WO2014113910A1 - Access information processing method, device and system - Google Patents

Access information processing method, device and system Download PDF

Info

Publication number
WO2014113910A1
WO2014113910A1 PCT/CN2013/070814 CN2013070814W WO2014113910A1 WO 2014113910 A1 WO2014113910 A1 WO 2014113910A1 CN 2013070814 W CN2013070814 W CN 2013070814W WO 2014113910 A1 WO2014113910 A1 WO 2014113910A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
access
policy entity
access network
access information
Prior art date
Application number
PCT/CN2013/070814
Other languages
French (fr)
Chinese (zh)
Inventor
于游洋
靳维生
朱文若
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201380000152.5A priority Critical patent/CN104081829A/en
Priority to PCT/CN2013/070814 priority patent/WO2014113910A1/en
Publication of WO2014113910A1 publication Critical patent/WO2014113910A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/22Interfaces between hierarchically similar devices between access point controllers

Definitions

  • the present invention relates to the field of communications, and in particular, to an access information processing method, device, and system.
  • An Evolved Packet Core Network (EPC) in a network supports not only 3GPP access technologies, such as: UMTS Terrestrial Radio Access Network (UTRAN), access technology, and evolved universal land-based wireless Access technology of the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) or access technology of the (GSM EDGE Radio Access Network, GERAN); at the same time, the EPC also supports non-3GPP access technologies, for example: Access technology of the Code Division Multiple Access (CDMA) 2000 network, access technology of the Worldwide Interoperability for Microwave Access (WiMax) network, and access to the Wireless Local Area Networks (WLAN) technology.
  • CDMA Code Division Multiple Access
  • WiMax Worldwide Interoperability for Microwave Access
  • WLAN Wireless Local Area Networks
  • the network side can send user granularity policy information to the user equipment through the Access Network Discovery and Selection Function (ANDSF) server,
  • WLAN has become a useful complement to 3GPP networks. Especially in hotspots, more and more mobile operators are willing to select and use WLAN offload data to reduce backbone network pressure and improve service quality.
  • the WLAN itself also has a corresponding policy control entity, such as a Wi-Fi Alliance (WFA) server, which can provide more detailed WLAN status information and selection for the user equipment.
  • WFA Wi-Fi Alliance
  • the user equipment receives the access information sent by the ANDSF server, and receives the access information sent by the WEA server.
  • the device selects an access target network according to the two access information.
  • the access information may have duplicate or even conflicting access information, resulting in The availability of access information is reduced.
  • the embodiment of the invention provides an access information processing method, device and system, which can improve the availability of access information.
  • the first aspect provides an access information processing method, including:
  • the determining, by using the access information, when the user equipment accesses the target access network includes:
  • the first policy entity combines the first access information and the second access information to obtain access information used when the user equipment accesses the target access network, or
  • the first policy entity selects the highest priority among the first access information and the second access information as access information used when the user equipment accesses the target access network.
  • the first access information, the second access information, and the user equipment access
  • the access information used by the target to access the network includes the discovery information of the target access network, respectively; or the first access information, the second access information, and the user equipment access station.
  • the access information used when the target accesses the network includes the different system switching policy of the target access network; or
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
  • the discovery information includes at least one of the following:
  • the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
  • the method further includes:
  • the first policy entity receives the location information reported by the user equipment, and the location information is used to select the target access network for the user equipment.
  • the first policy entity acquires second access information of a target access network of the user equipment that is stored by the second policy entity, Includes:
  • the first policy entity selects the target access network according to the location information, and the first policy entity sends the identifier information of the target access network to the second policy entity;
  • the first policy entity receives the second access information sent by the second policy entity.
  • the first policy entity acquires second access information of a target access network of the user equipment that is stored by the second policy entity, Includes:
  • the first policy entity sends the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
  • the first policy entity receives the second access information sent by the second policy entity.
  • the first policy entity further sends a query list to the second policy entity, so that the second policy entity is configured according to the The query list selects the second access information from the access information of the target access network;
  • the first policy entity further sends a subscription update indication to the second policy entity, so that the second policy entity selects the first information from the access information of the target access network according to the subscription update indication.
  • an eighth possible implementation further including:
  • the second policy entity receives the location information reported by the user equipment, where the location information is used to select the target access network for the user equipment;
  • the first policy entity sends, to the second policy entity, access information used by the user equipment to access the target access network.
  • the acquiring, by the first policy entity, the second access information of the target access network of the user equipment that is stored by the second policy entity includes:
  • the first policy entity receives the second access information pushed by the second policy entity.
  • the first policy entity includes:
  • the second policy entity includes:
  • the second aspect provides a policy entity, including: an obtaining unit and a determining unit, where: the acquiring unit is configured to acquire second access information of a target access network of the user equipment that is stored by the second policy entity;
  • the determining unit is configured to determine, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the policy entity, Access information.
  • the determining unit is further configured to combine the first access information and the second access information to obtain a connection used when the user equipment accesses the target access network. Enter Information, or,
  • the determining unit is further configured to select, among the first access information and the second access information, the access information used by the user equipment to access the target access network.
  • the first access information, the second access information, and the user equipment access
  • the access information used by the target to access the network includes the discovery information of the target access network, respectively; or the first access information, the second access information, and the user equipment access station.
  • the access information used when the target accesses the network includes the different system switching policy of the target access network; or
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
  • the discovery information includes at least one of the following items:
  • Type information assigned IP address type information, supported authentication information, and application type information
  • the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
  • the policy entity further includes:
  • the acquiring unit includes:
  • a selecting unit configured to select the target access network according to the location information
  • a first sending unit configured to send, to the second policy entity, identifier information of the target access network,
  • the first receiving subunit is configured to receive the second access information sent by the second policy entity.
  • the acquiring unit includes:
  • a second sending unit configured to send the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
  • the second sending unit is further configured to send a query list to the second policy entity, so that the second policy entity Selecting the second access information from the access information of the target access network according to the query list; or the second sending unit is further configured to send a subscription update indication to the second policy entity, so that The second policy entity selects the second access information from the access information of the target access network according to the subscription update indication.
  • the acquiring unit is further configured to receive the second access information that is pushed by the second policy entity.
  • the policy entity includes:
  • the second policy entity includes:
  • a policy entity in a third aspect, is provided, a receiver, a processor, and a memory, the memory is configured to store a set of program codes, and the processor is configured to invoke the program code stored in the memory to perform the following operations:
  • the performing, by the processor, determining, by using the access information used by the user equipment to access the target access network includes:
  • the first policy entity selects the highest priority among the first access information and the second access information as access information used when the user equipment accesses the target access network.
  • the first access information, the second access information, and the user equipment access
  • the access information used by the target to access the network includes the discovery information of the target access network, respectively; or the first access information, the second access information, and the user equipment access station.
  • the access information used when the target accesses the network includes the different system switching policy of the target access network; or
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
  • the discovery information includes at least one of the following items:
  • Type information assigned IP address type information, supported authentication information, and application type information
  • the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
  • the processor is further configured to perform the following operations:
  • the location information reported by the user equipment is received by the receiver, and the location information is used to select the target access network for the user equipment.
  • the policy entity further includes a transmitter, where the processor performs, by using the receiver, the second policy entity,
  • the operation of the second access information of the target accessing network of the user equipment includes:
  • the policy entity further includes a transmitter, where the processor performs, by using the receiver, the second policy entity,
  • the operation of the second access information of the target accessing network of the user equipment includes:
  • the processor further sends a query list to the second policy entity by using the transmitter, so that the second policy The entity selects the second access information from the access information of the target access network according to the query list; or the processor further sends a subscription update indication to the second policy entity by using the transmitter So that the second policy entity selects the second access information from the access information of the target access network according to the subscription update indication.
  • Entities include:
  • the second policy entity includes:
  • the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the first policy entity stores the second access information according to the second access information and the first policy entity.
  • the first access information of the target access network is used to determine access information used when the user equipment accesses the target access network.
  • the thus determined access information does not have duplicate and conflicting access information, thereby improving the usability of the access information.
  • FIG. 1 is a schematic flowchart of a method for processing an access information according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another method for processing access information according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of another method for processing access information according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of another method for processing access information according to an embodiment of the present invention
  • FIG. 6 is a schematic flowchart of another access information processing method according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of a policy entity according to an embodiment of the present invention
  • FIG. 8 is a schematic structural diagram of another policy entity according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of another policy entity according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of another policy entity according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of an access information processing system according to an embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of another policy entity according to an embodiment of the present invention.
  • FIG. 13 is a schematic structural diagram of another policy entity according to an embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of another policy entity according to an embodiment of the present invention
  • FIG. 15 is a schematic structural diagram of another policy entity according to an embodiment of the present invention.
  • FIG. 16 is a schematic structural diagram of another access information processing system according to an embodiment of the present invention. detailed description
  • FIG. 1 is a schematic flowchart of a method for processing access information according to an embodiment of the present invention. As shown in FIG. 1, the method includes:
  • the first policy entity acquires second access information of a target access network of the user equipment that is stored by the second policy entity.
  • the first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used.
  • the foregoing target access network may be one or more access networks, that is, the target access network is at least one access network; the first access information and the second access information may be one or more information. .
  • the step 102 determines that the user equipment accesses the access information used by the target access network, and may determine that the user equipment accesses each Access information used when the target accesses the network.
  • the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: ANDSF Server or, WFA server.
  • the first policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity is an ANDSF server, and the second policy entity is a WFA server.
  • the first policy entity may be a WFA server, and the second policy entity may be an ANDSF server.
  • the first policy entity acquires the target of the user equipment stored by the second policy entity. Accessing the second access information of the network; the first policy entity determines, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment is connected Access information used when the target accesses the network. The thus determined access information does not have duplicate and conflicting access information, thereby improving the availability of the access information.
  • 2 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
  • the first policy entity receives location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
  • the foregoing user equipment location information may be used to indicate a location where the user equipment is currently located, where the user equipment location information may be cell location information, that is, location information of a cell where the user equipment is currently located; or the user equipment location information.
  • the identifier of the access network that is, the identifier of the network that the user equipment is currently accessing, such as: Service Set Identification (SSID) or Homogenous Extended Service Set ID (HESSID) or basic service set identifier ( Basic Service Set ID, BSSID), etc.
  • the foregoing target access network may be a cell indicated by the location information of the user equipment or a neighboring cell or access network of the access network as the target access network, that is, at least one access network that satisfies the location information of the user equipment. Access the network for the target.
  • the user equipment location information may be a query location information, where the target access network is at least one access network that belongs to the indicated location area indicated by the query location information.
  • the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity.
  • step 202 may include:
  • the first policy entity sends the identifier information of the target access network to the second policy entity, and the first policy entity receives the second access information sent by the second policy entity.
  • the first policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
  • step 202 may include:
  • the first policy entity sends the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
  • the first policy entity receives the second access information sent by the second policy entity.
  • the location information may be sent by the first policy entity to the second policy entity, and the second policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
  • the first policy entity may further receive user equipment information sent by the user equipment, where the user equipment information may include at least one of the following:
  • the first policy entity may further send the user equipment information to the second policy entity, and the second policy entity selects the target access network or the second access information according to the user equipment information.
  • the user equipment identifier may be a unique identifier of the user equipment, for example, an International Mobile Subscriber Identity (IMSI), an International Mobile Equipment ID (IMEI), or a mobile station international integrated service number. Other identifiers that uniquely identify the user equipment, such as the Mobile Station International Integrated Services Digital Network Number (MSISDN).
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment ID
  • MSISDN Mobile Station International Integrated Services Digital Network Number
  • the first policy entity or the second policy entity may also select at least one access network to which the user equipment identifier applies as the target access network.
  • the user equipment level information may be a level used to describe the user equipment, for example, a gold, silver, and bronze user equipment level, and may also be other levels pre-negotiated by the user side and the network side.
  • the first policy entity or the second policy entity may also select at least one access network to which the user equipment level applies as the target access network.
  • the second policy entity may also select the access information applicable to the user equipment level in the access information of the target access network as the second access information; the first policy entity may also select the access of the target access network.
  • the access information applicable to the user equipment level in the information is used as the first access information; the mapping relationship between the user equipment level and the access network may be set in advance, or the mapping relationship between the user equipment level and the access information may be preset.
  • the first policy entity may further send a query list to the second policy entity, so as to The second policy entity selects the second access information from the access information of the target access network according to the query list; the foregoing query list may be sent to the second policy entity together with the location information, that is, In step 202, the first policy entity sends the location information and the query list to the second policy entity.
  • the first policy entity sends the location information and the query list to the second policy entity.
  • the query list is used to indicate the content of the query, where the content may be discovery information and
  • the second access information is information that is queried by the second policy entity from the query list selected by the target access network
  • the query list query content may include at least one of the following:
  • the load threshold of the access network the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection.
  • Incoming network type and access network information
  • the second policy entity may select the information queried by the query list in the access information of the target access network as the first The second access information of the target access network of the target entity is selected by the target entity of the policy entity.
  • the second policy entity may select the access network type information of the information of the target access network. As the second access information of the target access network sent to the first policy entity.
  • the first policy entity may further send a subscription update indication to the second policy entity, so that the second policy entity selects the access information from the target access network according to the subscription update indication.
  • Second access information Second access information.
  • the foregoing subscription update indication may be a subscription update list, that is, may include multiple discovery information and/or a subscription policy, where the subscription update indication is used to indicate that the subscription update list in the second policy entity is When a subscription discovery information and/or any subscription policy changes, the second policy entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information. .
  • the first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used.
  • the access information used by the user equipment to access the target access network in step 203 includes:
  • the first policy entity combines the first access information and the second access information to obtain access information used when the user equipment accesses the target access network;
  • the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information.
  • One access information One access information.
  • the first policy entity may further receive the network identifier of the target access network that is sent by the second policy entity, so that the first policy entity may further define, according to the network identifier, the interface that is stored by the first policy entity and includes the network identifier.
  • the incoming information is the second access information described above.
  • the second access information and the access information including the network identifier are about to be merged.
  • the first policy entity adds the first information in the second access information to the discovery information that is included in the first policy entity and includes the network identifier.
  • the first information is information that is not stored in the discovery information of the network identifier (ie, the identifier of the target access network) that is stored by the first policy entity;
  • the first policy entity adds the first policy parameter in the second access information to the different system that is configured by the first policy entity and includes the network identifier.
  • the first policy parameter is a policy parameter that is not included in the different system handover policy that is stored by the first policy entity and that includes the network identifier;
  • the first policy entity adds the first policy parameter in the second access information to the different system that is stored by the first policy entity and includes the network identifier.
  • the first policy parameter is a policy parameter that is not present in the different system routing policy that is stored by the first policy entity and that includes the network identifier.
  • the access information used by the user equipment to access the target access network in step 203 includes:
  • the first policy entity selects the highest priority among the first access information and the second access information as access information used when the user equipment accesses the target access network.
  • the first policy entity may further receive the application scenario information of the second access information, where the first policy entity selects the highest priority among the first access information and the second access information.
  • the access information used when the user equipment accesses the target access network may include:
  • the first information is the same information that exists in both the first access information and the second access information, and the application scenario is the same.
  • the application scenario may be applicable to the roaming user, that is, the first sub-access information and the second sub-access information are only applicable to the roaming user; or the application scenario may be applicable to the non-roaming user, that is, the first sub-connection
  • the incoming information and the second sub-access information are only applicable to non-roaming users.
  • the access information used by the user equipment to access the target access network in step 203 may include:
  • the foregoing second information refers to information existing in both the second access information and the first access information, for example, discovery information and/or policy parameters.
  • the second information is the maximum load value, that is, the maximum load value exists in the second access information and the first access information sent by the second policy entity, so that the first policy entity can determine the a priority level of the policy related to the two maximum load values, when the priority of the maximum load value related policy in the second access information sent by the second policy entity is high, the maximum load value policy is added to the first connection In the incoming information, the original maximum load value policy of the first access information is removed.
  • the priority level of the two policies For example, the policy of configuring the first policy entity on the first policy entity is always lower than the policy of the second policy entity. This determines the order of policy priorities from the two policy entities. It is also possible to set the priority level of the policy in advance.
  • the first policy entity may further receive the network identifier of the target access network sent by the second policy entity, where the first policy entity may also be the network identifier of the access information stored by the network identifier and the first policy entity.
  • the matching is performed, and the successfully matched access information is used as the second access information.
  • the first policy entity further determines a priority level of the second information in the second access information and the second information in the second access information, and adds the second information with a higher priority to the second interface Information.
  • the first access information may include the target access network.
  • the first access information may include a first different system switching policy of the target access network
  • the second access information may include a second different system switching policy of the target access network; Determining, according to the second different system switching policy and the first different system switching policy, determining a different system switching policy used when the user equipment accesses the target access network.
  • the first access information may include a first different system routing policy of the target access network
  • the second access information may include a different system routing policy of the target access network.
  • Step 203 is to determine, according to the second different system routing policy and the first different system routing policy, a different system routing policy used when the user equipment accesses the target access network.
  • the first access information, the second access information, and access information used when the user equipment accesses the target access network respectively include the target access Discovery information of the network; or,
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system switching policy of the target access network; or ,
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
  • the foregoing access information may include at least one of the following:
  • the discovery information may include at least one of the following:
  • Type information assigned IP address type information, supported authentication authentication information, and application type information;
  • the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
  • Maximum load value lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum Signal strength value and indication whether the minimum signal strength value must be met Information, the minimum uplink usable bandwidth value and information indicating whether the minimum uplink usable bandwidth value must be met, the lowest downlink usable bandwidth value and information indicating whether the minimum downlink usable bandwidth value must be met, allowing The access network type of the access and the information indicating whether the access network type of the access network must be met; if the indication information and the maximum load value occur simultaneously, the maximum load value must be met.
  • the target device can be accessed only when the load value of the user equipment is less than the maximum load value in the access information.
  • the minimum signal strength value, the bandwidth value that can be used at the lowest uplink, the bandwidth value that can be used for the lowest downlink, and the maximum load value are not described here.
  • the method may further include: sending the determined access information to the user equipment.
  • FIG. 3 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 3, the method includes:
  • the first policy entity receives the second access information that is pushed by the second policy entity.
  • the first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used;
  • the first policy entity receives an access information request message sent by the user equipment.
  • the first policy entity based on the access information request message, selects at least one access network from the target access network as the user equipment to finally access the network, and accesses the determined user equipment.
  • the access information used when finally accessing the network is sent to the user equipment.
  • the foregoing access information request message includes at least one of the following:
  • Step 304 Select at least one access network that meets the foregoing access information request message from the target access network as the final access network of the user equipment, and access the determined user equipment to the final access.
  • the access information used in the network is sent to the user equipment.
  • the foregoing policy request message includes user location information, and at least one access network adjacent to the cell indicated by the location information may be selected from the target access network as the final access network of the user equipment.
  • the first policy entity receives the second access information of the target access network that is actively sent by the second policy entity, based on the access information request message, from the At least one access network is selected in the target access network as the user equipment finally accesses the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment.
  • the availability of access information can be improved.
  • 4 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 4, the method includes:
  • the second policy entity receives the location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
  • the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity.
  • the first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used;
  • the first policy entity sends, to the second policy entity, access information used by the user equipment to access the target access network.
  • the method may further include:
  • the second policy entity sends, to the user equipment, access information used by the user equipment when accessing the target access network.
  • FIG. 5 is a schematic flowchart of another method for processing access information according to an embodiment of the present invention. As shown in FIG. 5, the method includes:
  • the second policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and the first
  • the first access information of the target access network stored by the policy entity determines access information used when the user equipment accesses the target access network.
  • the method may further include:
  • the second policy entity selects the target access network.
  • the second policy entity receives the query list sent by the first policy entity, and the second policy entity selects the second access information from the access information of the target access network according to the query list.
  • the query list is used to indicate the query content, where the content may be the discovery information and/or the policy, and the second access information is the query selected by the second policy entity from the access information of the target access network. The information queried by the list;
  • the query list query content may include at least one of the following:
  • the load threshold of the access network the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection.
  • Incoming network type and access network information
  • the second policy entity may select the information queried by the query list in the access information of the target access network as the first The second access information of the target access network of the target entity is selected by the target entity of the policy entity.
  • the second policy entity may select the access network type information of the information of the target access network. As the second access information of the target access network sent to the first policy entity.
  • the second policy entity receives the subscription update indication sent by the first policy entity, where the second policy entity selects the second access from the access information of the target access network according to the subscription update indication information.
  • the subscription update indication may be a subscription update list, that is, may include multiple a current information and/or a subscription policy, the subscription update indication being used to indicate that when any subscription discovery information and/or any subscription policy in the subscription update list in the second policy entity changes, the second policy The entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information.
  • the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: ANDSF Server or, WFA server.
  • the first policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity is an ANDSF server, and the second policy entity is a WFA server.
  • the first policy entity may be a WFA server, and the second policy entity may be an ANDSF server.
  • the second policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and
  • the first access information of the target access network that is stored by the first policy entity determines access information used when the user equipment accesses the target access network.
  • the access information thus processed does not have duplicate and conflicting access information, thereby improving the availability of the access information.
  • FIG. 6 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 6, the method includes:
  • the user equipment reports the location information to the first policy entity.
  • the first policy entity sends a request message that includes the location request to the second policy entity.
  • the second policy entity selects a target access network based on the foregoing location information.
  • the second policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity.
  • the first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used;
  • the first policy entity sends, to the user equipment, the access information used by the determined user equipment to access the target access network.
  • the flow of the access information processing is introduced in more detail, and the access information used when the determined user equipment accesses the target access network is sent to the user. device.
  • the following is an embodiment of the device of the present invention.
  • the device embodiment of the present invention is used to perform the method for implementing the first to sixth embodiments of the present invention. For the convenience of description, only parts related to the embodiment of the present invention are shown, and the specific technical details are not disclosed.
  • FIG. 7 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 7, the method includes: an obtaining unit 11 and a determining unit 12, where:
  • the obtaining unit 11 is configured to acquire second access information of the target access network of the user equipment that is stored by the second policy entity;
  • a determining unit 12 configured to determine, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment accesses the target access network Access information used.
  • the foregoing target access network may be one or more access networks, that is, the target access network is at least one access network; the first access information and the second access information may be one or more information. .
  • the foregoing policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server.
  • the foregoing policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the policy entity is an ANDSF server, and the second policy entity is a WFA server, and the foregoing policy may also be used.
  • the entity is a WFA server and the second policy entity is an ANDSF server.
  • the policy entity acquires the second access information of the target access network of the user equipment that is stored by the second policy entity; the policy entity is configured according to the second access information and the target access that is stored by the policy entity. Determining, by the first access information of the network, the user equipment accessing the target access network Access information used at the time. The policy thus processed will not have duplicate and conflicting policies, thereby improving the availability of access information.
  • FIG. 8 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 8, the method includes: a receiving unit 21, an obtaining unit 22, and a determining unit 23, where:
  • the receiving unit 21 is configured to receive location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
  • the foregoing user equipment location information may be used to indicate a location where the user equipment is currently located, where the user equipment location information may be cell location information, that is, location information of a cell where the user equipment is currently located; or the user equipment location information. It may be an access network identifier, that is, an identifier of a network currently accessed by the user equipment, such as: SSID or HESSID or BSSID.
  • the foregoing target access network may be a cell indicated by the location information of the user equipment or a neighboring cell or access network of the access network as the target access network, that is, at least one access network that satisfies the location information of the user equipment. Access the network for the target.
  • the user equipment location information may be a query location information, where the target access network is at least one access network that belongs to the indicated location area indicated by the query location information.
  • the obtaining unit 22 is configured to acquire second access information of the target access network of the user equipment that is stored by the second policy entity.
  • the obtaining unit 22 may include:
  • a selection unit (not shown in the drawing), configured to select the target access network according to the location information
  • a first sending unit (not shown in the drawing), configured to send, to the second policy entity, identifier information of the target access network,
  • the first receiving subunit (not shown in the drawing) is configured to receive the second access information sent by the second policy entity.
  • the first policy entity selects the target access network based on the location information. At least one access network that covers the location indicated by the above location information may be selected as the target access network.
  • the obtaining unit 22 may include: a second sending unit (not shown in the drawing), configured to send the location information to the second policy entity, where the location information is used by the second policy entity to select the target interface for the user equipment Into the network;
  • a second receiving subunit (not shown in the figure), configured to receive the second access information sent by the second policy entity.
  • the location information may be sent by the first policy entity to the second policy entity, and the second policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
  • the first policy entity may further receive user equipment information sent by the user equipment, where the user equipment information may include at least one of the following:
  • the first policy entity may further send the user equipment information to the second policy entity, and the second policy entity selects the target access network or the second access information according to the user equipment information.
  • the user equipment identifier may be a unique identifier of the user equipment, for example, an identifier that can uniquely identify the user equipment, such as IMSI, IMEI, or MSISDN.
  • the first policy entity or the second policy entity may also select at least one access network to which the user equipment identifier applies as the target access network.
  • the user equipment level information may be a level used to describe the user equipment, for example, a gold, silver, and bronze user equipment level, and may also be other levels pre-negotiated by the user side and the network side.
  • the first policy entity or the second policy entity may also select at least one access network to which the user equipment level applies as the target access network.
  • the second policy entity may also select the access information applicable to the user equipment level in the access information of the target access network as the second access information; the first policy entity may also select the access of the target access network.
  • the access information applicable to the user equipment level in the information is used as the first access information; the mapping relationship between the user equipment level and the access network may be set in advance, or the mapping relationship between the user equipment level and the access information may be preset.
  • the second sending unit (not shown in the drawing) is further configured to send a query list to the second policy entity, so that the second policy entity accesses the network from the target according to the query list.
  • the content may be a discovery information and/or a policy, where the second access information is information that is queried by the second policy entity from the query list selected by the target access network.
  • the query list query content may include at least one of the following:
  • the load threshold of the access network the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection.
  • Incoming network type and access network information
  • the second policy entity may select the information queried by the query list in the access information of the target access network as the first The second access information of the target access network of the target entity is selected by the target entity of the policy entity.
  • the second policy entity may select the access network type information of the information of the target access network. As the second access information of the target access network sent to the first policy entity.
  • the second sending unit may be further configured to send a subscription update indication to the second policy entity, so that the second policy entity is configured to access the network from the target according to the subscription update indication.
  • the second access information is selected in the access information.
  • the foregoing subscription update indication may be a subscription update list, that is, may include multiple discovery information and/or a subscription policy, where the subscription update indication is used to indicate that the subscription update list in the second policy entity is When a subscription discovery information and/or any subscription policy changes, the second policy entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information. .
  • a determining unit 23 configured to determine, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment accesses the target access network Access information used.
  • the determining unit 23 may be further configured to combine the first access information and the second access information to obtain access used when the user equipment accesses the target access network.
  • the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information.
  • the determining unit 23 may further receive the network identifier of the target access network that is sent by the second policy entity, so that the determining unit 23 may further define, according to the network identifier, the access information that is stored by the first policy entity and includes the network identifier.
  • the second access information is the above.
  • the second access information and the access information including the network identifier are about to be merged.
  • the determining unit 63 adds the first information in the second access information to the discovery information that is stored by the first policy entity and includes the network identifier.
  • the first information is information that is not stored in the discovery information of the network identifier (ie, the identifier of the target access network) that is stored by the first policy entity;
  • the determining unit 63 adds the first policy parameter in the second access information to the different system switch that is stored by the first policy entity and includes the network identifier.
  • the first policy parameter is a policy parameter that is not included in the different system switching policy that is stored by the first policy entity and includes the network identifier;
  • the determining unit 63 adds the first policy parameter in the second access information to the different system route that is stored by the first policy entity and includes the network identifier.
  • the first policy parameter is a policy parameter that is not present in the different system routing policy that is stored by the first policy entity and that includes the network identifier.
  • the determining unit 23 may be further configured to select the highest priority among the first access information and the second access information to access the target access network by the user equipment. Access information used at the time.
  • the determining unit 23 is further configured to: when the first policy entity further receives the application scenario information of the second access information, select the first information of the first access information and the second access The highest priority among the first information of the information is the access information used when the user equipment accesses the target access network;
  • the first information is the same information that exists in both the first access information and the second access information, and the application scenario is the same.
  • the application scenario may be applicable to the roaming user, that is, the first sub-access information and the second sub-access information are only applicable to the roaming user; or the application scenario may be applicable to the non-roaming user, that is, the first sub-connection
  • the incoming information and the second sub-access information are only applicable to non-roaming users.
  • the first access information may include first discovery information of the target access network
  • the second access information may include a second discovery information of the target access network.
  • the determining unit 23 may be configured to determine, according to the second discovery information and the first discovery information, discovery information used when the user equipment accesses the target access network. or,
  • the first access information may include a first different system switching policy of the target access network, and the second access information may include a second different system switching policy of the target access network; And determining, according to the second different system switching policy and the first different system switching policy, a different system switching policy used when the user equipment accesses the target access network.
  • the first access information may include a first different system routing policy of the target access network, where the second access information may include a different system routing policy of the target access network.
  • the determining unit 23 may be configured to determine, according to the second different system routing policy and the first different system routing policy, a different system routing policy used when the user equipment accesses the target access network.
  • the first access information, the second access information, and access information used when the user equipment accesses the target access network respectively include the target access Discovery information of the network; or,
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system switching policy of the target access network; or ,
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
  • the foregoing access information may include at least one of the following:
  • the discovery information may include at least one of the following:
  • the type information, the IP address type information, the supported authentication authentication information, and the application type information; the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
  • the target device can be accessed only when the load value of the user equipment is less than the maximum load value in the access information.
  • the minimum signal strength value, the bandwidth value that can be used at the lowest uplink, the bandwidth value that can be used for the lowest downlink, and the maximum load value are not described here.
  • FIG. 9 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 9, the method includes: an obtaining unit 31, a determining unit 32, a request message receiving unit 33, and an access information sending unit 34, where:
  • the obtaining unit 31 is configured to receive an access information request message pushed by the user equipment.
  • the determining unit 32 is configured to determine, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment accesses the target access network. Access information
  • the request message receiving unit 33 is configured to receive an access information request message that is pushed by the user equipment, and the access information sending unit 34 is configured to select at least one interface from the target access network based on the access information request message.
  • the access network is used as the user equipment to finally access the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment.
  • the foregoing access information request message includes at least one of the following:
  • User equipment identification, user location information, user equipment capability information, user equipment access information, and request policy type information wherein the user equipment access information is used to indicate whether the user equipment supports concurrent access.
  • the access information sending unit 34 may select at least one access network that satisfies the foregoing access information request message from the target access network as the final access network of the user equipment, and access the determined user equipment.
  • the access information used when finally accessing the network is sent to the user equipment.
  • the above policy request message includes user location information, and can be selected from the target access network. At least one access network adjacent to the cell indicated by the location information serves as a final access network of the user equipment.
  • the policy entity receives the second access information of the target access network that is actively sent by the second policy entity, and receives the message from the target based on the access information request message. At least one access network is selected in the network as the user equipment finally accesses the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment. At the same time, the availability of access information can be improved.
  • FIG. 10 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 10, the method includes: a sending unit 41, where:
  • the sending unit 41 is configured to send, to the first policy entity, second access information of the target access network of the user equipment that is stored by the policy entity, so that the first policy entity is configured according to the second access information and the first The first access information of the target access network stored by the policy entity determines access information used when the user equipment accesses the target access network.
  • the policy entity may further include:
  • a receiving unit (not shown in the drawing), configured to receive, by the second policy entity, location information of the user equipment sent by the first policy entity;
  • a selection unit (not shown in the drawing) is configured to select the target access network according to the location information.
  • the policy entity receives the query list sent by the first policy entity, where the second policy entity selects the second access information from the access information of the target access network according to the query list;
  • the policy entity receives the subscription update indication sent by the first policy entity, and the second policy entity selects the second access information from the access information of the target access network according to the subscription update indication.
  • the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the foregoing policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server.
  • the first policy entity and the foregoing policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity may be an ANDSF server, where the policy entity is For the WFA server, the first policy entity is a WFA server, and the above policy entity is an ANDSF server.
  • FIG. 11 is a schematic structural diagram of an access information processing system according to an embodiment of the present invention. As shown in FIG. 11, a first policy entity 51 and a second policy entity 52, where:
  • a second policy entity 52 configured to send, to the first policy entity, second access information of the target access network of the user equipment stored by the second policy entity;
  • a first policy entity 51 configured to receive the second access information message sent by the second policy entity, according to the second access information, and the first of the target access network that is stored by the first policy entity
  • the access information is used to determine access information used when the user equipment accesses the target access network.
  • the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the first policy entity stores the second access information according to the second access information and the first policy entity.
  • the first access information of the target access network is used to determine access information used when the user equipment accesses the target access network.
  • the policy thus processed will not have duplicate and conflicting policies, thereby improving the availability of access information.
  • FIG. 12 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 12, the method includes: a receiver 61, a processor 62, and a memory 63.
  • the memory 63 is configured to store a set of program codes, and the processor is configured.
  • 62 is used to call the program code stored in the memory 63 for performing the following operations:
  • the foregoing target access network may be one or more access networks, that is, a target access network.
  • the network is at least one access network; the first access information and the second access information may be one or more pieces of information.
  • the foregoing policy entity may be the first policy entity as described in the foregoing method embodiment.
  • the foregoing policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server.
  • the foregoing policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the policy entity is an ANDSF server, and the second policy entity is a WFA server, and the foregoing policy may also be used.
  • the entity is a WFA server and the second policy entity is an ANDSF server.
  • the policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the policy entity stores the target according to the second access information and the first policy entity. Accessing the first access information of the network, and determining access information used when the user equipment accesses the target access network. The thus determined access information does not have duplicate and conflicting access information, thereby improving the availability of the access information.
  • FIG. 13 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 13, the method includes: a receiver 71, a processor 72, and a memory 73.
  • the memory 73 is configured to store a set of program codes, and the processor 72 is used to call the program code stored in the memory 73 for performing the following operations:
  • the location information reported by the user equipment is received by the receiver 71, where the location information is used to select the target access network for the user equipment;
  • the foregoing user equipment location information may be used to indicate a location where the user equipment is currently located, where the user equipment location information may be cell location information, that is, location information of a cell where the user equipment is currently located; or the user equipment location information. It can be the access network identifier, that is, the user equipment is currently connected.
  • the identifier of the incoming network for example: SSID or HESSID or BSSID.
  • the foregoing target access network may be a cell indicated by the location information of the user equipment or a neighboring cell or access network of the access network as the target access network, that is, at least one access network that satisfies the location information of the user equipment. Access the network for the target.
  • the user equipment location information may be a query location information, where the target access network is at least one access network that belongs to the indicated location area indicated by the query location information.
  • the foregoing policy entity may further include a transmitter 74, where the processor 72 performs, by using the receiver 71, the second access information of the target access network of the user equipment stored by the second policy entity.
  • the operation can include:
  • the identifier information of the target access network is sent to the second policy entity by the transmitter 74, and the second access information sent by the second policy entity is received by the receiver 71.
  • the first policy entity selects the target access network based on the location information. At least one access network that covers the location indicated by the above location information may be selected as the target access network.
  • the foregoing policy entity may further include a transmitter 74, where the processor 72 performs, by using the receiver 71, the second access information of the target access network of the user equipment stored by the second policy entity.
  • the operation can include:
  • the location information is sent by the transmitter 74 to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
  • the second access information sent by the second policy entity is received by the receiver 71.
  • the location information may be sent by the first policy entity to the second policy entity, and the second policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
  • the processor 72 may further send, by using the transmitter 74, the query list to the second policy entity, so that the second policy entity is configured to access the access information of the target access network according to the query list. Selecting the second access information; the foregoing query list may be sent to the second policy entity together with the location information.
  • the query list is used to indicate the content of the query, where the content may be discovery information and
  • the second access information is the information queried by the second policy entity from the query list selected by the access information of the target access network;
  • the query list query content may include at least one of the following:
  • the load threshold of the access network Enter network type and access network information.
  • the processor 72 may further send, by the transmitter 74, the subscription update indication to the second policy entity, so that the second policy entity indicates the access from the target access network according to the subscription update indication.
  • the second access information is selected in the information.
  • the foregoing subscription update indication may be a subscription update list, that is, may include multiple discovery information and/or a subscription policy, where the subscription update indication is used to indicate that the subscription update list in the second policy entity is When a subscription discovery information and/or any subscription policy changes, the second policy entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information. .
  • the operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
  • the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information.
  • One access information One access information.
  • the operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
  • the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information.
  • One access information One access information.
  • the processor 72 performs the second connection.
  • the first information in the incoming information is added to the discovery information that is stored by the first policy entity and includes the network identifier.
  • the first information is a discovery that is stored by the first policy entity and includes the network identifier, that is, the identifier of the target access network. Information that does not exist in the information;
  • the processor 72 adds the first policy parameter in the second access information to the different system switch that is stored by the first policy entity and includes the network identifier.
  • the first policy parameter is a policy parameter that is not included in the different system switching policy that is stored by the first policy entity and includes the network identifier;
  • the processor 72 adds the first policy parameter in the second access information to the different system route that is stored by the first policy entity and includes the network identifier.
  • the first policy parameter is a policy parameter that is not present in the different system routing policy that is stored by the first policy entity and that includes the network identifier.
  • the operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
  • Selecting the highest priority among the first access information and the second access information is access information used when the user equipment accesses the target access network.
  • the processor 72 may further receive the application scenario information of the second access information, where the highest priority among the first access information and the second access information performed by the processor 72 is the
  • the operation of the access information used by the user equipment to access the target access network may include:
  • the first information is information that exists in both the first access information and the second access information, and the application scenario is the same.
  • the application scenario may be applicable to the roaming user, that is, the first sub-access information and the second sub-access information are only applicable to the roaming user; or the application scenario may be applicable to the non-roaming user, that is, the first sub-connection
  • the incoming information and the second sub-access information are only applicable to non-roaming users.
  • the operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
  • the foregoing second information refers to information that exists in both the second access information and the first access information, for example, discovery information and/or policy parameters.
  • the first policy entity may further receive the network identifier of the target access network sent by the second policy entity, and the processor 72 may further perform the network identifier in the access information stored by the first policy entity. Matching, the matching access information is used as the second access information.
  • the processor 72 further determines a priority level of the second information in the second access information and the second information in the second access information, and adds the second information with a higher priority to the second information. in.
  • the first access information may include first discovery information of the target access network
  • the second access information may include second discovery information of the target access network.
  • the processor 72 may be configured to determine, according to the second discovery information and the first discovery information, discovery information used when the user equipment accesses the target access network.
  • the first access information may include a first different system switching policy of the target access network, and the second access information may include a second different system switching policy of the target access network; And determining, according to the second different system switching policy and the first different system switching policy, a different system switching policy used when the user equipment accesses the target access network.
  • the first access information may include a first different system routing policy of the target access network, where the second access information may include a different system routing policy of the target access network.
  • the processor 72 may be configured to determine, according to the second different system routing policy and the first different system routing policy, a different system routing policy used when the user equipment accesses the target access network.
  • the first access information, the second access information, and access information used when the user equipment accesses the target access network respectively include the target access Discovery information of the network; or,
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system switching policy of the target access network; or ,
  • the first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
  • the foregoing access information may include at least one of the following:
  • the discovery information may include at least one of the following:
  • the type information, the IP address type information, the supported authentication authentication information, and the application type information; the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
  • the processor 72 may further be configured to perform the following operations:
  • the above determined access information is transmitted to the user equipment by the transmitter 74.
  • FIG. 14 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 14, the method includes: a receiver 81, a processor 82, and a memory 83.
  • the memory 83 is configured to store a set of program codes, and the processor 82 is used to call the program code stored in the memory 83 for performing the following operations:
  • the second access information pushed by the second policy entity is received by the receiver 81.
  • the used access information is sent to the user equipment.
  • the foregoing access information request message includes at least one of the following: User equipment identification, user location information, user equipment capability information, user equipment access information, and request policy type information; wherein the user equipment access information is used to indicate whether the user equipment supports concurrent access.
  • the processor 82 may select at least one access network that meets the foregoing access information request message from the target access network as the final access network of the user equipment, and access the determined user equipment to the final access
  • the access information used when entering the network is sent to the user equipment.
  • the foregoing policy request message includes user location information, and at least one access network adjacent to the cell indicated by the location information may be selected from the target access network as the final access network of the user equipment.
  • the policy entity receives the second access information of the target access network that is actively sent by the second policy entity, and receives the message from the target based on the access information request message. At least one access network is selected in the network as the user equipment finally accesses the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment. At the same time, the availability of access information can be improved.
  • FIG. 15 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 15, the method includes: a transmitter 91, a processor 92, and a memory 93.
  • the memory 93 is configured to store a set of program codes, and the processor is configured. 92 is used to call the program code stored in the memory 93 for performing the following operations:
  • the first access information of the target access network that is stored by the entity determines access information used when the user equipment accesses the target access network.
  • the foregoing policy entity may further include a receiver 94, where the processor 92 performs a second target transmission network of the user equipment that is sent by the second policy entity to the first policy entity by using the transmitter 91. Before the operation of accessing information, it is also used to perform the following operations:
  • the policy entity receives the query list sent by the first policy entity, and the second policy entity selects the second access information from the access information of the target access network according to the query list.
  • the foregoing policy entity receives a subscription update indication sent by the first policy entity, where the second policy entity selects the second access information from the access information of the target access network according to the subscription update indication. .
  • the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the foregoing policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server.
  • the first policy entity and the foregoing policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity may be an ANDSF server, and the foregoing policy entity is a WFA server, and may also be One policy entity is a WFA server and the second policy entity is an ANDSF server.
  • the policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and the The first access information of the target access network stored by the first policy entity determines access information used by the user equipment when accessing the target access network.
  • the access information thus processed does not have duplicate and conflicting access information, thereby improving the availability of access information.
  • FIG. 16 is a schematic structural diagram of another access information processing system according to an embodiment of the present invention. As shown in FIG. 16, the first policy entity 101 and the second policy entity 102 are included, where:
  • the first policy entity 101 can be a policy entity in any of the embodiments shown in Figures 12-14.
  • the second policy entity 102 can be a policy entity in any of the embodiments shown in FIG.
  • the first policy entity may include: a receiver, a processor, and a memory, the memory is used to store a set of program code, and the processor is configured to call the memory stored program code to perform the following operations:
  • the second policy entity may include: a transmitter, a processor, and a memory, and the memory is stored A set of program code is stored, and the program code used by the processor to call the memory store is used to perform the following operations:
  • the second access information of the target access network of the user equipment stored by the second policy entity is sent by the transmitter to the first policy entity.
  • the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the first policy entity stores the second access information according to the second access information and the first policy entity.
  • the first access information of the target access network is used to determine access information used when the user equipment accesses the target access network.
  • the policy thus processed will not have duplicate and conflicting policies, thereby improving the availability of access information.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided is an access information processing method, comprising: a first policy entity acquiring second access information about a target access network of a user equipment stored by a second policy entity; and according to the second access information and first access information about the target access network stored by the first policy entity, the first policy entity determining the access information used when the user equipment accesses the target access network. Correspondingly, also provided by an embodiment of the present invention is a policy entity. The embodiments of the present invention can improve the availability of the access information.

Description

一种接入信息处理方法、 设备及系统 技术领域  Access information processing method, device and system
本发明涉及通信领域, 尤其涉及一种接入信息处理方法、 设备及系统。 背景技术 网络中的核心网络( Evolved Packet Core Network, EPC )不但支持 3GPP接入 技术, 例如: 陆地无线接入网 (UMTS Terrestrial Radio Access Network, UTRAN )、 的接入技术、 演进的通用陆基无线接入网 ( Evolved Universal Terrestrial Radio Access Network, E-UTRAN ) 的接入技术或 (GSM EDGE Radio Access Network, GERAN ) 的接入技术; 同时, EPC还支持非 3GPP接 入技术, 例如: 码分多址(Code Division Multiple Access, CDMA ) 2000网络 的接入技术、 全球 波互联接入 ( Worldwide Interoperability for Microwave Access , WiMax ) 网络的接入技术和无线局域网络 ( Wireless Local Area Networks, WLAN )的接入技术。 对于支持多种接入技术的用户设备, 网络侧 可以通过接入网发现与选择功能 ( Access Network Discovery and Selection Function, ANDSF )服务器发送用户粒度的策略信息给用户设备, 从而指导用 户设备选择合适的接入网。  The present invention relates to the field of communications, and in particular, to an access information processing method, device, and system. BACKGROUND OF THE INVENTION An Evolved Packet Core Network (EPC) in a network supports not only 3GPP access technologies, such as: UMTS Terrestrial Radio Access Network (UTRAN), access technology, and evolved universal land-based wireless Access technology of the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) or access technology of the (GSM EDGE Radio Access Network, GERAN); at the same time, the EPC also supports non-3GPP access technologies, for example: Access technology of the Code Division Multiple Access (CDMA) 2000 network, access technology of the Worldwide Interoperability for Microwave Access (WiMax) network, and access to the Wireless Local Area Networks (WLAN) technology. For a user equipment that supports multiple access technologies, the network side can send user granularity policy information to the user equipment through the Access Network Discovery and Selection Function (ANDSF) server, thereby guiding the user equipment to select an appropriate device. Access Network.
随着 WLAN技术的发展, WLAN逐渐成为 3GPP网络的有益补充, 尤其 在热点地区, 越来越多的移动运营商愿意选择并使用 WLAN分流数据, 以减 轻骨干网络压力, 提升服务质量。 当然, WLAN 自身为了实现接入网络的优 化选择, 也存在相应的策略控制实体, 如 WiFi联盟(Wi-Fi Alliance, WFA ) 服务器, 服务器可以为用户设备提供更为详细的 WLAN的状态信息及选择策 略。  With the development of WLAN technology, WLAN has become a useful complement to 3GPP networks. Especially in hotspots, more and more mobile operators are willing to select and use WLAN offload data to reduce backbone network pressure and improve service quality. Of course, in order to optimize the access network, the WLAN itself also has a corresponding policy control entity, such as a Wi-Fi Alliance (WFA) server, which can provide more detailed WLAN status information and selection for the user equipment. Strategy.
当网络侧同时存有 ANDSF服务器和 WFA服务器, 即 3GPP 网络支持 WLAN的接入技术时,用户设备会接收到 ANDSF服务器下发的接入信息, 以 及接收到 WEA服务器下发的接入信息, 用户设备再根据这两个接入信息选择 接入目标网络。 而这两个接入信息可能会存在重复甚至冲突的接入信息, 导致 接入信息的可用性降低。 发明内容 When the network side has both the ANDSF server and the WFA server, that is, the 3GPP network supports the WLAN access technology, the user equipment receives the access information sent by the ANDSF server, and receives the access information sent by the WEA server. The device then selects an access target network according to the two access information. The access information may have duplicate or even conflicting access information, resulting in The availability of access information is reduced. Summary of the invention
本发明实施例提供了一种接入信息处理方法、设备及系统, 可以提高接入 信息的可用性。  The embodiment of the invention provides an access information processing method, device and system, which can improve the availability of access information.
第一方面, 提供一种接入信息处理方法, 包括:  The first aspect provides an access information processing method, including:
第一策略实体获取第二策略实体存储的用户设备的目标接入网络的第二 接入信息;  Obtaining, by the first policy entity, second access information of the target access network of the user equipment that is stored by the second policy entity;
所述第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息。  Determining, by the first policy entity, that the user equipment accesses the target access network according to the second access information and the first access information of the target access network that is stored by the first policy entity Access information used.
在第一种可能的实现方式中,所述确定所述用户设备接入所述目标接入网 络时使用的接入信息, 包括:  In a first possible implementation manner, the determining, by using the access information, when the user equipment accesses the target access network, includes:
所述第一策略实体合并所述第一接入信息和所述第二接入信息得到所述 用户设备接入所述目标接入网络时使用的接入信息, 或者,  The first policy entity combines the first access information and the second access information to obtain access information used when the user equipment accesses the target access network, or
所述第一策略实体选择所述第一接入信息和所述第二接入信息中优先级 高者为所述用户设备接入所述目标接入网络时使用的接入信息。  The first policy entity selects the highest priority among the first access information and the second access information as access information used when the user equipment accesses the target access network.
结合第一方面或第一方面的第一种可能的实现方式,在第二种可能的实现 方式中, 所述第一接入信息、 所述第二接入信息、 和所述用户设备接入所述目 标接入网络时使用的接入信息分别包括所述目标接入网络的发现信息; 或者, 所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者,  With reference to the first aspect or the first possible implementation manner of the first aspect, in a second possible implementation manner, the first access information, the second access information, and the user equipment access The access information used by the target to access the network includes the discovery information of the target access network, respectively; or the first access information, the second access information, and the user equipment access station. The access information used when the target accesses the network includes the different system switching policy of the target access network; or
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
结合第一方面的第一种可能的实现方式,在第三种可能的实现方式中, 其 中, 所述发现信息包含如下项中的至少一项:  In conjunction with the first possible implementation of the first aspect, in a third possible implementation, the discovery information includes at least one of the following:
类型信息, 分配的 IP地址类型信息, 支持的鉴权认证信息, 以及应用类 型信息; 所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项: Type information, assigned IP address type information, supported authentication authentication information, and application type information; The parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。  Maximum load value, lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum a signal strength value and information indicating whether the minimum signal strength value must be met, a bandwidth value that can be used for the lowest uplink, and information indicating whether the minimum uplink usable bandwidth value must be met, whether the minimum downlink usable bandwidth value and indication are necessary. Information that satisfies the bandwidth value that can be used by the lowest downlink, the type of access network that is allowed to access, and information indicating whether the type of access network that is allowed to access must be satisfied.
结合上述任一实现方式, 在第四种可能的实现方式中, 所述方法进一步包 括:  In combination with any of the foregoing implementation manners, in a fourth possible implementation manner, the method further includes:
所述第一策略实体接收所述用户设备上报的位置信息,所述位置信息用于 为所述用户设备选择所述目标接入网络。  The first policy entity receives the location information reported by the user equipment, and the location information is used to select the target access network for the user equipment.
结合第一方面的第四种可能的实现方式,在第五种可能的实现方式中, 所 述第一策略实体获取第二策略实体存储的用户设备的目标接入网络的第二接 入信息, 包括:  With reference to the fourth possible implementation of the first aspect, in a fifth possible implementation, the first policy entity acquires second access information of a target access network of the user equipment that is stored by the second policy entity, Includes:
根据所述位置信息, 所述第一策略实体选择所述目标接入网络, 所述第一策略实体向所述第二策略实体发送所述目标接入网络的标识信 息;  The first policy entity selects the target access network according to the location information, and the first policy entity sends the identifier information of the target access network to the second policy entity;
所述第一策略实体接收所述第二策略实体发送的所述第二接入信息。 结合第一方面的第四种可能的实现方式,在第六种可能的实现方式中, 所 述第一策略实体获取第二策略实体存储的用户设备的目标接入网络的第二接 入信息, 包括:  The first policy entity receives the second access information sent by the second policy entity. With reference to the fourth possible implementation of the first aspect, in a sixth possible implementation, the first policy entity acquires second access information of a target access network of the user equipment that is stored by the second policy entity, Includes:
所述第一策略实体向所述第二策略实体发送所述位置信息,所述位置信息 用于所述第二策略实体为所述用户设备选择所述目标接入网络;  The first policy entity sends the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
所述第一策略实体接收所述第二策略实体发送的所述第二接入信息。 结合第一方面的第六种可能的实现方式,在第七种可能的实现方式中, 所 述第一策略实体向所述第二策略实体还发送查询列表,以便所述第二策略实体 根据所述查询列表从所述目标接入网络的接入信息中选择所述第二接入信息; 或者, 所述第一策略实体向所述第二策略实体还发送订阅更新指示, 以便所述 第二策略实体根据所述订阅更新指示从所述目标接入网络的接入信息中选择 所述第二接入信息。 The first policy entity receives the second access information sent by the second policy entity. With reference to the sixth possible implementation of the first aspect, in a seventh possible implementation, the first policy entity further sends a query list to the second policy entity, so that the second policy entity is configured according to the The query list selects the second access information from the access information of the target access network; Or the first policy entity further sends a subscription update indication to the second policy entity, so that the second policy entity selects the first information from the access information of the target access network according to the subscription update indication. Two access information.
结合第一方面或第一方面的第一种可能的实现方式或第一方面的第二种 可能的实现方式或第一方面的第三种可能的实现方式,在第八种可能的实现方 式中, 进一步包括:  In combination with the first aspect or the first possible implementation of the first aspect or the second possible implementation of the first aspect or the third possible implementation of the first aspect, in an eighth possible implementation , further including:
所述第二策略实体接收所述用户设备上报的位置信息,所述位置信息用于 为所述用户设备选择所述目标接入网络;  The second policy entity receives the location information reported by the user equipment, where the location information is used to select the target access network for the user equipment;
所述第一策略实体向所述第二策略实体发送所述用户设备接入所述目标 接入网络时使用的接入信息。  The first policy entity sends, to the second policy entity, access information used by the user equipment to access the target access network.
结合第一方面或第一方面的第一种可能的实现方式或第一方面的第二种 可能的实现方式或第一方面的第三种可能的实现方式,在第九种可能的实现方 式中,  In combination with the first aspect or the first possible implementation of the first aspect or the second possible implementation of the first aspect or the third possible implementation of the first aspect, in a ninth possible implementation ,
所述第一策略实体获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息, 包括:  The acquiring, by the first policy entity, the second access information of the target access network of the user equipment that is stored by the second policy entity includes:
所述第一策略实体接收所述第二策略实体推送的所述第二接入信息。 结合上述任一实现方式, 在第十种可能的实现方式中, 所述第一策略实体 包括:  The first policy entity receives the second access information pushed by the second policy entity. In combination with any of the foregoing implementation manners, in the tenth possible implementation manner, the first policy entity includes:
接入网发现与选择功能 ANDSF服务器或者 WFA服务器;  Access network discovery and selection function ANDSF server or WFA server;
所述第二策略实体包括:  The second policy entity includes:
ANDSF服务器或者 WFA服务器。  ANDSF server or WFA server.
第二方面, 提供一种策略实体, 包括: 获取单元和确定单元, 其中: 所述获取单元,用于获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息;  The second aspect provides a policy entity, including: an obtaining unit and a determining unit, where: the acquiring unit is configured to acquire second access information of a target access network of the user equipment that is stored by the second policy entity;
所述确定单元,用于根据所述第二接入信息和所述策略实体存储的所述目 标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时使用 的接入信息。  The determining unit is configured to determine, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the policy entity, Access information.
在第一种可能的实现方式中,所述确定单元还用于合并所述第一接入信息 和所述第二接入信息得到所述用户设备接入所述目标接入网络时使用的接入 信息, 或者, In a first possible implementation manner, the determining unit is further configured to combine the first access information and the second access information to obtain a connection used when the user equipment accesses the target access network. Enter Information, or,
所述确定单元还用于选择所述第一接入信息和所述第二接入信息中优先 级高者为所述用户设备接入所述目标接入网络时使用的接入信息。  The determining unit is further configured to select, among the first access information and the second access information, the access information used by the user equipment to access the target access network.
结合第二方面或第二方面的第一种可能的实现方式,在第二种可能的实现 方式中, 所述第一接入信息、 所述第二接入信息、 和所述用户设备接入所述目 标接入网络时使用的接入信息分别包括所述目标接入网络的发现信息; 或者, 所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者,  With reference to the second aspect, or the first possible implementation manner of the second aspect, in a second possible implementation, the first access information, the second access information, and the user equipment access The access information used by the target to access the network includes the discovery information of the target access network, respectively; or the first access information, the second access information, and the user equipment access station. The access information used when the target accesses the network includes the different system switching policy of the target access network; or
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
结合第二方面的第二种可能的实现方式,在第三种可能的实现方式中, 其 中, 所述发现信息包含如下项中的至少一项:  With reference to the second possible implementation of the second aspect, in a third possible implementation, the discovery information includes at least one of the following items:
类型信息, 分配的 IP地址类型信息, 支持的鉴权认证信息, 以及应用类 型信息;  Type information, assigned IP address type information, supported authentication information, and application type information;
所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项:  The parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。  Maximum load value, lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum a signal strength value and information indicating whether the minimum signal strength value must be met, a bandwidth value that can be used for the lowest uplink, and information indicating whether the minimum uplink usable bandwidth value must be met, whether the minimum downlink usable bandwidth value and indication are necessary. Information that satisfies the bandwidth value that can be used by the lowest downlink, the type of access network that is allowed to access, and information indicating whether the type of access network that is allowed to access must be satisfied.
结合第二方面或第二方面的第一种可能的实现方式或第二方面的第二种 可能的实现方式或第二方面的第三种可能的实现方式,在第四种可能的实现方 式中, 所述策略实体还包括:  With reference to the second aspect or the first possible implementation of the second aspect or the second possible implementation of the second aspect or the third possible implementation of the second aspect, in a fourth possible implementation manner The policy entity further includes:
接收单元, 用于接收所述用户设备上报的位置信息, 所述位置信息用于为 所述用户设备选择所述目标接入网络。 结合第二方面的第四种可能的实现方式,在第五种可能的实现方式中, 所 述获取单元包括: And a receiving unit, configured to receive location information reported by the user equipment, where the location information is used to select the target access network for the user equipment. With reference to the fourth possible implementation of the second aspect, in a fifth possible implementation, the acquiring unit includes:
选择单元, 用于根据所述位置信息, 选择所述目标接入网络,  a selecting unit, configured to select the target access network according to the location information,
第一发送单元,用于向所述第二策略实体发送所述目标接入网络的标识信 息,  a first sending unit, configured to send, to the second policy entity, identifier information of the target access network, where
第一接收子单元, 用于接收所述第二策略实体发送的所述第二接入信息。 结合第二方面的第四种可能的实现方式,在第六种可能的实现方式中, 所 述获取单元包括:  The first receiving subunit is configured to receive the second access information sent by the second policy entity. With reference to the fourth possible implementation of the second aspect, in a sixth possible implementation, the acquiring unit includes:
第二发送单元, 用于向所述第二策略实体发送所述位置信息, 所述位置信 息用于所述第二策略实体为所述用户设备选择所述目标接入网络;  a second sending unit, configured to send the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
第二接收子单元, 用于接收所述第二策略实体发送的所述第二接入信息。 结合第二方面的第六种可能的实现方式,在第七种可能的实现方式中, 所 述第二发送单元还用于向所述第二策略实体发送查询列表,以便所述第二策略 实体根据所述查询列表从所述目标接入网络的接入信息中选择所述第二接入 信息;或者,所述第二发送单元还用于向所述第二策略实体发送订阅更新指示, 以便所述第二策略实体根据所述订阅更新指示从所述目标接入网络的接入信 息中选择所述第二接入信息。  a second receiving subunit, configured to receive the second access information sent by the second policy entity. With reference to the sixth possible implementation of the second aspect, in a seventh possible implementation, the second sending unit is further configured to send a query list to the second policy entity, so that the second policy entity Selecting the second access information from the access information of the target access network according to the query list; or the second sending unit is further configured to send a subscription update indication to the second policy entity, so that The second policy entity selects the second access information from the access information of the target access network according to the subscription update indication.
结合第二方面或第二方面的第一种可能的实现方式或第二方面的第二种 可能的实现方式或第二方面的第三种可能的实现方式,在第八种可能的实现方 式中, 所述获取单元还用于接收所述第二策略实体推送的所述第二接入信息。  With reference to the second aspect or the first possible implementation of the second aspect or the second possible implementation of the second aspect or the third possible implementation of the second aspect, in an eighth possible implementation manner The acquiring unit is further configured to receive the second access information that is pushed by the second policy entity.
结合第二方面上述任一实现方式,在第八种可能的实现方式中, 所述策略 实体包括:  With reference to any of the foregoing implementations of the second aspect, in the eighth possible implementation, the policy entity includes:
ANDSF服务器或者 WFA服务器;  ANDSF server or WFA server;
所述第二策略实体包括:  The second policy entity includes:
ANDSF服务器或者 WFA服务器。  ANDSF server or WFA server.
第三方面, 提供一种策略实体, 接收器、 处理器和存储器, 所述存储器用 于存储一组程序代码,且所述处理器用于调用所述存储器存储的程序代码用于 执行如下操作:  In a third aspect, a policy entity is provided, a receiver, a processor, and a memory, the memory is configured to store a set of program codes, and the processor is configured to invoke the program code stored in the memory to perform the following operations:
通过所述接收器接收获取第二策略实体存储的用户设备的目标接入网络 的第二接入信息;; Receiving, by the receiver, a target access network of the user equipment stored by the second policy entity Second access information;
根据所述第二接入信息和所述策略实体存储的所述目标接入网络的第一 接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息。  Determining access information used by the user equipment to access the target access network according to the second access information and the first access information of the target access network stored by the policy entity.
在第一种可能的实现方式中,所述处理器执行的确定所述用户设备接入所 述目标接入网络时使用的接入信息的操作包括:  In a first possible implementation manner, the performing, by the processor, determining, by using the access information used by the user equipment to access the target access network, includes:
合并所述第一接入信息和所述第二接入信息得到所述用户设备接入所述 目标接入网络时使用的接入信息, 或者,  Merging the first access information and the second access information to obtain access information used when the user equipment accesses the target access network, or
所述第一策略实体选择所述第一接入信息和所述第二接入信息中优先级 高者为所述用户设备接入所述目标接入网络时使用的接入信息。  The first policy entity selects the highest priority among the first access information and the second access information as access information used when the user equipment accesses the target access network.
结合第三方面或第三方面的第一种可能的实现方式,在第二种可能的实现 方式中, 所述第一接入信息、 所述第二接入信息、 和所述用户设备接入所述目 标接入网络时使用的接入信息分别包括所述目标接入网络的发现信息; 或者, 所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者,  With reference to the third aspect or the first possible implementation manner of the third aspect, in a second possible implementation manner, the first access information, the second access information, and the user equipment access The access information used by the target to access the network includes the discovery information of the target access network, respectively; or the first access information, the second access information, and the user equipment access station. The access information used when the target accesses the network includes the different system switching policy of the target access network; or
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
结合第三方面的第二种可能的实现方式,在第三种可能的实现方式中, 其 中, 所述发现信息包含如下项中的至少一项:  With reference to the second possible implementation of the third aspect, in a third possible implementation, the discovery information includes at least one of the following items:
类型信息, 分配的 IP地址类型信息, 支持的鉴权认证信息, 以及应用类 型信息;  Type information, assigned IP address type information, supported authentication information, and application type information;
所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项:  The parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。 Maximum load value, lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum a signal strength value and information indicating whether the minimum signal strength value must be met, a bandwidth value that can be used for the lowest uplink, and information indicating whether the minimum uplink usable bandwidth value must be met, whether the minimum downlink usable bandwidth value and indication are necessary. Information that satisfies the bandwidth value that can be used by the lowest downlink, and allows access to the access network type and indication whether the access must be met. Information about the type of access network that is allowed to access.
结合第三方面的上述任一实现方式,在第四种可能的实现方式中, 所述处 理器进一步还用于执行如下操作:  In conjunction with any of the foregoing implementations of the third aspect, in a fourth possible implementation, the processor is further configured to perform the following operations:
通过所述接收器接收所述用户设备上报的位置信息,所述位置信息用于为 所述用户设备选择所述目标接入网络。  The location information reported by the user equipment is received by the receiver, and the location information is used to select the target access network for the user equipment.
结合第三方面的第四种可能的实现方式,在第五种可能的实现方式中, 所 述策略实体还包括发射器,所述处理器执行的通过所述接收器获取第二策略实 体存储的用户设备的目标接入网络的第二接入信息的操作, 包括:  With the fourth possible implementation of the third aspect, in a fifth possible implementation, the policy entity further includes a transmitter, where the processor performs, by using the receiver, the second policy entity, The operation of the second access information of the target accessing network of the user equipment includes:
根据所述位置信息, 选择所述目标接入网络,  Selecting the target access network according to the location information,
通过所述发射器向所述第二策略实体发送所述目标接入网络的标识信息, 通过所述接收器接收所述第二策略实体发送的所述第二接入信息。  And transmitting, by the transmitter, identifier information of the target access network to the second policy entity, and receiving, by the receiver, the second access information sent by the second policy entity.
结合第三方面的第四种可能的实现方式,在第六种可能的实现方式中, 所 述策略实体还包括发射器,所述处理器执行的通过所述接收器获取第二策略实 体存储的用户设备的目标接入网络的第二接入信息的操作, 包括:  With reference to the fourth possible implementation manner of the third aspect, in a sixth possible implementation, the policy entity further includes a transmitter, where the processor performs, by using the receiver, the second policy entity, The operation of the second access information of the target accessing network of the user equipment includes:
通过所述发射器向所述第二策略实体发送所述位置信息,所述位置信息用 于所述第二策略实体为所述用户设备选择所述目标接入网络;  Sending, by the transmitter, the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
通过所述接收器接收所述第二策略实体发送的所述第二接入信息。  Receiving, by the receiver, the second access information sent by the second policy entity.
结合第三方面的第六种可能的实现方式,在第七种可能的实现方式中, 所 述处理器通过所述发射器向所述第二策略实体还发送查询列表,以便所述第二 策略实体根据所述查询列表从所述目标接入网络的接入信息中选择所述第二 接入信息; 或者, 所述处理器通过所述发射器向所述第二策略实体还发送订阅 更新指示,以便所述第二策略实体根据所述订阅更新指示从所述目标接入网络 的接入信息中选择所述第二接入信息。  In conjunction with the sixth possible implementation of the third aspect, in a seventh possible implementation, the processor further sends a query list to the second policy entity by using the transmitter, so that the second policy The entity selects the second access information from the access information of the target access network according to the query list; or the processor further sends a subscription update indication to the second policy entity by using the transmitter So that the second policy entity selects the second access information from the access information of the target access network according to the subscription update indication.
结合第三方面或第三方面的第一种可能的实现方式或第三方面的第二种 可能的实现方式或第三方面的第三种可能的实现方式,在第八种可能的实现方 式中,所述处理器执行的通过所述接收器获取第二策略实体存储的用户设备的 目标接入网络的第二接入信息的操作, 包括:  With reference to the third aspect or the first possible implementation of the third aspect or the second possible implementation of the third aspect or the third possible implementation of the third aspect, in an eighth possible implementation manner And the performing, by the processor, the obtaining, by the receiver, the second access information of the target access network of the user equipment that is stored by the second policy entity, including:
通过所述接收器接收所述第二策略实体推送的所述第二接入信息。  Receiving, by the receiver, the second access information pushed by the second policy entity.
结合第三方面上述任一实现方式,在第九种可能的实现方式中, 所述策略 实体包括: With reference to any of the foregoing implementation manners of the third aspect, in a ninth possible implementation manner, Entities include:
接入网发现与选择功能 ANDSF服务器或者 WFA服务器;  Access network discovery and selection function ANDSF server or WFA server;
所述第二策略实体包括:  The second policy entity includes:
ANDSF服务器或者 WFA服务器。  ANDSF server or WFA server.
上述技术方案中,第一策略实体获取第二策略实体存储的用户设备的目标 接入网络的第二接入信息;第一策略实体根据所述第二接入信息和所述第一策 略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备接入所述 目标接入网络时使用的接入信息。这样确定后的接入信息就不会出现重复和冲 突的接入信息, 从而可以提高接入信息的可用性。 附图说明  In the foregoing technical solution, the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the first policy entity stores the second access information according to the second access information and the first policy entity. The first access information of the target access network is used to determine access information used when the user equipment accesses the target access network. The thus determined access information does not have duplicate and conflicting access information, thereby improving the usability of the access information. DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施 例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地, 下面描述 中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲, 在不付 出创造性劳动性的前提下, 还可以根据这些附图获得其他的附图。  In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any inventive labor.
图 1本发明实施例提供的一种接入信息处理方法的流程示意图; 图 2是本发明实施例提供的另一种接入信息处理方法的流程示意图; 图 3是本发明实施例提供的另一种接入信息处理方法的流程示意图; 图 4是本发明实施例提供的另一种接入信息处理方法的流程示意图; 图 5是本发明实施例提供的另一种接入信息处理方法的流程示意图; 图 6是本发明实施例提供的另一种接入信息处理方法的流程示意图; 图 7是本发明实施例提供的一种策略实体的结构示意图;  FIG. 1 is a schematic flowchart of a method for processing an access information according to an embodiment of the present invention; FIG. 2 is a schematic flowchart of another method for processing access information according to an embodiment of the present invention; FIG. 4 is a schematic flowchart of another method for processing access information according to an embodiment of the present invention; FIG. 5 is a schematic diagram of another method for processing access information according to an embodiment of the present invention; FIG. 6 is a schematic flowchart of another access information processing method according to an embodiment of the present invention; FIG. 7 is a schematic structural diagram of a policy entity according to an embodiment of the present invention;
图 8是本发明实施例提供的另一种策略实体的结构示意图;  FIG. 8 is a schematic structural diagram of another policy entity according to an embodiment of the present invention;
图 9是本发明实施例提供的另一种策略实体的结构示意图;  FIG. 9 is a schematic structural diagram of another policy entity according to an embodiment of the present invention;
图 10是本发明实施例提供的另一种策略实体的结构示意图;  FIG. 10 is a schematic structural diagram of another policy entity according to an embodiment of the present invention;
图 11是本发明实施例提供的一种接入信息处理系统的结构示意图; 图 12是本发明实施例提供的另一种策略实体的结构示意图;  11 is a schematic structural diagram of an access information processing system according to an embodiment of the present invention; and FIG. 12 is a schematic structural diagram of another policy entity according to an embodiment of the present invention;
图 13是本发明实施例提供的另一种策略实体的结构示意图;  FIG. 13 is a schematic structural diagram of another policy entity according to an embodiment of the present invention;
图 14是本发明实施例提供的另一种策略实体的结构示意图; 图 15是本发明实施例提供的另一种策略实体的结构示意图; FIG. 14 is a schematic structural diagram of another policy entity according to an embodiment of the present invention; FIG. 15 is a schematic structural diagram of another policy entity according to an embodiment of the present invention;
图 16是本发明实施例提供的另一种接入信息处理系统的结构示意图。 具体实施方式  FIG. 16 is a schematic structural diagram of another access information processing system according to an embodiment of the present invention. detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没有作出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。  BRIEF DESCRIPTION OF THE DRAWINGS The technical solutions in the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative work are within the scope of the present invention.
图 1是本发明实施例提供的一种接入信息处理方法的流程示意图, 如图 1 所示, 包括:  1 is a schematic flowchart of a method for processing access information according to an embodiment of the present invention. As shown in FIG. 1, the method includes:
101、 第一策略实体获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息;  101. The first policy entity acquires second access information of a target access network of the user equipment that is stored by the second policy entity.
102、 第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息。  The first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used.
可选的, 上述目标接入网络可以是一个或者多个接入网络, 即目标接入网 络为至少一个接入网络;上述第一接入信息和第二接入信息可以是一个或者多 个信息。  Optionally, the foregoing target access network may be one or more access networks, that is, the target access network is at least one access network; the first access information and the second access information may be one or more information. .
可选的, 当上述目标接入网络为多个接入网络时, 步骤 102确定所述用户 设备接入所述目标接入网络时使用的接入信息,可以是分别确定用户设备接入 每个目标接入网络时使用的接入信息。  Optionally, when the target access network is a plurality of access networks, the step 102 determines that the user equipment accesses the access information used by the target access network, and may determine that the user equipment accesses each Access information used when the target accesses the network.
作为一种可选的实施方式,上述第一策略实体可以是用于管理策略的服务 器, 例如: ANDSF服务器或者, WFA服务器; 上述第二策略实体也可以是用 于管理策略的服务器, 例如: ANDSF服务器或者, WFA服务器。 其中, 上述 第一策略实体和第二策略实体可以是两个不同的 ANDSF服务器, 也可以是两 个不同的 WFA服务器, 还可以第一策略实体为 ANDSF服务器, 第二策略实 体为 WFA服务器, 还可以第一策略实体为 WFA服务器, 第二策略实体为 ANDSF服务器。  As an optional implementation manner, the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: ANDSF Server or, WFA server. The first policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity is an ANDSF server, and the second policy entity is a WFA server. The first policy entity may be a WFA server, and the second policy entity may be an ANDSF server.
上述技术方案中,第一策略实体获取第二策略实体存储的用户设备的目标 接入网络的第二接入信息;第一策略实体根据所述第二接入信息和所述第一策 略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备接入所述 目标接入网络时使用的接入信息。这样确定后的接入信息就不会出现重复和冲 突的接入信息, 从而可以提高接入信息的可用性。 图 2是本发明实施例提供的另一种接入信息处理方法的流程示意图,如图 2所示, 包括: In the foregoing technical solution, the first policy entity acquires the target of the user equipment stored by the second policy entity. Accessing the second access information of the network; the first policy entity determines, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment is connected Access information used when the target accesses the network. The thus determined access information does not have duplicate and conflicting access information, thereby improving the availability of the access information. 2 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
201、 第一策略实体接收所述用户设备上报的位置信息, 所述位置信息用 于为所述用户设备选择所述目标接入网络。  201. The first policy entity receives location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
可选的, 上述用户设备位置信息可以用于表示用户设备当前所处的位置, 如上述用户设备位置信息可以是小区位置信息,即用户设备当前所处小区的位 置信息; 或者上述用户设备位置信息可以是接入网络标识, 即用户设备当前接 入的网络的标识, 例如: 服务集合标识 (Service Set Identification, SSID )或 者扩展服务集合标识( Homogenous Extended Service Set ID, HESSID )或者基 础服务集合标识 (Basic Service Set ID, BSSID )等。  Optionally, the foregoing user equipment location information may be used to indicate a location where the user equipment is currently located, where the user equipment location information may be cell location information, that is, location information of a cell where the user equipment is currently located; or the user equipment location information. The identifier of the access network, that is, the identifier of the network that the user equipment is currently accessing, such as: Service Set Identification (SSID) or Homogenous Extended Service Set ID (HESSID) or basic service set identifier ( Basic Service Set ID, BSSID), etc.
可选的,上述目标接入网络可以是该用户设备位置信息所示的小区或者接 入网络相邻的小区或接入网络作为目标接入网络,即满足用户设备位置信息的 至少一个接入网络为目标接入网络。  Optionally, the foregoing target access network may be a cell indicated by the location information of the user equipment or a neighboring cell or access network of the access network as the target access network, that is, at least one access network that satisfies the location information of the user equipment. Access the network for the target.
可选的, 上述用户设备位置信息可以是一个查询位置信息, 上述目标接入 网络就为属于该查询位置信息所示指示位置区域的至少一个接入网络。  Optionally, the user equipment location information may be a query location information, where the target access network is at least one access network that belongs to the indicated location area indicated by the query location information.
202、 第一策略实体获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息。  202. The first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity.
作为一种可选的实施方式, 步骤 202可以包括:  As an optional implementation manner, step 202 may include:
根据所述位置信息, 第一策略实体选择所述目标接入网络,  Determining, by the first policy entity, the target access network according to the location information,
第一策略实体向所述第二策略实体发送所述目标接入网络的标识信息, 第一策略实体接收所述第二策略实体发送的所述第二接入信息。  The first policy entity sends the identifier information of the target access network to the second policy entity, and the first policy entity receives the second access information sent by the second policy entity.
该实施方式中,可以实现由第一策略实体根据上述位置信息选择出目标接 入网络。可以选择覆盖上述位置信息所指示的位置的至少一个接入网络为上述 目标接入网络。 作为一种可选的实施方式, 步骤 202可以包括: In this implementation manner, the first policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network. As an optional implementation manner, step 202 may include:
第一策略实体向所述第二策略实体发送所述位置信息,所述位置信息用于 所述第二策略实体为所述用户设备选择所述目标接入网络;  The first policy entity sends the location information to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
第一策略实体接收所述第二策略实体发送的所述第二接入信息。  The first policy entity receives the second access information sent by the second policy entity.
该实施方式中,可以实现由第一策略实体向第二策略实体发送上述位置信 息, 并由第二策略实体根据上述位置信息选择出目标接入网络。 可以选择覆盖 上述位置信息所指示的位置的至少一个接入网络为上述目标接入网络。  In this implementation manner, the location information may be sent by the first policy entity to the second policy entity, and the second policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
可选的, 第一策略实体还可以接收用户设备发送的用户设备信息, 该用户 设备信息可以包含如下至少一项:  Optionally, the first policy entity may further receive user equipment information sent by the user equipment, where the user equipment information may include at least one of the following:
用户设备标识和用户设备等级信息;  User equipment identification and user equipment level information;
当然本发明实施例中第一策略实体还可以将上述用户设备信息发送至第 二策略实体,由第二策略实体根据该用户设备信息选择目标接入网络或者第二 接入信息。  Of course, in the embodiment of the present invention, the first policy entity may further send the user equipment information to the second policy entity, and the second policy entity selects the target access network or the second access information according to the user equipment information.
其中, 上述用户设备标识可以是用户设备的唯一标识, 例如: 国际移动用 户识别码 ( International Mobile Subscriber Identity, IMSI ) , 国际移动设备身份 码( International Mobile Equipment ID, IMEI )或移动台国际综合业务数字网 号码用户设备的标识 ( Mobile Station International Integrated Services Digital Network Number, MSISDN )等其他可唯一标识用户设备的标识。  The user equipment identifier may be a unique identifier of the user equipment, for example, an International Mobile Subscriber Identity (IMSI), an International Mobile Equipment ID (IMEI), or a mobile station international integrated service number. Other identifiers that uniquely identify the user equipment, such as the Mobile Station International Integrated Services Digital Network Number (MSISDN).
第一策略实体或者第二策略实体还可以选择该用户设备标识适用的至少 一个接入网络作为上述目标接入网络。  The first policy entity or the second policy entity may also select at least one access network to which the user equipment identifier applies as the target access network.
其中, 上述用户设备等级信息可以是用于描述该用户设备的等级, 例如: 金、 银、 铜牌用户设备等级, 还可以是用户侧与网络侧预先协商的其它等级。  The user equipment level information may be a level used to describe the user equipment, for example, a gold, silver, and bronze user equipment level, and may also be other levels pre-negotiated by the user side and the network side.
第一策略实体或者第二策略实体还可以选择该用户设备等级适用的至少 一个接入网络作为上述目标接入网络。 或者, 第二策略实体还可以选择上述目 标接入网络的接入信息中该用户设备等级适用的接入信息作为第二接入信息; 第一策略实体还可以选择上述目标接入网络的接入信息中该用户设备等级适 用的接入信息作为第一接入信息;同样可以预先设置好用户设备等级和接入网 络的映射关系, 或者可以预先设置好用户设备等级和接入信息的映射关系。  The first policy entity or the second policy entity may also select at least one access network to which the user equipment level applies as the target access network. Alternatively, the second policy entity may also select the access information applicable to the user equipment level in the access information of the target access network as the second access information; the first policy entity may also select the access of the target access network. The access information applicable to the user equipment level in the information is used as the first access information; the mapping relationship between the user equipment level and the access network may be set in advance, or the mapping relationship between the user equipment level and the access information may be preset.
可选的, 第一策略实体向所述第二策略实体还可以发送查询列表, 以便所 述第二策略实体根据所述查询列表从所述目标接入网络的接入信息中选择所 述第二接入信息;可以是将上述查询列表与上述位置信息一起发送至第二策略 实体,即在步骤 202中第一策略实体向第二策略实体发送上述位置信息和上述 查询列表。 当然,还可以是通过分开向第二策略实体发送上述位置信息和上述 查询列表。 Optionally, the first policy entity may further send a query list to the second policy entity, so as to The second policy entity selects the second access information from the access information of the target access network according to the query list; the foregoing query list may be sent to the second policy entity together with the location information, that is, In step 202, the first policy entity sends the location information and the query list to the second policy entity. Of course, it is also possible to send the above location information and the above query list to the second policy entity separately.
其中, 上述查询列表用于指示查询内容, 其中, 该内容可以是发现信息和 The query list is used to indicate the content of the query, where the content may be discovery information and
/或策略, 上述第二接入信息为第二策略实体从目标接入网络的接入信息中选 择的所述查询列表所查询的信息; And/or a policy, where the second access information is information that is queried by the second policy entity from the query list selected by the target access network;
可选的, 上述查询列表查询内容可以包含如下至少一项:  Optionally, the query list query content may include at least one of the following:
接入网络的负荷门限值、接入网络的信号强度门限值、接入网络的上行中 能够使用的带宽门限值、接入网络的下行中能够使用的带宽门限值、允许的接 入网络类型和接入网络信息;  The load threshold of the access network, the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection. Incoming network type and access network information;
可选的, 第一策略实体向所述第二策略实体还可以发送查询列表时, 第二 策略实体就可以选择目标接入网络的接入信息中上述查询列表所查询的信息 作为发送给第一策略实体的目标接入网络的第二接入信息; 例如, 上述查询列 表查询的信息包括允许的接入网络类型时,第二策略实体就可以选择目标接入 网络的信息中接入网络类型信息作为发送给第一策略实体的目标接入网络的 第二接入信息。  Optionally, when the first policy entity can send the query list to the second policy entity, the second policy entity may select the information queried by the query list in the access information of the target access network as the first The second access information of the target access network of the target entity is selected by the target entity of the policy entity. For example, when the information of the query list includes the allowed access network type, the second policy entity may select the access network type information of the information of the target access network. As the second access information of the target access network sent to the first policy entity.
可选的, 第一策略实体向所述第二策略实体还可以发送订阅更新指示, 以 便所述第二策略实体根据所述订阅更新指示从所述目标接入网络的接入信息 中选择所述第二接入信息。  Optionally, the first policy entity may further send a subscription update indication to the second policy entity, so that the second policy entity selects the access information from the target access network according to the subscription update indication. Second access information.
可选的, 上述订阅更新指示可以是一个订阅更新列表, 即可以包含多个发 现信息和 /或订阅策略, 该订阅更新指示用于指示当所述第二策略实体中所述 订阅更新列表中任一订阅发现信息和 /或任一订阅策略发生改变时, 所述第二 策略实体将发生改变的订阅发现信息和 /或任一订阅策略作为上述第二接入信 息发送至所述第一策略实体。  Optionally, the foregoing subscription update indication may be a subscription update list, that is, may include multiple discovery information and/or a subscription policy, where the subscription update indication is used to indicate that the subscription update list in the second policy entity is When a subscription discovery information and/or any subscription policy changes, the second policy entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information. .
203、 第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息。 作为一种可选的实施方式,步骤 203中的确定所述用户设备接入所述目标 接入网络时使用的接入信息, 包括: 203. The first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used. As an optional implementation manner, the access information used by the user equipment to access the target access network in step 203 includes:
第一策略实体合并所述第一接入信息和所述第二接入信息得到所述用户 设备接入所述目标接入网络时使用的接入信息;  The first policy entity combines the first access information and the second access information to obtain access information used when the user equipment accesses the target access network;
可选的, 上述合并是指将第二接入信息加入第一接入信息, 当然这里加入 只加入不存在重复的,即将第二接入信息中与第一接入信息不重复的信息加入 第一接入信息中。  Optionally, the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information. One access information.
可选的,第一策略实体还可以接收第二策略实体发送的上述目标接入网络 的网络标识 ,这样第一策略实体还可以根据该网络标识定义第一策略实体存储 的包含该网络标识的接入信息为上述第二接入信息。即将合并上述第二接入信 息与包含该网络标识的接入信息。  Optionally, the first policy entity may further receive the network identifier of the target access network that is sent by the second policy entity, so that the first policy entity may further define, according to the network identifier, the interface that is stored by the first policy entity and includes the network identifier. The incoming information is the second access information described above. The second access information and the access information including the network identifier are about to be merged.
可选的, 当上述第二接入信息包含发现信息时, 第一策略实体将所述第二 接入信息中的第一信息加入第一策略实体存储的包含该网络标识的发现信息 中; 所述第一信息为第一策略实体存储的包含上述网络标识(即目标接入网络 的标识) 的发现信息中不存在的信息;  Optionally, when the foregoing second access information includes the discovery information, the first policy entity adds the first information in the second access information to the discovery information that is included in the first policy entity and includes the network identifier. The first information is information that is not stored in the discovery information of the network identifier (ie, the identifier of the target access network) that is stored by the first policy entity;
可选的, 当上述第二接入信息包含异系统切换策略时, 第一策略实体将所 述第二接入信息中的第一策略参数加入第一策略实体存储的包含上述网络标 识的异系统切换策略中;所述第一策略参数为第一策略实体存储的包含该网络 标识的异系统切换策略中不存在的策略参数;  Optionally, when the foregoing second access information includes the different system switching policy, the first policy entity adds the first policy parameter in the second access information to the different system that is configured by the first policy entity and includes the network identifier. In the handover policy, the first policy parameter is a policy parameter that is not included in the different system handover policy that is stored by the first policy entity and that includes the network identifier;
可选的, 当上述第二接入信息包含异系统路由策略时, 第一策略实体将所 述第二接入信息中的第一策略参数加入第一策略实体存储的包含上述网络标 识的异系统路由策略中;所述第一策略参数为第一策略实体存储的包含该网络 标识的异系统路由策略中不存在的策略参数。  Optionally, when the foregoing second access information includes a different system routing policy, the first policy entity adds the first policy parameter in the second access information to the different system that is stored by the first policy entity and includes the network identifier. In the routing policy, the first policy parameter is a policy parameter that is not present in the different system routing policy that is stored by the first policy entity and that includes the network identifier.
作为一种可选的实施方式,步骤 203中的确定所述用户设备接入所述目标 接入网络时使用的接入信息, 包括:  As an optional implementation, the access information used by the user equipment to access the target access network in step 203 includes:
第一策略实体选择所述第一接入信息和所述第二接入信息中优先级高者 为所述用户设备接入所述目标接入网络时使用的接入信息。  The first policy entity selects the highest priority among the first access information and the second access information as access information used when the user equipment accesses the target access network.
可选的, 第一策略实体还可以接收到第二接入信息的应用场景信息, 上述 第一策略实体选择所述第一接入信息和所述第二接入信息中优先级高者为所 述用户设备接入所述目标接入网络时使用的接入信息可以包括: Optionally, the first policy entity may further receive the application scenario information of the second access information, where the first policy entity selects the highest priority among the first access information and the second access information. The access information used when the user equipment accesses the target access network may include:
第一策略实体选择所述第一接入信息的第一信息和所述第二接入信息的 第一信息中优先级别高者作为所述用户设备接入所述目标接入网络时使用的 接入信息;  The first policy entity selects the highest priority among the first information of the first access information and the first information of the second access information as a connection used when the user equipment accesses the target access network Information
其中, 所述第一信息是第一接入信息和第二接入信息中都存在的,且应用 场景相同的信息。 该应用场景可以是指适用于漫游用户, 即上述第一子接入信 息和第二子接入信息只适用于漫游用户;或者应用场景可以是指适用于非漫游 用户, 即上述第一子接入信息和第二子接入信息只适用于非漫游用户。  The first information is the same information that exists in both the first access information and the second access information, and the application scenario is the same. The application scenario may be applicable to the roaming user, that is, the first sub-access information and the second sub-access information are only applicable to the roaming user; or the application scenario may be applicable to the non-roaming user, that is, the first sub-connection The incoming information and the second sub-access information are only applicable to non-roaming users.
步骤 203 中的确定所述用户设备接入所述目标接入网络时使用的接入信 息, 可以包括:  The access information used by the user equipment to access the target access network in step 203 may include:
第一策略实体判断所述第二接入信息中的第二信息与所述第二接入信息 中的第二信息的优先级别, 并将优先级别高的第二信息加入所述第二接信息 中。  Determining, by the first policy entity, a priority level of the second information in the second access information and the second information in the second access information, and adding the second information with a high priority to the second information in.
上述第二信息是指在第二接入信息与第一接入信息中都存在的信息, 例 如, 发现信息和 /或策略参数。  The foregoing second information refers to information existing in both the second access information and the first access information, for example, discovery information and/or policy parameters.
例如: 上述第二信息为最大负荷值,也就是说第二策略实体发送的所述第 二接入信息和第一接入信息中都存在最大负荷值,这样第一策略实体就可以判 断该这两个最大负荷值相关的策略的优先级别,当第二策略实体发送的所述第 二接入信息中最大负荷值相关策略的优先级别高时,就将该最大负荷值策略加 入到第一接入信息中,将第一接入信息原来的最大负荷值策略移除。本发明实 施例中不对如何判断两策略优先级别的方案做限制。如第一策略实体上配置第 一策略实体的策略总低于第二策略实体的策略。以此决定来自两策略实体的策 略优先级顺序。 还可以是预先设置好策略的优先级别。  For example, the second information is the maximum load value, that is, the maximum load value exists in the second access information and the first access information sent by the second policy entity, so that the first policy entity can determine the a priority level of the policy related to the two maximum load values, when the priority of the maximum load value related policy in the second access information sent by the second policy entity is high, the maximum load value policy is added to the first connection In the incoming information, the original maximum load value policy of the first access information is removed. In the embodiment of the present invention, there is no limitation on how to determine the priority level of the two policies. For example, the policy of configuring the first policy entity on the first policy entity is always lower than the policy of the second policy entity. This determines the order of policy priorities from the two policy entities. It is also possible to set the priority level of the policy in advance.
可选的,第一策略实体还可以接收到第二策略实体发送的目标接入网络的 网络标识,第一策略实体还可以是将该网络标识与第一策略实体存储的接入信 息中网络标识进行匹配, 将匹配成功的接入信息作为第二接入信息。 第一策略 实体再判断所述第二接入信息中的第二信息与所述第二接入信息中的第二信 息的优先级别, 并将优先级别高的第二信息加入所述第二接信息中。  Optionally, the first policy entity may further receive the network identifier of the target access network sent by the second policy entity, where the first policy entity may also be the network identifier of the access information stored by the network identifier and the first policy entity. The matching is performed, and the successfully matched access information is used as the second access information. The first policy entity further determines a priority level of the second information in the second access information and the second information in the second access information, and adds the second information with a higher priority to the second interface Information.
作为一种可选的实施方式,所述第一接入信息可以包括所述目标接入网络 的第一发现信息,所述第二接入信息可以包括所述目标接入网络的第二发现信 息; 步骤 203就可以是确定根据所述第二发现信息和所述第一发现信息,确定 所述用户设备接入所述目标接入网络时使用的发现信息。 或者, As an optional implementation manner, the first access information may include the target access network. The first discovery information, the second access information may include second discovery information of the target access network; step 203 may be determining to determine, according to the second discovery information and the first discovery information, The discovery information used when the user equipment accesses the target access network. or,
所述第一接入信息可以包括所述目标接入网络的第一异系统切换策略,所 述第二接入信息可以包括所述目标接入网络的第二异系统切换策略; 步骤 203 就可以是确定根据所述第二异系统切换策略和所述第一异系统切换策略,确定 所述用户设备接入所述目标接入网络时使用的异系统切换策略。 或者,  The first access information may include a first different system switching policy of the target access network, and the second access information may include a second different system switching policy of the target access network; Determining, according to the second different system switching policy and the first different system switching policy, determining a different system switching policy used when the user equipment accesses the target access network. Or,
所述第一接入信息可以包括所述目标接入网络的第一异系统路由策略,所 述第二接入信息可以包括所述目标接入网络的异系统路由策略。步骤 203就可 以是确定根据所述第二异系统路由策略和所述第一异系统路由策略,确定所述 用户设备接入所述目标接入网络时使用的异系统路由策略。  The first access information may include a first different system routing policy of the target access network, and the second access information may include a different system routing policy of the target access network. Step 203 is to determine, according to the second different system routing policy and the first different system routing policy, a different system routing policy used when the user equipment accesses the target access network.
作为一种可选的实施, 所述第一接入信息、 所述第二接入信息、 和所述用 户设备接入所述目标接入网络时使用的接入信息分别包括所述目标接入网络 的发现信息; 或者,  As an optional implementation, the first access information, the second access information, and access information used when the user equipment accesses the target access network respectively include the target access Discovery information of the network; or,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者,  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system switching policy of the target access network; or ,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
可选的, 上述接入信息可以包括如下至少一项:  Optionally, the foregoing access information may include at least one of the following:
发现信息、 异系统切换策略和异系统路由策略;  Discovery information, different system switching policies, and different system routing strategies;
其中, 所述发现信息可以包含如下至少一项:  The discovery information may include at least one of the following:
类型信息、 分配的 IP地址类型信息、 支持的鉴权认证信息以及应用类型 信息;  Type information, assigned IP address type information, supported authentication authentication information, and application type information;
所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项:  The parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息;如指示信息与最大负荷值同时出现时表明最大 负荷值为必须满足的策略。 Maximum load value, lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum Signal strength value and indication whether the minimum signal strength value must be met Information, the minimum uplink usable bandwidth value and information indicating whether the minimum uplink usable bandwidth value must be met, the lowest downlink usable bandwidth value and information indicating whether the minimum downlink usable bandwidth value must be met, allowing The access network type of the access and the information indicating whether the access network type of the access network must be met; if the indication information and the maximum load value occur simultaneously, the maximum load value must be met.
例如,上述指示是否必须满足该最大负荷值的信息为指示最大负荷值为必 须满足的时,则只有当用户设备的负荷值小于该接入信息中的最大负荷值时才 可以接入该目标接入网络。 最低信号强度值、 最底上行能够使用的带宽值、 最 低下行能够使用的带宽值、 最大负荷值一样, 此处不作一一说明。  For example, if the information indicating whether the maximum load value must be satisfied is that the maximum load value must be met, the target device can be accessed only when the load value of the user equipment is less than the maximum load value in the access information. Into the network. The minimum signal strength value, the bandwidth value that can be used at the lowest uplink, the bandwidth value that can be used for the lowest downlink, and the maximum load value are not described here.
作为一种可选的实施方式, 在步骤 203之后, 所述方法还可以包括: 将上述确定的接入信息发送至所述用户设备。  As an optional implementation manner, after the step 203, the method may further include: sending the determined access information to the user equipment.
上述技术方案中,在上面实施例的基础上实现了根据用户设备上报的位置 信息选择目标接入网络, 且还实现了多种接入信息处理方法,且都可以实现提 高接入信息的可用性。 图 3是本发明实施例提供的另一种接入信息处理方法的流程示意图,如图 3所示, 包括:  In the foregoing technical solution, the target access network is selected according to the location information reported by the user equipment, and various access information processing methods are also implemented, and the availability of the access information can be improved. FIG. 3 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 3, the method includes:
301、 第一策略实体接收所述第二策略实体推送的所述第二接入信息。 301. The first policy entity receives the second access information that is pushed by the second policy entity.
302、 第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息; 302. The first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used;
303、 第一策略实体接收用户设备发送的接入信息请求消息;  303. The first policy entity receives an access information request message sent by the user equipment.
304、 第一策略实体基于所述接入信息请求消息, 从所述目标接入网络中 选择出至少一个接入网络作为所述用户设备最终接入网络,并将确定后的用户 设备接入所述最终接入网络时使用的接入信息发送至所述用户设备。  The first policy entity, based on the access information request message, selects at least one access network from the target access network as the user equipment to finally access the network, and accesses the determined user equipment. The access information used when finally accessing the network is sent to the user equipment.
可选的, 上述的接入信息请求消息包括如下至少一项:  Optionally, the foregoing access information request message includes at least one of the following:
用户设备标识、 用户位置信息、 用户设备能力信息、 用户设备接入信息和 请求策略类型信息; 其中, 所述用户设备接入信息用于指示用户设备是否支持 并发接入。 步骤 304 就可以从上述目标接入网络中选择满足上述接入信息请求消息 的至少一个接入网络作为所述用户设备的最终接入网络,并将确定后的用户设 备接入所述最终接入网络时使用的接入信息发送至所述用户设备。例如: 上述 策略请求消息包括用户位置信息,就可以从述目标接入网络中选择与该位置信 息所示的小区相邻的至少一个接入网络作为所述用户设备的最终接入网络。 User equipment identification, user location information, user equipment capability information, user equipment access information, and request policy type information; wherein the user equipment access information is used to indicate whether the user equipment supports concurrent access. Step 304: Select at least one access network that meets the foregoing access information request message from the target access network as the final access network of the user equipment, and access the determined user equipment to the final access. The access information used in the network is sent to the user equipment. For example, the foregoing policy request message includes user location information, and at least one access network adjacent to the cell indicated by the location information may be selected from the target access network as the final access network of the user equipment.
上述技术方案中, 在上面实施例的基础上实施了, 第一策略实体接收第二 策略实体主动发送的目标接入网络的第二接入信息,基于所述接入信息请求消 息,从所述目标接入网络中选择出至少一个接入网络作为所述用户设备最终接 入网络,并将确定后的用户设备接入所述最终接入网络时使用的接入信息发送 至所述用户设备。 同时, 可以实现提高接入信息的可用性。 图 4是本发明实施例提供的另一种接入信息处理方法的流程示意图,如图 4所示, 包括:  In the foregoing technical solution, on the basis of the foregoing embodiment, the first policy entity receives the second access information of the target access network that is actively sent by the second policy entity, based on the access information request message, from the At least one access network is selected in the target access network as the user equipment finally accesses the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment. At the same time, the availability of access information can be improved. 4 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 4, the method includes:
401、 第二策略实体接收所述用户设备上报的位置信息, 所述位置信息用 于为所述用户设备选择所述目标接入网络;  401. The second policy entity receives the location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
402、 第一策略实体获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息;  402. The first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity.
403、 第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息;  403. The first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used;
404、 第一策略实体向所述第二策略实体发送所述用户设备接入所述目标 接入网络时使用的接入信息。  404. The first policy entity sends, to the second policy entity, access information used by the user equipment to access the target access network.
可选的, 步骤 404之后, 所述方法还可以包括:  Optionally, after step 404, the method may further include:
第二策略实体向所述用户设备发送所述用户设备接入所述目标接入网络 时使用的接入信息。  The second policy entity sends, to the user equipment, access information used by the user equipment when accessing the target access network.
上述技术方案中, 在上面实施例的基础上, 实现了由第一策略实体确定所 述用户设备接入所述目标接入网络时使用的接入信息,第一策略实体再将确定 后的用户设备接入所述目标接入网络时使用的接入信息发送至第二策略实体。 同时, 还可以实现提高接入信息的可用性。 图 5是本发明实施例提供的另一种接入信息处理方法的流程示意图,如图 5所示, 包括: In the above technical solution, on the basis of the foregoing embodiment, the access information used by the user equipment to access the target access network is determined by the first policy entity, and the first policy entity further determines the user. The access information used when the device accesses the target access network is sent to the second policy entity. At the same time, it is also possible to improve the availability of access information. FIG. 5 is a schematic flowchart of another method for processing access information according to an embodiment of the present invention. As shown in FIG. 5, the method includes:
501、 第二策略实体向第一策略实体发送第二策略实体存储的用户设备的 目标接入网络的第二接入信息,以使第一策略实体根据所述第二接入信息和所 述第一策略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备 接入所述目标接入网络时使用的接入信息。  501. The second policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and the first The first access information of the target access network stored by the policy entity determines access information used when the user equipment accesses the target access network.
可选的, 在步骤 501之前, 所述方法还可以包括:  Optionally, before the step 501, the method may further include:
第二策略实体接收第一策略实体发送的用户设备的位置信息;  Receiving, by the second policy entity, location information of the user equipment sent by the first policy entity;
根据所述位置信息, 所述第二策略实体选择所述目标接入网络。  And according to the location information, the second policy entity selects the target access network.
可选的, 第二策略实体接收第一策略实体发送的查询列表, 所述第二策略 实体根据所述查询列表从所述目标接入网络的接入信息中选择所述第二接入 信息; 其中, 上述查询列表用于指示查询内容, 其中, 该内容可以是发现信息 和 /或策略, 上述第二接入信息为第二策略实体从目标接入网络的接入信息中 选择的所述查询列表所查询的信息;  Optionally, the second policy entity receives the query list sent by the first policy entity, and the second policy entity selects the second access information from the access information of the target access network according to the query list. The query list is used to indicate the query content, where the content may be the discovery information and/or the policy, and the second access information is the query selected by the second policy entity from the access information of the target access network. The information queried by the list;
可选的, 上述查询列表查询内容可以包含如下至少一项:  Optionally, the query list query content may include at least one of the following:
接入网络的负荷门限值、接入网络的信号强度门限值、接入网络的上行中 能够使用的带宽门限值、接入网络的下行中能够使用的带宽门限值、允许的接 入网络类型和接入网络信息;  The load threshold of the access network, the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection. Incoming network type and access network information;
可选的, 第一策略实体向所述第二策略实体还可以发送查询列表时, 第二 策略实体就可以选择目标接入网络的接入信息中上述查询列表所查询的信息 作为发送给第一策略实体的目标接入网络的第二接入信息; 例如, 上述查询列 表查询的信息包括允许的接入网络类型时,第二策略实体就可以选择目标接入 网络的信息中接入网络类型信息作为发送给第一策略实体的目标接入网络的 第二接入信息。  Optionally, when the first policy entity can send the query list to the second policy entity, the second policy entity may select the information queried by the query list in the access information of the target access network as the first The second access information of the target access network of the target entity is selected by the target entity of the policy entity. For example, when the information of the query list includes the allowed access network type, the second policy entity may select the access network type information of the information of the target access network. As the second access information of the target access network sent to the first policy entity.
可选的, 第二策略实体接收第一策略实体发送的订阅更新指示, 所述第二 策略实体根据所述订阅更新指示从所述目标接入网络的接入信息中选择所述 第二接入信息。  Optionally, the second policy entity receives the subscription update indication sent by the first policy entity, where the second policy entity selects the second access from the access information of the target access network according to the subscription update indication information.
可选的, 上述订阅更新指示可以是一个订阅更新列表, 即可以包含多个发 现信息和 /或订阅策略, 该订阅更新指示用于指示当所述第二策略实体中所述 订阅更新列表中任一订阅发现信息和 /或任一订阅策略发生改变时, 所述第二 策略实体将发生改变的订阅发现信息和 /或任一订阅策略作为上述第二接入信 息发送至所述第一策略实体。 Optionally, the subscription update indication may be a subscription update list, that is, may include multiple a current information and/or a subscription policy, the subscription update indication being used to indicate that when any subscription discovery information and/or any subscription policy in the subscription update list in the second policy entity changes, the second policy The entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information.
作为一种可选的实施方式,上述第一策略实体可以是用于管理策略的服务 器, 例如: ANDSF服务器或者, WFA服务器; 上述第二策略实体也可以是用 于管理策略的服务器, 例如: ANDSF服务器或者, WFA服务器。 其中, 上述 第一策略实体和第二策略实体可以是两个不同的 ANDSF服务器, 也可以是两 个不同的 WFA服务器, 还可以第一策略实体为 ANDSF服务器, 第二策略实 体为 WFA服务器, 还可以第一策略实体为 WFA服务器, 第二策略实体为 ANDSF服务器。  As an optional implementation manner, the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: ANDSF Server or, WFA server. The first policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity is an ANDSF server, and the second policy entity is a WFA server. The first policy entity may be a WFA server, and the second policy entity may be an ANDSF server.
上述技术方案中,第二策略实体向第一策略实体发送第二策略实体存储的 用户设备的目标接入网络的第二接入信息,以使第一策略实体根据所述第二接 入信息和所述第一策略实体存储的所述目标接入网络的第一接入信息,确定所 述用户设备接入所述目标接入网络时使用的接入信息。这样处理后的接入信息 就不会出现重复和冲突的接入信息, 从而可以提高接入信息的可用性。 图 6是本发明实施例提供的另一种接入信息处理方法的流程示意图,如图 6所示, 包括:  In the foregoing technical solution, the second policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and The first access information of the target access network that is stored by the first policy entity determines access information used when the user equipment accesses the target access network. The access information thus processed does not have duplicate and conflicting access information, thereby improving the availability of the access information. FIG. 6 is a schematic flowchart of another access information processing method according to an embodiment of the present invention. As shown in FIG. 6, the method includes:
601、 用户设备向第一策略实体上报位置信息;  601. The user equipment reports the location information to the first policy entity.
602、 第一策略实体向第二策略实体发送包含上述位置请求的请求消息; 602. The first policy entity sends a request message that includes the location request to the second policy entity.
603、 第二策略实体基于上述位置信息选择目标接入网络; 603. The second policy entity selects a target access network based on the foregoing location information.
604、 第二策略实体向第一策略实体发送第二策略实体存储的用户设备的 目标接入网络的第二接入信息;  604. The second policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity.
605、 第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息;  605. The first policy entity determines, when the user equipment accesses the target access network, according to the second access information and the first access information of the target access network that is stored by the first policy entity. Access information used;
606、 第一策略实体向所述用户设备发送上述确定后的用户设备接入所述 目标接入网络时使用的接入信息。 上述技术方案中, 在上面实施例的基础上, 更为详细地介绍了接入信息处 理的流程,以及将确定后的用户设备接入所述目标接入网络时使用的接入信息 发送至用户设备。 同时, 还可以实现提高接入信息的可用性。 下面为本发明装置实施例 ,本发明装置实施例用于执行本发明方法实施例 一至六实现的方法, 为了便于说明, 仅示出了与本发明实施例相关的部分, 具 体技术细节未揭示的, 请参照本发明实施例一、 实施例二、 实施倒三、 实施例 四、 实施例五和实施例六。 图 7是本发明实施例提供的一种策略实体的结构示意图, 如图 7所示, 包 括: 获取单元 11和确定单元 12, 其中: 606. The first policy entity sends, to the user equipment, the access information used by the determined user equipment to access the target access network. In the foregoing technical solution, on the basis of the foregoing embodiment, the flow of the access information processing is introduced in more detail, and the access information used when the determined user equipment accesses the target access network is sent to the user. device. At the same time, it is also possible to improve the availability of access information. The following is an embodiment of the device of the present invention. The device embodiment of the present invention is used to perform the method for implementing the first to sixth embodiments of the present invention. For the convenience of description, only parts related to the embodiment of the present invention are shown, and the specific technical details are not disclosed. Please refer to Embodiment 1 of the present invention, Embodiment 2, Embodiment 3, Embodiment 4, Embodiment 5 and Embodiment 6. FIG. 7 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 7, the method includes: an obtaining unit 11 and a determining unit 12, where:
获取单元 11 , 用于获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息;  The obtaining unit 11 is configured to acquire second access information of the target access network of the user equipment that is stored by the second policy entity;
确定单元 12, 用于根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息。  a determining unit 12, configured to determine, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment accesses the target access network Access information used.
可选的, 上述目标接入网络可以是一个或者多个接入网络, 即目标接入网 络为至少一个接入网络;上述第一接入信息和第二接入信息可以是一个或者多 个信息。  Optionally, the foregoing target access network may be one or more access networks, that is, the target access network is at least one access network; the first access information and the second access information may be one or more information. .
作为一种可选的实施方式, 上述策略实体可以是用于管理策略的服务器, 例如: ANDSF服务器或者, WFA服务器; 上述第二策略实体也可以是用于管 理策略的服务器, 例如: ANDSF服务器或者, WFA服务器。 其中, 上述策略 实体和第二策略实体可以是两个不同的 ANDSF服务器, 也可以是两个不同的 WFA服务器, 还可以上述策略实体为 ANDSF服务器, 第二策略实体为 WFA 服务器, 还可以上述策略实体为 WFA服务器, 第二策略实体为 ANDSF服务 器。  As an optional implementation manner, the foregoing policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server. The foregoing policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the policy entity is an ANDSF server, and the second policy entity is a WFA server, and the foregoing policy may also be used. The entity is a WFA server and the second policy entity is an ANDSF server.
上述技术方案中,策略实体获取第二策略实体存储的用户设备的目标接入 网络的第二接入信息;策略实体根据所述第二接入信息和所述策略实体存储的 所述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络 时使用的接入信息。这样处理后的策略就不会出现重复和冲突的策略,从而可 以提高接入信息的可用性。 图 8是本发明实施例提供的一种策略实体的结构示意图, 如图 8所示, 包 括: 接收单元 21、 获取单元 22和确定单元 23 , 其中: In the foregoing technical solution, the policy entity acquires the second access information of the target access network of the user equipment that is stored by the second policy entity; the policy entity is configured according to the second access information and the target access that is stored by the policy entity. Determining, by the first access information of the network, the user equipment accessing the target access network Access information used at the time. The policy thus processed will not have duplicate and conflicting policies, thereby improving the availability of access information. FIG. 8 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 8, the method includes: a receiving unit 21, an obtaining unit 22, and a determining unit 23, where:
接收单元 21 , 用于接收所述用户设备上报的位置信息, 所述位置信息用 于为所述用户设备选择所述目标接入网络。  The receiving unit 21 is configured to receive location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
可选的, 上述用户设备位置信息可以用于表示用户设备当前所处的位置, 如上述用户设备位置信息可以是小区位置信息,即用户设备当前所处小区的位 置信息; 或者上述用户设备位置信息可以是接入网络标识, 即用户设备当前接 入的网络的标识, 例如: SSID或者 HESSID或 BSSID等。  Optionally, the foregoing user equipment location information may be used to indicate a location where the user equipment is currently located, where the user equipment location information may be cell location information, that is, location information of a cell where the user equipment is currently located; or the user equipment location information. It may be an access network identifier, that is, an identifier of a network currently accessed by the user equipment, such as: SSID or HESSID or BSSID.
可选的,上述目标接入网络可以是该用户设备位置信息所示的小区或者接 入网络相邻的小区或接入网络作为目标接入网络,即满足用户设备位置信息的 至少一个接入网络为目标接入网络。  Optionally, the foregoing target access network may be a cell indicated by the location information of the user equipment or a neighboring cell or access network of the access network as the target access network, that is, at least one access network that satisfies the location information of the user equipment. Access the network for the target.
可选的, 上述用户设备位置信息可以是一个查询位置信息, 上述目标接入 网络就为属于该查询位置信息所示指示位置区域的至少一个接入网络。  Optionally, the user equipment location information may be a query location information, where the target access network is at least one access network that belongs to the indicated location area indicated by the query location information.
获取单元 22, 用于获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息。  The obtaining unit 22 is configured to acquire second access information of the target access network of the user equipment that is stored by the second policy entity.
作为一种可选的实施方式, 获取单元 22可以包括:  As an optional implementation manner, the obtaining unit 22 may include:
选择单元(附图中未画出), 用于根据所述位置信息, 选择所述目标接入 网络,  a selection unit (not shown in the drawing), configured to select the target access network according to the location information,
第一发送单元(附图中未画出), 用于向所述第二策略实体发送所述目标 接入网络的标识信息,  a first sending unit (not shown in the drawing), configured to send, to the second policy entity, identifier information of the target access network, where
第一接收子单元(附图中未画出), 用于接收所述第二策略实体发送的所 述第二接入信息。  The first receiving subunit (not shown in the drawing) is configured to receive the second access information sent by the second policy entity.
该实施方式中,可以实现由第一策略实体根据上述位置信息选择出目标接 入网络。可以选择覆盖上述位置信息所指示的位置的至少一个接入网络为上述 目标接入网络。  In this embodiment, it may be implemented that the first policy entity selects the target access network based on the location information. At least one access network that covers the location indicated by the above location information may be selected as the target access network.
作为一种可选的实施方式, 获取单元 22可以包括: 第二发送单元(附图中未画出), 用于向所述第二策略实体发送所述位置 信息,所述位置信息用于所述第二策略实体为所述用户设备选择所述目标接入 网络; As an optional implementation manner, the obtaining unit 22 may include: a second sending unit (not shown in the drawing), configured to send the location information to the second policy entity, where the location information is used by the second policy entity to select the target interface for the user equipment Into the network;
第二接收子单元(附图中未画出), 用于接收所述第二策略实体发送的所 述第二接入信息。  And a second receiving subunit (not shown in the figure), configured to receive the second access information sent by the second policy entity.
该实施方式中,可以实现由第一策略实体向第二策略实体发送上述位置信 息, 并由第二策略实体根据上述位置信息选择出目标接入网络。 可以选择覆盖 上述位置信息所指示的位置的至少一个接入网络为上述目标接入网络。  In this implementation manner, the location information may be sent by the first policy entity to the second policy entity, and the second policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
可选的, 第一策略实体还可以接收用户设备发送的用户设备信息, 该用户 设备信息可以包含如下至少一项:  Optionally, the first policy entity may further receive user equipment information sent by the user equipment, where the user equipment information may include at least one of the following:
用户设备标识和用户设备等级信息;  User equipment identification and user equipment level information;
当然本发明实施例中第一策略实体还可以将上述用户设备信息发送至第 二策略实体,由第二策略实体根据该用户设备信息选择目标接入网络或者第二 接入信息。  Of course, in the embodiment of the present invention, the first policy entity may further send the user equipment information to the second policy entity, and the second policy entity selects the target access network or the second access information according to the user equipment information.
其中,上述用户设备标识可以是用户设备的唯一标识,例如: IMSI, IMEI 或 MSISDN等其他可唯一标识用户设备的标识。  The user equipment identifier may be a unique identifier of the user equipment, for example, an identifier that can uniquely identify the user equipment, such as IMSI, IMEI, or MSISDN.
第一策略实体或者第二策略实体还可以选择该用户设备标识适用的至少 一个接入网络作为上述目标接入网络。  The first policy entity or the second policy entity may also select at least one access network to which the user equipment identifier applies as the target access network.
其中, 上述用户设备等级信息可以是用于描述该用户设备的等级, 例如: 金、 银、 铜牌用户设备等级, 还可以是用户侧与网络侧预先协商的其它等级。  The user equipment level information may be a level used to describe the user equipment, for example, a gold, silver, and bronze user equipment level, and may also be other levels pre-negotiated by the user side and the network side.
第一策略实体或者第二策略实体还可以选择该用户设备等级适用的至少 一个接入网络作为上述目标接入网络。 或者, 第二策略实体还可以选择上述目 标接入网络的接入信息中该用户设备等级适用的接入信息作为第二接入信息; 第一策略实体还可以选择上述目标接入网络的接入信息中该用户设备等级适 用的接入信息作为第一接入信息;同样可以预先设置好用户设备等级和接入网 络的映射关系, 或者可以预先设置好用户设备等级和接入信息的映射关系。  The first policy entity or the second policy entity may also select at least one access network to which the user equipment level applies as the target access network. Alternatively, the second policy entity may also select the access information applicable to the user equipment level in the access information of the target access network as the second access information; the first policy entity may also select the access of the target access network. The access information applicable to the user equipment level in the information is used as the first access information; the mapping relationship between the user equipment level and the access network may be set in advance, or the mapping relationship between the user equipment level and the access information may be preset.
可选的, 第二发送单元(附图中未画出)还可以用于向所述第二策略实体 发送查询列表,以便所述第二策略实体根据所述查询列表从所述目标接入网络 的接入信息中选择所述第二接入信息;其中,上述查询列表用于指示查询内容, 其中, 该内容可以是发现信息和 /或策略, 上述第二接入信息为第二策略实体 从目标接入网络的接入信息中选择的所述查询列表所查询的信息; Optionally, the second sending unit (not shown in the drawing) is further configured to send a query list to the second policy entity, so that the second policy entity accesses the network from the target according to the query list. Selecting the second access information in the access information; wherein the query list is used to indicate the query content, The content may be a discovery information and/or a policy, where the second access information is information that is queried by the second policy entity from the query list selected by the target access network.
可选的, 上述查询列表查询内容可以包含如下至少一项:  Optionally, the query list query content may include at least one of the following:
接入网络的负荷门限值、接入网络的信号强度门限值、接入网络的上行中 能够使用的带宽门限值、接入网络的下行中能够使用的带宽门限值、允许的接 入网络类型和接入网络信息;  The load threshold of the access network, the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection. Incoming network type and access network information;
可选的, 第一策略实体向所述第二策略实体还可以发送查询列表时, 第二 策略实体就可以选择目标接入网络的接入信息中上述查询列表所查询的信息 作为发送给第一策略实体的目标接入网络的第二接入信息; 例如, 上述查询列 表查询的信息包括允许的接入网络类型时,第二策略实体就可以选择目标接入 网络的信息中接入网络类型信息作为发送给第一策略实体的目标接入网络的 第二接入信息。  Optionally, when the first policy entity can send the query list to the second policy entity, the second policy entity may select the information queried by the query list in the access information of the target access network as the first The second access information of the target access network of the target entity is selected by the target entity of the policy entity. For example, when the information of the query list includes the allowed access network type, the second policy entity may select the access network type information of the information of the target access network. As the second access information of the target access network sent to the first policy entity.
或者, 第二发送单元(附图中未画出)还可以用于向所述第二策略实体发 送订阅更新指示,以便所述第二策略实体根据所述订阅更新指示从所述目标接 入网络的接入信息中选择所述第二接入信息。  Alternatively, the second sending unit (not shown in the drawing) may be further configured to send a subscription update indication to the second policy entity, so that the second policy entity is configured to access the network from the target according to the subscription update indication. The second access information is selected in the access information.
可选的, 上述订阅更新指示可以是一个订阅更新列表, 即可以包含多个发 现信息和 /或订阅策略, 该订阅更新指示用于指示当所述第二策略实体中所述 订阅更新列表中任一订阅发现信息和 /或任一订阅策略发生改变时, 所述第二 策略实体将发生改变的订阅发现信息和 /或任一订阅策略作为上述第二接入信 息发送至所述第一策略实体。  Optionally, the foregoing subscription update indication may be a subscription update list, that is, may include multiple discovery information and/or a subscription policy, where the subscription update indication is used to indicate that the subscription update list in the second policy entity is When a subscription discovery information and/or any subscription policy changes, the second policy entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information. .
确定单元 23 , 用于根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息。  a determining unit 23, configured to determine, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment accesses the target access network Access information used.
作为一种可选的实施方式, 确定单元 23还可以用于合并所述第一接入信 息和所述第二接入信息得到所述用户设备接入所述目标接入网络时使用的接 入信息;  As an optional implementation manner, the determining unit 23 may be further configured to combine the first access information and the second access information to obtain access used when the user equipment accesses the target access network. Information
可选的, 上述合并是指将第二接入信息加入第一接入信息, 当然这里加入 只加入不存在重复的,即将第二接入信息中与第一接入信息不重复的信息加入 第一接入信息中。 可选的, 确定单元 23还可以接收第二策略实体发送的上述目标接入网络 的网络标识, 这样确定单元 23还可以根据该网络标识定义第一策略实体存储 的包含该网络标识的接入信息为上述第二接入信息。即将合并上述第二接入信 息与包含该网络标识的接入信息。 Optionally, the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information. One access information. Optionally, the determining unit 23 may further receive the network identifier of the target access network that is sent by the second policy entity, so that the determining unit 23 may further define, according to the network identifier, the access information that is stored by the first policy entity and includes the network identifier. The second access information is the above. The second access information and the access information including the network identifier are about to be merged.
可选的, 当上述第二接入信息包含发现信息时, 确定单元 63将所述第二 接入信息中的第一信息加入第一策略实体存储的包含该网络标识的发现信息 中; 所述第一信息为第一策略实体存储的包含上述网络标识(即目标接入网络 的标识) 的发现信息中不存在的信息;  Optionally, when the second access information includes the discovery information, the determining unit 63 adds the first information in the second access information to the discovery information that is stored by the first policy entity and includes the network identifier. The first information is information that is not stored in the discovery information of the network identifier (ie, the identifier of the target access network) that is stored by the first policy entity;
可选的, 当上述第二接入信息包含异系统切换策略时, 确定单元 63将所 述第二接入信息中的第一策略参数加入第一策略实体存储的包含上述网络标 识的异系统切换策略中;所述第一策略参数为第一策略实体存储的包含该网络 标识的异系统切换策略中不存在的策略参数;  Optionally, when the second access information includes the different system switching policy, the determining unit 63 adds the first policy parameter in the second access information to the different system switch that is stored by the first policy entity and includes the network identifier. In the policy, the first policy parameter is a policy parameter that is not included in the different system switching policy that is stored by the first policy entity and includes the network identifier;
可选的, 当上述第二接入信息包含异系统路由策略时, 确定单元 63将所 述第二接入信息中的第一策略参数加入第一策略实体存储的包含上述网络标 识的异系统路由策略中;所述第一策略参数为第一策略实体存储的包含该网络 标识的异系统路由策略中不存在的策略参数。  Optionally, when the second access information includes the different system routing policy, the determining unit 63 adds the first policy parameter in the second access information to the different system route that is stored by the first policy entity and includes the network identifier. In the policy, the first policy parameter is a policy parameter that is not present in the different system routing policy that is stored by the first policy entity and that includes the network identifier.
作为一种可选的实施方式, 确定单元 23还可以用于选择所述第一接入信 息和所述第二接入信息中优先级高者为所述用户设备接入所述目标接入网络 时使用的接入信息。  As an optional implementation manner, the determining unit 23 may be further configured to select the highest priority among the first access information and the second access information to access the target access network by the user equipment. Access information used at the time.
可选的, 确定单元 23还可以用于当第一策略实体还可以接收到第二接入 信息的应用场景信息时,选择所述第一接入信息的第一信息和所述第二接入信 息的第一信息中优先级别高者作为所述用户设备接入所述目标接入网络时使 用的接入信息;  Optionally, the determining unit 23 is further configured to: when the first policy entity further receives the application scenario information of the second access information, select the first information of the first access information and the second access The highest priority among the first information of the information is the access information used when the user equipment accesses the target access network;
其中, 所述第一信息是第一接入信息和第二接入信息中都存在的,且应用 场景相同的信息。 该应用场景可以是指适用于漫游用户, 即上述第一子接入信 息和第二子接入信息只适用于漫游用户;或者应用场景可以是指适用于非漫游 用户, 即上述第一子接入信息和第二子接入信息只适用于非漫游用户。  The first information is the same information that exists in both the first access information and the second access information, and the application scenario is the same. The application scenario may be applicable to the roaming user, that is, the first sub-access information and the second sub-access information are only applicable to the roaming user; or the application scenario may be applicable to the non-roaming user, that is, the first sub-connection The incoming information and the second sub-access information are only applicable to non-roaming users.
作为一种可选的实施方式,所述第一接入信息可以包括所述目标接入网络 的第一发现信息,所述第二接入信息可以包括所述目标接入网络的第二发现信 息; 确定单元 23就可以是确定根据所述第二发现信息和所述第一发现信息, 确定所述用户设备接入所述目标接入网络时使用的发现信息。 或者, As an optional implementation manner, the first access information may include first discovery information of the target access network, and the second access information may include a second discovery information of the target access network. The determining unit 23 may be configured to determine, according to the second discovery information and the first discovery information, discovery information used when the user equipment accesses the target access network. or,
所述第一接入信息可以包括所述目标接入网络的第一异系统切换策略,所 述第二接入信息可以包括所述目标接入网络的第二异系统切换策略;确定单元 23 就可以是确定根据所述第二异系统切换策略和所述第一异系统切换策略, 确定所述用户设备接入所述目标接入网络时使用的异系统切换策略。 或者, 所述第一接入信息可以包括所述目标接入网络的第一异系统路由策略,所 述第二接入信息可以包括所述目标接入网络的异系统路由策略。 确定单元 23 就可以是确定根据所述第二异系统路由策略和所述第一异系统路由策略,确定 所述用户设备接入所述目标接入网络时使用的异系统路由策略。  The first access information may include a first different system switching policy of the target access network, and the second access information may include a second different system switching policy of the target access network; And determining, according to the second different system switching policy and the first different system switching policy, a different system switching policy used when the user equipment accesses the target access network. Or the first access information may include a first different system routing policy of the target access network, where the second access information may include a different system routing policy of the target access network. The determining unit 23 may be configured to determine, according to the second different system routing policy and the first different system routing policy, a different system routing policy used when the user equipment accesses the target access network.
作为一种可选的实施, 所述第一接入信息、 所述第二接入信息、 和所述用 户设备接入所述目标接入网络时使用的接入信息分别包括所述目标接入网络 的发现信息; 或者,  As an optional implementation, the first access information, the second access information, and access information used when the user equipment accesses the target access network respectively include the target access Discovery information of the network; or,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者,  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system switching policy of the target access network; or ,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
可选的, 上述接入信息可以包括如下至少一项:  Optionally, the foregoing access information may include at least one of the following:
发现信息、 异系统切换策略和异系统路由策略;  Discovery information, different system switching policies, and different system routing strategies;
其中, 所述发现信息可以包含如下至少一项:  The discovery information may include at least one of the following:
类型信息、 IP地址类型信息、 支持的鉴权认证信息以及应用类型信息; 所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项:  The type information, the IP address type information, the supported authentication authentication information, and the application type information; the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息 Maximum load value, lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum a signal strength value and information indicating whether the minimum signal strength value must be met, a bandwidth value that can be used for the lowest uplink, and information indicating whether the minimum uplink usable bandwidth value must be met, whether the minimum downlink usable bandwidth value and indication are necessary. Meet the minimum downgrade Information about the bandwidth value that can be used, the type of access network that is allowed to access, and information indicating whether the type of access network that is allowed to access must be met.
例如,上述指示是否必须满足该最大负荷值的信息为指示最大负荷值为必 须满足的时,则只有当用户设备的负荷值小于该接入信息中的最大负荷值时才 可以接入该目标接入网络。 最低信号强度值、 最底上行能够使用的带宽值、 最 低下行能够使用的带宽值、 最大负荷值一样, 此处不作一一说明。  For example, if the information indicating whether the maximum load value must be satisfied is that the maximum load value must be met, the target device can be accessed only when the load value of the user equipment is less than the maximum load value in the access information. Into the network. The minimum signal strength value, the bandwidth value that can be used at the lowest uplink, the bandwidth value that can be used for the lowest downlink, and the maximum load value are not described here.
上述技术方案中,在上面实施例的基础上实现了根据用户设备上报的位置 信息选择目标接入网络, 且还实现了多种接入信息处理方法,且都可以实现提 高接入信息的可用性。 图 9是本发明实施例提供的一种策略实体的结构示意图, 如图 9所示, 包 括: 获取单元 31、 确定单元 32、 请求消息接收单元 33和接入信息发送单元 34 , 其中:  In the foregoing technical solution, the target access network is selected according to the location information reported by the user equipment, and various access information processing methods are also implemented, and the availability of the access information can be improved. FIG. 9 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 9, the method includes: an obtaining unit 31, a determining unit 32, a request message receiving unit 33, and an access information sending unit 34, where:
获取单元 31 , 用于接收用户设备推送的接入信息请求消息;  The obtaining unit 31 is configured to receive an access information request message pushed by the user equipment.
确定单元 32 , 根据所述第二接入信息和所述第一策略实体存储的所述目 标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时使用 的接入信息;  The determining unit 32 is configured to determine, according to the second access information and the first access information of the target access network that is stored by the first policy entity, that the user equipment accesses the target access network. Access information
请求消息接收单元 33 , 用于接收用户设备推送的接入信息请求消息; 接入信息发送单元 34 , 用于基于所述接入信息请求消息, 从所述目标接 入网络中选择出至少一个接入网络作为所述用户设备最终接入网络,并将确定 后的用户设备接入所述最终接入网络时使用的接入信息发送至所述用户设备。  The request message receiving unit 33 is configured to receive an access information request message that is pushed by the user equipment, and the access information sending unit 34 is configured to select at least one interface from the target access network based on the access information request message. The access network is used as the user equipment to finally access the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment.
可选的, 上述的接入信息请求消息包括如下至少一项:  Optionally, the foregoing access information request message includes at least one of the following:
用户设备标识、 用户位置信息、 用户设备能力信息、 用户设备接入信息和 请求策略类型信息; 其中, 所述用户设备接入信息用于指示用户设备是否支持 并发接入。  User equipment identification, user location information, user equipment capability information, user equipment access information, and request policy type information; wherein the user equipment access information is used to indicate whether the user equipment supports concurrent access.
接入信息发送单元 34就可以从上述目标接入网络中选择满足上述接入信 息请求消息的至少一个接入网络作为所述用户设备的最终接入网络,并将确定 后的用户设备接入所述最终接入网络时使用的接入信息发送至所述用户设备。 例如: 上述策略请求消息包括用户位置信息, 就可以从述目标接入网络中选择 与该位置信息所示的小区相邻的至少一个接入网络作为所述用户设备的最终 接入网络。 The access information sending unit 34 may select at least one access network that satisfies the foregoing access information request message from the target access network as the final access network of the user equipment, and access the determined user equipment. The access information used when finally accessing the network is sent to the user equipment. For example: the above policy request message includes user location information, and can be selected from the target access network. At least one access network adjacent to the cell indicated by the location information serves as a final access network of the user equipment.
上述技术方案中, 在上面实施例的基础上实施了, 策略实体接收第二策略 实体主动发送的目标接入网络的第二接入信息, 基于所述接入信息请求消息, 从所述目标接入网络中选择出至少一个接入网络作为所述用户设备最终接入 网络,并将确定后的用户设备接入所述最终接入网络时使用的接入信息发送至 所述用户设备。 同时, 可以实现提高接入信息的可用性。 图 10是本发明实施例提供的一种策略实体的结构示意图, 如图 10所示, 包括: 发送单元 41 , 其中:  The foregoing technical solution is implemented on the basis of the foregoing embodiment, the policy entity receives the second access information of the target access network that is actively sent by the second policy entity, and receives the message from the target based on the access information request message. At least one access network is selected in the network as the user equipment finally accesses the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment. At the same time, the availability of access information can be improved. FIG. 10 is a schematic structural diagram of a policy entity according to an embodiment of the present invention. As shown in FIG. 10, the method includes: a sending unit 41, where:
发送单元 41 , 用于向第一策略实体发送所述策略实体存储的用户设备的 目标接入网络的第二接入信息,以使第一策略实体根据所述第二接入信息和所 述第一策略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备 接入所述目标接入网络时使用的接入信息。  The sending unit 41 is configured to send, to the first policy entity, second access information of the target access network of the user equipment that is stored by the policy entity, so that the first policy entity is configured according to the second access information and the first The first access information of the target access network stored by the policy entity determines access information used when the user equipment accesses the target access network.
可选的, 所述策略实体还可以包括:  Optionally, the policy entity may further include:
接收单元(附图中未画出),, 用于第二策略实体接收第一策略实体发送的 用户设备的位置信息;  a receiving unit (not shown in the drawing), configured to receive, by the second policy entity, location information of the user equipment sent by the first policy entity;
选择单元(附图中未画出), 用于根据所述位置信息, 所述第二策略实体 选择所述目标接入网络。  A selection unit (not shown in the drawing) is configured to select the target access network according to the location information.
可选的, 策略实体接收第一策略实体发送的查询列表, 所述第二策略实体 根据所述查询列表从所述目标接入网络的接入信息中选择所述第二接入信息; 可选的, 策略实体接收第一策略实体发送的订阅更新指示, 所述第二策略 实体根据所述订阅更新指示从所述目标接入网络的接入信息中选择所述第二 接入信息。  Optionally, the policy entity receives the query list sent by the first policy entity, where the second policy entity selects the second access information from the access information of the target access network according to the query list; The policy entity receives the subscription update indication sent by the first policy entity, and the second policy entity selects the second access information from the access information of the target access network according to the subscription update indication.
作为一种可选的实施方式,上述第一策略实体可以是用于管理策略的服务 器, 例如: ANDSF服务器或者, WFA服务器; 上述策略实体也可以是用于管 理策略的服务器, 例如: ANDSF服务器或者, WFA服务器。 其中, 上述第一 策略实体和上述策略实体可以是两个不同的 ANDSF服务器, 也可以是两个不 同的 WFA服务器, 还可以第一策略实体为 ANDSF服务器, 上述策略实体为 WFA服务器, 还可以第一策略实体为 WFA服务器, 上述策略实体为 ANDSF 服务器。 As an optional implementation manner, the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the foregoing policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server. The first policy entity and the foregoing policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity may be an ANDSF server, where the policy entity is For the WFA server, the first policy entity is a WFA server, and the above policy entity is an ANDSF server.
上述技术方案中,策略实体向第一策略实体发送策略实体存储的用户设备 的目标接入网络的第二接入信息,以使第一策略实体根据所述第二接入信息和 所述第一策略实体存储的所述目标接入网络的第一接入信息,确定所述用户设 备接入所述目标接入网络时使用的接入信息。这样处理后的接入信息就不会出 现重复和冲突的接入信息, 从而可以提高接入信息的可用性。 图 11是本发明实施例提供的一种接入信息处理系统的结构示意图, 如图 11所示, 第一策略实体 51和第二策略实体 52, 其中:  In the foregoing technical solution, the policy entity sends the second access information of the target access network of the user equipment that is stored by the policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and the first The first access information of the target access network stored by the policy entity determines access information used by the user equipment when accessing the target access network. The access information thus processed does not have duplicate and conflicting access information, thereby improving the availability of the access information. FIG. 11 is a schematic structural diagram of an access information processing system according to an embodiment of the present invention. As shown in FIG. 11, a first policy entity 51 and a second policy entity 52, where:
第二策略实体 52 , 用于向第一策略实体发送第二策略实体存储的用户设 备的目标接入网络的第二接入信息;  a second policy entity 52, configured to send, to the first policy entity, second access information of the target access network of the user equipment stored by the second policy entity;
第一策略实体 51 , 用于接收第二策略实体发送的所述第二接入信息消息, 根据所述第二接入信息和所述第一策略实体存储的所述目标接入网络的第一 接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息。  a first policy entity 51, configured to receive the second access information message sent by the second policy entity, according to the second access information, and the first of the target access network that is stored by the first policy entity The access information is used to determine access information used when the user equipment accesses the target access network.
上述技术方案中,第一策略实体获取第二策略实体存储的用户设备的目标 接入网络的第二接入信息;第一策略实体根据所述第二接入信息和所述第一策 略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备接入所述 目标接入网络时使用的接入信息。这样处理后的策略就不会出现重复和冲突的 策略, 从而可以提高接入信息的可用性。 图 12是本发明实施例提供的另一种策略实体的结构示意图,如图 12所示, 包括: 接收器 61、 处理器 62和存储器 63 , 存储器 63用于存储一组程序代码, 且处理器 62用于调用存储器 63存储的程序代码用于执行如下操作:  In the foregoing technical solution, the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the first policy entity stores the second access information according to the second access information and the first policy entity. The first access information of the target access network is used to determine access information used when the user equipment accesses the target access network. The policy thus processed will not have duplicate and conflicting policies, thereby improving the availability of access information. FIG. 12 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 12, the method includes: a receiver 61, a processor 62, and a memory 63. The memory 63 is configured to store a set of program codes, and the processor is configured. 62 is used to call the program code stored in the memory 63 for performing the following operations:
通过接收器 61获取第二策略实体存储的用户设备的目标接入网络的第二 接入信息;  Acquiring, by the receiver 61, second access information of the target access network of the user equipment stored by the second policy entity;
根据所述第二接入信息和所述第一策略实体存储的所述目标接入网络的 第一接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息。  Determining access information used by the user equipment to access the target access network according to the second access information and the first access information of the target access network that is stored by the first policy entity.
可选的, 上述目标接入网络可以是一个或者多个接入网络, 即目标接入网 络为至少一个接入网络;上述第一接入信息和第二接入信息可以是一个或者多 个信息。 Optionally, the foregoing target access network may be one or more access networks, that is, a target access network. The network is at least one access network; the first access information and the second access information may be one or more pieces of information.
需要说明的是, 上述策略实体可以是如前方法实施例所述的第一策略实 体。  It should be noted that the foregoing policy entity may be the first policy entity as described in the foregoing method embodiment.
作为一种可选的实施方式, 上述策略实体可以是用于管理策略的服务器, 例如: ANDSF服务器或者, WFA服务器; 上述第二策略实体也可以是用于管 理策略的服务器, 例如: ANDSF服务器或者, WFA服务器。 其中, 上述策略 实体和第二策略实体可以是两个不同的 ANDSF服务器, 也可以是两个不同的 WFA服务器, 还可以上述策略实体为 ANDSF服务器, 第二策略实体为 WFA 服务器, 还可以上述策略实体为 WFA服务器, 第二策略实体为 ANDSF服务 器。  As an optional implementation manner, the foregoing policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the second policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server. The foregoing policy entity and the second policy entity may be two different ANDSF servers, or may be two different WFA servers, or the policy entity is an ANDSF server, and the second policy entity is a WFA server, and the foregoing policy may also be used. The entity is a WFA server and the second policy entity is an ANDSF server.
上述技术方案中,策略实体获取第二策略实体存储的用户设备的目标接入 网络的第二接入信息;策略实体根据所述第二接入信息和所述第一策略实体存 储的所述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入 网络时使用的接入信息。这样确定后的接入信息就不会出现重复和冲突的接入 信息, 从而可以提高接入信息的可用性。 图 13是本发明实施例提供的另一种策略实体的结构示意图,如图 13所示, 包括: 接收器 71、 处理器 72和存储器 73 , 存储器 73用于存储一组程序代码, 且处理器 72用于调用存储器 73存储的程序代码用于执行如下操作:  In the foregoing technical solution, the policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the policy entity stores the target according to the second access information and the first policy entity. Accessing the first access information of the network, and determining access information used when the user equipment accesses the target access network. The thus determined access information does not have duplicate and conflicting access information, thereby improving the availability of the access information. FIG. 13 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 13, the method includes: a receiver 71, a processor 72, and a memory 73. The memory 73 is configured to store a set of program codes, and the processor 72 is used to call the program code stored in the memory 73 for performing the following operations:
通过接收器 71接收所述用户设备上报的位置信息, 所述位置信息用于为 所述用户设备选择所述目标接入网络;  The location information reported by the user equipment is received by the receiver 71, where the location information is used to select the target access network for the user equipment;
通过接收器 71获取第二策略实体存储的用户设备的目标接入网络的第二 接入信息;  Obtaining second access information of the target access network of the user equipment stored by the second policy entity by the receiver 71;
根据所述第二接入信息和所述第一策略实体存储的所述目标接入网络的 第一接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息。  Determining access information used by the user equipment to access the target access network according to the second access information and the first access information of the target access network that is stored by the first policy entity.
可选的, 上述用户设备位置信息可以用于表示用户设备当前所处的位置, 如上述用户设备位置信息可以是小区位置信息,即用户设备当前所处小区的位 置信息; 或者上述用户设备位置信息可以是接入网络标识, 即用户设备当前接 入的网络的标识, 例如: SSID或者 HESSID或者 BSSID等。 Optionally, the foregoing user equipment location information may be used to indicate a location where the user equipment is currently located, where the user equipment location information may be cell location information, that is, location information of a cell where the user equipment is currently located; or the user equipment location information. It can be the access network identifier, that is, the user equipment is currently connected. The identifier of the incoming network, for example: SSID or HESSID or BSSID.
可选的,上述目标接入网络可以是该用户设备位置信息所示的小区或者接 入网络相邻的小区或接入网络作为目标接入网络,即满足用户设备位置信息的 至少一个接入网络为目标接入网络。  Optionally, the foregoing target access network may be a cell indicated by the location information of the user equipment or a neighboring cell or access network of the access network as the target access network, that is, at least one access network that satisfies the location information of the user equipment. Access the network for the target.
可选的, 上述用户设备位置信息可以是一个查询位置信息, 上述目标接入 网络就为属于该查询位置信息所示指示位置区域的至少一个接入网络。  Optionally, the user equipment location information may be a query location information, where the target access network is at least one access network that belongs to the indicated location area indicated by the query location information.
作为一种可选的实施方式, 上述策略实体还可以包括发射器 74, 其中, 处理器 72执行的通过接收器 71获取第二策略实体存储的用户设备的目标接入 网络的第二接入信息的操作, 可以包括:  As an optional implementation manner, the foregoing policy entity may further include a transmitter 74, where the processor 72 performs, by using the receiver 71, the second access information of the target access network of the user equipment stored by the second policy entity. The operation can include:
根据所述位置信息, 选择所述目标接入网络,  Selecting the target access network according to the location information,
通过发射器 74向所述第二策略实体发送所述目标接入网络的标识信息, 通过接收器 71接收所述第二策略实体发送的所述第二接入信息。  The identifier information of the target access network is sent to the second policy entity by the transmitter 74, and the second access information sent by the second policy entity is received by the receiver 71.
该实施方式中,可以实现由第一策略实体根据上述位置信息选择出目标接 入网络。可以选择覆盖上述位置信息所指示的位置的至少一个接入网络为上述 目标接入网络。  In this embodiment, it may be implemented that the first policy entity selects the target access network based on the location information. At least one access network that covers the location indicated by the above location information may be selected as the target access network.
作为一种可选的实施方式, 上述策略实体还可以包括发射器 74, 其中, 处理器 72执行的通过接收器 71获取第二策略实体存储的用户设备的目标接入 网络的第二接入信息的操作, 可以包括:  As an optional implementation manner, the foregoing policy entity may further include a transmitter 74, where the processor 72 performs, by using the receiver 71, the second access information of the target access network of the user equipment stored by the second policy entity. The operation can include:
通过发射器 74向所述第二策略实体发送所述位置信息, 所述位置信息用 于所述第二策略实体为所述用户设备选择所述目标接入网络;  The location information is sent by the transmitter 74 to the second policy entity, where the location information is used by the second policy entity to select the target access network for the user equipment;
通过接收器 71接收所述第二策略实体发送的所述第二接入信息。  The second access information sent by the second policy entity is received by the receiver 71.
该实施方式中,可以实现由第一策略实体向第二策略实体发送上述位置信 息, 并由第二策略实体根据上述位置信息选择出目标接入网络。 可以选择覆盖 上述位置信息所指示的位置的至少一个接入网络为上述目标接入网络。  In this implementation manner, the location information may be sent by the first policy entity to the second policy entity, and the second policy entity may select the target access network according to the location information. At least one access network that covers the location indicated by the location information may be selected as the target access network.
可选的,处理器 72还可以通过发射器 74向所述第二策略实体还可以发送 查询列表,以便所述第二策略实体根据所述查询列表从所述目标接入网络的接 入信息中选择所述第二接入信息;可以是将上述查询列表与上述位置信息一起 发送至第二策略实体。  Optionally, the processor 72 may further send, by using the transmitter 74, the query list to the second policy entity, so that the second policy entity is configured to access the access information of the target access network according to the query list. Selecting the second access information; the foregoing query list may be sent to the second policy entity together with the location information.
其中, 上述查询列表用于指示查询内容, 其中, 该内容可以是发现信息和 /或策略, 上述第二接入信息为第二策略实体从目标接入网络的接入信息中选 择的所述查询列表所查询的信息; The query list is used to indicate the content of the query, where the content may be discovery information and The second access information is the information queried by the second policy entity from the query list selected by the access information of the target access network;
可选的, 上述查询列表查询内容可以包含如下至少一项:  Optionally, the query list query content may include at least one of the following:
接入网络的负荷门限值、接入网络的信号强度门限值、接入网络的上行中 能够使用的带宽门限值、接入网络的下行中能够使用的带宽门限值、允许的接 入网络类型和接入网络信息。  The load threshold of the access network, the signal strength threshold of the access network, the bandwidth threshold that can be used in the uplink of the access network, the bandwidth threshold that can be used in the downlink of the access network, and the allowed connection. Enter network type and access network information.
可选的,处理器 72还可以通过发射器 74向所述第二策略实体还可以发送 订阅更新指示,以便所述第二策略实体根据所述订阅更新指示从所述目标接入 网络的接入信息中选择所述第二接入信息。  Optionally, the processor 72 may further send, by the transmitter 74, the subscription update indication to the second policy entity, so that the second policy entity indicates the access from the target access network according to the subscription update indication. The second access information is selected in the information.
可选的, 上述订阅更新指示可以是一个订阅更新列表, 即可以包含多个发 现信息和 /或订阅策略, 该订阅更新指示用于指示当所述第二策略实体中所述 订阅更新列表中任一订阅发现信息和 /或任一订阅策略发生改变时, 所述第二 策略实体将发生改变的订阅发现信息和 /或任一订阅策略作为上述第二接入信 息发送至所述第一策略实体。  Optionally, the foregoing subscription update indication may be a subscription update list, that is, may include multiple discovery information and/or a subscription policy, where the subscription update indication is used to indicate that the subscription update list in the second policy entity is When a subscription discovery information and/or any subscription policy changes, the second policy entity sends the changed subscription discovery information and/or any subscription policy to the first policy entity as the second access information. .
作为一种可选的实施方式, 处理器 72执行的确定所述用户设备接入所述 目标接入网络时使用的接入信息的操作, 可以包括:  As an optional implementation, the operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
合并所述第一接入信息和所述第二接入信息得到所述用户设备接入所述 目标接入网络时使用的接入信息;  Merging the first access information and the second access information to obtain access information used by the user equipment to access the target access network;
可选的, 上述合并是指将第二接入信息加入第一接入信息, 当然这里加入 只加入不存在重复的,即将第二接入信息中与第一接入信息不重复的信息加入 第一接入信息中。  Optionally, the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information. One access information.
作为一种可选的实施方式, 处理器 72执行的确定所述用户设备接入所述 目标接入网络时使用的接入信息的操作, 可以包括:  As an optional implementation, the operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
合并所述第一接入信息和所述第二接入信息得到所述用户设备接入所述 目标接入网络时使用的接入信息;  Merging the first access information and the second access information to obtain access information used by the user equipment to access the target access network;
可选的, 上述合并是指将第二接入信息加入第一接入信息, 当然这里加入 只加入不存在重复的,即将第二接入信息中与第一接入信息不重复的信息加入 第一接入信息中。  Optionally, the foregoing merging refers to adding the second access information to the first access information, and of course, adding the information that is added to the second access information and not overlapping the first access information is added to the first access information. One access information.
可选的, 当上述第二接入信息包含发现信息时, 处理器 72将所述第二接 入信息中的第一信息加入第一策略实体存储的包含该网络标识的发现信息中; 所述第一信息为第一策略实体存储的包含上述网络标识(即目标接入网络的标 识) 的发现信息中不存在的信息; Optionally, when the second access information includes the discovery information, the processor 72 performs the second connection. The first information in the incoming information is added to the discovery information that is stored by the first policy entity and includes the network identifier. The first information is a discovery that is stored by the first policy entity and includes the network identifier, that is, the identifier of the target access network. Information that does not exist in the information;
可选的, 当上述第二接入信息包含异系统切换策略时, 处理器 72将所述 第二接入信息中的第一策略参数加入第一策略实体存储的包含上述网络标识 的异系统切换策略中;所述第一策略参数为第一策略实体存储的包含该网络标 识的异系统切换策略中不存在的策略参数;  Optionally, when the second access information includes the different system switching policy, the processor 72 adds the first policy parameter in the second access information to the different system switch that is stored by the first policy entity and includes the network identifier. In the policy, the first policy parameter is a policy parameter that is not included in the different system switching policy that is stored by the first policy entity and includes the network identifier;
可选的, 当上述第二接入信息包含异系统路由策略时, 处理器 72将所述 第二接入信息中的第一策略参数加入第一策略实体存储的包含上述网络标识 的异系统路由策略中;所述第一策略参数为第一策略实体存储的包含该网络标 识的异系统路由策略中不存在的策略参数。  Optionally, when the second access information includes the different system routing policy, the processor 72 adds the first policy parameter in the second access information to the different system route that is stored by the first policy entity and includes the network identifier. In the policy, the first policy parameter is a policy parameter that is not present in the different system routing policy that is stored by the first policy entity and that includes the network identifier.
处理器 72执行的确定所述用户设备接入所述目标接入网络时使用的接入 信息的操作, 可以包括:  The operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
选择所述第一接入信息和所述第二接入信息中优先级高者为所述用户设 备接入所述目标接入网络时使用的接入信息。  Selecting the highest priority among the first access information and the second access information is access information used when the user equipment accesses the target access network.
可选的, 处理器 72还可以接收到第二接入信息的应用场景信息, 处理器 72执行的选择所述第一接入信息和所述第二接入信息中优先级高者为所述用 户设备接入所述目标接入网络时使用的接入信息的操作, 可以包括:  Optionally, the processor 72 may further receive the application scenario information of the second access information, where the highest priority among the first access information and the second access information performed by the processor 72 is the The operation of the access information used by the user equipment to access the target access network may include:
选择所述第一接入信息的第一信息和所述第二接入信息的第一信息中优 先级别高者作为所述用户设备接入所述目标接入网络时使用的接入信息; 其中, 所述第一信息是第一接入信息和第二接入信息中都存在的,且应用 场景相同的信息。 该应用场景可以是指适用于漫游用户, 即上述第一子接入信 息和第二子接入信息只适用于漫游用户;或者应用场景可以是指适用于非漫游 用户, 即上述第一子接入信息和第二子接入信息只适用于非漫游用户。  Selecting, among the first information of the first access information and the first information of the second access information, the access priority information used by the user equipment to access the target access network; The first information is information that exists in both the first access information and the second access information, and the application scenario is the same. The application scenario may be applicable to the roaming user, that is, the first sub-access information and the second sub-access information are only applicable to the roaming user; or the application scenario may be applicable to the non-roaming user, that is, the first sub-connection The incoming information and the second sub-access information are only applicable to non-roaming users.
处理器 72执行的确定所述用户设备接入所述目标接入网络时使用的接入 信息的操作, 可以包括:  The operation performed by the processor 72 to determine the access information used by the user equipment to access the target access network may include:
第一策略实体判断所述第二接入信息中的第二信息与所述第二接入信息 中的第二信息的优先级别, 并将优先级别高的第二信息加入所述第二接信息 中。 上述第二信息是指在第二接入信息与第一接入信息中都存在的信息, 例 如, 发现信息和 /或策略参数。 Determining, by the first policy entity, a priority level of the second information in the second access information and the second information in the second access information, and adding the second information with a high priority to the second information in. The foregoing second information refers to information that exists in both the second access information and the first access information, for example, discovery information and/or policy parameters.
可选的,第一策略实体还可以接收到第二策略实体发送的目标接入网络的 网络标识, 处理器 72还可以是将该网络标识与第一策略实体存储的接入信息 中网络标识进行匹配, 将匹配成功的接入信息作为第二接入信息。 处理器 72 再判断所述第二接入信息中的第二信息与所述第二接入信息中的第二信息的 优先级别, 并将优先级别高的第二信息加入所述第二接信息中。  Optionally, the first policy entity may further receive the network identifier of the target access network sent by the second policy entity, and the processor 72 may further perform the network identifier in the access information stored by the first policy entity. Matching, the matching access information is used as the second access information. The processor 72 further determines a priority level of the second information in the second access information and the second information in the second access information, and adds the second information with a higher priority to the second information. in.
作为一种可选的实施方式,所述第一接入信息可以包括所述目标接入网络 的第一发现信息,所述第二接入信息可以包括所述目标接入网络的第二发现信 息; 处理器 72就可以是确定根据所述第二发现信息和所述第一发现信息, 确 定所述用户设备接入所述目标接入网络时使用的发现信息。 或者,  As an optional implementation manner, the first access information may include first discovery information of the target access network, and the second access information may include second discovery information of the target access network. The processor 72 may be configured to determine, according to the second discovery information and the first discovery information, discovery information used when the user equipment accesses the target access network. Or,
所述第一接入信息可以包括所述目标接入网络的第一异系统切换策略,所 述第二接入信息可以包括所述目标接入网络的第二异系统切换策略; 处理器 72 就可以是确定根据所述第二异系统切换策略和所述第一异系统切换策略, 确定所述用户设备接入所述目标接入网络时使用的异系统切换策略。 或者, 所述第一接入信息可以包括所述目标接入网络的第一异系统路由策略,所 述第二接入信息可以包括所述目标接入网络的异系统路由策略。 处理器 72就 可以是确定根据所述第二异系统路由策略和所述第一异系统路由策略,确定所 述用户设备接入所述目标接入网络时使用的异系统路由策略。  The first access information may include a first different system switching policy of the target access network, and the second access information may include a second different system switching policy of the target access network; And determining, according to the second different system switching policy and the first different system switching policy, a different system switching policy used when the user equipment accesses the target access network. Or the first access information may include a first different system routing policy of the target access network, where the second access information may include a different system routing policy of the target access network. The processor 72 may be configured to determine, according to the second different system routing policy and the first different system routing policy, a different system routing policy used when the user equipment accesses the target access network.
作为一种可选的实施, 所述第一接入信息、 所述第二接入信息、 和所述用 户设备接入所述目标接入网络时使用的接入信息分别包括所述目标接入网络 的发现信息; 或者,  As an optional implementation, the first access information, the second access information, and access information used when the user equipment accesses the target access network respectively include the target access Discovery information of the network; or,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者,  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system switching policy of the target access network; or ,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。  The first access information, the second access information, and the access information used by the user equipment to access the target access network respectively include a different system routing policy of the target access network.
可选的, 上述接入信息可以包括如下至少一项:  Optionally, the foregoing access information may include at least one of the following:
发现信息、 异系统切换策略和异系统路由策略; 其中, 所述发现信息可以包含如下至少一项: Discovery information, different system switching policies, and different system routing strategies; The discovery information may include at least one of the following:
类型信息、 IP地址类型信息、 支持的鉴权认证信息以及应用类型信息; 所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项:  The type information, the IP address type information, the supported authentication authentication information, and the application type information; the parameter of the different system switching policy or the different system routing policy includes at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。  Maximum load value, lowest signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value, and information indicating whether the maximum load value must be met, minimum a signal strength value and information indicating whether the minimum signal strength value must be met, a bandwidth value that can be used for the lowest uplink, and information indicating whether the minimum uplink usable bandwidth value must be met, whether the minimum downlink usable bandwidth value and indication are necessary. Information that satisfies the bandwidth value that can be used by the lowest downlink, the type of access network that is allowed to access, and information indicating whether the type of access network that is allowed to access must be satisfied.
作为一种可选的实施方式, 处理器 72在执行确定所述用户设备接入所述 目标接入网络时使用的接入信息的操作之后, 还可以用于执行如下操作:  As an optional implementation, after performing the operation of determining the access information used by the user equipment to access the target access network, the processor 72 may further be configured to perform the following operations:
通过发射器 74将上述确定的接入信息发送至所述用户设备。  The above determined access information is transmitted to the user equipment by the transmitter 74.
上述技术方案中,在上面实施例的基础上实现了根据用户设备上报的位置 信息选择目标接入网络, 且还实现了多种接入信息处理方法,且都可以实现提 高接入信息的可用性。 图 14是本发明实施例提供的另一种策略实体的结构示意图,如图 14所示, 包括: 接收器 81、 处理器 82和存储器 83 , 存储器 83用于存储一组程序代码, 且处理器 82用于调用存储器 83存储的程序代码用于执行如下操作:  In the foregoing technical solution, the target access network is selected according to the location information reported by the user equipment, and various access information processing methods are also implemented, and the availability of the access information can be improved. FIG. 14 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 14, the method includes: a receiver 81, a processor 82, and a memory 83. The memory 83 is configured to store a set of program codes, and the processor 82 is used to call the program code stored in the memory 83 for performing the following operations:
通过接收器 81接收所述第二策略实体推送的所述第二接入信息。  The second access information pushed by the second policy entity is received by the receiver 81.
根据所述第二接入信息和所述第一策略实体存储的所述目标接入网络的 第一接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息; 通过接收器 81接收用户设备推送的接入信息请求消息;  Determining access information used by the user equipment to access the target access network according to the second access information and the first access information of the target access network that is stored by the first policy entity; Receiving, by the receiver 81, an access information request message pushed by the user equipment;
基于所述接入信息请求消息,从所述目标接入网络中选择出至少一个接入 网络作为所述用户设备最终接入网络,并将确定后的用户设备接入所述最终接 入网络时使用的接入信息发送至所述用户设备。  Determining, according to the access information request message, at least one access network from the target access network as a final access network of the user equipment, and accessing the determined user equipment to the final access network The used access information is sent to the user equipment.
可选的, 上述的接入信息请求消息包括如下至少一项: 用户设备标识、 用户位置信息、 用户设备能力信息、 用户设备接入信息和 请求策略类型信息; 其中, 所述用户设备接入信息用于指示用户设备是否支持 并发接入。 Optionally, the foregoing access information request message includes at least one of the following: User equipment identification, user location information, user equipment capability information, user equipment access information, and request policy type information; wherein the user equipment access information is used to indicate whether the user equipment supports concurrent access.
处理器 82就可以从上述目标接入网络中选择满足上述接入信息请求消息 的至少一个接入网络作为所述用户设备的最终接入网络,并将确定后的用户设 备接入所述最终接入网络时使用的接入信息发送至所述用户设备。例如: 上述 策略请求消息包括用户位置信息,就可以从述目标接入网络中选择与该位置信 息所示的小区相邻的至少一个接入网络作为所述用户设备的最终接入网络。  The processor 82 may select at least one access network that meets the foregoing access information request message from the target access network as the final access network of the user equipment, and access the determined user equipment to the final access The access information used when entering the network is sent to the user equipment. For example, the foregoing policy request message includes user location information, and at least one access network adjacent to the cell indicated by the location information may be selected from the target access network as the final access network of the user equipment.
上述技术方案中, 在上面实施例的基础上实施了, 策略实体接收第二策略 实体主动发送的目标接入网络的第二接入信息, 基于所述接入信息请求消息, 从所述目标接入网络中选择出至少一个接入网络作为所述用户设备最终接入 网络,并将确定后的用户设备接入所述最终接入网络时使用的接入信息发送至 所述用户设备。 同时, 可以实现提高接入信息的可用性。 图 15是本发明实施例提供的另一种策略实体的结构示意图,如图 15所示, 包括: 发射器 91、 处理器 92和存储器 93 , 存储器 93用于存储一组程序代码, 且处理器 92用于调用存储器 93存储的程序代码用于执行如下操作:  The foregoing technical solution is implemented on the basis of the foregoing embodiment, the policy entity receives the second access information of the target access network that is actively sent by the second policy entity, and receives the message from the target based on the access information request message. At least one access network is selected in the network as the user equipment finally accesses the network, and the access information used when the determined user equipment accesses the final access network is sent to the user equipment. At the same time, the availability of access information can be improved. FIG. 15 is a schematic structural diagram of another policy entity according to an embodiment of the present invention. As shown in FIG. 15, the method includes: a transmitter 91, a processor 92, and a memory 93. The memory 93 is configured to store a set of program codes, and the processor is configured. 92 is used to call the program code stored in the memory 93 for performing the following operations:
通过发射器 91向第一策略实体发送第二策略实体存储的用户设备的目标 接入网络的第二接入信息,以使第一策略实体根据所述第二接入信息和所述第 一策略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备接入 所述目标接入网络时使用的接入信息。  Transmitting, by the transmitter 91, the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and the first policy The first access information of the target access network that is stored by the entity determines access information used when the user equipment accesses the target access network.
作为一种可选的实施方式, 上述策略实体还可以包括接收器 94, 处理器 92在执行通过发射器 91向第一策略实体发送第二策略实体存储的用户设备的 目标接入网络的第二接入信息的操作之前, 还用于执行如下操作:  As an optional implementation manner, the foregoing policy entity may further include a receiver 94, where the processor 92 performs a second target transmission network of the user equipment that is sent by the second policy entity to the first policy entity by using the transmitter 91. Before the operation of accessing information, it is also used to perform the following operations:
通过接收器 94接收第一策略实体发送的用户设备的位置信息;  Receiving, by the receiver 94, location information of the user equipment sent by the first policy entity;
根据所述位置信息, 选择所述目标接入网络。  Selecting the target access network according to the location information.
可选的, 上述策略实体接收第一策略实体发送的查询列表, 所述第二策略 实体根据所述查询列表从所述目标接入网络的接入信息中选择所述第二接入 信息; 可选的, 上述策略实体接收第一策略实体发送的订阅更新指示, 所述第二 策略实体根据所述订阅更新指示从所述目标接入网络的接入信息中选择所述 第二接入信息。 Optionally, the policy entity receives the query list sent by the first policy entity, and the second policy entity selects the second access information from the access information of the target access network according to the query list. Optionally, the foregoing policy entity receives a subscription update indication sent by the first policy entity, where the second policy entity selects the second access information from the access information of the target access network according to the subscription update indication. .
作为一种可选的实施方式,上述第一策略实体可以是用于管理策略的服务 器, 例如: ANDSF服务器或者, WFA服务器; 上述策略实体也可以是用于管 理策略的服务器, 例如: ANDSF服务器或者, WFA服务器。 其中, 上述第一 策略实体和上述策略实体可以是两个不同的 ANDSF服务器, 也可以是两个不 同的 WFA服务器, 还可以第一策略实体为 ANDSF服务器, 上述策略实体为 WFA服务器, 还可以第一策略实体为 WFA服务器, 第二策略实体为 ANDSF 服务器。  As an optional implementation manner, the foregoing first policy entity may be a server for managing a policy, for example: an ANDSF server or a WFA server; the foregoing policy entity may also be a server for managing a policy, for example: an ANDSF server or , WFA server. The first policy entity and the foregoing policy entity may be two different ANDSF servers, or may be two different WFA servers, or the first policy entity may be an ANDSF server, and the foregoing policy entity is a WFA server, and may also be One policy entity is a WFA server and the second policy entity is an ANDSF server.
上述技术方案中,策略实体向第一策略实体发送第二策略实体存储的用户 设备的目标接入网络的第二接入信息,以使第一策略实体根据所述第二接入信 息和所述第一策略实体存储的所述目标接入网络的第一接入信息,确定所述用 户设备接入所述目标接入网络时使用的接入信息。这样处理后的接入信息就不 会出现重复和冲突的接入信息, 从而可以提高接入信息的可用性。 图 16是本发明实施例提供的另一种接入信息处理系统的结构示意图, 如 图 16所示, 包括第一策略实体 101和第二策略实体 102, 其中:  In the foregoing technical solution, the policy entity sends the second access information of the target access network of the user equipment that is stored by the second policy entity to the first policy entity, so that the first policy entity is configured according to the second access information and the The first access information of the target access network stored by the first policy entity determines access information used by the user equipment when accessing the target access network. The access information thus processed does not have duplicate and conflicting access information, thereby improving the availability of access information. FIG. 16 is a schematic structural diagram of another access information processing system according to an embodiment of the present invention. As shown in FIG. 16, the first policy entity 101 and the second policy entity 102 are included, where:
第一策略实体 101可以是图 12-图 14所示的实施例中任一实施方式中策略 实体。  The first policy entity 101 can be a policy entity in any of the embodiments shown in Figures 12-14.
第二策略实体 102可以是图 15所示的实施例中任一实施方式中策略实体。 例如: 第一策略实体可以包括: 接收器、 处理器和存储器, 存储器用于存 储一组程序代码, 且处理器用于调用存储器存储的程序代码用于执行如下操 作:  The second policy entity 102 can be a policy entity in any of the embodiments shown in FIG. For example: The first policy entity may include: a receiver, a processor, and a memory, the memory is used to store a set of program code, and the processor is configured to call the memory stored program code to perform the following operations:
通过接收器获取第二策略实体存储的用户设备的目标接入网络的第二接 入信息;  Acquiring, by the receiver, second access information of the target access network of the user equipment stored by the second policy entity;
根据所述第二接入信息和所述第一策略实体存储的所述目标接入网络的 第一接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息。  Determining access information used by the user equipment to access the target access network according to the second access information and the first access information of the target access network that is stored by the first policy entity.
例如: 第二策略实体可以包括: 发射器、 处理器和存储器, 存储器用于存 储一组程序代码, 且处理器用于调用存储器存储的程序代码用于执行如下操 作: For example: The second policy entity may include: a transmitter, a processor, and a memory, and the memory is stored A set of program code is stored, and the program code used by the processor to call the memory store is used to perform the following operations:
通过发射器向第一策略实体发送第二策略实体存储的用户设备的目标接 入网络的第二接入信息。  The second access information of the target access network of the user equipment stored by the second policy entity is sent by the transmitter to the first policy entity.
上述技术方案中,第一策略实体获取第二策略实体存储的用户设备的目标 接入网络的第二接入信息;第一策略实体根据所述第二接入信息和所述第一策 略实体存储的所述目标接入网络的第一接入信息,确定所述用户设备接入所述 目标接入网络时使用的接入信息。这样处理后的策略就不会出现重复和冲突的 策略, 从而可以提高接入信息的可用性。  In the foregoing technical solution, the first policy entity acquires second access information of the target access network of the user equipment that is stored by the second policy entity, and the first policy entity stores the second access information according to the second access information and the first policy entity. The first access information of the target access network is used to determine access information used when the user equipment accesses the target access network. The policy thus processed will not have duplicate and conflicting policies, thereby improving the availability of access information.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程 , 是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算 机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。 其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory, ROM )或随机存取存储器( Random Access Memory, 简称 RAM )等。  A person skilled in the art can understand that all or part of the process of implementing the above embodiment method can be completed by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium, the program When executed, the flow of an embodiment of the methods as described above may be included. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之 权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。  The above is only the preferred embodiment of the present invention, and the scope of the present invention is not limited thereto, and the equivalent changes made by the claims of the present invention are still within the scope of the present invention.

Claims

权 利 要 求 Rights request
1、 一种接入信息处理方法, 其特征在于, 包括: 1. An access information processing method, characterized by including:
第一策略实体获取第二策略实体存储的用户设备的目标接入网络的第二 接入信息; The first policy entity obtains the second access information of the target access network of the user equipment stored by the second policy entity;
所述第一策略实体根据所述第二接入信息和所述第一策略实体存储的所 述目标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时 使用的接入信息。 The first policy entity determines when the user equipment accesses the target access network based on the second access information and the first access information of the target access network stored by the first policy entity. Access information used.
2、 根据权利要求 1所述的方法, 其特征在于, 所述确定所述用户设备接 入所述目标接入网络时使用的接入信息, 包括: 2. The method according to claim 1, wherein the determining the access information used when the user equipment accesses the target access network includes:
所述第一策略实体合并所述第一接入信息和所述第二接入信息得到所述 用户设备接入所述目标接入网络时使用的接入信息, 或者, The first policy entity combines the first access information and the second access information to obtain the access information used when the user equipment accesses the target access network, or,
所述第一策略实体选择所述第一接入信息和所述第二接入信息中优先级 高者为所述用户设备接入所述目标接入网络时使用的接入信息。 The first policy entity selects the one with a higher priority among the first access information and the second access information as the access information used by the user equipment when accessing the target access network.
3、 根据权利要求 1或 2所述的方法, 其特征在于: 3. The method according to claim 1 or 2, characterized in that:
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的发现信息; 或者, 所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者, The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include discovery information of the target access network; or, The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include an inter-system handover policy of the target access network; or,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。 The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include the inter-system routing policy of the target access network.
4、 如权利要求 3所述的方法, 其特征在于: 4. The method of claim 3, characterized in that:
其中, 所述发现信息包含如下项中的至少一项: Wherein, the discovery information includes at least one of the following items:
类型信息, 分配的 IP地址类型信息, 支持的鉴权认证信息, 以及应用类 型信息; Type information, assigned IP address type information, supported authentication and authentication information, and application type information;
所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项: The parameters of the inter-system switching strategy or the inter-system routing strategy include at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。 Maximum load value, minimum signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value and whether the indication must be met The information of the maximum load value, the minimum signal strength value and the information indicating whether the minimum signal strength value must be met, the minimum uplink usable bandwidth value and the information indicating whether the minimum uplink usable bandwidth value must be met, the minimum downlink can The bandwidth value used and information indicating whether the minimum downlink usable bandwidth value must be met, the access network type that is allowed to access and the information indicating whether the access network type that is allowed to access must be met.
5、 根据权利要求 1-4任一所述的方法, 其特征在于, 所述方法进一步包 括: 5. The method according to any one of claims 1 to 4, characterized in that the method further includes:
所述第一策略实体接收所述用户设备上报的位置信息,所述位置信息用于 为所述用户设备选择所述目标接入网络。 The first policy entity receives the location information reported by the user equipment, and the location information is used to select the target access network for the user equipment.
6、 根据权利要求 5所述的方法, 其特征在于, 所述第一策略实体获取第 二策略实体存储的用户设备的目标接入网络的第二接入信息, 包括: 6. The method according to claim 5, wherein the first policy entity obtains the second access information of the target access network of the user equipment stored by the second policy entity, including:
根据所述位置信息, 所述第一策略实体选择所述目标接入网络, 所述第一策略实体向所述第二策略实体发送所述目标接入网络的标识信 息; According to the location information, the first policy entity selects the target access network, and the first policy entity sends identification information of the target access network to the second policy entity;
所述第一策略实体接收所述第二策略实体发送的所述第二接入信息。 The first policy entity receives the second access information sent by the second policy entity.
7、 根据权利要求 5所述的方法, 其特征在于, 所述第一策略实体获取第 二策略实体存储的用户设备的目标接入网络的第二接入信息, 包括: 7. The method according to claim 5, wherein the first policy entity obtains the second access information of the target access network of the user equipment stored by the second policy entity, including:
所述第一策略实体向所述第二策略实体发送所述位置信息,所述位置信息 用于所述第二策略实体为所述用户设备选择所述目标接入网络; The first policy entity sends the location information to the second policy entity, and the location information is used by the second policy entity to select the target access network for the user equipment;
所述第一策略实体接收所述第二策略实体发送的所述第二接入信息。 The first policy entity receives the second access information sent by the second policy entity.
8、 根据权利要求 7所述的方法, 其特征在于, 所述第一策略实体向所述 第二策略实体还发送查询列表,以便所述第二策略实体根据所述查询列表从所 述目标接入网络的接入信息中选择所述第二接入信息; 或者, 所述第一策略实 体向所述第二策略实体还发送订阅更新指示,以便所述第二策略实体根据所述 订阅更新指示从所述目标接入网络的接入信息中选择所述第二接入信息。 8. The method according to claim 7, characterized in that, the first policy entity also sends a query list to the second policy entity, so that the second policy entity receives data from the target according to the query list. Select the second access information from the access information entering the network; or, the first policy entity also sends a subscription update indication to the second policy entity, so that the second policy entity can use the subscription update indication according to the subscription update indication. The second access information is selected from the access information of the target access network.
9、 根据权利要求 1-4任一所述的方法, 其特征在于, 进一步包括: 所述第二策略实体接收所述用户设备上报的位置信息,所述位置信息用于 为所述用户设备选择所述目标接入网络; 9. The method according to any one of claims 1 to 4, further comprising: the second policy entity receiving location information reported by the user equipment, and the location information is used to select the location information for the user equipment. The target accesses the network;
所述第一策略实体向所述第二策略实体发送所述用户设备接入所述目标 接入网络时使用的接入信息。 The first policy entity sends the user equipment access to the target to the second policy entity Access information used when connecting to the network.
10、 根据权利要求 1-4任一所述的方法, 其特征在于, 所述第一策略实体 获取第二策略实体存储的用户设备的目标接入网络的第二接入信息, 包括: 所述第一策略实体接收所述第二策略实体推送的所述第二接入信息。 10. The method according to any one of claims 1 to 4, characterized in that, the first policy entity obtains the second access information of the target access network of the user equipment stored by the second policy entity, including: The first policy entity receives the second access information pushed by the second policy entity.
11、 根据权利要求 1-10 中任一项的方法, 其特征在于, 所述第一策略实 体包括: 11. The method according to any one of claims 1-10, characterized in that the first policy entity includes:
接入网发现与选择功能 ANDSF服务器或者 WiFi联盟 WFA服务器; 所述第二策略实体包括: Access network discovery and selection function ANDSF server or WiFi Alliance WFA server; the second policy entity includes:
ANDSF服务器或者 WFA服务器。 ANDSF server or WFA server.
12、 一种策略实体, 其特征在于, 包括: 获取单元和确定单元, 其中: 所述获取单元,用于获取第二策略实体存储的用户设备的目标接入网络的 第二接入信息; 12. A policy entity, characterized in that it includes: an obtaining unit and a determining unit, wherein: the obtaining unit is used to obtain the second access information of the target access network of the user equipment stored in the second policy entity;
所述确定单元,用于根据所述第二接入信息和所述策略实体存储的所述目 标接入网络的第一接入信息,确定所述用户设备接入所述目标接入网络时使用 的接入信息。 The determining unit is configured to determine, according to the second access information and the first access information of the target access network stored by the policy entity, when the user equipment accesses the target access network. access information.
13、 如权利要求 12所述的策略实体, 其特征在于, 所述确定单元还用于 合并所述第一接入信息和所述第二接入信息得到所述用户设备接入所述目标 接入网络时使用的接入信息, 或者, 13. The policy entity according to claim 12, wherein the determining unit is further configured to combine the first access information and the second access information to obtain the user equipment access to the target interface. the access information used to log into the network, or,
所述确定单元还用于选择所述第一接入信息和所述第二接入信息中优先 级高者为所述用户设备接入所述目标接入网络时使用的接入信息。 The determining unit is further configured to select the one with a higher priority among the first access information and the second access information as the access information used when the user equipment accesses the target access network.
14、 根据权利要求 12或 13所述的策略实体, 其特征在于, 14. The policy entity according to claim 12 or 13, characterized in that,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的发现信息; 或者, 所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者, The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include discovery information of the target access network; or, The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include an inter-system handover policy of the target access network; or,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。 The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include the inter-system routing policy of the target access network.
15、 根据权利要求 14所述的策略实体, 其特征在于, 其中, 所述发现信息包含如下项中的至少一项: 15. The policy entity according to claim 14, characterized in that, Wherein, the discovery information includes at least one of the following items:
类型信息, 分配的 IP地址类型信息, 支持的鉴权认证信息, 以及应用类 型信息; Type information, assigned IP address type information, supported authentication and authentication information, and application type information;
所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项: The parameters of the inter-system switching strategy or the inter-system routing strategy include at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。 Maximum load value, minimum signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value and information indicating whether the maximum load value must be met, minimum The signal strength value and the information indicating whether the minimum signal strength value must be met, the minimum uplink usable bandwidth value and the information indicating whether the minimum uplink usable bandwidth value must be met, the minimum downlink usable bandwidth value and the information indicating whether it is necessary Information that satisfies the minimum downlink usable bandwidth value, the access network type that is allowed to access, and information indicating whether the access network type that is allowed to access must be met.
16、 根据权利要求 12-15中任一项所述的策略实体, 其特征在于, 所述策 略实体还包括: 16. The policy entity according to any one of claims 12-15, characterized in that the policy entity further includes:
接收单元, 用于接收所述用户设备上报的位置信息, 所述位置信息用于为 所述用户设备选择所述目标接入网络。 A receiving unit, configured to receive location information reported by the user equipment, where the location information is used to select the target access network for the user equipment.
17、 如权利要求 16所述的策略实体, 其特征在于, 所述获取单元包括: 选择单元, 用于根据所述位置信息, 选择所述目标接入网络, 17. The policy entity according to claim 16, wherein the obtaining unit includes: a selecting unit, configured to select the target access network according to the location information,
第一发送单元,用于向所述第二策略实体发送所述目标接入网络的标识信 息, a first sending unit configured to send identification information of the target access network to the second policy entity,
第一接收子单元, 用于接收所述第二策略实体发送的所述第二接入信息。 The first receiving subunit is configured to receive the second access information sent by the second policy entity.
18、 如权利要求 16所述的策略实体, 其特征在于, 所述获取单元包括: 第二发送单元, 用于向所述第二策略实体发送所述位置信息, 所述位置信 息用于所述第二策略实体为所述用户设备选择所述目标接入网络; 18. The policy entity according to claim 16, wherein the obtaining unit includes: a second sending unit, configured to send the location information to the second policy entity, and the location information is used for the The second policy entity selects the target access network for the user equipment;
第二接收子单元, 用于接收所述第二策略实体发送的所述第二接入信息。 The second receiving subunit is configured to receive the second access information sent by the second policy entity.
19、 根据权利要求 18所述的策略实体, 其特征在于, 所述第二发送单元 还用于向所述第二策略实体发送查询列表,以便所述第二策略实体根据所述查 询列表从所述目标接入网络的接入信息中选择所述第二接入信息; 或者, 所述 第二发送单元还用于向所述第二策略实体发送订阅更新指示,以便所述第二策 略实体根据所述订阅更新指示从所述目标接入网络的接入信息中选择所述第 二接入信息。 19. The policy entity according to claim 18, characterized in that, the second sending unit is further configured to send a query list to the second policy entity, so that the second policy entity obtains the information from the query list according to the query list. select the second access information from the access information of the target access network; or, the second sending unit is further configured to send a subscription update indication to the second policy entity, so that the second policy entity The omission entity selects the second access information from the access information of the target access network according to the subscription update indication.
20、 根据权利要求 12-15中任一项所述的策略实体, 其特征在于, 所述获 取单元还用于接收所述第二策略实体推送的所述第二接入信息。 20. The policy entity according to any one of claims 12-15, wherein the obtaining unit is further configured to receive the second access information pushed by the second policy entity.
21、 如权利要求 12-20中任一项所述的策略实体, 其特征在于, 所述策略 实体包括: 21. The policy entity according to any one of claims 12 to 20, characterized in that the policy entity includes:
ANDSF服务器或者 WFA服务器; ANDSF server or WFA server;
所述第二策略实体包括: The second policy entity includes:
ANDSF服务器或者 WFA服务器。 ANDSF server or WFA server.
22、 一种策略实体, 其特征在于, 包括: 接收器、 处理器和存储器, 所述 存储器用于存储一组程序代码,且所述处理器用于调用所述存储器存储的程序 代码用于执行如下操作: 22. A policy entity, characterized in that it includes: a receiver, a processor and a memory, the memory is used to store a set of program codes, and the processor is used to call the program code stored in the memory to execute the following operate:
通过所述接收器接收获取第二策略实体存储的用户设备的目标接入网络 的第二接入信息; Receive and obtain, through the receiver, the second access information of the target access network of the user equipment stored by the second policy entity;
根据所述第二接入信息和所述策略实体存储的所述目标接入网络的第一 接入信息, 确定所述用户设备接入所述目标接入网络时使用的接入信息。 Determine the access information used when the user equipment accesses the target access network according to the second access information and the first access information of the target access network stored by the policy entity.
23、 如权利要求 22所述的策略实体, 其特征在于, 所述处理器执行的确 定所述用户设备接入所述目标接入网络时使用的接入信息的操作包括: 23. The policy entity according to claim 22, wherein the operation performed by the processor to determine the access information used when the user equipment accesses the target access network includes:
合并所述第一接入信息和所述第二接入信息得到所述用户设备接入所述 目标接入网络时使用的接入信息, 或者, Combining the first access information and the second access information to obtain the access information used by the user equipment when accessing the target access network, or,
所述第一策略实体选择所述第一接入信息和所述第二接入信息中优先级 高者为所述用户设备接入所述目标接入网络时使用的接入信息。 The first policy entity selects the one with a higher priority among the first access information and the second access information as the access information used by the user equipment when accessing the target access network.
24、 根据权利要求 22或 23所述的策略实体, 其特征在于, 24. The policy entity according to claim 22 or 23, characterized in that,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的发现信息; 或者, 所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统切换策略; 或 者, The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include discovery information of the target access network; or, The first access information, the second access information, and the access information used when the user equipment accesses the target access network respectively include an inter-system handover policy of the target access network; or,
所述第一接入信息、所述第二接入信息、和所述用户设备接入所述目标接 入网络时使用的接入信息分别包括所述目标接入网络的异系统路由策略。 The first access information, the second access information, and the user equipment access to the target interface The access information used when entering the network respectively includes the inter-system routing policy of the target access network.
25、 根据权利要求 24所述的策略实体, 其特征在于, 25. The policy entity according to claim 24, characterized in that,
其中, 所述发现信息包含如下项中的至少一项: Wherein, the discovery information includes at least one of the following items:
类型信息, 分配的 IP地址类型信息, 支持的鉴权认证信息, 以及应用类 型信息; Type information, assigned IP address type information, supported authentication and authentication information, and application type information;
所述异系统切换策略或所述异系统路由策略的参数包括如下项中的至少 一项: The parameters of the inter-system switching strategy or the inter-system routing strategy include at least one of the following items:
最大负荷值, 最低信号强度值, 最低上行能够使用的带宽值, 最低下行能 够使用的带宽值, 允许接入的接入网络类型, 最大负荷值和指示是否必须满足 该最大负荷值的信息,最低信号强度值和指示是否必须满足该最低信号强度值 的信息,最低上行能够使用的带宽值和指示是否必须满足该最低上行能够使用 的带宽值的信息,最低下行能够使用的带宽值和指示是否必须满足该最低下行 能够使用的带宽值的信息,允许接入的接入网络类型和指示是否必须满足该允 许接入的接入网络类型的信息。 Maximum load value, minimum signal strength value, minimum uplink usable bandwidth value, minimum downlink usable bandwidth value, allowed access network type, maximum load value and information indicating whether the maximum load value must be met, minimum The signal strength value and the information indicating whether the minimum signal strength value must be met, the minimum uplink usable bandwidth value and the information indicating whether the minimum uplink usable bandwidth value must be met, the minimum downlink usable bandwidth value and the information indicating whether it is necessary Information that satisfies the minimum downlink usable bandwidth value, the access network type that is allowed to access, and information indicating whether the access network type that is allowed to access must be met.
26、 根据权利要求 22-25中任一项所述的策略实体, 其特征在于, 所述处 理器进一步还用于执行如下操作: 26. The policy entity according to any one of claims 22-25, characterized in that the processor is further configured to perform the following operations:
通过所述接收器接收所述用户设备上报的位置信息,所述位置信息用于为 所述用户设备选择所述目标接入网络。 The location information reported by the user equipment is received through the receiver, and the location information is used to select the target access network for the user equipment.
27、 根据权利要求 26所述的策略实体, 其特征在于, 所述策略实体还包 括发射器,所述处理器执行的通过所述接收器获取第二策略实体存储的用户设 备的目标接入网络的第二接入信息的操作, 包括: 27. The policy entity according to claim 26, characterized in that, the policy entity further includes a transmitter, and the processor executes, through the receiver, obtaining the target access network of the user equipment stored in the second policy entity. The operations of the second access information include:
根据所述位置信息, 选择所述目标接入网络, Select the target access network according to the location information,
通过所述发射器向所述第二策略实体发送所述目标接入网络的标识信息, 通过所述接收器接收所述第二策略实体发送的所述第二接入信息。 The transmitter sends the identification information of the target access network to the second policy entity, and the receiver receives the second access information sent by the second policy entity.
28、 根据权利要求 26所述的策略实体, 其特征在于, 所述策略实体还包 括发射器,所述处理器执行的通过所述接收器获取第二策略实体存储的用户设 备的目标接入网络的第二接入信息的操作, 包括: 28. The policy entity according to claim 26, characterized in that, the policy entity further includes a transmitter, and the processor executes, through the receiver, obtaining the target access network of the user equipment stored in the second policy entity. The operations of the second access information include:
通过所述发射器向所述第二策略实体发送所述位置信息,所述位置信息用 于所述第二策略实体为所述用户设备选择所述目标接入网络; 通过所述接收器接收所述第二策略实体发送的所述第二接入信息。 Send the location information to the second policy entity through the transmitter, where the location information is used by the second policy entity to select the target access network for the user equipment; The second access information sent by the second policy entity is received through the receiver.
29、 根据权利要求 28所述的策略实体, 其特征在于, 所述处理器通过所 述发射器向所述第二策略实体还发送查询列表,以便所述第二策略实体根据所 述查询列表从所述目标接入网络的接入信息中选择所述第二接入信息; 或者, 所述处理器通过所述发射器向所述第二策略实体还发送订阅更新指示,以便所 述第二策略实体根据所述订阅更新指示从所述目标接入网络的接入信息中选 择所述第二接入信息。 29. The policy entity according to claim 28, wherein the processor further sends a query list to the second policy entity through the transmitter, so that the second policy entity obtains information from the query list according to the query list. Select the second access information from the access information of the target access network; or, the processor further sends a subscription update indication to the second policy entity through the transmitter, so that the second policy The entity selects the second access information from the access information of the target access network according to the subscription update indication.
30、 根据权利要求 22-25中任一项所述的策略实体, 其特征在于, 所述处 理器执行的通过所述接收器获取第二策略实体存储的用户设备的目标接入网 络的第二接入信息的操作, 包括: 30. The policy entity according to any one of claims 22 to 25, characterized in that, the processor executes, through the receiver, the second policy entity to obtain the target access network of the user equipment stored in the second policy entity. Operations to access information include:
通过所述接收器接收所述第二策略实体推送的所述第二接入信息。 The second access information pushed by the second policy entity is received through the receiver.
31、 根据权利要求 22-30中任一项的策略实体, 其特征在于, 所述策略实 体包括: 31. The policy entity according to any one of claims 22-30, characterized in that the policy entity includes:
接入网发现与选择功能 ANDSF服务器或者 WiFi联盟 WFA服务器; 所述第二策略实体包括: Access network discovery and selection function ANDSF server or WiFi Alliance WFA server; the second policy entity includes:
ANDSF服务器或者 WFA服务器。 ANDSF server or WFA server.
PCT/CN2013/070814 2013-01-22 2013-01-22 Access information processing method, device and system WO2014113910A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201380000152.5A CN104081829A (en) 2013-01-22 2013-01-22 Access information processing method, device and system
PCT/CN2013/070814 WO2014113910A1 (en) 2013-01-22 2013-01-22 Access information processing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/070814 WO2014113910A1 (en) 2013-01-22 2013-01-22 Access information processing method, device and system

Publications (1)

Publication Number Publication Date
WO2014113910A1 true WO2014113910A1 (en) 2014-07-31

Family

ID=51226796

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/070814 WO2014113910A1 (en) 2013-01-22 2013-01-22 Access information processing method, device and system

Country Status (2)

Country Link
CN (1) CN104081829A (en)
WO (1) WO2014113910A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010037422A1 (en) * 2008-10-03 2010-04-08 Nokia Siemens Networks Oy Optimizing andsf information provisioning for multiple-radio terminals
CN101720109A (en) * 2009-06-26 2010-06-02 中兴通讯股份有限公司 System and method for realizing intercommunication and fusion of policy
CN102638871A (en) * 2012-03-31 2012-08-15 南京邮电大学 Access network selection method for virtual terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010037422A1 (en) * 2008-10-03 2010-04-08 Nokia Siemens Networks Oy Optimizing andsf information provisioning for multiple-radio terminals
CN101720109A (en) * 2009-06-26 2010-06-02 中兴通讯股份有限公司 System and method for realizing intercommunication and fusion of policy
CN102638871A (en) * 2012-03-31 2012-08-15 南京邮电大学 Access network selection method for virtual terminal

Also Published As

Publication number Publication date
CN104081829A (en) 2014-10-01

Similar Documents

Publication Publication Date Title
US11558792B2 (en) Method for handover between access points, and terminal equipment
US9648550B2 (en) Wireless local area network discovery and selection method, device, and system, and terminal
US9516569B2 (en) Handover method, system, and device
US9736745B2 (en) Network interworking
EP3018934B1 (en) Network offloading method and apparatus
US20150146702A1 (en) Method and device for accessing network
EP2946599B1 (en) Enhanced integration between wi-fi and mobile communication networks
CN111404814B (en) Data transmission method and communication device
KR20150026759A (en) Apparatus and method for providing multiple connections in wlan systems
US9961596B2 (en) Determination of a capability of a user equipment
CN113767672A (en) Mobile communication core network apparatus and method for managing wireless communication after inserting an intermediate session management function
WO2017114057A1 (en) Network convergence preprocessing method, apparatus and system
WO2014112940A1 (en) Terminal, network node and methods therein for enabling access to a radio communications network
US20150289186A1 (en) Entity and a method of operating an entity of a wireless local area network
EP2894889B1 (en) Wireless local area network access method, base station controller and user equipment
US20160157156A1 (en) Communication method in dual connection mode, apparatus and system
WO2016049806A1 (en) Distribution method and apparatus
US11910475B2 (en) Systems and methods for enabling efficient establishment of policy control associations
CN107079381B (en) Wireless Local Area Network (WLAN) node, wireless device and methods therein
CN110149669B (en) Method for controlling terminal to use wireless network and related equipment
WO2015065267A1 (en) Methods and apparatuses for policy based wifi/3gpp integration
WO2016115911A1 (en) Method and apparatus for issuing indication information
WO2014113910A1 (en) Access information processing method, device and system
EP2997766B1 (en) Communicating with a radio network control node in a communication network
WO2016119451A1 (en) Method and device for user equipment to select network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13872527

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13872527

Country of ref document: EP

Kind code of ref document: A1