WO2011006450A1 - 业务处理方法及通信设备 - Google Patents

业务处理方法及通信设备 Download PDF

Info

Publication number
WO2011006450A1
WO2011006450A1 PCT/CN2010/075218 CN2010075218W WO2011006450A1 WO 2011006450 A1 WO2011006450 A1 WO 2011006450A1 CN 2010075218 W CN2010075218 W CN 2010075218W WO 2011006450 A1 WO2011006450 A1 WO 2011006450A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
service
attribute information
terminal
control
Prior art date
Application number
PCT/CN2010/075218
Other languages
English (en)
French (fr)
Inventor
周汉
吴问付
孙晓姬
王子谦
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2011006450A1 publication Critical patent/WO2011006450A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the present application claims the priority of the Chinese patent application filed on July 17, 2009, the Chinese Patent Office, the application number is 200910159149. 3, the invention name is "business processing method and communication device", the entire contents thereof This is incorporated herein by reference.
  • the present invention relates to the field of communications technologies, and in particular, to a service processing method and a communication device.
  • Background Art The 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) proposes an evolved packet switching system (EPS, Evolved Packet System).
  • EPS evolved packet switching system
  • M2M machine to machine
  • M2M refers to network communication between one or more network elements without the need for human involvement.
  • M2M applications can be used in the EPS network architecture.
  • an application server accessing a Packet Data Network is arbitrarily accessible and is not limited.
  • PDN Packet Data Network
  • VPN virtual private network
  • the user can be provided with the specified application server for access, but with a specific access point name (APN, Access Point Name).
  • APN Access Point Name
  • Ding ⁇ 2 ⁇ applications some applications are tailored to the specific needs of industry users, such as meter reading services for users in the power industry. These terminals only need to access the ⁇ 2 ⁇ application server of users in the power industry. Therefore, in order to optimize network performance and enhance network security, operators hope that a specific application-like terminal only needs to access a fixed application server.
  • GRR Guaranteed Bit Rate
  • PDP Packet Data Protocol
  • the inventor of the present invention finds that: in the prior art, the M2M application does not restrict access to a specific network element device, such as an application server, for the M2M terminal, although the VPN technology may Access is made for a specific application server, but a specific APN is required for limitation, and in an M2M application, the APN is a public resource, and there is no limit. Further, there is no related technical solution for limiting the transmission of M2M terminal data services. Therefore, the prior art does not implement the control of the service initiated by the M2M terminal in the M2M application, thereby reducing the security of the network.
  • Embodiments of the present invention provide a service processing method and a communication device capable of improving network security.
  • the embodiment of the invention provides a service processing method, including:
  • the attribute information about the service control is known, and the attribute information about the service control includes the server information that allows access and/or the bearer and resource information that restricts the operation;
  • the service request After learning the service request sent by the terminal, the service request is controlled according to the learned attribute information of the service control.
  • the embodiment of the invention provides a communication device, including:
  • the information obtaining unit is configured to learn attribute information about the service control in the network of the machine-to-machine M2M application, where the attribute information about the service control includes server information that allows access and/or bearer and resource information that restrict operations;
  • the processing unit is configured to control, according to the learned attribute information of the service control, the service request after the service request sent by the terminal is obtained.
  • the technical solution of the embodiment of the present invention is to obtain attribute information about service control, and the attribute information about the service control includes server information that allows access and/or bearer and resource information that restrict operations, and thus After the service request sent by the terminal is known, the service corresponding to the service request can be controlled according to the attribute information about the service control, thereby implementing the control of the service initiated by the M2M terminal and improving the security of the network.
  • FIG. 1 is a flowchart of a service processing method according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a service processing method according to Embodiment 2 of the present invention.
  • FIG. 3 is a flowchart of a service processing method according to Embodiment 3 of the present invention.
  • FIG. 6 is a flowchart of a service processing method according to Embodiment 6 of the present invention.
  • FIG. 7 is a schematic structural diagram of a communication device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a communication system according to an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE EMBODIMENTS Embodiments of the present invention provide a service processing method, a communication device, and a communication system capable of improving network security. The details are described below separately.
  • Embodiment 1 is a flowchart of a service processing method according to Embodiment 1 of the present invention, which mainly includes the following steps:
  • Step 101 In the network of the machine-to-machine M2M application, the attribute information about the service control is obtained, and the attribute information about the service control includes the server information that allows access and/or the bearer and resource information of the restricted operation;
  • Knowing the attribute information about the service control includes: obtaining attribute information about the service control from the service gateway SGW configuration information, the packet data network gateway PGW configuration information, the home subscriber server HSS database, the subscription database SPR, or the group subscription database.
  • Step 102 After learning the service request sent by the terminal, control the service request according to the learned attribute information of the service control.
  • the controlling the service request according to the learned attribute information of the service control includes: if the service request information of the terminal is If the server information that is allowed to access is inconsistent, the service request of the terminal is rejected.
  • the attribute information about the service control further includes service information that is allowed to be used; if the information of the service request of the terminal is inconsistent with the service information that is allowed to be used, the service request of the terminal is rejected.
  • the controlling the service request according to the learned attribute information of the service control includes: if the information of the service request of the terminal belongs to the bearer and resource information of the restricted operation, rejecting the service request of the terminal.
  • the attribute information about the service control includes the bearer and resource information of the restricted operation, and includes the permission to visit.
  • the controlling the service request according to the attribute information of the service control includes: if the information requested by the terminal service belongs to the bearer and resource information of the restricted operation, the service request of the terminal is rejected.
  • the technical solution of the embodiment of the present invention is to obtain attribute information about service control, where the attribute information about the service control includes server information that allows access and/or bearer and resource information that restrict operations. Therefore, after the service request sent by the terminal is known, the service corresponding to the service request can be controlled according to the attribute information about the service control, thereby implementing the control of the service initiated by the M2M terminal, thereby improving the security of the network. .
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • This embodiment describes a mobility management network element (which may be a Mobility Management Entity (MME), a Serving GPRS Support Node (SGSN), or a Mobile Switch Center (MSC). ) from a Home Subscriber Server (HSS, Home Subscriber Server) database or group (eg Group) subscription database (the group subscription database may be a subscription database dedicated to M2M applications, may have HSS and / or SPR functions)
  • MME Mobility Management Entity
  • SGSN Serving GPRS Support Node
  • MSC Mobile Switch Center
  • HSS Home Subscriber Server
  • group subscription database may be a subscription database dedicated to M2M applications, may have HSS and / or SPR functions
  • Obtaining the attribute information about the service control including obtaining the application server information that is allowed to be accessed, optionally including obtaining the service information that is allowed to be used, and/or acquiring the bearer and resource information of the restricted operation (including, for example, limiting the user to initiate Proprietary Bearer Activation, PDP Context Activation
  • the mobility management network element may subsequently notify the service gateway (SGW, Serving Gateway) and the packet data network gateway (PGW, Packet Data Network Gateway), optionally if it is dynamic policy and charging control (PCC, Policy Charging). Control )
  • SGW Service gateway
  • PGW Packet Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • the mobility management network element, the SGW, the PGW, or the PCRF can control the service request according to the learned attribute information of the service control after receiving the service request sent by the terminal, so that the service restriction mechanism can be utilized. Optimize network performance, save network resources, and enhance network security.
  • FIG. 2 is a flowchart of a service processing method according to Embodiment 2 of the present invention.
  • the steps shown in the flow chart mainly include three parts: information acquisition, information notification and execution control.
  • Content The content of the acquired information includes steps 201 to 202, the content of the information notification includes steps 203 to 206, and the content of the execution control includes steps 207 to 212.
  • Step 201 The mobility management network element sends an update location (Update Location) message to the network element where the HSS database or the group subscription database is located.
  • Update Location Update Location
  • Step 202 The network element where the HSS database or the group subscription database is located sends an Update Location Ack message to the mobility management network element, where the attribute information of the service control may be carried.
  • the attribute information of the service control may be the following information: the message may carry the application server information that allows access, such as the IP address of the application server that is allowed to access or the Fully Qualified Domain Name (FQDN) (or an IP address) Address or FQDN list information).
  • the service information that is allowed to be used may be carried, and the service information is used to indicate that the user uses the identification information of the service, such as the service identifier Service ID, or the quality of service level identifier QCI.
  • information that restricts a user from initiating a dedicated bearer activation, a PDP context activation, a secondary PDP context activation, a resource allocation/modification, or a PDN connection request may also be carried. This information can be pre-signed by the terminal in the database.
  • the application server information and the allowed service information that can be accessed may be restricted according to the M2M terminal granularity (for example, the M2M terminal performs service access, and may be restricted according to the attribute information of the M2M terminal subscription or configured service control), or may be
  • the group granularity is restricted.
  • a terminal in a group performs service access, and can know which group the terminal belongs to, and then restricts according to the group subscription or the attribute information of the configured service control, or can follow the APN or the service.
  • the granularity is limited (for example, the APN or service information that the terminal requests to access may be restricted according to the contracted or configured APN or service information).
  • the information limiting the user to initiate the dedicated bearer activation, the PDP context activation, the secondary PDP context activation, the resource allocation/modification, or the PDN connection request may be restricted according to the M2M terminal granularity, or may be restricted according to the group granularity, or may be carried according to the The PDN connection, or the APN granularity is limited, and is not limited in the embodiment of the present invention.
  • the network element in which the HSS database or the group subscription database is located may actively send an Insert Subscriber Data message to the mobility management network element, and the information is carried in the message, which is not used by the embodiment of the present invention. limit.
  • Step 203 The mobility management network sends a Create Session Request message to the PGW, where the SGW can carry the attribute information of the service control.
  • the message carries the application server information that is allowed to access, such as the IP address or FQDN of the application server that is allowed to access (which can also be an IP address or a list of FQDNs).
  • the service information is used to indicate that the user uses the identification information of the service, such as Service 1D, or QC1.
  • information that restricts a user from initiating a dedicated bearer activation, a PDP context activation, a secondary PDP context activation, a resource allocation/modification, or a PDN connection request may also be carried.
  • Step 204 In the case of a dynamic PCC application, the PGW sends an IP gateway session establishment indication (Indication of IP CAN Session Establishment) message to the PCRF, where the attribute information of the service control may be carried.
  • IP gateway session establishment indication Indication of IP CAN Session Establishment
  • Step 205 The PCRF sends an Ack of IP CAN Session Establishment to the PGW.
  • Step 206 The PGW sends a Create Session Response message to the SGW, and the SGW sends a Create Session Response message to the mobility management network element.
  • the SGW, the PGW, and the PCRF can also obtain the attribute information of the service control.
  • the mobility management network element, the SGW, the PGW, or the PCRF can perform corresponding control operations.
  • Step 207 When the M2M terminal initiates the process of resource modification or allocation, the M2M terminal sends a Bearer Resource Modification/Allocation Request message to the mobility management network element, where the message carries the SDF (Service Data Flow, service) Data stream) QoS and TAD (Traffic Aggregate Description) information.
  • SDF Service Data Flow, service
  • TAD Traffic Aggregate Description
  • the service request initiated by the terminal in the embodiment of the present invention may be a bearer resource modification/allocation initiated by the terminal, a dedicated bearer activation, a PDP context activation, a secondary PDP context activation, or an attach/PDN connection request.
  • the embodiments of the present invention do not limit this.
  • Step 208 The mobility management network element forwards the request bearer resource modification/allocation to the SGW (Bearer Resource
  • Modification/Allocation Request message, which can carry SDF QoS and TAD information.
  • Step 209 The SGW forwards a Bearer Resource Modification/Allocation Request message to the PGW, where the message can carry SDF QoS and TAD information.
  • Step 210 If it is a dynamic PCC application, the PGW sends an Indication of IP CAN Session modification message to the PCRF, where the message can carry SDF QoS and TAD information.
  • Step 211 The PCRF performs service control, and returns a TP CAN session modification confirmation (Ack of TP-CAN Session modification) message to the PGW.
  • TP CAN session modification confirmation Ack of TP-CAN Session modification
  • the PCRF can perform control operations based on previously known attribute information:
  • the application server that the M2M terminal requests to access is obtained.
  • the information is consistent with the obtained application server information that is allowed to be accessed. If they are consistent, the M2M terminal is allowed to access; if not, the M2M terminal is denied access. For example, comparing the source address in the DL Packet filter (downlink data filter) in the TAD cell carried by the M2M terminal or the destination address in the UL Packet filter (upstream data filter) with the previously obtained application server information that is allowed to be accessed If the two are consistent, the M2M terminal is allowed to access, otherwise the access is denied.
  • the reject message may carry a cause value indicating that the M2M terminal is denied access to the current service, for example, "illegal server information" or "no" Allowed Server (, Allowed Server),.
  • the access to the application server is obtained, and the service information requested by the M2M terminal is consistent with the obtained permitted service information. If the information is consistent, the M2M terminal is allowed to access; , then refuse access to the M2M terminal. For example, comparing the QCI or Service ID in the SDF QoS carried by the M2M terminal with the previously obtained allowed service information (such as QCI or Service ID), if both are consistent, access is allowed; otherwise, access is denied. And can carry a reason value, such as "Forbidden Service” or "Not Allowed Service".
  • the M2M terminal requests the bearer resource modification/allocation information to be the acquired restriction.
  • the user initiates the information of the dedicated bearer activation, the PDP context activation, the primary PDP context activation, the resource allocation/modification, or the PDN connection request. If it does not belong, the M2M terminal is allowed to restrict access; if it is the D, the M2M terminal is rejected. In, and can carry a cause value indication, such as "Not Allowed Activation".
  • the service request of the terminal is rejected.
  • the information obtained by restricting the user from initiating a dedicated bearer activation, a PDP context activation, a secondary PDP context activation, a resource allocation/modification, or a PDN connection request is obtained, there is also application server information that allows access, and service information that is allowed to be accessed. Any item or two items; the obtained information can be compared with the related information in the M2M originating service request.
  • the restricted user initiates the dedicated bearer activation, the PDP context activation, the secondary PDP context activation,
  • the information of the resource allocation/modification, or PDN connection request is compared and the result is that the information in the service request belongs to restricting the user from initiating a dedicated bearer activation, a PDP context activation, a secondary PDP context activation, a resource allocation/modification, or a PDN connection request.
  • Information regardless of the ratio of the other or two acquired information More than the result, they refused access.
  • the information of the service request of the terminal is inconsistent with at least one of the server information that is allowed to be accessed or the service information that is allowed to be used, the service request of the terminal is rejected.
  • the PCC rule is sent to the PGW in the Ack of IP-CAN Session modification message; if the access is not allowed, the IP CAN session modification confirmation (Ack of IP- CAN Session modification)
  • the message carries a cause value indicating that the access to the current service is denied. For the specific expression of the cause value, refer to the description of the previous cases.
  • Step 212 If the user access is denied in the IP CAN session modification confirmation message, the PGW and the mobility management network element send a Bearer Resource Modification/Allocation Reject message to the M2M terminal.
  • the message may carry a cause value indicating that the M2M terminal is denied access to the current service. For the specific expression of the cause value, refer to the description of the previous cases.
  • Step 207 After receiving the bearer resource modification/allocation request, the mobility management network element may also perform control, and the specific content is the same as the PCRF execution control operation. If the mobility management network element rejects the M2M terminal access, it sends a Bearer Resource Modification/Allocation Reject message to the M2M terminal, where the message carries a cause value indicating that the M2M terminal is denied access to the current service. For the specific expression of the cause value, refer to the description of the previous cases. Step 208 is performed if the mobility management network element allows the M2M terminal to access.
  • the SGW may also perform control in step 208, and the specific content is the same as the PCRF execution control operation. If the SGW rejects the access of the M2M terminal, the bearer resource Modification/Allocation Reject message is sent to the M2M terminal by the mobility management network element, and the message may carry a cause value indicating that the M2M terminal is denied access to the current For the specific expression of the business and cause values, refer to the description of the previous cases. If the SGW allows the M2M terminal to access, step 209 is performed.
  • the PGW may also perform control in step 209, and the specific content is the same as the PCRF execution control operation. If the PGW rejects the M2M terminal access, the SGW and the mobility management network element send a Bearer Resource Modification/Allocation Reject message to the M2M terminal, where the message may carry a cause value indicating to reject the M2M terminal connection. For the current business, the specific expression of the cause value can be found in the description of the previous cases. Step 210 is performed if the PGW allows the M2M terminal to access.
  • the network side network element can also perform the same control policy to limit the services initiated by the M2M terminal.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • This embodiment describes that during dynamic PCC application, the PCRF obtains attribute information about the service control from the SPR Subscription Profi le Repository or the Group subscription database.
  • FIG. 3 is a flowchart of a service processing method according to Embodiment 3 of the present invention.
  • the steps shown in the flow chart generally include two parts: information acquisition and execution control.
  • the content of the acquired information includes steps 301 to 308, and the content of the execution control includes steps 309 to 313.
  • Step 301 The mobility management network element sends a Create Session Request message to the SGW.
  • Step 302 The SGW sends a Create Session Request message to the PGW.
  • Step 303 If the dynamic PCC is applied, the PGW sends an IP CAN session establishment indication to the PCRF (Indication of
  • IP CAN Session Establ ishment Message.
  • Step 304 The PCRF sends a User Data Request (Profi le Request) message to the network element where the SPR database or the Group subscription database is located, and requests to obtain the attribute information of the service control.
  • Profile le Request User Data Request
  • Step 305 The network element where the SPR database or the group subscription database is located sends a user data response (Profi le Response) message to the PCRF, where the attribute information of the service control may be carried.
  • Profile information of the service control may be carried.
  • the message may carry a description of the attribute information of the service control, as described in the previous step 202.
  • the network element in which the SPR database or the group subscription database is located may actively send a user information update (Profile Update) message to the PCRF, and the information may be carried in the message, which is not limited by the embodiment of the present invention.
  • Profile Update user information update
  • Step 306 The PCRF sends an IP CAN session establishment confirmation to the PGW (Ack of IP CAN Session
  • Rstabli shment which can carry attribute information of business control.
  • Step 307 The PGW sends a Create Session Response message to the SGW, where the attribute information of the service control may be carried.
  • Step 308 The SGW sends a Create Session Response to the mobility management network element.
  • a message which can carry attribute information of the service control.
  • Step 309-Step 313 Refer to the description of the foregoing Embodiment 2 steps 207-212 and the description of the parts in the second embodiment.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • This embodiment describes that some service control information may be pre-configured on the SGW or the PGW, and the SGW or the PGW may perform control in the subsequent M2M terminal in the bearer resource modification/allocation request.
  • Embodiment 4 is a flowchart of a service processing method according to Embodiment 4 of the present invention.
  • Step 401 The M2M terminal sends a bearer resource modification/allocation request (Bearer Resource Modulation) message to the mobility management network element, where the message carries the SDF QoS and TAD information, and optionally, the group identifier may be carried. information.
  • Bearer Resource Modulation Bearer Resource Modulation
  • Step 402 The mobility management network element forwards a message requesting a bearer resource modification/allocation request to the SGW, where the message carries the SDF QoS and the TAD information, and optionally carries the group identification information.
  • Step 403 The SGW forwards the request bearer resource modification/allocation to the PGW (Bearer Resource
  • the message carries the SDF QoS and the TAD information, and optionally carries the group identification information.
  • the PGW can be configured in advance to allow access to the application server information, such as the IP address or FQDN of the application server that is allowed to access (which can also be a list of IP addresses or FQDNs).
  • the allowed service information which is used to identify attribute information of the service used by the user, such as Service ID, or QCI.
  • information for restricting user initiation of dedicated bearer activation, PDP context activation, secondary PDP context activation, resource allocation/modification, or PDN connection request may also be configured.
  • the application server information and the allowed service information that can be accessed may be restricted according to the M2M terminal granularity (for example, the M2M terminal performs service access, and may be restricted according to the attribute information of the M2M terminal subscription or configured service control), or may be
  • the group granularity is restricted.
  • a terminal in a group performs service access, and can know which group the terminal belongs to, and then restricts according to the group subscription or the attribute information of the configured service control, or can follow the APN or the service.
  • the granularity is limited (for example, the APN or service information that the terminal requests to access may be restricted according to the contracted or configured APN or service information).
  • the information of the PDP context activation, the secondary PDP context activation, the resource allocation/modification, or the PDN connection request may be restricted according to the M2M terminal granularity, may be restricted according to the group granularity, or may be restricted according to the bearer, the PDN connection, or the APN granularity.
  • the embodiment of the invention is not limited.
  • the PGW performs the control according to the pre-configured attribute information.
  • the PCRF execution control in the step 211 of the second embodiment refers to the operation of the PCRF execution control in the step 211 of the second embodiment. The principle is the same.
  • the PGW may also perform a corresponding control policy according to the configuration context corresponding to the Group ID. If the related information and configuration information of the terminal service request are related, the user is allowed to access; if not, the user is denied access.
  • Step 404 If the PGW allows the M2M terminal to access, and if it is a dynamic PCC application, the PGW sends an Indication of IP CAN Session modification message to the PCRF, where the message carries the SDF QoS and TAD information.
  • Step 405 The PCRF sends an Ack of IP-CAN Session modification message to the PGW.
  • the foregoing steps are exemplified by the PGW performing control according to the pre-configuration information, but are not limited thereto.
  • the SGW may also perform control according to the pre-configuration information, and the specific content is the same as the PGW execution control operation. If the SGW rejects the access of the M2M terminal, the bearer resource Modification/Allocation Reject message is sent to the M2M terminal by the mobility management network element, and the message may carry a cause value indicating to reject the M2M terminal access. For the current service, the specific manifestation of the cause value can be found in the description of several cases in the second embodiment. If the SGW allows the M2M terminal to access, step 403 is performed.
  • the SGW or the PGW can control the service corresponding to the different service requests initiated by the M2M terminal according to the pre-configuration information, so that the service restriction mechanism can be used to optimize network performance and save network resources. , enhance network security.
  • Embodiment 5 is a diagrammatic representation of Embodiment 5:
  • This embodiment describes that when a M2M terminal initiates a dedicated bearer setup, if a dynamic PCC application is applied, the network side network element can perform control.
  • FIG. 5 is a flowchart of a service processing method according to Embodiment 5 of the present invention.
  • Step 501 The PCRF obtains attribute information of the service control.
  • the PCRF can obtain the attribute information of the service control according to the obtaining manner described in the second embodiment or the third embodiment, and details are not described herein again.
  • Step 502 If the dynamic PCC application is used, when the M2M terminal initiates the establishment of the dedicated bearer, the service request is initiated.
  • the application entity AF, Appl icat ion Funct ion
  • the application entity interacts, and the AF sends an application/service notification to the PCRF.
  • the message may carry the application server information requested to be accessed, and optionally carry the service information used by the request.
  • Step 503 The PCRF returns an Acknowledge message to the AF.
  • the PCRF may perform the control process as described in Embodiment 2 or Embodiment 3 according to the attribute information of the learned service control, and details are not described herein again. If no control is performed, proceed to the next step 504.
  • Step 504 The PCRF sends a policy and a charging rule (Pol icy and Charging Rules Provi s ion ) message to the PGW, where the message may carry the attribute information of the service control.
  • Policy and Charging Rules Provi s ion Policy and Charging Rules Provi s ion
  • the PGW can obtain the attribute information of the service control according to the obtaining manner described in the second embodiment, the third embodiment, or the fourth embodiment, and details are not described herein again.
  • the control process described in the second embodiment, the third embodiment, or the fourth embodiment may be performed according to the attribute information of the service control, and details are not described herein again. If no control is performed, a Create Private Bearer Request/Update Bearer Request message is sent to the mobility management network element.
  • Step 505 The PGW sends a policy and charging rule to the SGW (Pol icy and Charging Rules)
  • Provi s ion which can carry attribute information of business control.
  • the SGW can obtain the attribute information of the service control according to the obtaining mode described in the second embodiment, the third embodiment, or the fourth embodiment, and details are not described herein again.
  • the control process described in the second embodiment, the third embodiment, or the fourth embodiment may be performed according to the attribute information of the service control, and details are not described herein again. If no control is performed, a Create Private Bearer Request/Update Bearer Request message is sent to the mobility management network element.
  • Step 506 The SGW sends a create dedicated bearer request/update bearer request message to the mobility management network element, where the attribute information of the service control may be carried.
  • Step 507 The mobility management network element performs service control.
  • the mobility management network element may obtain the attribute information of the service control according to the obtaining manner described in the second embodiment or the third embodiment, and details are not described herein again.
  • the mobility management network element may perform the control process as described in the second embodiment or the third embodiment according to the obtained attribute information of the service control, and details are not described herein again.
  • the embodiment of the present invention describes that when the M2M terminal initiates a service request, the M2M terminal allocates a data filter (packet filter) to limit the service that the M2M terminal requests to access.
  • a packet filter can be controlled for a service request initiated by an M2M terminal.
  • FIG. 6 is a flowchart of a service processing method according to Embodiment 6 of the present invention.
  • Step 601 The M2M terminal initiates the establishment of a default bearer, and initiates an Attach Request/PDN Connectivity Request (Attach Request/PDN Connectivity Request) message to the mobility management network element, where the message may carry the application server information requested to be accessed, and optionally The service information to be used for the request may be carried, and optionally, the group identifier (for example, the group ID) to which the M2M terminal belongs may be carried.
  • Attach Request/PDN Connectivity Request Attach Request/PDN Connectivity Request
  • the mobility management network element performs control according to the attribute information of the learned service control. For details, refer to the operation performed by the PCRF in step 211 of the second embodiment. The principle is the same.
  • Step 602 The mobility management network element sends a Create Session Request message to the PGW through the SGW, where the message may carry the application server information that is requested to be accessed, and optionally carries the service information requested to be used, optionally The group identification information to which the M2M terminal belongs may also be carried.
  • the SGW or the PGW may perform the corresponding control policy according to the configuration context corresponding to the group ID. If the related information of the terminal service request is consistent with the configuration information, the user is allowed to access; if not, the user access is denied.
  • the SGW or the PGW performs the control according to the obtained attribute information.
  • the SGW or the PGW performs the control according to the obtained attribute information.
  • the PCRF in step 211 of the second embodiment.
  • the principle is the same.
  • Step 603 If there is no dynamic PCC application, that is, a static PCC application, if the PGW allows the terminal to access the currently accessed service, the PGW may construct a packet filtering according to the IP address of the M2M terminal and the obtained address of the application server that is allowed to access. Packet filter, which is the default bearer allocation and a corresponding packet filter packet f ilter.
  • Step 604 The PGW sends a Create Session Response message to the mobility management network element, where the message may carry a packet filter allocated as a default bearer.
  • the mobility management network element obtains the allocated packet filter, and then when the terminal sends data to the network or the network sends data to the terminal, the mobility management network element can control the service request through the packet filter, and the control is mainly performed by the packet filter.
  • the IP address of the M2M terminal and the obtained address of the application server that is allowed to access control the request. If they are inconsistent, the user access is denied; if they are consistent, the user is allowed to access.
  • Step 605 If the dynamic PCC is applied, the PGW sends an IP CAN Session establishment indication request message to the PCRF.
  • the message can carry the IP address of the M2M terminal, and optionally carry the application server information that is allowed to be accessed.
  • Step 606 The PCRF performs control according to the obtained attribute information. For details, refer to the operation performed by the PCRF in the embodiment-step 211, and the principle is the same. If the PCRF allows access, the PCRF generates a service data flow template according to the obtained IP address of the M2M terminal and the M2M application server address information that is allowed to be accessed.
  • Step 607 The PCRF returns an IP CAN session modification confirmation message to the PGW, where the message may carry a service data flow template that is a default bearer.
  • Step 608 The PGW sends a session creation response message to the mobility management network element, where the message may carry a service date flow template that is a default bearer.
  • the mobility management network element obtains the assigned service date flow template, and then when the terminal sends data to the network or the network sends data to the terminal, the mobility management network element can control the service request by using the service date flow template, and the control is mainly
  • the service date flow template controls the request according to the IP address of the M2M terminal and the obtained address of the application server that is allowed to access. If not, the user access is denied; if they are consistent, the user is allowed to access.
  • a corresponding packet filter is allocated for the default bearer in the static PCC application, and a 561 ⁇ 6 date flow template is allocated in the dynamic PCC application, and the purpose is to filter the granularity of the packet from the default bearer or
  • the service data flow template granularity is restricted.
  • the request initiated by the subsequent terminal may be restricted according to the data packet filter or the service data flow template. If not, the user access is denied; if so, the user is allowed to access.
  • the embodiment of the present invention provides a communication device and a communication system.
  • FIG. 7 is a schematic structural diagram of a communication device according to an embodiment of the present invention.
  • the communication device includes: an information learning unit 71, and a processing unit 72.
  • the information learning unit 71 is configured to learn attribute information about the service control in the network of the machine-to-machine M2M application, where the attribute information about the service control includes server information that allows access and/or bearer and resource information that restricts operations;
  • the processing unit 72 after learning the service request sent by the terminal, controls the service request according to the learned attribute information of the service control.
  • the processing unit 72 includes: a 'comparison unit 721, a 'control unit 722.
  • a first comparison unit 721 configured to: in the attribute information about the service control, a server letter that allows access And comparing the information in the received service request with the server information that is allowed to be accessed; the first control unit 722 is configured to reject the terminal when the information of the service request is inconsistent with the server information that is allowed to access Business request.
  • the first comparison unit 721 compares the received service request information with the allowed service information when the attribute information about the service control further includes the service information that is allowed to be used; the first control unit 722 Rejecting the service request of the terminal when the information of the service request is inconsistent with the service information that is allowed to be used.
  • the processing unit 72 includes: a second comparison unit 723 and a second control unit 724.
  • the second comparing unit 723 is configured to compare the received service request information with the bearer and resource information of the restricted operation when the attribute information about the service control is the bearer and the resource information of the restricted operation;
  • the second control unit 724 is configured to reject the service request of the terminal when the information requested by the service belongs to the bearer and resource information of the restricted operation.
  • the processing unit 72 includes: a third comparison unit 725 and a third control unit 726.
  • the third comparing unit 725 is configured to: when the attribute information about the service control includes the bearer and resource information of the restricted operation, and the server information that includes the access, the information of the received service request and the attribute information of the service control Compare;
  • the second control unit 726 is configured to reject the service request of the terminal when the information requested by the service belongs to the bearer and resource information of the restricted operation.
  • the communication device may be a functional entity PCRF performed by the mobility management network element, the packet data network gateway PGW, or the policy and charging.
  • FIG. 8 is a schematic structural diagram of a communication system according to an embodiment of the present invention.
  • the communication system includes: a terminal 81 and a network side device 82.
  • the terminal 81 is configured to send a service request in a network of the machine to machine M2M application;
  • the network side device 82 is configured to learn attribute information about the service control, where the attribute information about the service control includes server information that allows access and/or bearer and resource information that restricts operations, and learns the service request sent by the terminal 81. Then, the service request is controlled according to the learned attribute information about the service control.
  • the network side device 82 When the network side device 82 is specifically configured to learn the attribute information of the service control as the server information that is allowed to be accessed, if the information of the service request of the terminal 81 is inconsistent with the server information that is allowed to be accessed, the network side device 82 rejects Absolute the service request of the terminal 81;
  • the network side device 82 When the network side device 82 is specifically configured to learn the attribute information about the service control as the bearer and resource information of the restricted operation, if the information of the service request of the terminal 81 belongs to the bearer and resource information of the restricted operation, the network side device 82 rejects The service request of the terminal 81;
  • the network side device 82 is specifically configured to learn the attribute information about the service control, including the bearer and resource information of the restricted operation, and the server information including the allowed access; if the information requested by the terminal 81 belongs to the bearer of the restricted operation and The resource information rejects the service request of the terminal 81.
  • the network side device 82 is configured by the mobility management network element, the serving gateway SGW, the packet data network gateway PGW, or the policy and charging function entity PCRF.
  • the network side device 82 may have the structure shown in FIG. 7 above, and specifically refer to the foregoing description.
  • the technical solution of the embodiment of the present invention is to obtain attribute information about service control, where the attribute information about the service control includes server information that allows access and/or bearer and resource information that restricts operations, and thus the terminal is learned.
  • the service request is sent, the service corresponding to the service request is controlled according to the attribute information about the service control, so that the service initiated by the M2M terminal is controlled, and the security of the network is improved.
  • the program can be stored in a computer readable storage medium.
  • the storage medium can include: Read Only Memory (ROM), Random Access Memory (RAM) ⁇ Disk or CD.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

业务处理方法及通信设备 本申请要求于 2009年 07月 17日提交中国专利局、 申请号为 200910159149. 3、 发明名称为 "业务处理方法及通信设备" 的中国专利申请的优先权, 其全部内容通过 引用结合在本申请中。 技术领域 本发明涉及通信技术领域, 具体涉及一种业务处理方法及通信设备。 背景技术 第三代合作伙伴计划 (3GPP, 3rd Generation Partnership Project ) 提出了了 演进的分组交换系统 (EPS, Evolved Packet System)。 机器到机器 (M2M, Machine to Machine )应用指的是一个或者多个网元之间在不需要人为参与的情况下进行的网络通 信。 目前 M2M应用可以在 EPS网络架构中使用。
现有技术中, 在 M2M应用中, 访问分组数据网络 (PDN, Packet Data Network) 的应用服务器是可以任意访问的, 没有受到限制。 如果是利用了虚拟专用网络 (VPN, Virtual Private Network), 则可以为用户提供指定的应用服务器进行访问, 但是含 有特定的接入点名称 (APN, Access Point Name ) 的限制。 对丁 · Μ2Μ应用, 某些应用 是针对行业用户的特殊需求制定的, 例如电力行业用户的抄表业务, 此类 Μ2Μ终端只 需要访问电力行业用户的 Μ2Μ应用服务器即可。 因此, 为了优化网络性能和增强网络 安全, 运营商希望类似特殊应用的 Μ2Μ终端只需要访问某个固定的 Μ2Μ应用服务器。
同样对于上述此类的 Μ2Μ应用, 由于业务应用简单, 数据量小, 数据业务只需要 在一个非保证比特速率 (GBR, Guaranteed Bi t Rate ) 承载 (例如, 缺省承载) 中传 输即可。 为了节约网络资源, 运营商不希望此类 M2M终端使用其他的业务, 当后续此 类 M2M终端发起的资源分配 /修改、 专有承载激活、 分组数据协议 (PDP, Packet Data Protocol ) 上下文激活、 二次 PDP上下文激活、 或附着 /PDN连接请求的流程, 运营商 希望引入一种机制使网络侧有选择的拒绝此类 M2M终端的业务请求。
在对此方法的研究和实践过程中, 本发明的发明人发现: 现有技术中 M2M应用中 没有针对 M2M终端对特定的网元设备例如应用服务器进行访问限制, 虽然 VPN技术可 以针对特定应用服务器进行访问,但是需要特定的 APN进行限制,而在 M2M应用中 APN 是公共资源, 没有限制。 进一步的, 关于限制 M2M终端数据业务的传输也没有相关的 技术解决方案。 因此, 现有技术在 M2M应用中还没有实现对 M2M终端发起的业务进行 控制, 从而降低网络的安全性。 发明内容 本发明实施例提供一种能够提高网络安全性的业务处理方法及通信设备。
本发明实施例提供 ·种业务处理方法, 包括:
在机器到机器 M2M应用的网络中, 获知关于业务控制的属性信息, 所述关于业务 控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载及资源信息;
在获知终端发送的业务请求后,根据获知的所述业务控制的属性信息对所述的业 务请求进行控制。
本发明实施例提供一种通信设备, 包括:
信息获知单元, 用于在机器到机器 M2M应用的网络中, 获知关于业务控制的属性 信息,所述关于业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载 及资源信息;
处理单元, 用于获知终端发送的业务请求后, 根据获知的所述业务控制的属性信 息对所述的业务请求进行控制。
上述技术方案可以看出,本发明实施例技术方案是获知了关于业务控制的属性信 息,所述关于业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载及 资源信息,因此在获知终端发送的业务请求后,就可以根据所述关于业务控制的属性信 息对所述业务请求对应的业务进行控制, 从而实现了对 M2M终端发起的业务进行控制, 提高了网络的安全性。 附图说明 图 1是本发明实施例一的业务处理方法流程图;
图 2是本发明实施例二的业务处理方法流程图;
图 3是本发明实施例三的业务处理方法流程图;
图 4是本发明实施例四的业务处理方法流程图; 图 5是本发明实施例五的业务处理方法流程图;
图 6是本发明实施例六的业务处理方法流程图;
图 7是本发明实施例的通信设备结构示意图;
图 8是本发明实施例的通信系统结构示意图。 具体实施方式 本发明实施例提供一种能够提高网络安全性的业务处理方法、通信设备及通信系 统。 以下分别进行详细说明。
图 1是本发明实施例一的业务处理方法流程图, 主要包括步骤:
步骤 101、 在机器到机器 M2M应用的网络中, 获知关于业务控制的属性信息, 所述 关于业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载及资源信 息;
获知关于业务控制的属性信息包括: 从服务网关 SGW配置信息、 分组数据网络网 关 PGW配置信息、 归属用户服务器 HSS数据库、签约数据库 SPR、或群组签约数据库中获 知关于业务控制的属性信息。
步骤 102、 在获知终端发送的业务请求后, 根据获知的所述业务控制的属性信息 对所述的业务请求进行控制。
其中, 所述关于业务控制的属性信息为允许访问的服务器信息时; 所述根据获知 的所述业务控制的属性信息对所述的业务请求进行控制包括: 如果终端的业务请求的 信息与所述允许访问的服务器信息不一致, 则拒绝所述终端的业务请求。 所述关于业 务控制的属性信息还包括允许使用的业务信息; 如果终端的业务请求的信息与所述允 许使用的业务信息不一致, 则拒绝所述终端的业务请求。
或者是,
所述关于业务控制的属性信息为限制操作的承载及资源信息时,
所述根据获知的所述业务控制的属性信息对所述的业务请求进行控制包括:如果 终端的业务请求的信息属于所述限制操作的承载及资源信息, 则拒绝所述终端的业务 请求。
或者是,
所述关于业务控制的属性信息包括限制操作的承载及资源信息, 以及包括允许访 问的服务器信息时;
所述根据获知所述业务控制的属性信息对所述的业务请求进行控制包括: 若终端业务请求的信息属于限制操作的承载及资源信息,拒绝所述终端的业务请 求。
从该实施例内容可以看出,本发明实施例技术方案是获取了关于业务控制的属性 信息,所述关于业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载 及资源信息, 因此在获知终端发送的业务请求后, 就可以根据所述关于业务控制的属 性信息对所述业务请求对应的业务进行控制,从而实现了对 M2M终端发起的业务进行控 制, 提高了网络的安全性。
以下结合更具体实施例进行详细介绍, 具体包括实施例二到实施例六。
实施例二:
本实施例描述的是移动性管理网元 (可以是移动管理实体 (MME , Mobility Management Entity), 服务 GPRS支持节点 (SGSN, Serving GPRS Support Node ), 或 者移动交换中心 (MSC, Mobile Switch Center) 等) 从归属用户服务器 (HSS, Home Subscriber Server) 数据库或群组 (例如 Group) 签约数据库 (所述群组签约数据库 可以是为 M2M应用专门服务的签约数据库, 可以具有 HSS和 /或 SPR的功能) 获取关于业 务控制的属性信息, 包括获取到允许访问的应用服务器信息, 可选的还包括获取到允 许使用的业务信息, 和 /或, 获取到限制操作的承载及资源信息(例如包括限制用户发 起专有承载激活、 PDP上下文激活、 二次 PDP上下文激活、 资源分配 /修改、 或附着 /分 组数据网络 (PDN, Packet Data Network) 连接请求的信息)。 移动性管理网元后续可 以将上述信息通知给服务网关 (SGW, Serving Gateway) 和分组数据网络网关 (PGW, Packet Data Network Gateway ) , 可选的如果是动态策略和计费控制 (PCC, Policy Charging Control ) 应用, 贝 l」PGW可以将上述信息通知给策略和计费规则功能 (PCRF, Policy Charging Rules Function)。 这样, 移动性管理网元、 SGW、 PGW, 或 PCRF可以 在接收终端发送的业务请求后, 根据获知的所述业务控制的属性信息对所述的业务请 求进行控制, 从而可以利用该业务限制机制优化网络性能, 节约网络资源, 增强网络 安全。
图 2是本发明实施例二的业务处理方法流程图。
流程图中显示的步骤概括而言主要包括获取信息、信息通知及执行控制三大部分 内容。 获取信息的内容包括步骤 201到 202, 信息通知的内容包括步骤 203到 206, 执行 控制的内容包括步骤 207到 212。
步骤 201、 移动性管理网元向 HSS数据库或 Group签约数据库所在的网元发送更新 位置 (Update Location) 消息。
步骤 202、 HSS数据库或 Group签约数据库所在的网元向移动性管理网元发送更新 位置确认 (Update Location Ack) 消息, 其中可以携带业务控制的属性信息。
所述业务控制的属性信息可以是如下信息:消息中可以携带允许访问的应用服务 器信息,如允许访问的应用服务器的 IP地址或者完全合格域名(FQDN, Fully Qualified Domain Name ) (也可以是一个 IP地址或 FQDN的列表信息)。 可选的, 可以携带允许使用 的业务信息, 该业务信息用于指示用户使用业务的标识信息, 如服务标识 Service ID、 或服务质量等级标识 QCI等。 可选的, 还可以携带限制用户发起专有承载激活、 PDP上 下文激活、 二次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息。这些信息都 可以预先由终端在所述数据库中签约。
所述允许访问的应用服务器信息、 允许使用的业务信息可以按照 M2M终端粒度进 行限制 (如 M2M终端进行业务访问, 可以根据该 M2M终端签约或配置的业务控制的属性 信息进行限制),或可以按照 Group粒度进行限制(如一个群组下的终端进行业务访问, 可以获知该终端属于哪个群组, 然后根据该群组的签约或配置的业务控制的属性信息 进行限制),或可以按照 APN或者业务粒度进行限制(如可以根据签约或配置的 APN或业 务信息对终端请求访问的 APN或业务信息进行限制)。 而限制用户发起专有承载激活、 PDP上下文激活、 二次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息可以按 照 M2M终端粒度进行限制,也可以按照 Group粒度进行限制,或可以按照承载、 PDN连接、 或 APN粒度进行限制, 本发明实施例不作限制。
需要说明的是,也可以是 HSS数据库或 Group签约数据库所在的网元主动向移动性 管理网元发送插入签约数据 (Insert Subscriber Data) 消息, 在消息中携带上述信 息, 本发明实施例对此不作限制。
步骤 203、 移动性管理网兀通过 SGW向 PGW发送创建会话请求 (Create Session Request ) 消息, 其中可以携带业务控制的属性信息;
消息中携带允许访问的应用服务器信息,如允许访问的应用服务器的 IP地址或者 FQDN (也可以是一个 IP地址或 FQDN的列表信息)。可选的, 可以携带允许使用的业务信 息, 该业务信息用于指示用户使用业务的标识信息, 如 Service 1D、或 QC1等。可选的, 还可以携带限制用户发起专有承载激活、 PDP上下文激活、 二次 PDP上下文激活、 资源 分配 /修改、 或 PDN连接请求的信息。
步骤 204、在动态 PCC应用情况下, PGW向 PCRF发送 IP CAN会话建立指示( Indication of IP CAN Session Establishment ) 消息, 其中可以携带所述业务控制的属性信息。
步骤 205、 PCRF向 PGW发送 IP CAN会话建立确认 ( Ack of IP CAN Session Establishment )。
步骤 206、 PGW向 SGW发送创建会话响应 (Create Session Response )消息, 而 SGW 向移动性管理网元发送创建会话响应 (Create Session Response ) 消息。
通过该 "通知"过程, SGW、 PGW和 PCRF也可以获取到所述业务控制的属性信息。 这样后续 M2M终端发起业务请求时, 移动性管理网元、 SGW、 PGW, 或 PCRF都可以执行相 应的控制操作。
步骤 207、 当 M2M终端发起资源修改或者分配的流程时, M2M终端向移动性管理网 元发送承载资源修改 /分配请求 ( Bearer Resource Modification/Allocation Request )消息,消息中携带 SDF (Service Data Flow,服务数据流) QoS和 TAD (Traffic Aggregate Description, 流聚合描述) 信息。
需要说明的是, 本发明实施例所述的终端发起的业务请求, 可以是终端发起的承 载资源修改 /分配、 专有承载激活、 PDP上下文激活、 二次 PDP上下文激活、 或附着 /PDN 连接请求等, 本发明实施例对此不作限制。
步骤 208、 移动性管理网元向 SGW转发请求承载资源修改 /分配 (Bearer Resource
Modification/Allocation Request ) 消息, 消息中可以携带 SDF QoS和 TAD信息。
步骤 209、 SGW向 PGW转发请求承载资源修改 /分配 ( Bearer Resource Modification/Allocation Request ) 消息, 消息中可以携带 SDF QoS和 TAD信息。
步骤 210、如果是动态 PCC应用, PGW向 PCRF发送 IP CAN会话修改指示(Indication of IP CAN Session modification) 消息, 消息中可以携带 SDF QoS和 TAD信息。
步骤 211、 PCRF执行业务控制, 向 PGW返回 TP CAN会话修改确认 (Ack of TP-CAN Session modification) 消息。
PCRF可以根据之前获知的属性信息执行控制操作:
如果获取的是允许访问的应用服务器信息, 获知 M2M终端请求访问的应用服务器 信息与获取的允许访问的应用服务器信息是否一致, 如果一致, 则允许 M2M终端接入; 如果不一致,则拒绝 M2M终端接入。例如将 M2M终端携带的 TAD信元中的 DL Packet filter (下行数据过滤器) 中的源地址或 UL Packet filter (上行数据过滤器) 中的目的地 址和之前获知的允许访问的应用服务器信息作比较,如果两者一致,则允许 M2M终端接 入,否则拒绝接入,拒绝消息中可以携带一个原因值指示拒绝该 M2M终端接入当前业务, 例如 "非法服务器信息 (illegal Server information) "或 "不允许的服务器 (Not Allowed Server ),,。
如果获取的是允许访问的业务信息, 在允许访问应用服务器的基础上, 获知 M2M 终端请求访问的业务信息与获取的允许使用的业务信息是否一致, 如果一致, 则允许 M2M终端接入; 如果不一致, 则拒绝 M2M终端接入。 例如将 M2M终端携带的 SDF QoS中的 QCI或 Service ID和之前获取到的允许使用的业务信息 (如 QCI或 Service ID) 作比较, 如果两者都一致, 则允许接入; 否则拒绝接入, 并且可以携带一个原因值指不, 如"禁 止业务 (Forbidden Service ) "或 "不允许的业务 (Not Allowed Service ),,。
如果获取的是限制用户发起专有承载激活、 PDP上下文激活、二次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息, 获知 M2M终端请求承载资源修改 /分配的信息 是否属于获取的限制用户发起专有承载激活、 PDP上下文激活、 一次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息, 如果不属于, 则允许限制 M2M终端接入; 如果 属丁 ·, 则拒绝 M2M终端接入, 并且可以携带一个原因值指示, 如 "不允许的激活 (Not Allowed Activation),,。
如果获取的是允许访问的应用服务器信息和允许访问的业务信息,如果终端业务 请求的相关信息与所述允许访问信息的其中任意一项不一致, 则拒绝所述终端的业务 请求。
如果获取的是限制用户发起专有承载激活、 PDP上下文激活、二次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息, 还有允许访问的应用服务器信息、 允许访问 的业务信息中的任 ·项或两项;可以将这些获取的信息与 M2M发起业务请求中的相关信 息进行比较, 一般来说, 如果先利用限制用户发起专有承载激活、 PDP上下文激活、 二 次 PDP上下文激活、资源分配 /修改、或 PDN连接请求的信息进行比较并且结果为业务请 求中的信息属于限制用户发起专有承载激活、 PDP上下文激活、 二次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息, 则无论另外一种或两种获取的信息进行的比 较结果如何, 都拒绝接入。 或者如果终端的业务请求的信息与允许访问的服务器信息 或允许使用的业务信息至少一项不一致, 拒绝所述终端的业务请求。
如果 PCRF允许接入, 则在 IP CAN会话修改确认 (Ack of IP-CAN Session modification) 消息中携带 PCC规则下发给 PGW; 如果不允许接入, 则在 IP CAN会话修 改确认 (Ack of IP-CAN Session modification) 消息中携带一个原因值指示拒绝该 接入当前业务, 原因值的具体表现形式参见前面几种情况的描述。
步骤 212、如果在 IP CAN会话修改确认消息中指示拒绝该用户接入,贝 l」PGW通过 SGW 和移动性管理网元向 M2M终端发送承载资源修改 /分配拒绝 (Bearer Resource Modification/Allocation Reject )消息, 消息中可以携带一个原因值指示拒绝该 M2M 终端接入当前业务, 原因值的具体表现形式参见前面几种情况的描述。
需要说明的是, 上述步骤是以 PCRF进行控制举例说明但不局限于此。 步骤 207移 动性管理网元接收到承载资源修改 /分配请求后, 也可以进行控制, 具体内容与 PCRF 执行控制操作是相同的。 如果移动性管理网元拒绝 M2M终端接入, 则会向 M2M终端发送 承载资源修改 /分配拒绝 (Bearer Resource Modification/Allocation Reject )消息, 消息中可以携带一个原因值指示拒绝该 M2M终端接入当前业务,原因值的具体表现形式 参见前面几种情况的描述。 如果移动性管理网元允许 M2M终端接入, 才执行步骤 208。
还需要说明的是, 步骤 208中 SGW接收到承载资源修改 /分配请求后, 也可以进行 控制, 具体内容与 PCRF执行控制操作是相同的。 如果 SGW拒绝 M2M终端接入, 则通过移 动性管理网元向 M2M终端发送承载资源修改 I分配拒绝 ( Bearer Resource Modification/Allocation Reject )消息, 消息中可以携带一个原因值指示拒绝该 M2M 终端接入当前业务,原因值的具体表现形式参见前面几种情况的描述。如果 SGW允许 M2M 终端接入, 才执行步骤 209。
还需要说明的是, 步骤 209中 PGW接收到承载资源修改 /分配请求后, 也可以进行 控制, 具体内容与 PCRF执行控制操作是相同的。如果 PGW拒绝 M2M终端接入, 则通过 SGW 和移动性管理网元向 M2M终端发送承载资源修改 /分配拒绝 (Bearer Resource Modification/Allocation Reject )消息, 消息中可以携带一个原因值指示拒绝该 M2M 终端接入当前业务,原因值的具体表现形式参见前面几种情况的描述。如果 PGW允许 M2M 终端接入, 才执行步骤 210。
上述是以 M2M终端发起承载资源修改 /分配的情况举例说明, 当 M2M终端发起专有 承载激活、 PDP上下文激活、 一次 PDP上下文激活、 或 PDN连接请求时, 网络侧网元也可 以执行同样的控制策略, 对 M2M终端发起的业务进行限制。
从该实施例内容可以看出, 通过上述技术方案, 可以对 M2M终端发起的不同的业 务请求进行控制, 从而可以利用该业务限制机制优化网络性能, 节约网络资源, 增强 网络安全。
实施例三:
本实施例描述的是在动态 PCC应用时, PCRF从签约数据库 (SPR Subscription Profi le Repository ) 或 Group签约数据库获取关于业务控制的属性信息。
图 3是本发明实施例三的业务处理方法流程图。
流程图中显示的步骤概括而言主要包括获取信息及执行控制两大部分内容。获取 信息的内容包括步骤 301到 308 , 执行控制的内容包括步骤 309到 313。
步骤 301、 移动性管理网元向 SGW发送创建会话请求 (Create Sess ion Request ) 消息。
步骤 302、 SGW向 PGW发送创建会话请求 (Create Session Request ) 消息。
步骤 303、如果动态 PCC应用, PGW向 PCRF发送 IP CAN会话建立指示( Indication of
IP CAN Session Establ ishment ) 消息。
步骤 304、 PCRF向 SPR数据库或 Group签约数据库所在的网元发送用户数据请求 (Profi le Request ) 消息, 请求获取业务控制的属性信息。
步骤 305、 SPR数据库或 Group签约数据库所在的网元向 PCRF发送用户数据响应 (Profi le Response ) 消息, 其中可以携带业务控制的属性信息。
消息中可以携带业务控制的属性信息的描述, 参见前面步骤 202中的描述。
需要说明的是,也可以是 SPR数据库或 Group签约数据库所在的网元主动向 PCRF发 送用户数据更新 (Profile Update ) 消息, 在消息中可以携带上述信息, 本发明实施 例对此不作限制。
步骤 306、 PCRF向 PGW发送 IP CAN会话建立确认 ( Ack of IP CAN Session
Rstabli shment ), 其中可以携带业务控制的属性信息。
步骤 307、 PGW向 SGW发送创建会话响应 (Create Session Response ) 消息, 其中 可以携带业务控制的属性信息。
步骤 308、 SGW向移动性管理网元发送创建会话响应 (Create Session Response ) 消息, 其中可以携带业务控制的属性信息。
步骤 309—步骤 313 :参见前面实施例二步骤 207— 212的描述及实施例二中需说明 部分内容的描述。
从该实施例内容可以看出, 通过上述技术方案, 可以对 M2M终端发起的不同的业 务请求进行控制, 从而可以利用该业务限制机制优化网络性能, 节约网络资源, 增强 网络安全。
实施例四:
本实施例描述的是可以在 SGW或 PGW上预先配置一些业务控制的信息, 后续 M2M终 端在承载资源修改 /分配请求中, SGW或 PGW可以执行控制。
图 4是本发明实施例四的业务处理方法流程图。
步骤 401、 M2M终端向移动性管理网元发送承载资源修改 /分配请求 (Bearer Resource Modificat ion/Al locat ion Reques t ) 消息, 消息中携带 SDF QoS和 TAD信息, 可选的, 可以携带群组标识信息。
步骤 402、 移动性管理网元向 SGW转发请求承载资源修改 /分配 (Bearer Resource Modificat ion/Al locat ion Request ) 消息, 消息中携带 SDF QoS和 TAD信息, 可选的, 可以携带群组标识信息。
步骤 403、 SGW向 PGW转发请求承载资源修改 /分配 (Bearer Resource
Modificat ion/Al locat ion Request ) 消息, 消息中携带 SDF QoS和 TAD信息, 可选的, 可以携带群组标识信息。
PGW中预先可以配置允许访问的应用服务器信息, 如允许访问的应用服务器的 IP 地址或者 FQDN (也可以是一个 IP地址或 FQDN的列表信息)。可选的, 可以配置允许使用 的业务信息, 该业务信息用于标识用户使用业务的属性信息, 如 Service ID、 或 QCI 等。 可选的, 还可以配置限制用户发起专有承载激活、 PDP上下文激活、 二次 PDP上下 文激活、 资源分配 /修改、 或 PDN连接请求的信息。
所述允许访问的应用服务器信息、 允许使用的业务信息可以按照 M2M终端粒度进 行限制 (如 M2M终端进行业务访问, 可以根据该 M2M终端签约或配置的业务控制的属性 信息进行限制),或可以按照 Group粒度进行限制(如一个群组下的终端进行业务访问, 可以获知该终端属于哪个群组, 然后根据该群组的签约或配置的业务控制的属性信息 进行限制),或可以按照 APN或者业务粒度进行限制(如可以根据签约或配置的 APN或业 务信息对终端请求访问的 APN或业务信息进行限制)。 而限制用户发起专有承载激活、 PDP上下文激活、 二次 PDP上下文激活、 资源分配 /修改、 或 PDN连接请求的信息可以按 照 M2M终端粒度进行限制,也可以按照 Group粒度进行限制,或可以按照承载、 PDN连接、 或 APN粒度进行限制, 本发明实施例不作限制。
PGW根据预先配置的属性信息进行控制,具体可以参见实施例二步骤 211中 PCRF执 行控制的操作, 其原理是相同。
PGW也可以根据所述 Group ID所对应的配置上下文执行对应的控制策略, 如果终 端业务请求的相关信息与配置信息 ·致, 则允许用户接入; 如果不 ·致, 则拒绝用户 接入。
步骤 404、 如果 PGW允许 M2M终端接入, 并且如果是动态 PCC应用, PGW向 PCRF发送 IP CAN会话修改指示 (Indication of IP CAN Session modification) 消息, 消息中 携带 SDF QoS和 TAD信息。
步骤 405、 PCRF向 PGW发送 IP CAN会话修改确认 ( Ack of IP-CAN Session modification) 消息。
需要说明的是, 上述步骤是以 PGW根据预配置信息进行控制举例说明但不局限于 此。步骤 402中 SGW接收到承载资源修改 /分配请求后,也可以根据预配置信息进行控制, 具体内容与 PGW执行控制操作是相同的。如果 SGW拒绝 M2M终端接入,则会通过移动性管 理网 元 向 M2M终端发送承载资源修改 I分配拒绝 ( Bearer Resource Modification/Allocation Reject )消息, 消息中可以携带一个原因值指示拒绝该 M2M 终端接入当前业务, 原因值的具体表现形式参见实施例二几种情况的描述。 如果 SGW 允许 M2M终端接入, 才执行步骤 403。
从该实施例内容可以看出, 通过上述技术方案, SGW或 PGW根据预配置信息可以对 M2M终端发起的不同业务请求对应的业务进行控制,从而可以利用该业务限制机制优化 网络性能, 节约网络资源, 增强网络安全。
实施例五:
本实施例描述的是当 M2M终端发起专有承载建立时, 如果动态 PCC应用, 网络侧网 元可以执行控制。
图 5是本发明实施例五的业务处理方法流程图。
步骤 501、 PCRF获取业务控制的属性信息。
PCRF可以根据实施例二或实施例三中描述的获取方式获取业务控制的属性信息, 此处不再赘述。
步骤 502、 如果动态 PCC应用, 当 M2M终端发起专有承载建立时, 发起业务请求与 应用实体 (AF, Appl icat ion Funct ion ) 交互, AF再向 PCRF发送应用 /服务通知
(Appl icat ion/service info ) 消息, 消息中可以携带请求访问的应用服务器信息, 可选的携带请求使用的业务信息。
步骤 503、 PCRF向 AF返冋确认 (Acknowledge ) 消息。
需要说明的是, 该步骤中 PCRF可以根据获知的业务控制的属性信息, 执行如实施 例二或实施例三中描述的控制过程, 此处不再赘述。 如果不执行控制, 则继续下一步 骤 504。
步骤 504、 PCRF向 PGW发送策略和计费规则规定 (Pol icy and Charging Rules Provi s ion ) 消息, 消息中可以携带业务控制的属性信息。
需要说明的是, PGW可以根据实施例二、 实施例三、 或实施例四中描述的获取方 式获取业务控制的属性信息, 此处不再赘述。
PGW获取业务控制的属性信息后, 可以根据业务控制的属性信息, 执行如实施例 二、 实施例三、 或实施例四中描述的控制过程, 此处不再赘述。 如果不执行控制, 向 移动性管理网元发送创建专有承载请求 /更新承载请求消息。
步骤 505、 PGW向 SGW发送策略和计费规则规定 (Pol icy and Charging Rules
Provi s ion ) 消息, 消息中可以携带业务控制的属性信息。
需要说明的是, SGW可以根据实施例二、 实施例三、 或实施例四中描述的获取方 式获取业务控制的属性信息, 此处不再赘述。
SGW获取业务控制的属性信息后, 可以根据业务控制的属性信息, 执行如实施例 二、 实施例三、 或实施例四中描述的控制过程, 此处不再赘述。 如果不执行控制, 向 移动性管理网元发送创建专有承载请求 /更新承载请求消息。
步骤 506、 SGW向移动性管理网元发送创建专有承载请求 /更新承载请求消息, 其 中可以携带业务控制的属性信息。
步骤 507、 移动性管理网元进行业务控制。
需要说明的是,移动性管理网元可以根据实施例二或实施例三中描述的获取方式 获取业务控制的属性信息, 此处不再赘述。
移动性管理网元可以根据获知的业务控制的属性信息, 执行如实施例二、或实施 例三中描述的控制过程, 此处不再赘述。
从该实施例内容可以看出, 通过上述技术方案, 可以对 M2M终端发起的不同业务 请求对应的业务进行控制, 从而可以利用该业务限制机制优化网络性能, 节约网络资 源, 增强网络安全。 实施例六:
木实施例描述的是当 M2M终端发起缺省承载建立时, 可以为缺省承载分配一个数 据过滤器(packet filter)对 M2M终端请求访问的业务进行限制, 后续 M2M终端发起业 务请求时, 分配的数据过滤器 (packet filter) 可以针对 M2M终端发起的业务请求进 行控制。
图 6是本发明实施例六的业务处理方法流程图。
步骤 601、 M2M终端发起建立缺省承载, 向移动性管理网元发起附着 /PDN连接请求 (Attach Request/PDN Connectivity Request ) 消息, 消息中可以携带请求接入的应 用服务器信息, 可选的还可以携带请求使用的业务信息, 可选的还可以携带 M2M终端所 属的群组标识 (如, Group ID)。
移动性管理网元根据获知的业务控制的属性信息进行控制,具体可以参见实施例 二步骤 211中 PCRF执行控制的操作, 其原理是相同。
步骤 602、 移动性管理网元通过 SGW向 PGW发送创建会话请求 (Create Session Request )消息, 消息中可以携带请求接入的应用服务器信息, 可选的还可以携带请求 使用的业务信息, 可选的还可以携带 M2M终端所属的群组标识信息。 SGW或 PGW可以根据 所述 Group ID所对应的配置上下文执行对应的控制策略, 如果终端业务请求的相关信 息与配置信息一致, 则允许用户接入; 如果不一致, 则拒绝用户接入。
SGW或 PGW根据获取的属性信息进行控制, 具体可以参见实施例二步骤 211中 PCRF 执行控制的操作, 其原理是相同。
步骤 603、 如果没有动态 PCC应用, 即静态 PCC应用时, 如果 PGW允许终端接入当前 访问的业务, PGW可以根据 M2M终端的 IP地址和获取到的允许访问的应用服务器的地址 构造出数据包过滤器 packet filter, 即为缺省承载分配 ·个相应的分组过滤器 packet f ilter。
步骤 604、 PGW向移动性管理网元发送创建会话响应 (Create Session Response ) 消息, 消息中可以携带为缺省承载分配的 packet filter。
移动性管理网元获取分配的 packet filter, 那么后续当终端向网络发送数据或 者网络向终端发送数据时, 移动性管理网元可以通过 packet filter对业务请求进行控 制, 该控制主要是由 packet filter根据 M2M终端的 IP地址和获取到的允许访问的应用 服务器的地址对请求进行控制, 如果不一致, 则拒绝用户接入; 如果一致, 则允许用 户接入。
步骤 605、 如果动态 PCC应用, PGW向 PCRF发送 IP CAN Session建立指示请求消息, 消息中可以携带 M2M终端的 IP地址, 可选的可以携带允许访问的应用服务器信息。 步骤 606、 PCRF根据获取的属性信息进行控制, 具体可以参见实施例—步骤 211中 PCRF执行控制的操作, 其原理是相同。如果 PCRF允许接入, PCRF根据获取到的 M2M终端 的 IP地址和允许访问的 M2M应用服务器地址信息生成业务数据流模板 Service date flow template。
步骤 607、 PCRF向 PGW返回 IP CAN会话修改确认消息, 消息中可以携带为缺省承载 分配的业务数据流模板 Service date flow template。
步骤 608、 PGW向移动性管理网元发送创建会话响应消息, 消息中可以携带为缺省 承载分酉己的 Service date flow template。
移动性管理网元获取分配的 Service date flow template, 那么后续当终端向网 络发送数据或者网络向终端发送数据时, 移动性管理网元可以通过 Service date flow template对业务请求进行控制, 该控制主要是由 Service date flow template根据 M2M 终端的 IP地址和获取到的允许访问的应用服务器的地址对请求进行控制,如果不 ·致, 则拒绝用户接入; 如果一致, 则允许用户接入。
本发明实施例在静态 PCC应用时为缺省承载分配一个相应的 packet filter, 在动 态 PCC应用时分配 '个561^ 6 date flow template , 目的都是为了从缺省承载的数据 包过滤器粒度或业务数据流模板粒度进行限制控制, 后续终端发起的请求可以根据该 数据包过滤器或业务数据流模板进行限制控制, 如果不一致, 则拒绝用户接入; 如果 -致, 则允许用户接入。
上述内容详细介绍了本发明实施例的业务处理方法, 相应的, 本发明实施例提供 一种通信设备和通信系统。
图 7是本发明实施例的通信设备结构示意图。
如图 7所示, 通信设备包括: 信息获知单元 71、 处理单元 72。
信息获知单元 71 , 用于在机器到机器 M2M应用的网络中, 获知关于业务控制的属 性信息,所述关于业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承 载及资源信息;
处理单元 72, 于获知终端发送的业务请求后, 根据获知的所述业务控制的属性信 息对所述的业务请求进行控制。
处理单元 72包括: 第 '比较单元 721、 第 '控制单元 722。
第一比较单元 721 , 用于在所述关于业务控制的属性信息为允许访问的服务器信 息时, 将接收的业务请求中的信息与允许访问的服务器信息进行比较; 第一控制单元 722 , 用于在所述业务请求的信息与所述允许访问的服务器信息不 一致时, 拒绝所述终端的业务请求。
所述第一比较单元 721在所述关于业务控制的属性信息还包括允许使用的业务信 息时, 将接收的业务请求的信息与所述允许使用的业务信息进行比较; 所述第一控制 单元 722在所述业务请求的信息与所述允许使用的业务信息不一致时,拒绝所述终端的 业务请求
或者, 处理单元 72包括: 第二比较单元 723、 第二控制单元 724。
第二比较单元 723 , 用于在所述关于业务控制的属性信息为限制操作的承载及资 源信息时, 将接收的业务请求的信息与限制操作的承载及资源信息进行比较;
第二控制单元 724, 用于在所述业务请求的信息属于限制操作的承载及资源信息 时, 拒绝所述终端的业务请求。
或者, 处理单元 72包括: 第三比较单元 725、 第三控制单元 726。
第三比较单元 725 , 用于在所述关于业务控制的属性信息包括限制操作的承载及 资源信息, 以及包括允许访问的服务器信息时, 将接收的业务请求的信息与所述业务 控制的属性信息进行比较;
第二控制单元 726, 用于在所述业务请求的信息属于限制操作的承载及资源信息 时, 拒绝所述终端的业务请求。
其中, 通信设备可以为由移动性管理网元、 分组数据网络网关 PGW或策略和计费 执行功能实体 PCRF。
图 8是本发明实施例的通信系统结构示意图。
如图 8所示, 通信系统包括: 终端 81、 网络侧设备 82。
终端 81 , 用于在机器到机器 M2M应用的网络中, 发送业务请求;
网络侧设备 82, 用于获知关于业务控制的属性信息, 所述关于业务控制的属性信 息包括允许访问的服务器信息和 /或限制操作的承载及资源信息, 在获知所述终端 81 发送的业务请求后, 根据获知的所述关于业务控制的属性信息对所述的业务请求进行 控制。
所述网络侧设备 82具体用于获知的所述业务控制的属性信息为允许访问的服务 器信息时, 如果终端 81的业务请求的信息与所述允许访问的服务器信息不一致, 则拒 绝所述终端 81的业务请求;
或者,
所述网络侧设备 82具体用于获知的所述关于业务控制的属性信息为限制操作的 承载及资源信息时, 如果终端 81的业务请求的信息属于所述限制操作的承载及资源信 息, 则拒绝所述终端 81的业务请求;
或者,
所述网络侧设备 82具体用于获知的所述关于业务控制的属性信息包括限制操作 的承载及资源信息, 以及包括允许访问的服务器信息时; 若终端 81业务请求的信息属 于限制操作的承载及资源信息, 拒绝所述终端 81的业务请求。
其中, 网络侧设备 82为由移动性管理网元、 服务网关 SGW、 分组数据网络网关 PGW 或策略和计费执行功能实体 PCRF。
网络侧设备 82可以具有上述图 7所示的结构, 具体参见前面描述。
需要说明的是, 上述装置和系统内的各单元之间的信息交互、 执行过程等内容, 由于与本发明方法实施例基于同一构思,具体内容可参见本发明方法实施例中的叙述, 此处不再赘述。
综上所述, 本发明实施例技术方案是获知了关于业务控制的属性信息, 所述关于 业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载及资源信息,因 此在获知终端发送的业务请求后, 就可以根据所述关于业务控制的属性信息对所述业 务请求对应的业务进行控制, 从而实现了对 M2M终端发起的业务进行控制,提高了网络 的安全性。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可 以通过程序来指令相关的硬件来完成, 该程序可以存储于一计算机可读存储介质中, 存储介质可以包括: 只读存储器 (ROM, Read Only Memory ), 随机存取存储器 (RAM, Random Access Memory ) ^ 磁盘或光盘等。
以上对本发明实施例所提供的一种业务处理方法及通信设备进行了详细介绍,本 文中应用了具体个例对本发明的原理及实施方式进行了阐述, 以上实施例的说明只是 用于帮助理解本发明的方法及其核心思想; 同时, 对于本领域的一般技术人员, 依据 本发明的思想, 在具体实施方式及应用范围上均会有改变之处, 综上所述, 本说明书 内容不应理解为对本发明的限制。

Claims

权利要求
1、 一种业务处理方法, 其特征在于, 包括:
在机器到机器 M2M应用的网络中, 获知关于业务控制的属性信息, 所述关于业务 控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载及资源信息;
在获知终端发送的业务请求后,根据获知的所述业务控制的属性信息对所述的业 务请求进行控制。
2、 根据权利要求 1所述的业务处理方法, 其特征在于:
所述获知关于业务控制的属性信息包括: 从服务网关 SGW配置信息、 分组数据网 络网关 PGW配置信息、归属用户服务器 HSS数据库、签约数据库 SPR或群组签约数据库中 获知关于业务控制的属性信息。
3、 根据权利耍求 1或 2所述的业务处理方法, 其特征在于:
所述关于业务控制的属性信息为允许访 1 的服务器信息时;
所述根据获知的所述业务控制的属性信息对所述的业务请求进行控制包括:如果 终端的业务请求的信息与所述允许访问的服务器信息不一致, 则拒绝所述终端的业务 请求。
4、 根据权利要求 3所述的业务处理方法, 其特征在于:
所述关于业务控制的属性信息为允许访问的服务器信息时,所述关于业务控制的 属性信息还包括允许使用的业务信息;
如果终端的业务请求的信息与所述允许使用的业务信息不一致,则拒绝所述终端 的业务请求。
5、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述关于业务控制的属性信息为限制操作的承载及资源信息时,
所述根据获知的所述业务控制的属性信息对所述的业务请求进行控制包括:如果 终端的业务请求的信息属于所述限制操作的承载及资源信息, 则拒绝所述终端的业务 请求。
6、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述关于业务控制的属性信息包括限制操作的承载及资源信息, 以及包括允许访 问的服务器信息时;
所述根据获知所述业务控制的属性信息对所述的业务请求进行控制包括: 若终端业务请求的信息属于限制操作的承载及资源信息,拒绝所述终端的业务请 求。
7、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述获知关于业务控制的属性信息具体为:
移动性管理网元从 属用户服务器 HSS数据库或群组签约数据库获取所述关于业 务控制的属性信息; 或者,
移动性管理网元接收策略和计费执行功能实体 PCRF发送的由所述 PCRRF从签约数 据库 SPR或群组签约数据库获取的所述关于业务控制的属性信息。
8、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述获知关于业务控制的属性信息具体为:
服务网关 SGW接收移动性管理网元发送的由所述移动性管理网元从归属用户服务 器 HSS数据库或群组签约数据库获取的所述关于业务控制的属性信息; 或者,
服务网关 SGW接收策略和计费执行功能实体 PCRF发送的由所述 PCRRF从签约数据 库 SPR或群组签约数据库获取的所述关于业务控制的属性信息; 或者,
服务网关 SGW获取自身配置的关于业务控制的属性信息。
9、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述获知关于业务控制的属性信息具体为- 分组数据网络网关 PGW接收移动性管理网元发送的由所述移动性管理网元从归属 用户服务器 HSS数据库或群组签约数据库获取的所述关于业务控制的属性信息; 或者, 分组数据网络网关 PGW接收策略和计费执行功能实体 PCRF发送的由所述 PCRRF从 签约数据库 SPR或群组签约数据库获取的所述关于业务控制的属性信息; 或者,
分组数据网络网关 PGW获取自身配置的关于业务控制的属性信息。
10、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述获知关于业务控制的属性信息具体为:
策略和计费执行功能实体 PCRF从签约数据库 SPR或群组签约数据库获取关于业务 控制的属性信息; 或者,
策略和计费执行功能实体 PCRF接收移动性管理网元发送的由所述移动性管理网 元从归属用户服务器 HSS数据库或群组签约数据库获取的所述关于业务控制的属性信
11、 根据权利要求 1或 2所述的业务处理方法, 其特征在于:
所述终端发送的业务请求包括: 承载资源修改 /分配请求、 专有承载激活请求、 分组数据协议 PDP上下文激活请求、 二次分组数据协议 PDP上下文激活请求、 或附着 / 分组数据网络 PDN连接请求。
12、 一种通信设备, 其特征在于, 包括:
信息获知单元, 用于在机器到机器 M2M应用的网络中, 获知关于业务控制的属性 信息,所述关于业务控制的属性信息包括允许访问的服务器信息和 /或限制操作的承载 及资源信息;
处理单元, 用于获知终端发送的业务请求后, 根据获知的所述业务控制的属性信 息对所述的业务请求进行控制。
13、 根据权利要求 12所述的通信设备, 其特征在于, 所述处理单元包括: 第一比较单元, 用于在所述关于业务控制的属性信息为允许访问的服务器信息 时, 将接收的业务请求的信息与所述允许访问的服务器信息进行比较,;
第 ·控制单元,用于在所述业务请求的信息与所述允许访问的服务器信息不 -致 时, 拒绝所述终端的业务请求。
14、 根据权利要求 13所述的通信设备, 其特征在于:
所述第一比较单元在所述关于业务控制的属性信息还包括允许使用的业务信息 时, 将接收的业务请求的信息与所述允许使用的业务信息进行比较;
所述第一控制单元在所述业务请求的信息与所述允许使用的业务信息不一致时, 拒绝所述终端的业务请求。
15、 根据权利要求 12所述的通信设备, 其特征在于, 所述处理单元包括: 第二比较单元,用于在所述关于业务控制的属性信息为限制操作的承载及资源信 息时, 将接收的业务请求的信息与所述限制操作的承载及资源信息进行比较;
第二控制单元, 用于在所述业务请求的信息属于限制操作的承载及资源信息时, 拒绝所述终端的业务请求。
16、 根据权利要求 12所述的通信设备, 其特征在于, 所述处理单兀包括: 第三比较单元, 用于, 在所述关于业务控制的属性信息包括限制操作的承载及资 源信息, 以及包括允许访问的服务器信息时, 将接收的业务请求的信息与所述业务控 制的属性信息进行比较; 第三控制单元, 用于在所述业务请求的信息属于限制操作的承载及资源信息时, 拒绝所述终端的业务请求。
PCT/CN2010/075218 2009-07-17 2010-07-16 业务处理方法及通信设备 WO2011006450A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009101591493A CN101959192A (zh) 2009-07-17 2009-07-17 业务处理方法及通信设备
CN200910159149.3 2009-07-17

Publications (1)

Publication Number Publication Date
WO2011006450A1 true WO2011006450A1 (zh) 2011-01-20

Family

ID=43448956

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/075218 WO2011006450A1 (zh) 2009-07-17 2010-07-16 业务处理方法及通信设备

Country Status (2)

Country Link
CN (1) CN101959192A (zh)
WO (1) WO2011006450A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327606A (zh) * 2020-02-10 2020-06-23 广州市百果园信息技术有限公司 资源管理方法、系统及存储介质
EP3725117A4 (en) * 2017-12-14 2021-06-23 Telefonaktiebolaget LM Ericsson (publ) REGULATION OF ACCESS FROM A COMMUNICATIONS TERMINAL TO A COMMUNICATION NETWORK

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136976B (zh) * 2011-02-24 2014-12-31 华为技术有限公司 一种机器事务控制方法、装置和系统
CN102651853B (zh) * 2011-02-28 2017-05-10 北京三星通信技术研究有限公司 M2m终端随机接入方法
CN102883404B (zh) 2011-07-14 2015-07-08 华为终端有限公司 实现机器对机器业务的方法、m2m终端、ap和系统
CN103548377B (zh) * 2012-01-21 2017-01-25 华为技术有限公司 一种服务请求sr流程的执行方法、装置及服务网关
CN104601456B (zh) * 2013-10-30 2017-11-07 华为终端有限公司 网关替换方法、网关及服务器
CN104683956B (zh) * 2013-11-27 2018-01-26 普天信息技术研究院有限公司 QoS控制方法和系统
EP3101928B1 (en) 2014-02-27 2018-05-23 Huawei Technologies Co., Ltd. Method and system for providing service according to policy
CN106797565B (zh) * 2014-09-01 2020-07-14 华为技术有限公司 一种通信方法、移动网络设备、终端、应用服务器及系统
EP3973689A4 (en) * 2019-05-21 2023-01-11 Aeris Communications, Inc. TRAFFIC FLOW CONTROL BY MEANS OF A DOMAIN NAME

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1784072A (zh) * 2004-12-02 2006-06-07 华为技术有限公司 宽带移动接入网系统及其方法
CN101068148A (zh) * 2007-04-19 2007-11-07 华为技术有限公司 策略和计费控制的方法及装置
CN101325583A (zh) * 2007-06-15 2008-12-17 华为技术有限公司 注册网关地址的方法及移动性管理实体

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1784072A (zh) * 2004-12-02 2006-06-07 华为技术有限公司 宽带移动接入网系统及其方法
CN101068148A (zh) * 2007-04-19 2007-11-07 华为技术有限公司 策略和计费控制的方法及装置
CN101325583A (zh) * 2007-06-15 2008-12-17 华为技术有限公司 注册网关地址的方法及移动性管理实体

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3725117A4 (en) * 2017-12-14 2021-06-23 Telefonaktiebolaget LM Ericsson (publ) REGULATION OF ACCESS FROM A COMMUNICATIONS TERMINAL TO A COMMUNICATION NETWORK
US11368898B2 (en) 2017-12-14 2022-06-21 Telefonaktiebolaget Lm Ericsson (Publ) Regulation of communication terminal access to a communication network
CN111327606A (zh) * 2020-02-10 2020-06-23 广州市百果园信息技术有限公司 资源管理方法、系统及存储介质

Also Published As

Publication number Publication date
CN101959192A (zh) 2011-01-26

Similar Documents

Publication Publication Date Title
WO2011006450A1 (zh) 业务处理方法及通信设备
WO2009086734A1 (zh) 非漫游场景下策略和计费规则功能实体的选择方法
US20120207104A1 (en) Method for implementing local access and system thereof
WO2011054300A1 (zh) Mtc终端的接入控制方法和系统
WO2012051890A1 (zh) 终端接入限制的方法及系统
WO2011054299A1 (zh) 机器类通讯终端信息的获取方法和系统
WO2011134329A1 (zh) 一种小数据包传输的方法和系统
WO2007143940A1 (fr) procédé, système et équipement de contrôle des conditions d'utilisation et de la facturation lorsque l'utilisateur est mobile
WO2011095100A1 (zh) 一种对本地ip连接的建立进行控制的方法和系统
WO2009043209A1 (fr) Procédé permettant d'établir une porteuse vers un terminal utilisateur en mode repos
WO2011050689A1 (zh) 机器类通讯终端的接入控制方法和系统
WO2008128459A1 (fr) Procédé pour établir des supports par défaut de réseau sans fil et système pour celui-ci
WO2012100684A1 (zh) 一种控制接入本地网络的方法及装置
WO2014166089A1 (zh) 拥塞控制方法和装置
WO2011029289A1 (zh) 漫游场景下承载控制模式的发送方法和系统
WO2012097706A1 (zh) 一种承载修改的系统及方法
WO2011079782A1 (zh) 一种实现策略与计费控制的方法、网关和移动终端
WO2014166294A1 (zh) 临近业务服务器的选择方法及装置、用户注册方法及装置
WO2012126302A1 (zh) 一种支持双模双待终端同时通信的方法和系统
WO2018058365A1 (zh) 一种网络接入授权方法、相关设备及系统
WO2010139285A1 (zh) 一种信息同步方法及通讯系统以及相关设备
WO2018045928A1 (zh) 网络拥塞控制的方法及装置
WO2013104248A1 (zh) 一种本地访问连接的处理方法和装置
WO2016065639A1 (zh) 数据处理的方法、装置、终端、移动管理实体及系统
WO2011026391A1 (zh) 服务网关的负载重分配方法、系统及服务网关

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10799448

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10799448

Country of ref document: EP

Kind code of ref document: A1