WO2008133561A1 - A method and a device for improved service authorization - Google Patents

A method and a device for improved service authorization Download PDF

Info

Publication number
WO2008133561A1
WO2008133561A1 PCT/SE2007/050289 SE2007050289W WO2008133561A1 WO 2008133561 A1 WO2008133561 A1 WO 2008133561A1 SE 2007050289 W SE2007050289 W SE 2007050289W WO 2008133561 A1 WO2008133561 A1 WO 2008133561A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
node
information
control function
service
Prior art date
Application number
PCT/SE2007/050289
Other languages
French (fr)
Inventor
John Stenfelt
Lars Lövsén
Hans Mattsson
Guadalupe Sanchez Santiso
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to PCT/SE2007/050289 priority Critical patent/WO2008133561A1/en
Priority to NZ580166A priority patent/NZ580166A/en
Priority to CN2007800527605A priority patent/CN101682609B/en
Priority to BRPI0721599-1A priority patent/BRPI0721599B1/en
Priority to AU2007352471A priority patent/AU2007352471B2/en
Priority to JP2010506120A priority patent/JP5144749B2/en
Priority to EP07748450.9A priority patent/EP2153621B1/en
Priority to US12/597,833 priority patent/US20100146596A1/en
Publication of WO2008133561A1 publication Critical patent/WO2008133561A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • a method and a device for improved service authorization are provided.
  • the present invention discloses a method and a device by means of which improved service authorization can be obtained in a wireless access telecommunications system.
  • a user requests access to a service by means of a request to a node in the system, in a GPRS system the so called GGSN, the Gateway GPRS Support Node.
  • the GGSN has obtained knowledge of the user's rights and which services the user may access by means of another function in the system, usually known as the PCRF, Policy and Charging Rule Function.
  • PCRF Policy and Charging Rule Function
  • the GGSN requests, and receives from the PCRF, a list that defines which services the user may or may not access. This list is then used by the GGSN during the session in question, in order to permit or deny the user access to services which the user requests access to.
  • a user requests access to a service to which the GGSN wishes, according to the information from the PCRF, to deny him access to, the request may be redirected to a separate function in the system, which handles denial of service requests.
  • This separate function will send a message to the UE informing the user of the denial, e.g. he will receive a message such as "Access Denied” or "Service not authorized”.
  • the GGSN assumes a role referred to as Policy Charging Enforcement Function, PCEF.
  • PCEF accesses the PCRF by means of an interface known as Gx.
  • Some services that a user is normally allowed to access may temporarily not be authorized, e.g. due to a number of PCRF-defined polices:
  • a service that a user is normally allowed to access may not be authorized if the user roams into a different network
  • Some services may be authorized during certain periods of the day only, e.g. between 09:00 and 18:00 on weekdays only, • Certain services may only be authorized in case the requested bearer provides good enough quality.
  • the Gx interface only provides information regarding whether or not a user is allowed access to a service or not.
  • a PCEF/GGSN it is impossible for a PCEF/GGSN to know if a user is denied access to a certain service due to the fact that the user's terminal doesn't support the service in question, or if the denial is due to the fact that the user is roaming in another network, in which the service in question is denied.
  • the only action the PCEF can take in the case of a denial is to redirect service requests issued from the user terminal to a generic redirect address that informs the user that the service is denied for an unspecified reason, as exemplified by the messages above.
  • a node such as, for example a PCEF/GGSN can provide a user who is denied access to a service to which he has requested access more information regarding the reason for the denial than is possible at present.
  • the system in which the invention can be applied also comprises a control function which holds information about the access rights to specific services for a plurality of UEs in the system, and the system additionally comprises an interface between said first node and the control function.
  • the method of the invention comprises the step of letting the first node receive information about a UE's access rights from the control function, and also comprises the step of letting the first node handle access requests to a service from a UE using the access rights information from the control function.
  • the method also comprises the step of letting the access rights information from the control function to the first node comprise a code regarding services to which the UE is denied access.
  • the first node e.g. a PCEF/GGSN can use the code obtained from the control function, e.g. a PCRF, in order to provide users with more detailed information regarding the reason that they are denied access to a certain service.
  • the code is used by the first node (PCEF/GGSN) in order to redirect the access request to a second function in the system, and in this embodiment, the method also comprises the step of letting the second function send an explicit message regarding the reason for the denial to the requesting UE.
  • the first node comprise a list of said codes, so that a code may be "decoded" in the first node, in which case a message which corresponds to the code in question may be sent to the UE from the first node.
  • an additional problem in present systems is that an operator may want to grant certain users access to certain services during a limited interval in time, such as for example, between 08:00 AM to 06:00 PM on weekdays.
  • the authorization information in the PCEF for all affected sessions will need to be updated essentially at the same time. This will cause massive peaks in Gx signalling, which is highly undesirable.
  • the invention in a particular embodiment comprises the step of letting the access rights information from the control function (e.g. PCRF) to the first node (e.g. PCEF/GGSN) comprise information about periods in time when the UE is allowed or denied access to one or more of said services.
  • the control function e.g. PCRF
  • the first node e.g. PCEF/GGSN
  • the invention also discloses an improved interface for use between the first node (e.g. PCEF/GGSN) and the control function (e.g. PCRF), as well as a node for use as said first node.
  • first node e.g. PCEF/GGSN
  • control function e.g. PCRF
  • Fig 1 shows a prior art system
  • Fig 2 shows the system of fig 1 , with the invention applied
  • Figs 3 and 4 show examples of event diagrams of the invention.
  • Fig 1 shows an example of a prior art system 100, shown in order to facilitate the reader's understanding of the invention.
  • fig 1 as well as in the description below, the invention will be described with the aid of system components and names from a 3G GPRS system, but it should be understood that this is by way of example only, the invention can be applied to virtually any system in which it is desired to solve the problems which are addressed by means of the invention.
  • a GGSN which in this text will alternatingly be referred to as a PCEF, a Policy Charging Enforcement Function, since the GGSN in this context constitutes the PCEF for GPRS.
  • a GPRS system comprises numerous components which are not shown in fig 1. This is due to the fact that only those components which are of immediate interest to the present invention will be shown in the drawings and described in this text.
  • the 3G GPRS system comprises a function known as the SGSN, which is positioned between the UE 110 and the PCEF/GGSN 120.
  • the messages with which this invention is concerned are "passed through" the SGSN on their way between the UE and the PCEF/GGSN, which means that the SGSN is of less interest to this invention.
  • the PCRF 160 has information about which services that the UE 110 should be granted or denied access to. This information is communicated to the PCEF/GGSN, usually at the initial UE bearer service request, although the procedure may take place at other points in time as well.
  • the interface between the PCRF 160 and the PCEF/GGSN 120 is known as the Gx interface.
  • the PCRF 160 communicates to the PCEF/GGSN 120 a list of services to which the UE 130 should be denied or granted access to. As an example, all services that are not granted in the list can be considered to be denied.
  • the PCEF/GGSN stores this list, and when a UE 110 sends a request message, shown by the arrow 1 in fig 1 to the PCEF/GGSN 120, requesting access to a certain service, the following may happen:
  • the PCEF/GGSN 120 grants the UE 110 access to the service in question based on information provided from the PCRF via the Gx interface.
  • the request is routed/forwarded by the PCEF/GGSN to its destination.
  • the PCEF/GGSN 120 by means of the information provided from the PCRF via the Gx interface, sees that the UE 110 may not be granted access to the service which it has requested access to.
  • the arrow 2 from the PCEF/GGSN intercepts the request and sends a "redirect" response, shown by the arrow 2 in fig 1 , to the UE, i.e. a message which redirects the UE's request to a second function 170 in the system, to which the UE's request is redirected, shown as the arrow 3 in fig 1.
  • the second function 170 sends a message, shown by means of the arrow 4, to the UE 110.
  • this message can only be a standardized "denial message" such as "Access Denied” or "Service not authorized".
  • Fig 2 shows a system 200 of the invention. Components and functions which can be found in the system 100 of fig 1 have been given the same reference numbers in fig 1 , and will not be explained again here.
  • the control function 160 i.e. the PCRF
  • the PCRF may send information to the PCEF/GGSN regarding a UE's access rights to a number of services via the Gx interface.
  • the information sent from the PCRF 160 to the PCEF/GGSN 120 may have the following structure, as also indicated in fig 2:
  • the PCRF uses the Gx interface to explicity inform the PCEF/GGSN 120 not only about which services that are authorized, but also which services that are not authorized (NOK), which may be temporary, together with a code coupled to the reason for the denial.
  • the PCEF/GGSN uses the codes comprised in the Gx message as follows: • The UE 110 sends its request message, arrow 1 in fig 2.
  • the PCEF/GGSN 120 identifies the requested service and sees that the UE 110 should be denied access to the service in question and sends a redirect message, arrow 2 to the UE 110.
  • the redirect message arrow 2
  • PCEF/GGSN now has additional information coupled to the access denial, said additional information being the code shown above.
  • the code is, in a certain embodiment of the present invention, used in order to redirect the access request from the UE to one of a number of specified functions, shown as 180-182 in fig 2.
  • the redirected request is shown by means of an arrow 3
  • the response from the function 180-182 is shown by means of an arrow 4.
  • each NOK code is tied to a specified one of the functions 180-182, by means of which each NOK code can be made to correspond to a certain denial message.
  • each of the functions 180-182 is prepared with a certain message, example of which might be:
  • the requested service can only be reached from your Home PLMN, Public Land Mobile Network. • The requested service cannot be accessed from this terminal type.
  • the requested service can only be accessed between 0700 and 1800 Monday to Friday.
  • denial message functions 180-182 are merely one way of utilizing the enhanced Gx messages of the invention. It is also perfectly possible to let the PCEF/GGSN comprise the function of "decoding" the codes from the PCRF itself, so that the denial messages are sent directly from the PCEF/GGSN 120 to the UE 110 by a function for this in the PCEF/GGSN.
  • denial message function 180-182 be external to the PCEF/GGSN as shown in fig 2, but to let it be one function only, which as such comprises the ability to decode all of the codes sent from the PCRF regarding the reasons for denial.
  • the present invention comprises extending the Gx protocol so that the PCRF may communicate more information to the PCEF regarding reasons for denying a UE access to a service.
  • the extensions to the Gx protocol may be referred to as Attribute Value Pairs, AVPs, a term which may be used below, AVPs being information containers used by the Gx protocol.
  • Fig 3 shows a signaling sequence 300 in which the AVPs of the present invention is used.
  • the signaling is between a UE, a PCEF, a PCRF and a Redirect Server which corresponds to the functions 180-182 of fig 2.
  • PDP Context Request 2. Gx CCR, Credit Control Request, initial.
  • the PCEF initiates a Gx session with the PCRF, and includes the UE identity, the requested QoS, PLMN-Id etc.
  • the CCA in question may contain the following information:
  • the UE requests access to a web-page, e.g. URL "x".
  • the PCEF detects that URL "x" corresponds to e.g. Charging-Rule No. ⁇ which is temporarily not authorized due to roaming.
  • the PCEF sends a response to the UE with a redirect indication that includes the configured redirect server address used only for DENIED_ROAMING (url "y)
  • the UE issues a request for url "y" 8.
  • the redirect server at URL "y" responds to the UE that the requested webpage can only be accessed from the Home PLMN.
  • the authorization state for the current and next periods of time is included in the Charging-Rule Install AVP, by inserting the a new AVP:
  • the authorization information provided in the Charging-Rule-Authorization AVP is valid for all Charging-Rule-Names and Charging-Rule-Base-Names provided in that instance of the Charging-Rule-lnstall AVP provided in a CCA or RAR, Re-Authorization Request.
  • Charging-Rule-Authorization AVP If no Charging-Rule-Authorization AVP is present in a Charging-Rule- Authorization AVP then this implies that all Charging-Rule-Definitions, Charging-Rule-Names and Charging-Rule-Base-Names are authorized without any restrictions (standard solution).
  • the Charging-Rule-Authorization AVP groups the AVPs that are required to define the authorization state for the current and next time period for the associated charging rules and charging rule bases.
  • the Charging-Rule-Authorization AVP is shared in the same Charging-Rule- lnstall for those Charging-Rule-Names or Charging-Rule-Base-Names that has the same Authorization-state.
  • the Charging-Rule-Authorization AVP may look as follows:
  • Charging-Rule-Authorization: : ⁇ AVP Header: 1055, Vendor Id: 193 > ⁇ Autho rizatio n-State ⁇ [Authorization-State-Change-Time] [Next Authorization State] *[ AVP ]
  • the Authorization-State AVP may be of the type "enumerated", and specifies the authorization state and reason for non-authorization for the charging rules and charging rule bases provided in the Charging-Rule-lnstall AVP.
  • Another problem which may be solved by a particular embodiment of the invention is that an operator of a system may want to authorize some services to a large number of users during a limited period of time, such as a particular interval of a day, such as, for example, between 08:00 AM to 06:00 PM on weekdays.
  • a limited period of time such as a particular interval of a day, such as, for example, between 08:00 AM to 06:00 PM on weekdays.
  • the authorization information in the PCEF of all affected sessions need to be updated more or less at the same time point in time. This causes massive peaks in Gx signalling in the system, which is undesirable.
  • the mentioned embodiment of the present invention comprises the step of letting the access rights information from the control function, i.e. the PCRF, to the first node, i.e. the PCRF/GGSN, comprise information about periods in time when a UE is allowed or denied access to one or more services.
  • the control function i.e. the PCRF
  • the first node i.e. the PCRF/GGSN
  • some services may be authorized for a certain user during a specific period of time only, e.g. for 24 hours from the time when the service is activated, or during re-occurring periods of the day, e.g. between 07:00 - 18:00 on weekdays.
  • the "authorization code" described above, provided by the PCRF to the PCEF, the so called PCC- rule, can be associated with information regarding a specific point in time when the authorization state changes.
  • the next authorization state that is valid after the authorization state change must also be provided for this kind of services.
  • the PCEF determines that e.g. a certain user is to be granted access to a certain service until, in this example, 18:00, and thereafter the user should be denied access to the service, due to calendar time restrictions.
  • the opposite is of course also possible, i.e. the service is first temporarily denied to the user due to calendar time restrictions, but after 18:00, in the present example, the user is granted access to the service.
  • Another "building block" in the calendar time based authorization embodiment of the invention is a validity timer which schedules the PCEF to request new policy information from the PCRF.
  • the validity timer is provided by the PCRF to the PCEF, and should typically be set longer than the authorization state change time, e.g. longer than 18:00 in the present example, but short enough to catch new policy information before the next consecutive authorization state change time occurs, i.e. in this example at the latest at 07:00 the following morning.
  • Gx signalling peaks may be avoided.
  • fig 4 is a signalling diagram 400 in which the time based denial/grant of access is used.
  • the signaling in fig 4 is between a UE, a PCEF and a PCRF.
  • the signaling is as follows, with reference to the horizontal arrows shown in fig 4:
  • Gx CCR initial.
  • the PCEF/GGSN initiates a Gx session with the PCRF, and includes the UE identity, Requested QoS, PLMN-Id etc.
  • the PCRF responds with a CCA containing one Charging-Rule-lnstall for a Charging-Rule-Base that is authorized and a Charging-Rule-Name that is currently not authorized due to calendar time.
  • the authorization state change time is set to be at 07:00 the next morning. When the authorization state change time has passed, access to the service is granted to the user (next authorization state).
  • the authorization-validity-time states that the policy information must be refreshed by the PCEF before 18:00 the next day.
  • the CCA in question may have the following format:
  • Charging-Rule-Name 5 Charging-Rule-Authorization AVP
  • Authorization-State DENIED_CALENDAR_TIME
  • Authorization-State-Change-Time 07/08/01 , 07:00 UTC
  • the PCRF responds with new policy information.
  • the Charging-Rule in question now has the authorization state AUTHORIZED and a next authorization state that is DENIED_CALENDAR_TIME.
  • the authorization state change time is at 18:00, and the policy information must be refreshed again at the latest at 07:00 the following day.
  • the new values may look as follows:
  • Event-Trigger TIME_CHANGE Charging-Rule-lnstall AVP
  • Charging-Rule-Name 5 Charging-Rule-Authorization AVP
  • AVPs of the invention which may be used with the calendar based grant or denial of access to services are shown below. It should be pointed out that the AVPs below are merely examples, and are in no way to be seen as restrictive for the scope of protection sought for the present invention.
  • the Authorization-State-Change-Time is a time-stamp identifying the date and time when the authorization state provided in the Authorization-State AVP will no longer be valid.
  • An example of an authorization-State-Change- Time AVP is that it is of the type "Time" and includes the time in seconds since January 1 , 1900, 00:00 UTC.
  • Next-Authorization-State AVP is that it is of the type "enumerated", and specifies the authorization state and reason for non- authorization after the expiration time, defined in the Authorization-State- Change-Time AVP, has been passed.
  • the following values may be defined for the Next-Authorization-State AVP:
  • the Authorization-Validity-Time AVP may be included in a Credit Control Answer, CCA, or in a Re-Authorization-Request, RAR.
  • the Authorization- Validity-Time is a time-stamp identifying the date and time when the authorization information, provided in the Charging-Rule-lnstall AVPs, will no longer be valid.
  • An example of a specific Authorization-Validity-Time AVP is that it is of the type "Time", and includes the time in seconds since January 1 , 1900, 00:00 UTC.
  • the Event-Trigger AVP is suitably of the type "Enumerated”.
  • the Event- Trigger indicates an event that shall cause a re-request of PCC-Rules The following value may be defined for this AVP:
  • This value is used to indicate that before the given time, specified in the Authorization-Validity-Time AVP, new PCC-rules should be requested.
  • Event-Trigger 100 and the Authorization-Validity-Time AVP are not provided, but the Authorization-State-Change-Time AVP has been provided in a Charging-Rule-Authorization AVP, then the next-authorization state will be a permanent state of authorization, until new PCC-decisions are provided by the PCEF. This is useful for accomplishing time-based subscriptions, e.g. 12 hour access to service "A".
  • the invention also comprises as such a node 120 as shown above, said node suitably being a PCEF/GGSN of a 2G or a 3G system such as the 3G GPRS system.
  • a node will comprising means for receiving the information about a UE's access rights from the control function 160.
  • These means 145 have been symbolically shown as a processor 145 in fig 2, but the means can also be a suitable combination of hardware or software.
  • a node of the invention will also comprise means for handling access requests to a service from a UE by using the access rights information from said control function, these means also suitably being the processor 145, which will also be able to handle the access rights information from the control function, the PCRF, including a code, X, Y, Z, regarding services to which the UE is denied access.
  • the processor 145 also handles the redirection of access requests to services which a UE is denied access, as shown above, as well as handling information about periods in time when the UE 110 is allowed or denied access to one or more of said services, so that a UE which requests access to a certain service from the node 120 may be denied or granted access by the node 120 based on the time of day, week, month etc that the request is made.
  • the enhanced service authorization of the Gx interface as discloses by the present invention enables the PCEF/GGSN to carry out a selective service redirect to a redirect server which can provide detailed information to an end user, i.e. a UE regarding why the UE has been denied access to a certain service to which he has requested access, and to which service the user is normally allowed to access.
  • the calendar time based authorization information conveyed via the Gx interface as disclosed by the present invention provides the PCEF/GGSN with information that enables it to carry out service based access control for services that are authorized only for a certain period of time, or only during, for example, certain times of the day or the week.

Abstract

A method (300) for a wireless telecommunication system (200) with user equipment, UE (110), and a first node (120) to which a UE may send a request for access to a service, and a control function (160) with information about the access rights to specific services for UEs in the system. The system (200) comprises an interface (150) between said first node (120) and the control function (160), and the method (300) comprises the step (3) of letting said first node receive information about a UE's access rights from said control function, and letting said first node handle access requests to a service from a UE using the access rights information from said control function. The method additionally comprises the step (3) of letting the access rights information from said control function to said first node comprise a code (X, Y, Z) regarding services to which the UE is denied access.

Description

TITLE
A method and a device for improved service authorization.
TECHNICAL FIELD The present invention discloses a method and a device by means of which improved service authorization can be obtained in a wireless access telecommunications system.
BACKGROUND At present, in some wireless access telecommunications systems, such as, for example 2G and 3G systems, such as 3G-GPRS, there are functions in the system for allowing or denying users access to services within the system or services outside of the system. In most 2G and 3G systems, the functions for allowing or denying a user such access are designed in the following manner: a user requests access to a service by means of a request to a node in the system, in a GPRS system the so called GGSN, the Gateway GPRS Support Node.
The GGSN has obtained knowledge of the user's rights and which services the user may access by means of another function in the system, usually known as the PCRF, Policy and Charging Rule Function. Usually, when a UE requests a new session, e.g. is turned on initially, the GGSN requests, and receives from the PCRF, a list that defines which services the user may or may not access. This list is then used by the GGSN during the session in question, in order to permit or deny the user access to services which the user requests access to.
If a user requests access to a service to which the GGSN wishes, according to the information from the PCRF, to deny him access to, the request may be redirected to a separate function in the system, which handles denial of service requests. This separate function will send a message to the UE informing the user of the denial, e.g. he will receive a message such as "Access Denied" or "Service not authorized".
In the context of allowing or denying access to a user, the GGSN assumes a role referred to as Policy Charging Enforcement Function, PCEF. The PCEF accesses the PCRF by means of an interface known as Gx.
Some services that a user is normally allowed to access may temporarily not be authorized, e.g. due to a number of PCRF-defined polices:
• A service that a user is normally allowed to access may not be authorized if the user roams into a different network,
• Some services may be authorized during certain periods of the day only, e.g. between 09:00 and 18:00 on weekdays only, • Certain services may only be authorized in case the requested bearer provides good enough quality.
• Limitations in the user's terminal equipment.
Even though it is clear that the reason that one or more services may be denied for a user, the Gx interface only provides information regarding whether or not a user is allowed access to a service or not.
For example, it is impossible for a PCEF/GGSN to know if a user is denied access to a certain service due to the fact that the user's terminal doesn't support the service in question, or if the denial is due to the fact that the user is roaming in another network, in which the service in question is denied. Hence, the only action the PCEF can take in the case of a denial is to redirect service requests issued from the user terminal to a generic redirect address that informs the user that the service is denied for an unspecified reason, as exemplified by the messages above. SUMMARY
As has emerged from the description above, there is thus a need for a method by means of which a node such as, for example a PCEF/GGSN can provide a user who is denied access to a service to which he has requested access more information regarding the reason for the denial than is possible at present.
This need is addressed by the present invention in that it discloses a method for use in a wireless access telecommunication system, in which system there can be a number of user equipments, UE, and a first node to which a UE may send a request for access to a specific service.
The system in which the invention can be applied also comprises a control function which holds information about the access rights to specific services for a plurality of UEs in the system, and the system additionally comprises an interface between said first node and the control function.
The method of the invention comprises the step of letting the first node receive information about a UE's access rights from the control function, and also comprises the step of letting the first node handle access requests to a service from a UE using the access rights information from the control function. The method also comprises the step of letting the access rights information from the control function to the first node comprise a code regarding services to which the UE is denied access.
Thus, by means of the present invention, the first node, e.g. a PCEF/GGSN can use the code obtained from the control function, e.g. a PCRF, in order to provide users with more detailed information regarding the reason that they are denied access to a certain service. In a preferred embodiment of the present invention, the code is used by the first node (PCEF/GGSN) in order to redirect the access request to a second function in the system, and in this embodiment, the method also comprises the step of letting the second function send an explicit message regarding the reason for the denial to the requesting UE. However, it is also entirely possible to let the first node comprise a list of said codes, so that a code may be "decoded" in the first node, in which case a message which corresponds to the code in question may be sent to the UE from the first node.
In addition to the problem of "denial messages" which do not comprise sufficient amounts of information, an additional problem in present systems is that an operator may want to grant certain users access to certain services during a limited interval in time, such as for example, between 08:00 AM to 06:00 PM on weekdays. In order to achieve this with the present standard Gx protocol, the authorization information in the PCEF for all affected sessions will need to be updated essentially at the same time. This will cause massive peaks in Gx signalling, which is highly undesirable.
This problem is also addressed by the present invention, in that the invention in a particular embodiment comprises the step of letting the access rights information from the control function (e.g. PCRF) to the first node (e.g. PCEF/GGSN) comprise information about periods in time when the UE is allowed or denied access to one or more of said services.
Thus, by means of the present invention, it is made possible to inform users who are denied access to a certain service of the reason for the denial, and it is also possible to improve the way in which users may be denied or granted access to services based on time intervals.
These and other advantages of the present invention will become even more apparent from the following detailed description. The invention also discloses an improved interface for use between the first node (e.g. PCEF/GGSN) and the control function (e.g. PCRF), as well as a node for use as said first node.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be described in more detail in the following, with reference to the appended drawings, in which
Fig 1 shows a prior art system, and Fig 2 shows the system of fig 1 , with the invention applied, and Figs 3 and 4 show examples of event diagrams of the invention.
DETAILED DESCRIPTION
Fig 1 shows an example of a prior art system 100, shown in order to facilitate the reader's understanding of the invention. In fig 1 , as well as in the description below, the invention will be described with the aid of system components and names from a 3G GPRS system, but it should be understood that this is by way of example only, the invention can be applied to virtually any system in which it is desired to solve the problems which are addressed by means of the invention.
As shown in fig 1 , in the system 100 there can be a number of user equipment, UE, 110, and a first node 120, a GGSN, which in this text will alternatingly be referred to as a PCEF, a Policy Charging Enforcement Function, since the GGSN in this context constitutes the PCEF for GPRS.
It can be pointed out that a GPRS system comprises numerous components which are not shown in fig 1. This is due to the fact that only those components which are of immediate interest to the present invention will be shown in the drawings and described in this text. For example, the 3G GPRS system comprises a function known as the SGSN, which is positioned between the UE 110 and the PCEF/GGSN 120. However, the messages with which this invention is concerned are "passed through" the SGSN on their way between the UE and the PCEF/GGSN, which means that the SGSN is of less interest to this invention.
The PCRF 160 has information about which services that the UE 110 should be granted or denied access to. This information is communicated to the PCEF/GGSN, usually at the initial UE bearer service request, although the procedure may take place at other points in time as well. The interface between the PCRF 160 and the PCEF/GGSN 120 is known as the Gx interface.
Thus, the PCRF 160 communicates to the PCEF/GGSN 120 a list of services to which the UE 130 should be denied or granted access to. As an example, all services that are not granted in the list can be considered to be denied. The PCEF/GGSN stores this list, and when a UE 110 sends a request message, shown by the arrow 1 in fig 1 to the PCEF/GGSN 120, requesting access to a certain service, the following may happen:
• The PCEF/GGSN 120 grants the UE 110 access to the service in question based on information provided from the PCRF via the Gx interface. The request is routed/forwarded by the PCEF/GGSN to its destination.
• The PCEF/GGSN 120, by means of the information provided from the PCRF via the Gx interface, sees that the UE 110 may not be granted access to the service which it has requested access to. In this case, the arrow 2 from the PCEF/GGSN intercepts the request and sends a "redirect" response, shown by the arrow 2 in fig 1 , to the UE, i.e. a message which redirects the UE's request to a second function 170 in the system, to which the UE's request is redirected, shown as the arrow 3 in fig 1. The second function 170 sends a message, shown by means of the arrow 4, to the UE 110. In the prior art system 100 of fig 1 , this message can only be a standardized "denial message" such as "Access Denied" or "Service not authorized".
Fig 2 shows a system 200 of the invention. Components and functions which can be found in the system 100 of fig 1 have been given the same reference numbers in fig 1 , and will not be explained again here.
In the system 200 of the invention, the control function 160, i.e. the PCRF, may send information to the PCEF/GGSN regarding a UE's access rights to a number of services via the Gx interface. However, in the system 200, as opposed to the system 100 of fig 1 , the information sent from the PCRF 160 to the PCEF/GGSN 120 may have the following structure, as also indicated in fig 2:
Examples of service authorization information provided over the Gx interface from the PCRF to the PCEF/GGSN:
Service "A": OK
Service "B": Not OK, "NOK", Code 2 Service "C": OK
Service "D": NOK; Code 4.
Thus, as can be seen, for services to which the user 110 is denied access, the PCRF uses the Gx interface to explicity inform the PCEF/GGSN 120 not only about which services that are authorized, but also which services that are not authorized (NOK), which may be temporary, together with a code coupled to the reason for the denial.
Subsequently, when a UE requests access to a service to which it, according to the information from the PCRF, should be denied access to, the PCEF/GGSN uses the codes comprised in the Gx message as follows: • The UE 110 sends its request message, arrow 1 in fig 2.
• The PCEF/GGSN 120 identifies the requested service and sees that the UE 110 should be denied access to the service in question and sends a redirect message, arrow 2 to the UE 110. However, as opposed to the event sequence in the prior art system 100, the
PCEF/GGSN now has additional information coupled to the access denial, said additional information being the code shown above. The code is, in a certain embodiment of the present invention, used in order to redirect the access request from the UE to one of a number of specified functions, shown as 180-182 in fig 2. The redirected request is shown by means of an arrow 3, and the response from the function 180-182 is shown by means of an arrow 4.
Since the denied request can be redirected to one of a number of functions 180-182, the contents of the "denial message" to the UE 110 can be tailored in a way which has been impossible hitherto. Preferably, each NOK code is tied to a specified one of the functions 180-182, by means of which each NOK code can be made to correspond to a certain denial message.
Thus, each of the functions 180-182 is prepared with a certain message, example of which might be:
• The requested service can only be reached from your Home PLMN, Public Land Mobile Network. • The requested service cannot be accessed from this terminal type.
Please contact customer support for minimal terminal requirements.
• The requested service can only be accessed between 0700 and 1800 Monday to Friday.
• The requested service requires a 3G connection. Naturally, the number of "denial message functions" 180-182 shown in fig 2 are only example, the number can be varied more or less endlessly.
It should also be pointed out that the denial message functions 180-182 are merely one way of utilizing the enhanced Gx messages of the invention. It is also perfectly possible to let the PCEF/GGSN comprise the function of "decoding" the codes from the PCRF itself, so that the denial messages are sent directly from the PCEF/GGSN 120 to the UE 110 by a function for this in the PCEF/GGSN.
In addition, it is also possible to let the denial message function 180-182 be external to the PCEF/GGSN as shown in fig 2, but to let it be one function only, which as such comprises the ability to decode all of the codes sent from the PCRF regarding the reasons for denial.
As has emerged from the description above, the present invention comprises extending the Gx protocol so that the PCRF may communicate more information to the PCEF regarding reasons for denying a UE access to a service. The extensions to the Gx protocol may be referred to as Attribute Value Pairs, AVPs, a term which may be used below, AVPs being information containers used by the Gx protocol.
Fig 3 shows a signaling sequence 300 in which the AVPs of the present invention is used. The signaling is between a UE, a PCEF, a PCRF and a Redirect Server which corresponds to the functions 180-182 of fig 2.
The sequence is as follows:
1. Establish bearer service request: The UE sends a requests to the PCEF/GGSN to set up a bearer. For GPRS, this would be an Activate
PDP Context Request. 2. Gx CCR, Credit Control Request, initial. The PCEF initiates a Gx session with the PCRF, and includes the UE identity, the requested QoS, PLMN-Id etc.
3. Gx CCA initial. The PCRF responds with a CCA, Credit Control
Answer, containing one Charging-Rule-lnstall for a Charging-Rule- Base that is authorized and a Charging-Rule-Name which normally is available only in the Home PLMN. Since the UE in this example is currently roaming in another operator's network, the service is temporarily unauthorized. The CCA in question may contain the following information:
Charging-Rule-lnstall AVP
Charging-Rule-Base-Name = 1 Charging-Rule-lnstall AVP
Charging-Rule-Name=5 Charging-Rule-Authorization AVP
Authorization-State = DENIED_ROAMING
4. Establish Bearer Service Request. The Requested bearer is accepted.
For GPRS, this would be an Activate PDP Context Accept.
5. The UE requests access to a web-page, e.g. URL "x". The PCEF detects that URL "x" corresponds to e.g. Charging-Rule No. δwhich is temporarily not authorized due to roaming.
6. The PCEF sends a response to the UE with a redirect indication that includes the configured redirect server address used only for DENIED_ROAMING (url "y)
7. The UE issues a request for url "y" 8. The redirect server at URL "y" responds to the UE that the requested webpage can only be accessed from the Home PLMN.
In the following, by way of example only, some examples of AVPs of the present invention will be given.
Charqinq-Rule-lnstall AVP
The authorization state for the current and next periods of time is included in the Charging-Rule Install AVP, by inserting the a new AVP: The Charging- Rule-Authorization AVP:
Charging-Rule-lnstall := < AVP Header: 1001 >
*[ Charging-Rule-Definition ] *[ Charging-Rule-Name ] *[ Charging-Rule-Base-Name ]
[ Charging-Rule-Authorization] *[ AVP ]
The authorization information provided in the Charging-Rule-Authorization AVP is valid for all Charging-Rule-Names and Charging-Rule-Base-Names provided in that instance of the Charging-Rule-lnstall AVP provided in a CCA or RAR, Re-Authorization Request.
If no Charging-Rule-Authorization AVP is present in a Charging-Rule- Authorization AVP then this implies that all Charging-Rule-Definitions, Charging-Rule-Names and Charging-Rule-Base-Names are authorized without any restrictions (standard solution).
Charqinq-Rule-Authorization AVP The Charging-Rule-Authorization AVP groups the AVPs that are required to define the authorization state for the current and next time period for the associated charging rules and charging rule bases. The Charging-Rule-Authorization AVP is shared in the same Charging-Rule- lnstall for those Charging-Rule-Names or Charging-Rule-Base-Names that has the same Authorization-state.
The Charging-Rule-Authorization AVP may look as follows:
Charging-Rule-Authorization: := < AVP Header: 1055, Vendor Id: 193 > {Autho rizatio n-State} [Authorization-State-Change-Time] [Next Authorization State] *[ AVP ]
Authorization-State AVP
The Authorization-State AVP may be of the type "enumerated", and specifies the authorization state and reason for non-authorization for the charging rules and charging rule bases provided in the Charging-Rule-lnstall AVP.
The following values can be defined for the Authorization-State AVP:
AUTHORIZED 0
DENIED_CALENDAR_TIME 1 DENIED_ROAMING 2
DENIED_QUALITY_OF_SERVICE 3
DENIED_BLACKLISTED 4
DENIED_TERMINAL 5
DENIED_OPERATOR_REASON_ONE 6 DENIED_ OPERATOR_REASON_TWO 7
DENIED_ OPERATOR_REASON_THREE 8
DENIED_ OPERATOR_REASON_FOUR 9
DENIED_ OPERATOR_REASON_FIVE 10
DENIED_UNKNOWN_REASON 11
As has been seen from the description given above, by means of the invention, a problem associated with "access denial messages" may be addressed. Another problem which may be solved by a particular embodiment of the invention is that an operator of a system may want to authorize some services to a large number of users during a limited period of time, such as a particular interval of a day, such as, for example, between 08:00 AM to 06:00 PM on weekdays. To achieve this with the present Gx protocol which is used between the PCRF and the PCEF, the authorization information in the PCEF of all affected sessions need to be updated more or less at the same time point in time. This causes massive peaks in Gx signalling in the system, which is undesirable.
In order to address this problem, the mentioned embodiment of the present invention comprises the step of letting the access rights information from the control function, i.e. the PCRF, to the first node, i.e. the PCRF/GGSN, comprise information about periods in time when a UE is allowed or denied access to one or more services.
As an example, some services may be authorized for a certain user during a specific period of time only, e.g. for 24 hours from the time when the service is activated, or during re-occurring periods of the day, e.g. between 07:00 - 18:00 on weekdays.
In order to provide such information to the PCEF, the "authorization code" described above, provided by the PCRF to the PCEF, the so called PCC- rule, can be associated with information regarding a specific point in time when the authorization state changes. The next authorization state that is valid after the authorization state change must also be provided for this kind of services. In this way, it will be possible for the PCEF to determine that e.g. a certain user is to be granted access to a certain service until, in this example, 18:00, and thereafter the user should be denied access to the service, due to calendar time restrictions. The opposite is of course also possible, i.e. the service is first temporarily denied to the user due to calendar time restrictions, but after 18:00, in the present example, the user is granted access to the service.
Another "building block" in the calendar time based authorization embodiment of the invention is a validity timer which schedules the PCEF to request new policy information from the PCRF. The validity timer is provided by the PCRF to the PCEF, and should typically be set longer than the authorization state change time, e.g. longer than 18:00 in the present example, but short enough to catch new policy information before the next consecutive authorization state change time occurs, i.e. in this example at the latest at 07:00 the following morning.
Thus, by means of calendar time based authorization embodiment of the invention, Gx signalling peaks may be avoided.
In order to explain the time based authorization or denial/grant of access to certain services, reference will now be made to fig 4, which is a signalling diagram 400 in which the time based denial/grant of access is used.
The signaling in fig 4 is between a UE, a PCEF and a PCRF. The signaling is as follows, with reference to the horizontal arrows shown in fig 4:
1'. Establish bearer service request. The UE sends a request to the PCEF/GGSN to set up a bearer. For GPRS, this would be an Activate PDP Context Request.
2'. Gx CCR initial. The PCEF/GGSN initiates a Gx session with the PCRF, and includes the UE identity, Requested QoS, PLMN-Id etc.
3'. Gx CCA initial. The PCRF responds with a CCA containing one Charging-Rule-lnstall for a Charging-Rule-Base that is authorized and a Charging-Rule-Name that is currently not authorized due to calendar time. The authorization state change time is set to be at 07:00 the next morning. When the authorization state change time has passed, access to the service is granted to the user (next authorization state). In addition, the authorization-validity-time states that the policy information must be refreshed by the PCEF before 18:00 the next day. The CCA in question may have the following format:
Event-Trigger = TIME_CHANGE Charging-Rule-lnstall AVP Charging-Rule-Base-Name = 1
Charging-Rule-lnstall AVP
Charging-Rule-Name = 5 Charging-Rule-Authorization AVP
Authorization-State = DENIED_CALENDAR_TIME Authorization-State-Change-Time = 07/08/01 , 07:00 UTC
Next-Authorization-State = AUTHORIZED Authorization-Validity-Time = 07/08/01 , 18:00 UTC
4'. Establish Bearer Service Request. The Requested bearer is accepted. For GPRS this would be an Activate PDP Context Accept. All service requests associated with the Charging-Rule-Name in question will be redirected to a redirect server for DENIED_CALENDAR_TIME for this bearer.
5'. At 07:00, the authorization state changes from DENIED_CALENDAR_TIME to AUTHORIZED. From now on, the PCEF will no longer redirect service requests for Charging-Rule-Name in question, but the requests will be passed through.
6'. CCR update. At a point in time before 18:00, the PCEF issues a new CCR in order to refresh the policy information. The PCEF is responsible for distributing this kind of requests in order to avoid signalling peaks in the case that there are many sessions which share the same Authorization-Validity-Time.
T, CCA update. The PCRF responds with new policy information. The Charging-Rule in question now has the authorization state AUTHORIZED and a next authorization state that is DENIED_CALENDAR_TIME. The authorization state change time is at 18:00, and the policy information must be refreshed again at the latest at 07:00 the following day. The new values may look as follows:
Event-Trigger = TIME_CHANGE Charging-Rule-lnstall AVP
Charging-Rule-Name = 5 Charging-Rule-Authorization AVP
Authorization State = AUTHORIZED Authorization-State-Change-Time = 07/08/01 , 18:00 UTC Next Authorization State = DENIED_CALENDAR_TIME Authorization-Validity-Time = 08/08/02, 07:00 UTC
Some examples of AVPs of the invention which may be used with the calendar based grant or denial of access to services are shown below. It should be pointed out that the AVPs below are merely examples, and are in no way to be seen as restrictive for the scope of protection sought for the present invention.
Authorization-State-Change-Time AVP
The Authorization-State-Change-Time is a time-stamp identifying the date and time when the authorization state provided in the Authorization-State AVP will no longer be valid. An example of an authorization-State-Change- Time AVP is that it is of the type "Time" and includes the time in seconds since January 1 , 1900, 00:00 UTC. Next-Authorization-State AVP
An example of the Next-Authorization-State AVP is that it is of the type "enumerated", and specifies the authorization state and reason for non- authorization after the expiration time, defined in the Authorization-State- Change-Time AVP, has been passed. The following values may be defined for the Next-Authorization-State AVP:
AUTHORIZED 0 DENIED_CALENDAR_TIME 1
Authorization-Validitv-Time AVP
The Authorization-Validity-Time AVP may be included in a Credit Control Answer, CCA, or in a Re-Authorization-Request, RAR. The Authorization- Validity-Time is a time-stamp identifying the date and time when the authorization information, provided in the Charging-Rule-lnstall AVPs, will no longer be valid. An example of a specific Authorization-Validity-Time AVP is that it is of the type "Time", and includes the time in seconds since January 1 , 1900, 00:00 UTC.
Event-Trigger AVP
The Event-Trigger AVP is suitably of the type "Enumerated". The Event- Trigger indicates an event that shall cause a re-request of PCC-Rules The following value may be defined for this AVP:
TIME_CHANGE 100
This value is used to indicate that before the given time, specified in the Authorization-Validity-Time AVP, new PCC-rules should be requested.
Note: If the Event-Trigger 100 and the Authorization-Validity-Time AVP are not provided, but the Authorization-State-Change-Time AVP has been provided in a Charging-Rule-Authorization AVP, then the next-authorization state will be a permanent state of authorization, until new PCC-decisions are provided by the PCEF. This is useful for accomplishing time-based subscriptions, e.g. 12 hour access to service "A".
The invention also comprises as such a node 120 as shown above, said node suitably being a PCEF/GGSN of a 2G or a 3G system such as the 3G GPRS system. Such a node will comprising means for receiving the information about a UE's access rights from the control function 160. These means 145 have been symbolically shown as a processor 145 in fig 2, but the means can also be a suitable combination of hardware or software.
A node of the invention will also comprise means for handling access requests to a service from a UE by using the access rights information from said control function, these means also suitably being the processor 145, which will also be able to handle the access rights information from the control function, the PCRF, including a code, X, Y, Z, regarding services to which the UE is denied access.
Suitably, the processor 145 also handles the redirection of access requests to services which a UE is denied access, as shown above, as well as handling information about periods in time when the UE 110 is allowed or denied access to one or more of said services, so that a UE which requests access to a certain service from the node 120 may be denied or granted access by the node 120 based on the time of day, week, month etc that the request is made.
In conclusion, the enhanced service authorization of the Gx interface as discloses by the present invention enables the PCEF/GGSN to carry out a selective service redirect to a redirect server which can provide detailed information to an end user, i.e. a UE regarding why the UE has been denied access to a certain service to which he has requested access, and to which service the user is normally allowed to access.
The calendar time based authorization information conveyed via the Gx interface as disclosed by the present invention provides the PCEF/GGSN with information that enables it to carry out service based access control for services that are authorized only for a certain period of time, or only during, for example, certain times of the day or the week.
By means of this information, it will be possible to avoid the signalling peaks that present day Gx solutions would imply for this kind of services, when the policy information of large numbers of sessions needs to be updated at the same time.
The invention is not restricted to the examples of embodiments described above and shown in the drawings, but may be varied freely within the scope of the appended claims.

Claims

1. A method (300) for use in a wireless access telecommunications system (200), in which system there can be a number of user equipment, UE (110), and a first node (120) to which a UE may send a request for access to a specific service, the system (200) also comprising a control function (160) which holds information about the access rights to specific services for a plurality of UEs in the system, the system (200) in addition comprising an interface (150) between said first node (120) and the control function (160), the method (300) comprising the step (3) of letting said first node receive information about a UE's access rights from said control function, and the step (5) of letting said first node handle access requests to a service from a UE using the access rights information from said control function, the method being characterized in that it additionally comprises the step (3) of letting the access rights information from said control function to said first node comprise a code (X, Y, Z) regarding services to which the UE is denied access.
2. The method (300) of claim 1 , according to which, if a UE (110) requests access to a service to which it is denied access according to the information from the control function (160), said code (X, Y, Z) is used by the first node (120) in order to redirect the access request to a second function (180-182) in the system, the method (300) also comprising the step (8) of letting the second function (180-182) send an explicit message regarding the reason for the denial to the requesting UE.
3. The method (300, 400) of claim 1 or 2, additionally comprising the step (3') of letting the access rights information from said control function (160) to said first node (120) comprise information about periods in time when the UE (110) is allowed or denied access to one or more of said services.
4. The method (300, 400) of any of the previous claims, according to which said first node (120) is the GGSN of a 2G or a 3G system, configured to act as a PCEF, Policy Control Enforcement Function, and the control function is the PCRF, Policy and Charging Rule Function of the system.
5. An interface (150 for use in a wireless access telecommunications system (200), in which system there can be a number of user equipment, UE (110), and a first node (120) to which a UE may send a request for access to a specific service, the system (200) also comprising a control function (160) which holds information about the access rights to specific services for a plurality of UEs in the system, said interface being the interface (150) used between said first node (120) and the control function (160) in order to convey, inter alia, information from said control function to said first node (120) about a UEs access rights to certain services, the interface (150) being characterized in that it comprises, along with said access rights information, one or more codes (X, Y, Z) regarding services to which the UE is denied access.
6. The interface (150) of claim 5, in which said codes (X, Y, Z) may be used by said first node if a UE (110) requests access to a service to which it is denied access according to the information from the control function (160), in order to redirect the access request to a second function (180-182) in the system.
7. The interface of claim 5 or 6, in which the access rights information from said control function (160) to said first node (120) comprises information about periods in time when the UE (110) is allowed or denied access to one or more of said services.
8. The interface (150) of any of claims 5-7, being the Gx interface in a 2G or 3G system, such as the 3G GPRS system.
9. A node (120) for use in a in a wireless access telecommunications system (200), in which system there can be a number of user equipment, UE (110), to which node (120) a UE may send a request for access to a specific service, the node comprising means for exchanging information with a control function (160) in the system which holds information about the access rights to specific services for a plurality of UEs in the system, said exchange of information being carried out over an interface (150) between the node (120) and the control function (160), the node (120) comprising means (145) for receiving information about a UE's access rights from said control function (160) and means (145) for handling access requests to a service from a UE by using the access rights information from said control function, the node (120) being characterized in that it additionally comprises means (145) for handling the access rights information from said control function including a code (X, Y, Z) regarding services to which the UE is denied access.
10. The node (120) of claim 9, in which said means (145) for handling access rights information use one or more of said codes (X, Y, Z) if a UE (110) requests access to a service to which it is denied access according to the information from the control function (160), said code (X, Y, Z) being used by said means (145) in order to redirect the access request to one of a number of second functions (180-182) in the system, the code being used in order to select the proper second function.
11. The node (120) of claim 9 or 10, additionally comprising means (145) for handling access rights information from said control function (160) which comprises information about periods in time when the UE (110) is allowed or denied access to one or more of said services, so that a UE which requests access to a certain service from the node (120) may be denied or granted access by the node (120) based on the time of day, week, month etc that the request is made.
12. The node (120) of any of claims 9-11 , being a GGSN of a 2G or a 3G system configured to act as a PCEF, Policy Control Enforcement Function in the system.
PCT/SE2007/050289 2007-04-27 2007-04-27 A method and a device for improved service authorization WO2008133561A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
PCT/SE2007/050289 WO2008133561A1 (en) 2007-04-27 2007-04-27 A method and a device for improved service authorization
NZ580166A NZ580166A (en) 2007-04-27 2007-04-27 Including access rights information in a code regarding services to which equipment is denied access
CN2007800527605A CN101682609B (en) 2007-04-27 2007-04-27 A method and a device for improved service authorization
BRPI0721599-1A BRPI0721599B1 (en) 2007-04-27 2007-04-27 METHOD AND Node FOR USE IN A WIRELESS TELECOMMUNICATION SYSTEM
AU2007352471A AU2007352471B2 (en) 2007-04-27 2007-04-27 A method and a device for improved service authorization
JP2010506120A JP5144749B2 (en) 2007-04-27 2007-04-27 Improved service authorization method and apparatus
EP07748450.9A EP2153621B1 (en) 2007-04-27 2007-04-27 A method and a device for improved service authorization
US12/597,833 US20100146596A1 (en) 2007-04-27 2007-04-27 Method And A Device For Improved Service Authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2007/050289 WO2008133561A1 (en) 2007-04-27 2007-04-27 A method and a device for improved service authorization

Publications (1)

Publication Number Publication Date
WO2008133561A1 true WO2008133561A1 (en) 2008-11-06

Family

ID=39925908

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2007/050289 WO2008133561A1 (en) 2007-04-27 2007-04-27 A method and a device for improved service authorization

Country Status (7)

Country Link
US (1) US20100146596A1 (en)
EP (1) EP2153621B1 (en)
JP (1) JP5144749B2 (en)
CN (1) CN101682609B (en)
AU (1) AU2007352471B2 (en)
BR (1) BRPI0721599B1 (en)
WO (1) WO2008133561A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010283513A (en) * 2009-06-03 2010-12-16 Nec Corp Access information guidance system, access information guidance method and program
CN101998323A (en) * 2009-08-18 2011-03-30 中兴通讯股份有限公司 Policy and charging control-based redirection method and device
CN102123370A (en) * 2010-01-12 2011-07-13 中兴通讯股份有限公司 System and method for redirecting access of user
WO2011100478A3 (en) * 2010-02-10 2011-10-06 Qualcomm Incorporated In- band provisioning of a device at a closed subscriber group
WO2012065626A1 (en) * 2010-11-16 2012-05-24 Telefonaktiebolaget Lm Ericsson (Publ) Service redirection from a policy and charging control architecture
WO2012097044A1 (en) * 2011-01-11 2012-07-19 Apple Inc. Improved registration with a mobile telecommunications service provider
JP2013502786A (en) * 2009-08-20 2013-01-24 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Implementation of fair use in roaming packet access
CN103503400A (en) * 2011-11-04 2014-01-08 华为技术有限公司 Redirection method, device and system
US8805365B2 (en) 2010-01-15 2014-08-12 Apple Inc. Registration with a mobile telecommunications service provider
EP2805465A1 (en) * 2012-01-19 2014-11-26 Telefonaktiebolaget L M Ericsson (publ) Handling of authorization requests for a packet-based service in a mobile network
US8914025B2 (en) 2010-01-15 2014-12-16 Apple Inc. Registration with a mobile telecommunications service provider
US10477385B2 (en) 2012-07-20 2019-11-12 Tekelec, Inc. Methods, systems and computer readable media for distributing policy rules to the mobile edge

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299660B (en) * 2007-04-30 2010-12-08 华为技术有限公司 Method, system and equipment for executing security control
CN101370006B (en) * 2007-08-15 2011-07-27 华为技术有限公司 Conversation establishing method and conversation deletion method of network protocol communication access network
CN101394449B (en) * 2007-09-19 2011-01-19 华为技术有限公司 Session modifying method and system
CN101583152B (en) * 2008-05-15 2011-08-24 华为技术有限公司 Method, device and system for information transmission
RU2513711C2 (en) * 2009-11-13 2014-04-20 Телефонактиеболагет Лм Эрикссон (Пабл) Service event trigger
US9184924B2 (en) * 2010-02-16 2015-11-10 Telefonaktiebolaget L M Ericsson (Publ) Nodes for communicating credit related information
CN102123147B (en) * 2011-03-01 2014-12-31 中兴通讯股份有限公司 Method and system for differential authorization of network device
CN102811130A (en) * 2011-06-03 2012-12-05 华为软件技术有限公司 Redirect method and redirect device under PCC (Policy and Charging Control)
US9608830B2 (en) * 2012-07-05 2017-03-28 Telefonaktiebolaget Lm Ericsson (Publ) Policy and charging control methods for handling multiple-user subscriptions of a telecommunication network
CN103002426B (en) * 2012-11-15 2015-04-15 大唐移动通信设备有限公司 Method and device for controlling PCC (policy control and charging) rules in Preload mode
WO2018013925A1 (en) * 2016-07-15 2018-01-18 Idac Holdings, Inc. Adaptive authorization framework for communication networks
US10237418B2 (en) 2017-04-21 2019-03-19 Oracle International Corporation Methods, systems, and computer readable media for charging based on radio congestion in mobile networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6628954B1 (en) 1999-09-07 2003-09-30 Nortel Networks Limited System, method, and program for controlling access to data services by a subscriber unit in a wireless network
US20050135428A1 (en) 2003-12-19 2005-06-23 Nokia Corporation Communication network
WO2007090463A1 (en) * 2006-02-07 2007-08-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for use in a communications network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6317584B1 (en) * 1998-12-21 2001-11-13 Nortel Networks Limited Controlling communication in wireless and satellite networks
AU6082199A (en) * 1999-09-13 2001-04-30 Nokia Corporation Intelligent data network router
GB0216278D0 (en) * 2002-07-12 2002-08-21 Nokia Corp Communication channel selection
CN1266891C (en) * 2003-06-06 2006-07-26 华为技术有限公司 Method for user cut-in authorization in wireless local net
JP2006262300A (en) * 2005-03-18 2006-09-28 Nec Corp Mobile communication system and information exchange method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6628954B1 (en) 1999-09-07 2003-09-30 Nortel Networks Limited System, method, and program for controlling access to data services by a subscriber unit in a wireless network
US20050135428A1 (en) 2003-12-19 2005-06-23 Nokia Corporation Communication network
WO2007090463A1 (en) * 2006-02-07 2007-08-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for use in a communications network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
3GPP TS 29.212 V7.0.0, March 2007 (2007-03-01), XP003020387, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/Specs/html-info/29212.htm> *
3GPP TSG-CT WG3 MEETING #43BIS, FRANKFURT, GERMANY, vol. C3-070304, 11 April 2007 (2007-04-11) - 12 April 2007 (2007-04-12), XP003020388, Retrieved from the Internet <URL:http://www.3gpp.orf/ftp/sg_ran/WG3_interworking_ex-CN3/TSGC3_43bis_Frankfurt/Docs> *
See also references of EP2153621A4

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010283513A (en) * 2009-06-03 2010-12-16 Nec Corp Access information guidance system, access information guidance method and program
CN101998323A (en) * 2009-08-18 2011-03-30 中兴通讯股份有限公司 Policy and charging control-based redirection method and device
JP2013502786A (en) * 2009-08-20 2013-01-24 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Implementation of fair use in roaming packet access
CN102123370A (en) * 2010-01-12 2011-07-13 中兴通讯股份有限公司 System and method for redirecting access of user
US8914025B2 (en) 2010-01-15 2014-12-16 Apple Inc. Registration with a mobile telecommunications service provider
US8805365B2 (en) 2010-01-15 2014-08-12 Apple Inc. Registration with a mobile telecommunications service provider
JP2015097411A (en) * 2010-02-10 2015-05-21 クゥアルコム・インコーポレイテッドQualcomm Incorporated Method and apparatus for in-band provisioning of device at closed subscriber group
US8792392B2 (en) 2010-02-10 2014-07-29 Qualcomm Incorporated Method and apparatus for in-band provisioning of a device at a closed subscriber group
JP2013520093A (en) * 2010-02-10 2013-05-30 クゥアルコム・インコーポレイテッド Method and apparatus for in-band provisioning of devices in a limited subscriber group
WO2011100478A3 (en) * 2010-02-10 2011-10-06 Qualcomm Incorporated In- band provisioning of a device at a closed subscriber group
CN103329483B (en) * 2010-11-16 2016-11-16 瑞典爱立信有限公司 Service redirection is carried out from strategy and charging control architecture
US20140237129A1 (en) * 2010-11-16 2014-08-21 Telefonaktiebolaget L M Ericsson (Publ) Service Redirection from a Policy and Charging Control Architecture
WO2012065626A1 (en) * 2010-11-16 2012-05-24 Telefonaktiebolaget Lm Ericsson (Publ) Service redirection from a policy and charging control architecture
CN103329483A (en) * 2010-11-16 2013-09-25 瑞典爱立信有限公司 Service redirection from a policy and charging control architecture
US10476970B2 (en) 2010-11-16 2019-11-12 Telefonaktiebolaget Lm Ericsson (Publ) Service redirection from a policy and charging control architecture
US11647085B2 (en) 2010-11-16 2023-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Service redirection from a policy and charging control architecture
WO2012097044A1 (en) * 2011-01-11 2012-07-19 Apple Inc. Improved registration with a mobile telecommunications service provider
CN103503400A (en) * 2011-11-04 2014-01-08 华为技术有限公司 Redirection method, device and system
CN103503400B (en) * 2011-11-04 2017-04-12 华为技术有限公司 redirection method, device and system
EP2805465A1 (en) * 2012-01-19 2014-11-26 Telefonaktiebolaget L M Ericsson (publ) Handling of authorization requests for a packet-based service in a mobile network
US10477385B2 (en) 2012-07-20 2019-11-12 Tekelec, Inc. Methods, systems and computer readable media for distributing policy rules to the mobile edge

Also Published As

Publication number Publication date
EP2153621B1 (en) 2018-12-26
CN101682609B (en) 2013-07-31
AU2007352471B2 (en) 2012-05-10
US20100146596A1 (en) 2010-06-10
CN101682609A (en) 2010-03-24
BRPI0721599A2 (en) 2013-01-22
JP2010525732A (en) 2010-07-22
AU2007352471A1 (en) 2008-11-06
EP2153621A1 (en) 2010-02-17
JP5144749B2 (en) 2013-02-13
EP2153621A4 (en) 2014-08-13
BRPI0721599B1 (en) 2019-10-15

Similar Documents

Publication Publication Date Title
AU2007352471B2 (en) A method and a device for improved service authorization
JP5926433B2 (en) Telecommunications network and time-based network access method
RU2437219C2 (en) Method to provide access to ip-multimedia subsystem
US8756663B1 (en) Service utilization control manager
EP2294806B1 (en) Online charging for roaming users in a proxy online charging system of a visited network
JP4319284B2 (en) Internet subscriber profile
US8078142B2 (en) Prepaid charging in communication network
WO2002067498A1 (en) Prepaid access to internet protocol (ip) networks
EP2052513B1 (en) Policy management in a roaming or handover scenario in an ip network
JP5022493B2 (en) Subscription and charge notification control
EP1695514B1 (en) Communication network
EP1623595B1 (en) Service restriction in mobile communication networks
CN1326065C (en) Differentiated connectivity in a pay-per-use public data access system
WO2003098958A1 (en) Quality of service based on mobile position
KR20130016614A (en) A method and apparatus of controlling mtc device access outside of grant time and forbidden time
Cai et al. Online charging in the roaming EPC/LTE network

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780052760.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07748450

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2010506120

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 580166

Country of ref document: NZ

WWE Wipo information: entry into national phase

Ref document number: 2007352471

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 12597833

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2007352471

Country of ref document: AU

Date of ref document: 20070427

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 4037/KOLNP/2009

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009143886

Country of ref document: RU

Ref document number: 2007748450

Country of ref document: EP

ENP Entry into the national phase

Ref document number: PI0721599

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20091022