WO2013189044A1 - 一种识别网络共享行为的方法、节点、移动终端及系统 - Google Patents
一种识别网络共享行为的方法、节点、移动终端及系统 Download PDFInfo
- Publication number
- WO2013189044A1 WO2013189044A1 PCT/CN2012/077227 CN2012077227W WO2013189044A1 WO 2013189044 A1 WO2013189044 A1 WO 2013189044A1 CN 2012077227 W CN2012077227 W CN 2012077227W WO 2013189044 A1 WO2013189044 A1 WO 2013189044A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ggsn
- mobile terminal
- packet
- ttl value
- network sharing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/303—Terminal profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/654—International mobile subscriber identity [IMSI] numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
Definitions
- the present invention relates to the field of communications, and in particular, to a method, a node, a mobile terminal, and a system for identifying a network sharing behavior. Background technique
- the Tethering behavior refers to the connection of the device to be connected to the mobile terminal through WiFi (Wireless Fidelity), Bluetooth or USB (Universal Serial Bus), and the mobile network sharing through the mobile terminal. behavior.
- the devices to be networked include, but are not limited to, computers, tablets, mobile terminals, and the like. Since computers, tablets, etc. interact with mobile networks in different ways than mobile terminals and mobile networks, it is possible to conduct more P2P.
- the first solution is when the IP (Internet Protocol) message is a Get request message, and the GGSN (Gateway General Packet Radio Service Support Node) The support node performs DPI (Deep Packet Inspection) analysis on the received Get message, and the UA is included in the received packet.
- IP Internet Protocol
- GGSN Gateway General Packet Radio Service Support Node
- DPI Deep Packet Inspection
- the (User-Agent, User Agent) field is used for judgment.
- the UA is a special string header included in the Get message, and stores the operating system and version used by the IP packet sending device, the browser and version, the browser rendering engine, the browser language, and the browser plug-in. .
- the GGSN can determine the type of the IP packet sending device to access the Internet based on the operating system information of the UA, and distinguish whether the IP packet sending device accesses the Internet through the network sharing behavior.
- the second solution is to set a separate APN (Access Point Name) for the device to be connected to the network sharing function, which is independent of the mobile terminal's own APN.
- the GGSN can identify the network sharing behavior by identifying the APN.
- the GGSN cannot obtain the UA field in the Get message, and thus the network sharing behavior cannot be recognized; if the mobile terminal performs the Get" service, most mobile terminals
- the browser can set the UA by itself, and the user can also change the UA, which is easy to cause
- the GGSN incorrectly identifies the network sharing behavior.
- the iOS (iPhone Operation System) system supports the independent APN for the network sharing function. The operator can only configure the APN with the network sharing function in the mobile terminal in cooperation with the Apple. 4 is narrow. Summary of the invention
- Embodiments of the present invention provide a method, a node, a mobile terminal, and a system for identifying a network sharing behavior, so as to improve the accuracy of identifying a network sharing behavior, and expand a range of scenarios applicable to identifying a network sharing behavior.
- the technical solution is as follows:
- a method for identifying a network sharing behavior comprising:
- the gateway general packet radio service supporting node GGSN receives the Internet Protocol IP text sent by the device to be connected and forwarded by the mobile terminal;
- determining whether the obtained TTL value is different from the specified TTL value includes: further, the gateway general packet radio service supporting node GGSN receives the Internet Protocol IP file sent by the network device and forwarded by the mobile terminal, Includes:
- an activated packet data protocol PDP request that is sent by the mobile terminal and includes at least an International Mobile Subscriber Identity (IMS) information;
- IMS International Mobile Subscriber Identity
- An activation success notification message is sent to the mobile terminal.
- the method before receiving the policy and the rule that the PCRF sends the user subscription information corresponding to the IMSI information, the method further includes:
- the PCRF determines, according to the IMSI information, whether the user has subscribed to the network shared service; if yes, the policy and rules for signing the network shared service are sent to the GGSN;
- the method further includes: If the GGSN has received the notification message sent by the PCRF, and the notification message carries an event triggering parameter indicating that the GGSN performs the network sharing behavior reporting, the network sharing behavior is reported to the PCRF, so that the PCRF notification is sent.
- the mobile terminal, the device to be connected is using a network sharing service.
- reporting the network sharing behavior to the PCRF including:
- the GGSN sends a status parameter added to the Gx interface to the PCRF, where the status parameter is used to indicate the status of the network sharing behavior.
- the GGSN After the network sharing behavior is determined, the GGSN processes the IP packet according to a preset policy and rule; or
- the GGSN processes the IP packet according to policies and rules delivered by the PCRF.
- a method for identifying a network sharing behavior includes: receiving, by a mobile terminal, an Internet Protocol IP packet sent by a device to be networked;
- the GGSN forwards the IP packet including the modified TTL value to the GGSN, so that the GGSN identifies the network sharing behavior of the device to be connected according to the modified TTL value.
- the modifying the TTL value of the time-to-live in the IP packet includes:
- the mobile terminal decrements the TTL value in the IP packet by one.
- the mobile terminal before the mobile terminal receives the Internet Protocol IP packet sent by the device to be connected, the mobile terminal further includes:
- an activation packet data protocol PDP request including at least an international mobile subscriber identity (IMSI) information to the GGSN, so that the GGSN sends the IMSI information to a policy and charging rule function PCRF;
- IMSI international mobile subscriber identity
- the GGSN After receiving the policy and the rule that the PCRF sends the user subscription information corresponding to the IMSI information, the GGSN receives the activation success notification message sent by the GGSN.
- GGSN gateway general packet radio service support node
- a first receiving module configured to receive an Internet Protocol IP packet sent by the device to be connected and forwarded by the mobile terminal
- An obtaining module configured to obtain a time-to-live TTL value in the IP packet
- a determining module configured to determine whether the obtained TTL value is different from a specified TTL value
- an identifying module configured to determine, if the TTL value obtained by the determining module is different from the specified TTL value, determining that the network sharing behavior occurs on the device to be connected.
- the determining module is configured to determine whether a TTL value in the IP packet is smaller than a specified TTL value.
- the GGSN further includes:
- a second receiving module configured to receive an activation packet data protocol PDP request that is sent by the mobile terminal and includes at least an International Mobile Subscriber Identity (IMS) information;
- IMS International Mobile Subscriber Identity
- a first sending module configured to send the IMSI information to the policy and charging rule function PCRF
- a third receiving module configured to receive a policy and a rule that are sent by the PCRF according to the user subscription information corresponding to the IMSI information
- a second sending module configured to send an activation success notification message to the mobile terminal.
- the GGSN further includes:
- the reporting module is configured to report the network sharing behavior to the PCRF, if the GGSN has received the notification message sent by the PCRF, and the notification message carries an event triggering parameter indicating that the GGSN performs the network sharing behavior, And causing the PCRF to notify the mobile terminal that the device to be connected is using a network shared service.
- the reporting module is configured to send a status parameter added to the Gx interface to the PCRF, where the status parameter is used to indicate a status of the network sharing behavior.
- the GGSN further includes:
- the first processing module is configured to process the IP packet according to a preset policy and a rule; or the second processing module is configured to process the IP packet according to a policy and a rule delivered by the PCRF.
- a mobile terminal is provided, where the mobile terminal includes:
- a fourth receiving module configured to receive an Internet Protocol IP packet sent by the device to be connected
- a modification module configured to modify a time-to-live TTL value in the IP packet.
- a forwarding module configured to forward, to the gateway general packet radio service supporting node, the GGSN, the IP packet that includes the modified TTL value, so that the GGSN identifies the network sharing behavior of the device to be connected according to the modified TTL value.
- the modifying module is configured to decrement the TTL value in the IP packet by one.
- the mobile terminal further includes:
- a third sending module configured to send, to the GGSN, an activation packet data protocol PDP request that includes at least an International Mobile Subscriber Identity (IMSI) information, so that the GGSN sends the IMSI information to a policy and charging rule function PCRF;
- a fifth receiving module configured to: after the GGSN receives the policy and the rule sent by the PCRF according to the user subscription information corresponding to the IMSI information, receive an activation success notification message sent by the GGSN.
- IMSI International Mobile Subscriber Identity
- a system for identifying a network sharing behavior comprising: a gateway general packet radio service support node GGSN as described above and a mobile terminal as described above.
- the TTL value in the IP packet is obtained by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determining whether the obtained TTL value is different from the specified TTL value, and if yes, determining the mobile terminal
- the TTL value is modified to further determine that the IP packet is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has a TTL value, and the network share is identified according to the modified TTL value.
- the behavior method avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art, and improves the accuracy of identifying the network sharing behavior; in addition, the operating system corresponds to a fixed TTL value, according to the modified The method of identifying the network sharing behavior by the TTL value is applicable to any operating system, and expands the range of scenarios to which the network sharing behavior is recognized.
- FIG. 1 is a flowchart of a method for identifying a network sharing behavior according to Embodiment 1 of the present invention
- FIG. 2 is a flowchart of a method for identifying a network sharing behavior according to Embodiment 2 of the present invention
- FIG. 3 is a third embodiment of the present invention
- FIG. 4 is a flowchart of a method for identifying a network sharing behavior according to Embodiment 4 of the present invention
- FIG. 5 is a flowchart for identifying a network sharing behavior according to Embodiment 4 of the present invention
- FIG. 6 is a schematic structural diagram of a gateway general packet radio service supporting node according to Embodiment 5 of the present invention.
- FIG. 7 is a schematic structural diagram of a gateway general packet radio service support node according to Embodiment 6 of the present invention
- FIG. 8 is a schematic structural diagram of a mobile terminal according to Embodiment 7 of the present invention
- FIG. 8 is a schematic structural diagram of a mobile terminal according to Embodiment 7 of the present invention
- FIG. 9 is a schematic structural diagram of a mobile terminal according to Embodiment 8 of the present invention.
- FIG. 10 is a schematic structural diagram of a system for identifying a network sharing behavior according to Embodiment 9 of the present invention. detailed description
- the embodiment relates to the behavior of the device to be connected to the Internet through the mobile network of the mobile terminal, and the mobile network may include, but is not limited to, a GPRS (General Packet Radio Service) network, 3G (3rd-generation, third generation) Mobile communication technology) Network, WiFi network and WiMax (Worldwide Interoperability for Microwave Access) network, etc.
- GPRS General Packet Radio Service
- 3G Third Generation, third generation
- WiFi network Worldwide Interoperability for Microwave Access
- WiMax Worldwide Interoperability for Microwave Access
- this embodiment provides a method for identifying a network sharing behavior, and the method flow is as follows:
- the GGSN receives an IP packet sent by the device to be connected and forwarded by the mobile terminal.
- the GGSN is a gateway GPRS support node with network-controlled information shielding function. It can select IP packets that can enter the GPRS network to ensure the security of the GPRS network.
- the device to be connected refers to a device that performs online behavior through the GPRS network of the mobile terminal, and may include, but is not limited to, a computer, a tablet, and a mobile terminal.
- IP packets are data units that are exchanged and transmitted in the Internet Protocol.
- the TTL is a flag in the header of an IP packet. It is used to identify the number of network segments allowed to pass before IP packets are discarded.
- the TTL value is generally related to the operating system and is in the uplink IP packet of the device to be connected.
- the TTL value is generally fixed.
- the network sharing behavior refers to the behavior of the networked device connected to the mobile terminal through WiFi, Bluetooth or USB, and the mobile network sharing through the mobile terminal.
- determining whether the obtained TTL value is different from the specified TTL value may include: The GGSN determines whether the TTL value in the IP packet is one less than the specified TTL value. Further, before the GGSN receives the IP packet sent by the device to be connected and forwarded by the mobile terminal, the GGSN may further include:
- the GGSN receives an activated PDP (Packet Data Protocol) request that is sent by the mobile terminal and includes at least an IMSI (International Mobile Subscriber Identification Number) information;
- PDP Packet Data Protocol
- IMSI International Mobile Subscriber Identification Number
- the method may further include:
- the PCRF determines, according to the IMSI information, whether the user subscribes to the network sharing service; if yes, the policy and rules for signing the network sharing service are sent to the GGSN;
- the method may further include: if the GGSN has received the notification message sent by the PCRF, and the notification message carries an event triggering parameter indicating that the GGSN performs the network sharing behavior reporting, The PCRF reports the network sharing behavior, so that the PCRF notifies the mobile terminal that the networked device is using the network sharing service.
- reporting the network sharing behavior to the PCRF may include:
- the GGSN sends a new status parameter to the PCRF on the Gx interface, which is used to indicate the status of the network sharing behavior.
- the method may further include:
- the GGSN processes the IP packet according to a preset policy and rule; or
- the GGSN processes the IP packet according to policies and rules delivered by the PCRF.
- the method provided in this embodiment obtains the TTL value in the IP packet by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determines whether the obtained TTL value is different from the specified TTL value. If yes, determining that the mobile terminal modifies the TTL value, further determining that the IP packet is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has a TTL value, according to The method for identifying the network sharing behavior by using the modified TTL value avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art, and the problem is improved.
- Identify the accuracy of the network sharing behavior in addition, the operating system corresponds to a fixed TTL value, and the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and the scenario for identifying the network sharing behavior is expanded. range.
- the notification message sent by the PCRF determines whether the notification message sent by the PCRF has been received, and the notification message carries an event triggering parameter indicating that the GGSN performs the network sharing behavior reporting, if yes, reporting the network sharing behavior to the PCRF, so that the PCRF can Notifying the mobile terminal that the device to be networked is using the network sharing service, the user of the mobile terminal can control the network sharing behavior, thereby reducing the use of the network sharing service caused by the misoperation, thereby making the identification network sharing behavior more humanized.
- Embodiment 2 Embodiment 2
- this embodiment provides a method for identifying a network sharing behavior, and the method flow is as follows:
- the mobile terminal receives an IP packet sent by the device to be connected.
- the mobile terminal After receiving the IP packet sent by the device to be networked, the mobile terminal obtains the TTL value in the IP packet, and modifies the obtained TTL value to identify that the IP packet is sent by the device to be connected, thereby distinguishing the mobile device from the mobile terminal. IP packets sent by itself to the GPRS network.
- modifying the TTL value in the IP packet may include:
- the mobile terminal decrements the TTL value in the IP text by one.
- the mobile terminal may further include: the mobile terminal sending an activation PDP request that includes at least the IMSI information to the GGSN, so that the GGSN sends the IMSI information to the PCRF;
- the GGSN After receiving the policy and rules sent by the PCRF according to the user subscription information corresponding to the IMSI information, the GGSN receives the activation success notification message sent by the GGSN.
- the method provided in this embodiment by receiving the IP packet sent by the device to be networked, modifying the TTL value in the IP packet, and forwarding the IP packet containing the modified TTL value to the GGSN, so that the GGSN can be modified according to the GGSN.
- the TTL value determines that the IP packet is forwarded by the mobile terminal, thereby identifying the network sharing behavior of the device to be networked, and each IP packet has a TTL value, and the method for identifying the network sharing behavior according to the modified TTL value is avoided.
- the problem of disconnecting the network sharing behavior improves the accuracy of identifying the network sharing behavior; in addition, the operating system corresponds to a fixed TTL value, and the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and also expands the pair.
- this embodiment provides a method for identifying a network sharing behavior, and processes an IP packet by using a policy and a rule preset by the GGSN.
- the method flow is as follows:
- the mobile terminal receives the IP packet sent by the device to be connected, and modifies the TTL value in the IP packet.
- the device to be connected refers to a device that performs the online behavior through the GPRS network of the mobile terminal, and may include, but is not limited to, a computer, a tablet computer, a mobile terminal, and the like.
- the device to be connected may be connected to the mobile terminal by means of WiFi, Bluetooth or USB, and send an IP message to the mobile terminal, and the mobile terminal forwards the IP file to the GPRS network, thereby implementing the Internet access through the GPRS network of the mobile terminal. behavior.
- the IP message is a data unit exchanged and transmitted in the Internet Protocol.
- the TTL is a flag in the header of an IP packet. It is used to identify the number of network segments allowed to pass before IP packets are discarded.
- the TTL value is generally related to the operating system, and the TTL value in the uplink IP packet of the device to be connected is generally fixed. Table 1 shows the TTL values of common operating systems, such as Linux with a TTL of 64, Apple iOS (Apple OS) with a TTL of 64, Windows Phone with a TTL of 128, and so on.
- the mobile terminal after receiving the IP packet sent by the device to be networked, the mobile terminal obtains the TTL value in the IP packet, and modifies the obtained TTL value to identify the IP packet from the device to be connected.
- the transmission is different from the IP packet sent by the mobile terminal itself to the GPRS network.
- modifying the TTL value in the IP packet may be specifically: the mobile terminal decrements the TTL value in the IP packet by one. For example, if Windows Phone is connected to Apple iOS and the network sharing behavior is implemented through Apple iOS, after receiving the IP packet sent by Windows Phone, Apple iOS obtains the TTL value of 128 in the IP text, and subtracts 128 from 1 to get 127, replacing 127 with 127. The original TTL value is 128.
- the mobile terminal forwards the IP packet that includes the modified TTL value to the GGSN.
- the GGSN is a gateway GPRS support node, which has a network-controlled information shielding function, and can select an IP packet that can enter the GPRS network to ensure the security of the GPRS network.
- the GGSN in this embodiment also has a charging information collecting function, which is capable of collecting charging information related to the use of the GPRS network resource by each mobile terminal.
- the GGSN receives the IP packet forwarded by the mobile terminal.
- the GGSN obtains the TTL value in the IP packet, and determines whether the obtained TTL value is different from the specified TTL value. If yes, execute 305; otherwise, the process ends.
- the specified TTL value is a fixed TTL value of the operating system.
- the TTL value specified in this embodiment may include, but is not limited to, 128, 64, or 69, etc., and may be sent to the mobile terminal by the device to be connected.
- the mobile terminal informs the GGSN.
- the GGSN obtains the TTL value in the received IP packet, and determines whether the obtained TTL value is different from the specified TTL value.
- the determining whether the obtained TTL value is different from the specified TTL value may be:
- the GGSN determines whether the TTL value in the IP packet is smaller than the specified TTL value.
- the TTL value is smaller than the specified TTL value, it is determined that the IP file is sent by the device to be connected and forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected; if the TTL value and the specified TTL value If the IP packets are equal, the IP packet is generated and sent by the mobile terminal, and the mobile terminal performs an autonomous online behavior, thereby determining that the network sharing behavior does not occur on the device to be connected.
- the above-mentioned Windows Phone is connected to Apple iOS, and the network sharing behavior is implemented by Apple iOS as an example. If the Apple iOS forwards the IP packet of the Windows Phone, the TTL value of the IP packet obtained by the GGSN is 127, due to the specified The TTL value is 128, 64, or 69, which is different from 127.
- the GGSN determines the network sharing behavior of the Windows Phone. If the Apple iOS generates and sends an IP packet, the TTL value of the IP packet obtained by the GGSN is 64. The TTL value contains 64, and the GGSN determines that the Windows Phone does not have a network sharing behavior, and the Internet iOS behavior occurs by Apple iOS.
- the GGSN determines that the network sharing behavior occurs on the device to be connected, and processes the IP document according to preset policies and rules.
- the GGSN reads the preset policies and rules, and processes the IP documents.
- the policies and rules are locally set in advance by the GGSN. Specifically, the GGSN sets different policies and rules for the services provided by the operator.
- the GGSN determines that the network sharing behavior occurs on the device to be connected, the GGSN obtains the service that the user subscribes to, and obtains the policies and rules corresponding to the service, according to the policy. And rules handle IP text. Or, the IP packet is blocked, or the IP packet is charged according to the charging rule of the GGSN.
- the method provided in this embodiment obtains the TTL value in the IP packet by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determines whether the obtained TTL value is different from the specified TTL value. If yes, determining that the mobile terminal modifies the TTL value, further determining that the IP packet is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has a TTL value, according to The method for identifying the network sharing behavior of the modified TTL value avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art, and improves the accuracy of identifying the network sharing behavior.
- the operating system corresponds to the fixed The TTL value
- the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and expands the range of scenarios to which the network sharing behavior is recognized.
- this embodiment provides a method for identifying a network sharing behavior, and processes an IP packet by using a policy and a rule delivered by the PCRF.
- the method flow is as follows:
- the mobile terminal sends an activation PDP request containing at least IMSI information to the GGSN.
- the IMSI is an international mobile subscriber identity, which uniquely identifies a mobile subscriber.
- the mobile terminal attaches to the GPRS network through the IMSI information, it transmits an activation PDP request containing at least IMSI information to the GGSN to establish a data channel between the mobile terminal and the GPRS network through the PDP activation process.
- the PDP is a packet data protocol, and is a network protocol used by an external PDN (Public Data Network) network and a GPRS interface.
- the GGSN receives an activated PDP request that is sent by the mobile terminal and includes at least the IMSI information, and sends the IMSI information to the PCRF.
- the GGSN in this embodiment does not have a charging function. Therefore, a PCRF needs to be deployed in the network to perform charging for the GPRS network resources used by the mobile terminal.
- the PCRF is configured to formulate policy rules according to service information, and may include, but is not limited to, data flow detection, threshold control, QoS (Quality of Service) control, flow-based charging, and the like.
- a network may include multiple PCRFs, and each PCRF may formulate corresponding policy rules and control the mobile terminals under the control according to the policy rules.
- the PCRF determines, according to the IMSI information, whether the user subscribes to the network shared service, and if so, executes 404; otherwise, performs 405.
- the user subscription information refers to information that the user subscribes to the service, and the service may include, but is not limited to, a GPRS mobile data service, a network sharing service, a short message service, and the like.
- the user subscription information can be uniquely identified by the IMSI information, and the PCRF can obtain the corresponding user subscription information according to the IMSI information, and determine whether the user subscribes to the network sharing service according to the user subscription information.
- the PCRF sends a policy and a rule for signing the network shared service to the GGSN, and executes 406.
- the policies and rules for signing a network shared service are policies and rules specified by the operator for users who have subscribed to the network shared service. For example, the operator sets a network sharing service with 5 yuan of 30Mbit GPRS traffic, and charges 1 yuan for each excess 1Mbit GPRS traffic; or 20 yuan for 150Mbit GPRS traffic network sharing service, and charges 2 yuan for each excess 1Mbit GPRS traffic. Etc., this embodiment is not limited.
- the PCRF sends a policy and a rule for not signing the network shared service to the GGSN.
- the policies and rules for the unsigned network shared service are policies and rules specified by the operator for users who have not subscribed to the network shared service. For example, the operator sets a fee of 1 yuan per 1 Mbit GPRS traffic; or a fee of 2 yuan per 1 Mbit GPRS traffic, etc., which is not limited in this embodiment.
- the GGSN receives a policy and a rule that are sent by the PCRF according to the user subscription information corresponding to the IMSI information.
- the GGSN stores the received policies and rules to control the network sharing behavior according to the policies and rules.
- the GGSN sends an activation success notification message to the mobile terminal.
- the notification message indicates that the data channel between the mobile terminal and the GPRS network is established, and the mobile terminal can enable the network sharing function to receive the IP packet sent by the device to be connected; if the mobile terminal does not receive the GGSN transmission within the specified time
- the activation success notification message indicates that the PDP activation process between the mobile terminal and the GPRS network fails, and the mobile terminal cannot connect to the GPRS network, that is, the mobile terminal cannot enable the network sharing function.
- the mobile terminal modifies the TTL value in the IP packet.
- the mobile terminal after receiving the IP packet sent by the device to be networked, the mobile terminal obtains the TTL value in the IP packet, and modifies the obtained TTL value to identify that the IP packet is sent by the device to be connected, thereby distinguishing The IP packet sent by the mobile terminal itself to the GPRS network.
- modifying the TTL value in the IP packet may be specifically: the mobile terminal decrements the TTL value in the IP packet by one.
- the mobile terminal forwards the IP packet that includes the modified TTL value to the GGSN.
- the GGSN receives the IP packet forwarded by the mobile terminal.
- the GGSN obtains the TTL value in the IP packet, and determines whether the obtained TTL value is different from the specified TTL value. If yes, execute 413; otherwise, the process ends.
- step 304 it is determined that the obtained TTL value is different from the specified TTL value.
- the GGSN determines the network sharing behavior of the device to be connected, and processes the IP packet according to the policy and rules delivered by the PCRF.
- the GGSN reads the policies and rules delivered by the PCRF, and processes the IP packets.
- the policies and rules are preset in the PCRF. Specifically, the PCRF sets different policies and rules for the service provided by the operator, and sends the policy to the GGSN, and the GGSN processes the IP packet.
- the processing of the IP address by the GGSN may include, but is not limited to: discarding the IP packet, or blocking the IP packet, or performing IP packet according to a charging rule sent by the PCRF. Do billing and more.
- the method may further include:
- the GGSN has received the notification message sent by the PCRF, and the notification message carries the event triggering parameter indicating that the GGSN performs the network sharing behavior reporting, and reports the network sharing behavior to the PCRF, so that the PCRF notifies the mobile terminal that the The device to be networked is using the network sharing service.
- the notification message is used to notify the GGSN to perform network sharing behavior reporting, and For the CCA-I (Credit Control Answer-Initial), or other notification messages, this embodiment is not limited.
- the event triggering parameter is used to indicate that the GGSN performs the network sharing behavior reporting, and specifically, when the event that the GGSN detects the network sharing behavior occurs, the event is reported to be reported to the PCRF.
- the PCRF can extend the value of the Event-Trigger (Event Trigger Parameter) on the Gx interface, and add a Tethering_REPORT that is used to notify the GGSN to report the network sharing behavior as an Event-Trigger value, as follows:
- Event-Trigger >:: ⁇ AVP Header: AVP Code 1006, M-Bit set, V-Bit set, Vendor-ID 10415 >
- Event-Trigger Tethering_REPORT ( 101 )
- the reporting the network sharing behavior to the PCRF may include:
- the GGSN sends a new status parameter to the PCRF on the Gx interface, which is used to indicate the status of the network sharing behavior.
- the newly added state parameter on the Gx interface may be an X-HW-Event-Status, and the structure of the X-HW-Event-Status is as follows:
- X-HW-Event-Status > :: ⁇ AVP Header: AVP Code 2018, V-Bit set, Vendor-ID 2011 >
- the PCRF may notify the mobile terminal by email or short message, and the network-connected device is currently using the network sharing service.
- the PCRF may also notify the mobile terminal by other means.
- the device to be networked is currently using the network sharing service, which is not limited in this embodiment. Referring to FIG. 5, a schematic diagram of a specific application process of the foregoing method provided by this embodiment is provided. The process of identifying a network sharing behavior is as follows:
- the mobile terminal sends an activation PDP request to the PCEF (Policy and Charging Enforcement Function).
- PCEF Policy and Charging Enforcement Function
- the PCEF mainly includes the detection of the service data flow, the policy execution, and the flow-based charging function, which are located in the GGSN.
- the PCEF reports the IMSI information to the PCRF through a CCR-I (Credit Control Request-Initial) message.
- CCR-I Clear Control Request-Initial
- the PCRF sends policies and rules to the PCEF through the CCA-I message.
- the PCRF sends a notification message to the GGSN through the CCA-I message, if the PCRF sends the policy and the rule of the unshared network sharing behavior, and the PCRF is required to notify the mobile terminal.
- the PCEF sends an activation success notification message to the mobile terminal.
- the PCEF receives the IP packet sent by the mobile terminal.
- the PCEF reports the network sharing behavior to the PCRF through a CCR-U (Credit Control Request-Update) message.
- the PCRF sends a response message to the PCEF through a CCA-U (Credit Control Answer-Update) message.
- CCA-U Current Control Answer-Update
- the PCEF processes the IP packet according to the policies and rules delivered by the PCRF.
- the method provided in this embodiment obtains the TTL value in the IP packet by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determines whether the obtained TTL value is different from the specified TTL value. If yes, determining that the mobile terminal modifies the TTL value, further determining that the IP packet is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has a TTL value, according to The method for identifying the network sharing behavior of the modified TTL value avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art, and improves the accuracy of identifying the network sharing behavior.
- the operating system corresponds to the fixed The TTL value
- the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and expands the range of scenarios to which the network sharing behavior is recognized.
- the notification message sent by the PCRF determines whether the notification message sent by the PCRF has been received, and the notification message carries an event triggering parameter indicating that the GGSN performs the network sharing behavior reporting, if yes, reporting the network sharing behavior to the PCRF, so that the PCRF can Notifying the mobile terminal that the device to be networked is
- the user of the mobile terminal can control the network sharing behavior, thereby reducing the use of the network sharing service caused by the misoperation, thereby making the identification network sharing behavior more humanized.
- this embodiment provides a gateway general packet radio service support node GGSN, where the GGSN may include:
- the first receiving module 601 is configured to receive an IP packet that is sent by the device to be connected and forwarded by the mobile terminal.
- the obtaining module 602 is configured to obtain a TTL value in the IP packet.
- the determining module 603 is configured to determine whether the obtained TTL value is different from the specified TTL value.
- the identifying module 604 is configured to determine, if the determining module 603 determines that the obtained TTL value is different from the specified TTL value, determining the device to be connected. Network sharing behavior occurs.
- the identifying module 604 determines that the IP packet is sent by the device to be connected and forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected. If the determining module 603 determines that the TTL value is equal to the specified TTL value, the identifying module 604 determines that the IP packet is generated and sent by the mobile terminal, and the mobile terminal generates an autonomous online behavior, thereby determining that the network to be connected to the networked device does not occur. behavior.
- the foregoing GGSN provided in this embodiment may perform the method for identifying the network sharing behavior provided in any one of the foregoing method embodiments. For details, refer to the description in the method embodiment, and details are not described herein.
- the GGSN obtained in this embodiment obtains the TTL value in the IP packet by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determines whether the obtained TTL value is different from the specified TTL value. If yes, determining that the mobile terminal modifies the TTL value, further determining that the IP packet is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has a TTL value, according to The method for identifying the network sharing behavior of the modified TTL value avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art, and improves the accuracy of identifying the network sharing behavior.
- the operating system corresponds to the fixed The TTL value
- the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and expands the range of scenarios to which the network sharing behavior is recognized.
- this embodiment provides a gateway general packet radio service supporting node GGSN.
- the GGSN in this embodiment is different from the GGSN provided in the fifth embodiment in that: the TTL value is one.
- the GGSN may further include:
- the second receiving module 605 is configured to receive an active PDP request that is sent by the mobile terminal and that includes at least IMSI information.
- the first sending module 606 is configured to send the IMSI information to the PCRF.
- the third receiving module 607 is configured to receive a policy and a rule that is sent by the PCRF according to the user subscription information corresponding to the IMSI information.
- the second sending module 608 is configured to send an activation success notification message to the mobile terminal.
- the GGSN may further include:
- the reporting module 609 is configured to: if the GGSN has received the notification message sent by the PCRF, and the event message carries the event triggering parameter indicating that the GGSN performs the network sharing behavior, the network sharing behavior is reported to the PCRF, so that the PCRF notification is performed.
- the mobile terminal, the device to be networked, is using a network sharing service.
- the reporting module 609 is configured to send a status parameter added to the Gx interface to the PCRF, where the status parameter is used to indicate the status of the network sharing behavior.
- the GGSN may further include:
- the first processing module 610 is configured to process the IP packet according to a preset policy and a rule.
- the second processing module 611 is configured to process the IP packet according to a policy and a rule delivered by the PCRF.
- the foregoing GGSN provided in this embodiment may perform the method for identifying the network sharing behavior provided in any one of the foregoing method embodiments. For details, refer to the description in the method embodiment, and details are not described herein.
- the GGSN provided in this embodiment obtains the TTL value in the IP packet by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determines whether the obtained TTL value is different from the specified TTL value. If yes, determining that the mobile terminal modifies the TTL value, further determining that the IP packet is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has a TTL value, according to The method for identifying the network sharing behavior of the modified TTL value avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art, and improves the accuracy of identifying the network sharing behavior.
- the operating system corresponds to the fixed The TTL value
- the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and expands the range of scenarios to which the network sharing behavior is recognized.
- the notification message sent by the PCRF has been received, and the notification message carries an event triggering parameter indicating that the GGSN performs the network sharing behavior reporting, if yes, reporting the network sharing behavior to the PCRF, so that the PCRF can Notifying the mobile terminal that the device to be networked is using the network sharing service
- the user of the mobile terminal can control the network sharing behavior, thereby reducing the use of the network sharing service caused by the misoperation, thereby making the identification network sharing behavior more humanized.
- this embodiment provides a mobile terminal, where the mobile terminal includes:
- a fourth receiving module 801 configured to receive an IP packet sent by the device to be connected
- the modifying module 802 is configured to modify a TTL value in the IP packet.
- the mobile terminal After receiving the IP packet sent by the device to be networked, the mobile terminal obtains the TTL value of the IP packet, and the modification module 802 modifies the obtained TTL value to identify that the IP packet is sent by the device to be connected. It is different from the IP packet sent by the mobile terminal itself to the GPRS network.
- the forwarding module 803 is configured to forward the IP packet that includes the modified TTL value to the GGSN, so that the GGSN identifies the network sharing behavior of the device to be connected according to the modified TTL value.
- the foregoing mobile terminal provided in this embodiment may perform the method for identifying the network sharing behavior provided in any one of the foregoing method embodiments.
- the foregoing mobile terminal provided in this embodiment may perform the method for identifying the network sharing behavior provided in any one of the foregoing method embodiments.
- the mobile terminal by receiving the IP packet sent by the device to be networked, modifies the TTL value in the IP packet, and forwards the IP packet containing the modified TTL value to the GGSN, so as to be connected to the network device.
- the network sharing behavior, and the TTL value in each IP packet avoids the problem that the network sharing behavior cannot be judged when there is no UA field in the Get message of the prior art.
- the accuracy of identifying the network sharing behavior is improved; in addition, the operating system corresponds to a fixed TTL value, and the method for identifying the network sharing behavior according to the modified TTL value is applicable to any operating system, and the application for identifying the network sharing behavior is expanded.
- the scope of the scene Example eight
- this embodiment provides a mobile terminal.
- the mobile terminal in this embodiment is different from the mobile terminal provided in Embodiment 7.
- the modifying module 802 is configured to decrement the TTL value in the IP packet by one.
- the mobile terminal may further include:
- the third sending module 804 is configured to send, to the GGSN, an activated PDP request that includes at least IMSI information, so that the GGSN sends the IMSI information to the PCRF.
- the fifth receiving module 805 is configured to receive an activation success notification message sent by the GGSN, after the GGSN receives the policy and the rule sent by the PCRF according to the user subscription information corresponding to the IMSI information.
- the foregoing mobile terminal provided in this embodiment may perform the method for identifying the network sharing behavior provided in any one of the foregoing method embodiments.
- the foregoing mobile terminal provided in this embodiment may perform the method for identifying the network sharing behavior provided in any one of the foregoing method embodiments.
- the mobile terminal by receiving the IP packet sent by the device to be networked, modifies the TTL value in the IP packet, and forwards the IP packet containing the modified TTL value to the GGSN, so that the GGSN can be modified according to the GGSN.
- the TTL value determines that the IP packet is forwarded by the mobile terminal, thereby identifying the network sharing behavior of the device to be networked, and each IP packet has a TTL value, and the method for identifying the network sharing behavior according to the modified TTL value is avoided.
- the operating system corresponds to a fixed TTL value, and the network is identified according to the modified TTL value.
- the method of sharing behavior applies to any operating system, extending the range of scenarios in which network sharing behavior is identified. Example nine
- the present embodiment provides a system for identifying network sharing behavior, and the system may include: a gateway general packet radio service support node GGSN 1001 and a mobile terminal 1002.
- the GGSN 1001 may be the GGSN provided in the foregoing Embodiment 5 or Embodiment 6.
- the mobile terminal 1002 may be the mobile terminal provided in the foregoing Embodiment 7 or Embodiment 8.
- the system for identifying the network sharing behavior provided in this embodiment may perform the method for identifying the network sharing behavior provided in the foregoing method embodiment. For details, refer to the description in the method embodiment, which is not described herein.
- the system for identifying the network sharing behavior obtains the TTL value in the IP packet by receiving the IP packet sent by the device to be connected and forwarded by the mobile terminal, and determines whether the obtained TTL value is The specified TTL value is different. If yes, it is determined that the mobile terminal modifies the TTL value, further determining that the IP file is forwarded by the mobile terminal, thereby determining that the network sharing behavior occurs on the device to be connected, and each IP packet has The TTL value, which identifies the network sharing behavior according to the modified TTL value, avoids the problem that the network sharing behavior cannot be determined when there is no UA field in the Get message of the prior art, and improves the accuracy of identifying the network sharing behavior;
- the system corresponds to a fixed TTL value, and the method of identifying the network sharing behavior according to the modified TTL value is applicable to any operating system. Expanded the range of scenarios for identifying network sharing behavior.
- the user of the mobile terminal can control the network sharing behavior, thereby reducing the use of the network sharing service caused by the misoperation, thereby making the identification network sharing behavior more humanized.
- the system for identifying the network sharing behavior provided by the foregoing embodiment is only exemplified by the division of the foregoing functional modules when identifying the network sharing behavior. In actual applications, the foregoing functions may be allocated differently according to requirements.
- the function module is completed, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
- the method for the gateway general-purpose packet radio service supporting node, the mobile terminal, and the system for recognizing the network sharing behavior provided by the foregoing embodiment belongs to the same concept, and the specific implementation process is described in the method embodiment. Narration.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium may be any available media that can be accessed by a computer.
- computer readable media may comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, disk storage media or other magnetic storage device, or can be used for carrying or storing in the form of an instruction or data structure.
- the desired program code and any other medium that can be accessed by the computer may suitably be a computer readable medium.
- the software is transmitted from a website, server, or other remote source using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable , fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, wireless, and microwaves are included in the fixing of the associated media.
- coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, wireless, and microwaves are included in the fixing of the associated media.
- a disk and a disc include a compact disc (CD), a laser disc, a disc, a digital versatile disc (DVD), a floppy disc, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data.
- CD compact disc
- DVD digital versatile disc
- a floppy disc a disc
- Blu-ray disc wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data.
- the above combination should also include Within the protection of the computer-readable shield.
- the above is only the preferred embodiment of the present invention, and is intended to limit the present invention. Any modifications, equivalent improvements, etc., which are within the spirit and scope of the present invention, should be included in the scope of the present invention. Inside.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP12879501.0A EP2852096B1 (en) | 2012-06-20 | 2012-06-20 | Method, node, mobile terminal and system for identifying network sharing behavior |
PCT/CN2012/077227 WO2013189044A1 (zh) | 2012-06-20 | 2012-06-20 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
CN201280000638.4A CN102870445B (zh) | 2012-06-20 | 2012-06-20 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
EP15200461.0A EP3059902B1 (en) | 2012-06-20 | 2012-06-20 | Method, node, mobile terminal, and system for identifying network tethering behavior |
CN201610644865.0A CN106302423B (zh) | 2012-06-20 | 2012-06-20 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
RU2015101484/08A RU2598581C2 (ru) | 2012-06-20 | 2012-06-20 | Способ, узел, мобильный терминал и система для идентификации поведения привязки к сети |
KR1020157000975A KR101621346B1 (ko) | 2012-06-20 | 2012-06-20 | 네트워크 테더링 동작을 식별하기 위한 방법, 노드, 휴대 단말 및 시스템 |
US14/574,029 US10070374B2 (en) | 2012-06-20 | 2014-12-17 | Method, node, mobile terminal, and system for identifying network tethering behavior |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2012/077227 WO2013189044A1 (zh) | 2012-06-20 | 2012-06-20 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/574,029 Continuation US10070374B2 (en) | 2012-06-20 | 2014-12-17 | Method, node, mobile terminal, and system for identifying network tethering behavior |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013189044A1 true WO2013189044A1 (zh) | 2013-12-27 |
Family
ID=47447778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/077227 WO2013189044A1 (zh) | 2012-06-20 | 2012-06-20 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US10070374B2 (zh) |
EP (2) | EP3059902B1 (zh) |
KR (1) | KR101621346B1 (zh) |
CN (2) | CN106302423B (zh) |
RU (1) | RU2598581C2 (zh) |
WO (1) | WO2013189044A1 (zh) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106302423B (zh) * | 2012-06-20 | 2019-07-23 | 华为技术有限公司 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
US9237028B1 (en) * | 2012-08-14 | 2016-01-12 | Sprint Spectrum L.P. | Method and apparatus for generating a tethering alert based on a threshold similarity between incoming data and outgoing data |
CN103139015B (zh) * | 2013-02-08 | 2016-08-03 | 华为技术有限公司 | 网络共享检测方法、装置及设备 |
CN103415084B (zh) * | 2013-07-18 | 2016-11-02 | 中国联合网络通信集团有限公司 | 移动终端上网方法和移动终端 |
CN104702564A (zh) * | 2013-12-05 | 2015-06-10 | 华为技术有限公司 | 一种网络共享用户识别方法及装置 |
CN105812148A (zh) * | 2014-12-30 | 2016-07-27 | 华为技术有限公司 | 一种计费方法、装置及系统 |
CN105636176A (zh) * | 2016-03-24 | 2016-06-01 | 北京小米移动软件有限公司 | 网络共享方法及装置 |
US20170295600A1 (en) * | 2016-04-11 | 2017-10-12 | Microsoft Technology Licensing, Llc | Tethering Policy for Network Connectivity via a Tethered Connection |
WO2018036613A1 (en) * | 2016-08-23 | 2018-03-01 | Telefonaktiebolaget Lm Ericsson (Publ) | A method, network node and system for controlling tethering |
CN106254375B (zh) * | 2016-09-05 | 2019-11-19 | 北京神州绿盟信息安全科技股份有限公司 | 一种无线热点设备的识别方法及装置 |
US9667681B1 (en) * | 2016-09-23 | 2017-05-30 | Machine Zone, Inc. | Systems and methods for providing messages to multiple subscribers |
TWI736769B (zh) * | 2017-06-13 | 2021-08-21 | 日商日本電氣股份有限公司 | 流量最佳化裝置、通訊系統、流量最佳化方法及程式 |
CN108347359B (zh) * | 2018-01-30 | 2020-08-07 | 新浪网技术(中国)有限公司 | 一种大型网络地址转换出口判断方法及装置 |
CN112219380B (zh) * | 2018-06-11 | 2023-10-03 | 瑞典爱立信有限公司 | 用于操作策略控制实体的方法、策略控制实体及存储介质 |
CN111294856B (zh) * | 2018-12-07 | 2023-07-21 | 中国移动通信集团陕西有限公司 | 一种共享流量终端识别方法、装置、设备及可读存储介质 |
CN111343034B (zh) * | 2018-12-19 | 2022-04-01 | 中国移动通信集团辽宁有限公司 | 终端热点开启识别方法、装置、设备及存储介质 |
CN112020057B (zh) * | 2019-05-30 | 2023-04-07 | 中国电信股份有限公司 | 识别报文的方法及系统 |
CN113840353A (zh) * | 2020-06-23 | 2021-12-24 | 云米互联科技(广东)有限公司 | Iot设备的配网方法、智能家电、系统及存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286894A (zh) * | 2008-05-07 | 2008-10-15 | 中国网络通信集团公司长沙市分公司 | 一种针对ip网络中非法接入的检测及控制方法 |
CN102457938A (zh) * | 2010-10-18 | 2012-05-16 | 中兴通讯股份有限公司 | 终端接入限制的方法及系统 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6625156B2 (en) * | 1998-06-29 | 2003-09-23 | Nortel Networks Limited | Method of implementing quality-of-service data communications over a short-cut path through a routed network |
KR100316288B1 (ko) * | 1999-08-28 | 2001-12-20 | 서평원 | 게이트웨이 시스템에서의 무선 인터넷 서비스 방법 |
AU7325700A (en) * | 1999-09-10 | 2001-04-17 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method of controlling discovery of a call-control server in a packet data network |
DE60110792T2 (de) * | 2000-06-30 | 2006-02-23 | British Telecommunications P.L.C. | Paketkommunikationssystem |
US20020147845A1 (en) * | 2001-03-06 | 2002-10-10 | Juan-Antonio Sanchez-Herrero | Flexible user distribution between user's serving entities |
US7006499B2 (en) | 2003-04-28 | 2006-02-28 | Alcatel Ip Networks, Inc. | Source identifier for MAC address learning |
US7200129B2 (en) * | 2004-03-12 | 2007-04-03 | Motorola, Inc. | Method of signaling reverse channel information with minimal voice/data delay |
CN1866951B (zh) | 2005-05-20 | 2010-09-22 | 华为技术有限公司 | 在网络中检测共享接入主机的方法及系统 |
CN101145909B (zh) | 2006-09-12 | 2010-09-08 | 中兴通讯股份有限公司 | 在宽带接入服务器中跟踪限制用户共享上网的方法 |
US8023432B2 (en) * | 2007-03-12 | 2011-09-20 | Microsoft Corporation | Cost reduction of NAT connection state keep-alive |
US8074279B1 (en) * | 2007-12-28 | 2011-12-06 | Trend Micro, Inc. | Detecting rogue access points in a computer network |
US20090279543A1 (en) * | 2008-05-06 | 2009-11-12 | Lucent Technologies Inc. | Method and System for Handling Tethered User Devices in a Telecommunications Network |
US8958770B2 (en) * | 2009-10-12 | 2015-02-17 | At&T Mobility Ii Llc | Dynamic usage inequity detection and/or remedy |
US8339942B2 (en) * | 2009-10-15 | 2012-12-25 | Telefonaktiebolaget L M Ericsson (Publ) | RSVP-TE graceful restart under fast re-route conditions |
US9009293B2 (en) * | 2009-11-18 | 2015-04-14 | Cisco Technology, Inc. | System and method for reporting packet characteristics in a network environment |
CN101771953A (zh) * | 2009-12-23 | 2010-07-07 | 宇龙计算机通信科技(深圳)有限公司 | 一种多移动终端间信息交互实现方法及网络设备 |
US20130166763A1 (en) * | 2010-09-07 | 2013-06-27 | Nokia Siemens Networks Oy | Method and network devices for selecting between private addresses and public addresses within a user session |
KR101706042B1 (ko) | 2010-10-27 | 2017-02-13 | 에스케이 텔레콤주식회사 | 이동통신망에서의 테더링 제어 시스템 및 방법 |
CN102075386B (zh) * | 2010-12-29 | 2013-11-06 | 华为技术有限公司 | 识别方法及装置 |
EP2687035A1 (en) * | 2011-03-18 | 2014-01-22 | Smith Micro Software, Inc. | Managing tethered data traffic over a hotspot network |
US8971849B2 (en) * | 2011-12-29 | 2015-03-03 | United States Cellular Corporation | System and method for network assisted control and monetization of tethering to mobile wireless devices |
US8862726B1 (en) * | 2012-04-11 | 2014-10-14 | Narus, Inc. | Quantifying privacy leakage in mobile networks |
EP2856699B1 (en) * | 2012-05-31 | 2016-04-13 | Telefonaktiebolaget LM Ericsson (publ) | Method, user terminal, and policy and charging network entity for classifying packets |
CN106302423B (zh) * | 2012-06-20 | 2019-07-23 | 华为技术有限公司 | 一种识别网络共享行为的方法、节点、移动终端及系统 |
-
2012
- 2012-06-20 CN CN201610644865.0A patent/CN106302423B/zh active Active
- 2012-06-20 CN CN201280000638.4A patent/CN102870445B/zh active Active
- 2012-06-20 EP EP15200461.0A patent/EP3059902B1/en active Active
- 2012-06-20 WO PCT/CN2012/077227 patent/WO2013189044A1/zh active Application Filing
- 2012-06-20 KR KR1020157000975A patent/KR101621346B1/ko active IP Right Grant
- 2012-06-20 RU RU2015101484/08A patent/RU2598581C2/ru active
- 2012-06-20 EP EP12879501.0A patent/EP2852096B1/en active Active
-
2014
- 2014-12-17 US US14/574,029 patent/US10070374B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286894A (zh) * | 2008-05-07 | 2008-10-15 | 中国网络通信集团公司长沙市分公司 | 一种针对ip网络中非法接入的检测及控制方法 |
CN102457938A (zh) * | 2010-10-18 | 2012-05-16 | 中兴通讯股份有限公司 | 终端接入限制的方法及系统 |
Non-Patent Citations (4)
Title |
---|
"McDV. Reply of: How does WiFi-Tethering work and how do carriers detect it?", 25 July 2010 (2010-07-25), XP055163373, Retrieved from the Internet <URL:http://forum.xda-developers.com/showthread.php?t=734138.> * |
"TTL MODIFICATION TO CLOAK TETHERED PACKETS - LET'S MAKE THEM WORK HARDER TO CATCH US", TTL MODIFICATION TO CLOAK TETHERED PACKETS-LET'S MAKE THEM WORK HARDER TO CATCH US., 21 April 2011 (2011-04-21), XP055163380, Retrieved from the Internet <URL:http://forums.macrumors.com/showthread.php?t=1140306.> * |
JONATHAN FLECKENSTEIN.: "How Network Providers Can Tell You're Tethering.", 27 June 2011 (2011-06-27), XP055163378, Retrieved from the Internet <URL:http://addto.it/How-Network-Providers-Can-Tell-You're-Tethering.> * |
See also references of EP2852096A4 * |
Also Published As
Publication number | Publication date |
---|---|
KR101621346B1 (ko) | 2016-05-16 |
RU2598581C2 (ru) | 2016-09-27 |
CN106302423A (zh) | 2017-01-04 |
EP3059902B1 (en) | 2017-08-30 |
CN106302423B (zh) | 2019-07-23 |
KR20150023759A (ko) | 2015-03-05 |
RU2015101484A (ru) | 2016-08-10 |
US10070374B2 (en) | 2018-09-04 |
EP2852096A1 (en) | 2015-03-25 |
EP2852096B1 (en) | 2016-04-06 |
US20150103697A1 (en) | 2015-04-16 |
EP3059902A1 (en) | 2016-08-24 |
CN102870445A (zh) | 2013-01-09 |
EP2852096A4 (en) | 2015-05-27 |
CN102870445B (zh) | 2016-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013189044A1 (zh) | 一种识别网络共享行为的方法、节点、移动终端及系统 | |
CN102893640B (zh) | 用于在策略和计费规则功能与服务节点之间传输策略信息的方法、系统和计算机可读介质 | |
JP6797288B2 (ja) | 課金管理方法、ユーザプレーン機能エンティティ、およびコントロールプレーン機能エンティティ | |
KR101995150B1 (ko) | 3gpp 네트워크들에서의 소량 데이터 사용 가능 | |
US9306756B2 (en) | Policy and charging rules node expired message handling | |
US10298744B2 (en) | Method and arrangement for policy regulation of electronic communication devices | |
WO2011137644A1 (zh) | 终端访问业务的方法、装置及系统 | |
EP3641248B1 (en) | Traffic optimization device, communication system, traffic optimization method, and program | |
WO2012088997A1 (zh) | 识别方法及装置 | |
US8549116B2 (en) | PCRF triggered rules cleanup | |
WO2014071758A1 (zh) | 信息的发送方法、mtc服务器、用户设备及mtc系统 | |
WO2011127666A1 (zh) | 计费处理方法、计费处理装置和计费处理系统 | |
CN106034296A (zh) | 一种实现在线计费的方法及系统 | |
KR20100053160A (ko) | 이동통신 시스템에서 보존모드의 세션 관리 방법 | |
US20140050098A1 (en) | Handling session linking status in gxx update |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201280000638.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12879501 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012879501 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20157000975 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2015101484 Country of ref document: RU Kind code of ref document: A |