charging information of each address of the multi-address user and the extended field content between the network access server and the authorized charging server according to the step A includes:
  • the network access server carries the charging information in the charging request message and sends the charging information to the authorized charging server.
  • the extensible field includes a self-designated attribute defined by RFC2865 Vendor-Specific field.
  • the present invention extends the access confirmation message sent to the network access server in the RADIUS process and the charging request message sent to the R.ADIUS server, thereby targeting different host addresses.
  • the authorization and accounting information is sent out, so that the RADIUS server, network access server, and other devices can obtain the authorization and accounting information of the corresponding host IP addresses. Therefore, the present invention implements the functions of separately performing authorization according to different IP addresses of the host in the IPv6 network, and performing charging separately by using different charging policies.
  • FIG. 1 is a schematic diagram of a network environment of an application of the present invention
  • the core of the method of the present invention is that in the RADIUS process for the host, the RADIUS server separately authorizes different IP addresses of the host, and sends the authorization information to the network access server, such as BFAS;
  • the incoming server can send the accounting information of the different IP addresses of the same host to the RADIUS server for accounting, so as to implement the authorization and accounting operations for different IP addresses of a host in the IPv6 network.
  • the broadband user ie, the host
  • the broadband user is connected to the Internet through a LAN switch and a BRAS (Broadband Remote Access Server) at the edge of the Internet.
  • broadband users must first perform corresponding identity authentication before going online. Users authenticate through PPP (Point-to-Point Protocol), 802.1X, WEB (World Wide Web) authentication, etc., enter the user name and Password, sent by BR.AS and sent to The RADIUS server authenticates.
  • PPP Point-to-Point Protocol
  • 802.1X Wi-Fi Protectet Access
  • WEB Worldwide Wide Web
  • the basic working principle of the RADIUS includes: after the user accesses the network access server (such as a BRAS device), the network access server submits the user information, including the username, to the RADIUS server using an Access-Require message. , password and other related information; RADIUS server checks the legality of the user name and password; if it is legal, returns an access confirmation (Access-Accept) to the network access server.
  • the network access server such as a BRAS device
  • the network access server submits the user information, including the username, to the RADIUS server using an Access-Require message. , password and other related information
  • RADIUS server checks the legality of the user name and password; if it is legal, returns an access confirmation (Access-Accept) to the network access server.
  • 4 ⁇ means to allow access, allowing the user to proceed to the next step, otherwise Returning an Access-Reject message, denying user access; if access is allowed, the network access server continues to send an Account-Request message to the RADIUS server, and the RADIUS server responds with a charge confirmation (Account-Response) ) The message, initiates the charging process for the user.
  • the RADIUS server when the host user passes the authentication, the RADIUS server sends the access information of the different IP addresses of the same host to the BRAS through the corresponding access confirmation (Access-Accept) message, as shown in FIG. 2, and specifies the BRAS pair. The user performs the corresponding authorization operation.
  • the present invention extends the Access-Accept message based on the RFC2865 protocol. Add the following attributes: Auth- Address- Author attribute information;
  • Length The total length of the TLV of the attribute.
  • the TLV is: Type Length, Value, and the value is the sum of Attr-Count and String.
  • Attr-Count number of sub-attributes: The number of sub-attributes included
  • the Auth-Address-Author attribute carried in the Access-Accept 4 may not appear, and may appear one or more times.
  • the sub-attribute may use the attributes defined in RFC2865 and RFC3162, and the TLV (Type, Length, Value) of the attribute is unchanged; the Value value of the sub-attribute must have one of the following attributes to represent the specified IP. Address, and can only have one of the attributes:
  • Framed-IP- Address host IP address
  • Framed-IPv6-Prefix Host IPv6 address prefix
  • Login-IPv6-Host Log in to the host IPv6 address.
  • the value of the value of the sub-attribute can be extended and authorized according to the requirements, such as ACL (Access Control List) and CAR (Committed Access Rate).
  • Application properties include:
  • State Session-Timeout: session duration
  • Termination-Action session termination action flag
  • Framed-Routing Host gateway routing.
  • Auth- Address-Author encapsulation sub-attribute is the same as ⁇ Vendor-Specific in RFC 2865.
  • the message of the expandable field content between the network access server and the authorized charging server of the present invention may also include a Vendor-Specific field corresponding to the interaction between the network access server and the authorized charging server.
  • the message such that the content contained in the sub-attribute of the Auth-Address-Author can be encapsulated in the Vendor-Specific defined by the RFC2865 protocol, and the Access-Accept is no longer needed.
  • the Auth-Address-Author attribute is extended in the text, but the Type value of the sub-attribute needs to be changed accordingly to avoid conflicts.
  • RADIUS-based processing in the present invention, in order to ensure that the accounting of different IP addresses of the host can be sent to the RADIUS server, and the RADIUS server can identify the accounting information corresponding to different IP addresses, the RADIUS is required.
  • the protocol is supplemented accordingly, and the address charging (Acti-Address-Flow) attribute information is added to the packet sent by the network access server to the RADIUS server, and the present invention uses the address charging (Acct-Address). -Flow)
  • the attribute information is sent to the RADIUS server in the Accounting-Request packet of the RADIUS process, as shown in Figure 2.
  • the specific format of the address charging attribute information is the same as the format of the address authorization attribute information, except that the content information carried by the specific field is different, and the format of the address charging (Acct-Address-Flow) attribute information is shown in Table 3. Shown as follows:
  • Type It can be 64. Of course, the value is not necessarily 64. It can be adjusted according to the actual situation, as long as it does not conflict with the existing attribute value.
  • Length The total length of the TLV (Type, Length, Value) of the attribute, the value of which is the sum of Attr-Count and String;
  • Attr-Count number of sub-attributes: number of sub-attributes
  • the Acct-Address-Flow attribute is a new attribute.
  • the attribute appears 0+, which means it can be absent and can appear one or more times.
  • the attribute has the following sub-attributes (String).
  • the overall structure of the sub-attribute is the same as the sub-attribute of the address authorization attribute information, except that the specific content carried by each field is different.
  • the overall structure of the sub-attribute is shown in Table 4. :
  • the sub-attribute may use an attribute defined in the RFC2866, RFC3162 protocol, and the TLV (Type, Length, Value) of the attribute does not change, and the sub-attribute Value value must have one of the following attributes to indicate the specified IP address:
  • Framed-IP- Address frame IP address
  • Framed-IPv6-Prefix ⁇ 4 ⁇ IPv6 address
  • Login-IPv6-Host Log in to the IPv6 host.
  • the value of the sub-attribute value can also be extended and related authorizations are performed as needed, for example, authorization of ACL, CAR, etc., and sub-attribute packages that may be used for related authorization. Includes:
  • Acct-Session-Id the charging session identifier
  • Acct-Input-Octets billing downstream traffic (bytes);
  • Acct-Output-Octets Accounting upstream traffic (number of bytes);
  • Acct-Input-Packets Accounting downlink traffic (number of packets);
  • Acct-Output-Packets Accounting upstream traffic (number of packets).
  • the encapsulation sub-attribute of the Acct-Address-Flow attribute information is the same as the Vendor-Specific in RFC 2865.
  • the RADIUS server client (the client, the network access server) charges the accounting information of each host's IP address according to RFC2866. After the packet format is encapsulated with the attribute type defined above, it is directly sent to the RADIUS server to collect accounting information, such as traffic statistics, for different IP addresses of the host user.
  • the packet of the expandable field content between the network access server and the authorized charging server may also be a packet including a Vendor-Specific field that is exchanged between the network access server and the authorized charging server, so that the The sub-attributes contained in the attribute information of the Acct-Address-Flow attribute can also be encapsulated in the Vendor-Specific defined in RFC2865, so that it is no longer necessary to add an address meter in the Accounting-Request message.
  • the Acct-Address-Flow attribute, but the Type value of the sub-attribute needs to be adjusted accordingly to avoid conflicts.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Description

IPv6网络中对多地址用户进行授权计费的实现方法
技术领域
本发明涉及网络通信技术领域,尤其涉及一种 IPv6网络中对多地址 用户进行授权计费的实现方法。 发明背景
在网络运营过程中, 对接入网络的主机用户迸行认证、 授权和计费 是用户管理的一个重要组成部分。 对于接入网络的不同用户, 网络运营 商首先需要对用户进行授权, 允许用户接入相应的服务, 然后再基于不 同用户接入的服务的不同分别进行计费。 另一方面, 对于同一个用户在 不同时间所接入的同样服务的计费也可以有所不同。 为了实现上述的计 费, 就要求网络运营商能够获得接入网络的用户的各种计费数据。
在可运营、 可管理的网络中, 针对用户的授权、 计费将直接关系到 运营商的收益及用户的切身利益, 因此, 一个合理的计费策略对于运营 商来说是非常必要的, 否则, 在运营商和用户间的合法利益均无法得到 保证。
在 IPv4 网络中, IETF (互联网工程任务组) 定义了 RFC2865、 RFC2866 ( RFC, 请求注释)等相关 RADIUS (远程认证拨号用户服务) 协议来保证用户的统一计费。 在 IPv6网络中, IETF定义了 RFC2865、 RFC2866 RFC3162来描述关于 IPv6、 IPv4用户的认证和计费过程, 随 着 IPv6网络的不断发展, 基于用户的认证和计费技术也在不断的发展。
在 IPv6网络中, 可以为主机用户分配一个乃至多个单播地址(单播 地址用于单播传输, 单播传输时, 为源用户到每个目的用户分别单独建 立一条数据传送通路), 考虑到网络运营商的实际需求, 可能需要在如 RADIUS服务器、 PHCP (动态主机配置协议)服务器或其他服务器上, 为该主机用户分配的不同地址提供不同的授权, 并采用不同的计费策 略。 例如, 当主机用户不同的 IP地址分别用于接入不同的服务时, 各个 服务会对该主机用户采用不同的计费费率。
但是, 目前尚未提供针对同一主机用户不同的 IP 地址进行分别授 权、 分别计费的方法, 即使在 RFC3162中也未提及。 因而, 目前还无法 提供一种针对主机用户分配获得的多个地址分别进行授权、 计费的处理 方法, 无法很好地满足网络运营商的合理的运营管理需求。 发明内容
鉴于上述现有技术所存在的问题,本发明的目的是提供一种 IPy6网 络下用户多 IP地址授权计费的实现方法, 使可根据主机的不同 IP地址 进行分别授权, 采用不同的计费策略分别进行计费。
本发明提供的一种 IPv6 网络中对多地址用户进行授权计费的实现 方法, 包括:
A、 IPv6 网络中的多地址用户的网络接入服务器与授权计费服务器 间通信时, 将针对多地址用户的每个地址的授权计费信息通过所述网络 接入服务器与授权计费服务器间的可扩展字段内容的报文进行交互;
B、 所述的网络接入服务器及授权计费服务器获取所述的报文中的 每个地址的授权计费信息;
C、 所述的网络接入服务器及授权计费服务器对该用户的每个地址 分别进行相应的授权计费操作。
其中,所述的授权计费服务器包括:远程认证拨号用户服务 RADIUS 服务器。
其中,所述的授权计费信息包括以下属性: 类型 Type,长度 Length, 子属性数量 Attr-Count和 /或子属性内容 String。
其中, 所述的子属性内容 String 包括以下属性: 类型 Type, 长度 Length和 /或值 Value。
其中, 所述的值 Value 包括下述的属性之一: 主机 IP 地址 Framed-IP- Address; 主机 IPv6地址 Framed-IPv6-Prefix; 登录主机 IPv6 地址 Login-IPv6-Host。
其中, 当所述的授权计费信息为授权信息时, 所述的值 Value 包括 至少下述属性之一或任意組合: 级别 Class; 状态 State; 会话时长 Session-Timeout; 会话终结动作标志 Termination-Action; 主机网关路由 Framed-Routingo
其中, 步骤 A所述将针对多地址用户的每个地址的授权计费信息通 过所述网络接入服务器与授权计费服务器间的可扩展字段内容的报文 进行交互的步骤包括: 授权计费服务器将所述的授权信息承载于接入确 认报文中发送给所述的多地址用户的网络接入服务器。
其中, 当所述的授权计费信息为计费信息时, 所述的值 Value 包括 至少下述属性之一或任意组合: 计费会话标识 Acct-Session-Id; 以字节 数为单位的计费下行流量 Acct-Input-Octets; 以字节数为单位的计费上 行流量 Acct-Output-Octets; 以报文包数为单位的计费下行流量 Acct-Input-Packets ; 以 报文 包数为 单位 的 计 费 上行流量 Acct-Output-Packets。
其中 , 步骤 A所述将针对多地址用户的每个地址的授权计费信息通 过所述网络接入服务器与授权计费服务器间的可扩展字段内容的报文 进行交互的步骤包括: 多地址用户的网络接入服务器将所述的计费信息 承载于计费请求报文中发送给所述的授权计费服务器。
其中, 所述可扩展字段包括 RFC2865 †办议定义的自行指定属性 Vendor-Specific字段。
由上述技术方案可以看出, 本发明通过对 RADIUS过程中发给网络 接入服务器的接入确认报文及向 R.ADIUS 服务器发送的计费请求报文 进行扩展, 从而将针对不同的主机地址的授权、 计费信息发送出去, 以 实现 RADIUS服务器、 网络接入服务器等设备可获得相应的主机各 IP 地址的授权、计费信息。 因此, 本发明实现了在 IPv6网络中可以根据主 机的不同 IP地址进行分别授权,采用不同的计费策略分别进行计费的功 能。 附图简要说明
图 1为本发明应用的网络环境示意图;
图 2为本发明所述的方法的流程图。 实施本发明的方式
本发明所述的方法的核心是在针对主机的 RADIUS 过程中, RADIUS服务器将针对该主机的不同 IP地址分别进行授权,并将授权信 息发送给网络接入服务器, 如 BFAS等; 同时, 网络接入服务器可以将 同一主机不同 IP地址的计费信息发送给 RADIUS服务器以进行计费, 从而实现了在 IPv6网络中, 针对一主机的不同 IP地址分别进行授权、 计费的操作处理。
如图.1所示, 宽带用户 (即主机)是通过局域网交换机及互联网边 缘的 BRAS (宽带远程接入服务器), 即网络接入服务器接入互联网。 在 可运营、 可管理的网络中, 宽带用户在上线前首先要进行相应的身份认 证, 用户通过 PPP (点对点协议)、 802.1X、 WEB (环球网)认证等方 式进行认证, 按照要求输入用户名和口令, 由 BR.AS 获取后发送到 RADIUS服务器进行认证。
所述的 RADIUS的基本工作原理包括:用户接入网络接入服务器(如 BRAS 设备等)后, 网絡接入服务器向 RADIUS服务器使用接入请求 (Access-Require)报文提交用户信息, 包括用户名、 密码等相关信息; RADIUS服务器对用户名和密码的合法性进行检验; 如果合法, 向网络 接入服务器返回接入确认(Access-Accept) 4艮文表示允许访问, 允许用 户进行下一步工作, 否则返回接入拒绝(Access-Reject)报文, 拒绝用 户访问; 如果允许访问, 网络接入服务器继续向 RADIUS服务器发送计 费请求 ( Account-Request ) 报文, RADIUS 服务器响应计费确认 ( Account-Response )报文, 启动对用户的计费过程。
本发明中, 当主机用户认证通过时, RADIUS服务器将针对同一主 机不同 IP地址的授权信息通过对应的接入确认 ( Access-Accept )报文发 送到 BRAS,如图 2所示,并指定 BRAS对该用户进行相应的授权操作。 为了保证 RADIU服务器可以通过接入确认( Access- Accept )报文将针 对不同 IP地址的授权信息发送给 BRAS设备, 本发明对基于 RFC2865 协议的接入确认(Access-Accept)报文进行了扩展, 增加以下属性: 地 址授权( Auth- Address- Author )属性信息;
所述的地址授权( Auth-Address-Author )属性信息的具体格式如表 1 所示:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1 Type I Length | Attr-Count | String... 表 1
其中:
Type (类型): 可以选值为 65, 当然该值不一定是 65, 还可以根据 实际情况进行调整, 只要保证不与现有的属性值冲突即可;
Length(长度):属性的 TLV总长度,所述的 TLV是指: Type Length, Value (值) , 所述的 Value为 Attr-Count和 String的总和;
Attr-Count (子属性数量): 包含的子属性数量;
String (子属性内容): 子属性内容。
所述的承载于 Access- Accept 4艮文的地址 4受权( Auth-Address-Author ) 属性可以不出现, 也可以出现一次或多次。
所述的地址授权属性带的子属性(String) 的整体结构如表 2所示:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1 Type I Length | Value... 表 2
所述的子属性可以使用在 RFC2865、 RFC3162中定义的属性, 且属 性的 TLV (Type、 Length、 Value ) 不变; 所述的子属性的 Value值必须 有以下属性的其中一个来表示指定的 IP地址, 且仅能有其中一个的属 性:
Framed-IP- Address: 主机 IP地址;
Framed-IPv6-Prefix: 主机 IPv6地址前缀;
Login-IPv6-Host: 登录主机 IPv6地址。
所述的子属性的 Value值还可以进行扩展并根据需要进行相关授权, 例如进行 ACL ( Access Control List访问控制列表)、 CAR ( Committed Access Rate 可靠接入速率)的授权等,进行相关授权可能会应用的属性 包括:
Class: 级别;
State: 状态; Session-Timeout: 会话时长;
Termination-Action: 会话终结动作标志;
Framed-Routing: 主机网关路由。
地址授权( Auth- Address-Author )封装子属性的用法同 RFC2865中 ό Vendor-Specific相同。
同时, 本发明所述网络接入服务器与授权计费服务器间的可扩展字 段内容的报文还可以为网络接入服务器与授权计费服务器间交互的包 含有 Vendor-Specific (自行指定属性)字段的报文, 这样, 所述的地址 授权 ( Auth-Address-Author ) 中的子属性包含的内容便可以封装在 RFC2865 协议定义的 Vendor-Specific 中 , 也就不再需要在 ( Access- Accept )报文中扩展地址授权属性(Auth-Address-Author), 但 子属性的 Type值需要进行相应的改变, 避免沖突。
基于 RADIUS 的处理过程, 本发明中, 为了保证主机的不同的 IP 地址的流量等计费能够发送到 RADIUS服务器中,且 RADIUS服务器可 以识别出不同的 IP地址对应的计费信息, 则需要对 RADIUS协议进行 相应的补充,将网络接入服务器发往 RADIUS服务器的报文中增加地址 计费 ( Acct- Address-Flow )属性信息, 本发明釆用的是将所述的地址计 费 ( Acct-Address-Flow ) 属性信息承载于 RADIUS 过程的计费请求 ( Accounting-Request )报文中发送给 RADIUS服务器, 如图 2所示。
所述的地址计费属性信息的具体格式与地址授权属性信息的格式相 同, 只是具体字段承载的内容信息不相同, 所述的地址计费 ( Acct-Address-Flow )属性信息的格式如表 3所示:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1 Type I Length | Attr~Count | String... 表 3
其中:
Type (类型): 可以为 64, 当然该值不一定是 64, 可以根据实际情 况进行调整, 只要不与现有的属性值冲突即可;
Length (长度): 属性的 TLV (Type、 Length, Value)总长度, 所述 的 Value为 Attr-Count和 String的总和;
Attr-Count (子属性数量): 子属性数量;
String (子属性内容): 子属性内容。
地址计费 ( Acct- Address-Flow )属性是新增属性, 属性的出现次数 为 0+,即可以不出现, 可以出现一次或多次。
该属性带有以下子属性(String), 子属性的整体结构与地址授权属 性信息的子属性的结构相同, 只是各字段承载的具体的内容不相同, 该 子属性的整体结构如表 4所示:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1 Type I Length | Value... 表 4
所述的子属性可以使用在 RFC2866、 RFC3162协议中定义的属性, 且属性的 TLV (Type、 Length, Value)不变, 而且, 所述的子属性 Value 值必须有以下属性的其中一个来表示指定的 IP地址:
Framed-IP- Address: 外框 IP地址;
Framed-IPv6-Prefix: 夕卜 4匡 IPv6地址;
Login-IPv6-Host: 登录 IPv6主机。
所述的子属性 Value值还可以进行扩展并根据需要进行相关授权, 例如进行 ACL、 CAR的授权等, 进行相关授权可能会使用的子属性包 括:
Acct- Session-Id: 计费会话标识;
Acct-Input-Octets: 计费下行流量(字节数);
Acct-Output-Octets: 计费上行流量(字节数);
Acct-Input-Packets: 计费下行流量(报文包数);
Acct-Output-Packets: 计费上行流量(报文包数)。
所述的地址计费 ( Acct-Address-Flow )属性信息的封装子属性的用 法同 RFC2865中的 Vendor-Specific相同。
有了上述在计费请求(Accounting-Request )报文中的地址计费属性 后, RADIUS服务器的 Client (客户端, 网络接入服务器)将主机的每 个 IP地址的流量等计费信息按照 RFC2866的报文格式和以上定义的属 性类型进行封装后, 直接发送到 RADIUS服务器端, 从而完成对主机用 户的不同的 IP地址分别进行计费信息的统计, 如流量统计等。
同样, 所述网络接入服务器与授权计费服务器间的可扩展字段内容 的报文还可以为网络接入服务器与授权计费服务器间交互的包含有 Vendor-Specific字段的报文,这样,所述的地址计费( Acct- Address-Flow ) 属性信息包含的子属性还可以封装在 RFC2865 定义的 Vendor-Specific 中, 也就不再需要在计费请求( Accounting-Request )报文中增加地址计 费( Acct-Address-Flow )属性,但子属性的 Type值需要进行相应的调整, 以避免沖突。
以上所述, 仅为本发明较佳的具体实施方式, 但本发明的保护范围 并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范 围内, 可轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应该以权利要求书的保护范围为准。

Claims

权利要求书
1、 一种 IPv6网络中对多地址用户进行授权计费的实现方法, 其特 征在于, 包括:
A、 IPv6 网络中的多地址用户的网络接入服务器与授权计费服务器 间通信时, 将针对多地址用户的每个地址的授权计费信息通过所述网络 接入服务器与授权计费服务器间的可扩展字段内容的报文进行交互;
B、 所述的网络接入服务器及授权计费服务器获取所述的报文中的 每个地址的授权计费信息;
C、 所述的网络接入服务器及授权计费服务器对该用户的每个地址 分别进行相应的授权计费操作。
2、根据权利要求 1所述的方法, 其特征在于, 所述的授权计费服务 器包括: 远程认证拨号用户服务 RADIUS服务器。
3、 根据权利要求 1所述的方法, 其特征在于, 所述的授权计费信息 包括以下属性:
类型 Type, 长度 Length, 子属性数量 Attr-Count和 /或子属性内容 String。
4、 根据权利要求 3 所述的方法, 其特征在于, 所述的子属性内容 String包括以下属性: 类型 Type, 长度 Length和 /或值 Value。
5、 根据权利要求 4所述的方法, 其特征在于, 所述的值 Value包括 下述的属性之一:
主机 IP地址 Framed-IP- Address;
主机 IPv6地址 Framed-IPv6-Prefix;
登录主机 IPv6地址 Login-IPv6-Host。
6、根据权利要求 4所述的方法, 其特征在于, 当所述的授权计费信 息为授权信息时, 所述的值 Value包括至少下述属性之一或任意组合: 级别 Class;
状态 State;
会话时长 Session-Timeout;
会话终结动作标志 Termination- Action;
主机网关路由 Framed-Routing。
7、 根据权利要求 6所述的方法, 其特征在于, 步骤 A所述将针对 多地址用户的每个地址的授权计费信息通过所述网络接入服务器与授 权计费服务器间的可扩展字段内容的报文进行交互的步骤包括:
授权计费服务器将所述的授权信息承载于接入确认报文中发送给所 述的多地址用户的网络接入服务器。
8、根据权利要求 4所述的方法, 其特征在于, 当所述的授权计费信 息为计费信息时, 所述的值 Value包括至少下述属性之一或任意组合: 计费会话标识 Acct-Session-Id;
以字节数为单位的计费下行流量 Acct-Input-Octets;
以字节数为单位的计费上行流量 Acct-Output-Octets;
以报文包数为单位的计费下行流量 Acct-Input-Packets;
以 艮文包数为单位的计费上行流量 Acct-Output-Packets。
9、 根据权利要求 , 8所述的方法, 其特征在于, 步骤 A所述将针对 多地址用户的每个地址的授权计费信息通过所述网络接入服务器与授 权计费服务器间的可扩展字段内容的报文进行交互的步骤包括:
多地址用户的网络接入服务器将所述的计费信息承载于计费请求报 文中发送给所述的授权计费服务器。
10、 根据权利要求 1所述的方法, 其特征在于, 所述可扩展字段包 括 RFC2865协议定义的自行指定属性 Vendor-Specific字段。
PCT/CN2005/001232 2004-09-01 2005-08-10 Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6 WO2006024218A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP05772879A EP1777872B1 (en) 2004-09-01 2005-08-10 A METHOD REALIZING AUTHORIZATION ACCOUNTING OF MULTIPLE ADDRESSES USER IN THE IPv6 NETWORK
AT05772879T ATE459148T1 (de) 2004-09-01 2005-08-10 Verfahren zur autorisierungsverwaltung eines benutzers von mehrfachadressen im ipv6 netzwerk
DE602005019576T DE602005019576D1 (de) 2004-09-01 2005-08-10 Verfahren zur autorisierungsverwaltung eines benutzers von mehrfachadressen im ipv6 netzwerk
US11/677,915 US8813217B2 (en) 2004-09-01 2007-02-22 Method and system for authorizing and charging host with multiple addresses in IPv6 network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200410055381.X 2004-09-01
CNB200410055381XA CN100344094C (zh) 2004-09-01 2004-09-01 IPv6网络中对多地址用户进行授权计费的实现方法

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/677,915 Continuation US8813217B2 (en) 2004-09-01 2007-02-22 Method and system for authorizing and charging host with multiple addresses in IPv6 network

Publications (1)

Publication Number Publication Date
WO2006024218A1 true WO2006024218A1 (fr) 2006-03-09

Family

ID=35999696

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/001232 WO2006024218A1 (fr) 2004-09-01 2005-08-10 Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6

Country Status (7)

Country Link
US (1) US8813217B2 (zh)
EP (1) EP1777872B1 (zh)
CN (1) CN100344094C (zh)
AT (1) ATE459148T1 (zh)
DE (1) DE602005019576D1 (zh)
ES (1) ES2339575T3 (zh)
WO (1) WO2006024218A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510915A (zh) * 2020-03-23 2020-08-07 沈阳通用软件有限公司 一种无线准入环境下通用的扩展认证方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010055630A1 (ja) * 2008-11-11 2010-05-20 パナソニック株式会社 アドレス登録方法、アドレス登録システム、移動装置及び移動管理装置
CN101888389B (zh) * 2010-07-19 2013-04-17 中国电信股份有限公司 一种实现icp联盟统一认证的方法和系统
CN102136938B (zh) * 2010-12-29 2013-03-20 华为技术有限公司 向cgn设备提供用户信息的方法及装置
CN103178973B (zh) * 2011-12-21 2016-04-20 中国电信股份有限公司 管理ip地址的方法、系统和设备
US11743162B1 (en) * 2012-05-07 2023-08-29 Amdocs Development Limited System, method, and computer program for offering experience-based subscriptions to services
CN102843240B (zh) * 2012-09-13 2015-12-09 清华大学 基于多ip地址检测的网关计费方法
CN105376203B (zh) * 2014-08-26 2019-11-05 阿里巴巴集团控股有限公司 交互信息的处理方法、装置及系统
CN113300961B (zh) * 2021-05-14 2022-07-08 烽火通信科技股份有限公司 一种IPv4接入策略路由下发控制的方法与系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013289A2 (en) * 1999-08-16 2001-02-22 Trivnet Ltd. A retail method over a wide area network
US6427170B1 (en) * 1998-12-08 2002-07-30 Cisco Technology, Inc. Integrated IP address management
WO2004002108A1 (en) * 2002-06-20 2003-12-31 Nokia Corporation Method, system and devices for transferring accounting information
WO2004064442A1 (en) * 2003-01-10 2004-07-29 Telefonaktiebolaget Lm Ericsson (Publ) Single sign-on for users of a packet radio network roaming in a multinational operator network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4009136B2 (ja) * 2001-06-07 2007-11-14 富士通株式会社 課金システム
JP2003008622A (ja) * 2001-06-22 2003-01-10 Fujitsu Ltd サービス制御ネットワーク、及びそのサービス制御ネットワークにおいて使用されるルータ装置
CN1200532C (zh) * 2001-12-05 2005-05-04 上海卓扬科技有限公司 一种宽带接入网络的用户识别方法
CN1231031C (zh) * 2002-06-28 2005-12-07 华为技术有限公司 一种基于多网络服务提供商的地址分配及服务的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6427170B1 (en) * 1998-12-08 2002-07-30 Cisco Technology, Inc. Integrated IP address management
WO2001013289A2 (en) * 1999-08-16 2001-02-22 Trivnet Ltd. A retail method over a wide area network
WO2004002108A1 (en) * 2002-06-20 2003-12-31 Nokia Corporation Method, system and devices for transferring accounting information
WO2004064442A1 (en) * 2003-01-10 2004-07-29 Telefonaktiebolaget Lm Ericsson (Publ) Single sign-on for users of a packet radio network roaming in a multinational operator network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510915A (zh) * 2020-03-23 2020-08-07 沈阳通用软件有限公司 一种无线准入环境下通用的扩展认证方法
CN111510915B (zh) * 2020-03-23 2023-12-05 三六零数字安全科技集团有限公司 一种无线准入环境下通用的扩展认证方法

Also Published As

Publication number Publication date
DE602005019576D1 (de) 2010-04-08
ES2339575T3 (es) 2010-05-21
US20070169180A1 (en) 2007-07-19
CN100344094C (zh) 2007-10-17
CN1744508A (zh) 2006-03-08
EP1777872B1 (en) 2010-02-24
EP1777872A4 (en) 2007-08-08
US8813217B2 (en) 2014-08-19
ATE459148T1 (de) 2010-03-15
EP1777872A1 (en) 2007-04-25

Similar Documents

Publication Publication Date Title
US7389534B1 (en) Method and apparatus for establishing virtual private network tunnels in a wireless network
EP1987629B1 (en) Techniques for authenticating a subscriber for an access network using dhcp
WO2006024218A1 (fr) Methode pour effectuer une comptabilisation d'autorisations d'un utilisateur de plusieurs adresses dans un reseau ipv6
US9112909B2 (en) User and device authentication in broadband networks
US7788705B2 (en) Fine grained access control for wireless networks
US8509440B2 (en) PANA for roaming Wi-Fi access in fixed network architectures
US20020174335A1 (en) IP-based AAA scheme for wireless LAN virtual operators
US8336082B2 (en) Method for realizing the synchronous authentication among the different authentication control devices
JP5982008B2 (ja) 信頼される非3gppのアクセス・ネットワーク経由で接続されているユーザ機器に対する、3gppのhplmnにおけるサービス配送プラットフォームによって配送されるサービスへのアクセス許可
JP5531355B2 (ja) ネットワーク課金方法、システム及び装置
WO2006118497A1 (en) Operator shop selection
JP2008512958A (ja) 無線アクセスゲートウェイのためのダイナミック・ファイアウォール機能
WO2008006317A1 (fr) Système et procédé pour accès multiservice
CN101064605B (zh) 一种多主机网络的aaa系统及认证方法
WO2012089039A1 (zh) 向运营商级网络地址转换cgn设备提供用户信息的方法及装置
US20050041808A1 (en) Method and apparatus for facilitating roaming between wireless domains
WO2008138274A1 (fr) Procédé et dispositif correspondant et système servant à accéder à un service distant
WO2014176964A1 (zh) 一种通信管理方法及通信系统
US20080155678A1 (en) Computer system for controlling communication to/from terminal
WO2009059533A1 (fr) Procédé, dispositif et système de commande de gestion de stratégie
Zhang et al. Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support
Ventura Diameter: Next generations AAA protocol
Xie et al. A generic way for wireline and wireless access authentication
Zhang et al. Access and accounting schemes of wireless broadband
Rubens et al. AAA Working Group Pat R. Calhoun Internet-Draft Black Storm Networks Category: Standards Track William Bulley< draft-ietf-aaa-diameter-nasreq-08. txt> Merit Network, Inc.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 11677915

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2005772879

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2005772879

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 11677915

Country of ref document: US