WO2014186974A1 - 一种业务接入控制方法和装置 - Google Patents

一种业务接入控制方法和装置 Download PDF

Info

Publication number
WO2014186974A1
WO2014186974A1 PCT/CN2013/076194 CN2013076194W WO2014186974A1 WO 2014186974 A1 WO2014186974 A1 WO 2014186974A1 CN 2013076194 W CN2013076194 W CN 2013076194W WO 2014186974 A1 WO2014186974 A1 WO 2014186974A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
service data
access
tft
tft information
Prior art date
Application number
PCT/CN2013/076194
Other languages
English (en)
French (fr)
Inventor
张万强
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201380001926.6A priority Critical patent/CN104322013A/zh
Priority to EP13885338.7A priority patent/EP2993829A4/en
Priority to PCT/CN2013/076194 priority patent/WO2014186974A1/zh
Publication of WO2014186974A1 publication Critical patent/WO2014186974A1/zh
Priority to US14/949,704 priority patent/US20160088547A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the embodiments of the present invention relate to the field of network communication technologies, and in particular, to a service access control method and apparatus.
  • UE User Equipment
  • some applications usually need to be connected to the network to be used. If too many applications are connected to the network at the same time, network congestion will occur, and some applications will not be allowed by the user.
  • the disclosure of the user's personal information does not protect the user's rights and interests. Therefore, a mechanism is needed to enable the network to block access to certain applications.
  • the application of the packet domain becomes very important. For example, providing a disaster information bulletin board service or a disaster voice information service can make people confirm the safety of relatives. At this time, the operator needs to provide priority access to the above important services in the case of network congestion.
  • the existing 3GPP (Third Generation Partnership Project) technology proposes access control mechanisms, such as access level barring (ACB), domain access control (DSAC, Domain Specific). Access Control), Service Specific Access Control (SSAC) and Extended Access Barring (EAB).
  • access control mechanisms such as access level barring (ACB), domain access control (DSAC, Domain Specific). Access Control), Service Specific Access Control (SSAC) and Extended Access Barring (EAB).
  • ACB access level barring
  • DSAC domain access control
  • SSAC Service Specific Access Control
  • EAB Extended Access Barring
  • MOs application origination requests
  • the DSAC mechanism only controls the terminal to initiate CS or PS domain services
  • the SSAC only controls the voice/video service.
  • Type service in other words, all access control mechanisms in the prior art cannot implement access control or restrict access control for a specific service.
  • the present invention provides a service access control method and apparatus,
  • the defect of all services accessing the network on the terminal can be limited by limiting the specific service or allowing the specific service to access the network.
  • a service access control method includes:
  • TFT Traffic Flow Template
  • a service access control method includes:
  • TFT information where the TFT information carries indication information
  • a service access control device includes:
  • a determining unit configured to determine, when the service data access control is started, whether the service data is within an allowed access range of the TFT information acquired by the acquiring unit;
  • an execution unit configured to allow the service data to be accessed when the determining unit determines that the result is yes; and disable the service data access when the determining unit determines that the result is no.
  • a service access control device includes:
  • a determining unit configured to determine, when the service data access control is started, whether the indication information carried by the TFT information obtained by the acquiring unit indicates that the service data corresponding to the TFT information is allowed to be accessed;
  • an execution unit configured to allow the service data to be accessed when the determining unit determines that the result is yes; and disable the service data access when the determining unit determines that the result is no.
  • the present invention provides a service access control method and apparatus, and obtains TFT information, when service data
  • the access control is started, it is determined whether the service data is within the allowed access range of the TFT information or whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the determination result is yes, the service data is allowed to be connected. If the result of the judgment is no, the service data access is prohibited.
  • Embodiment 1 is a flowchart of a method according to Embodiment 1 of the present invention.
  • Embodiment 2 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 2;
  • Embodiment 3 is a flowchart of a method according to Embodiment 3 of the present invention.
  • Embodiment 4 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 4;
  • FIG. 5 is a schematic diagram of an application scenario signaling of a service access control method provided in Embodiment 4.
  • FIG. 6 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 6;
  • Embodiment 7 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 7;
  • Embodiment 8 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 8;
  • Embodiment 9 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 9;
  • Embodiment 10 is an application scenario signaling diagram of a service access control method provided in Embodiment 10.
  • FIG. 11a is a schematic diagram of a device according to Embodiment 11 of the present invention.
  • Figure lib is a schematic diagram of another apparatus provided in Embodiment 11 of the present invention.
  • Figure 11c is a schematic diagram of another apparatus according to Embodiment 11 of the present invention.
  • FIG. 15 is a schematic diagram of another apparatus provided in Embodiment 11 of the present invention.
  • FIG. 12a is a schematic diagram of an apparatus according to Embodiment 12 of the present invention.
  • FIG. 12b is a schematic diagram of another apparatus according to Embodiment 12 of the present invention.
  • FIG. 12c is a schematic diagram of another apparatus according to Embodiment 12 of the present invention.
  • FIG. 12d is a schematic diagram of another apparatus according to Embodiment 12 of the present invention.
  • FIG. 13 is a schematic diagram of a device according to Embodiment 13 of the present invention.
  • FIG. 14 is a schematic diagram of a device according to Embodiment 14 of the present invention.
  • the embodiments of the present invention provide a service access control method and apparatus, which are used to restrict specific services or allow specific services to access the network, and solve the prior art, and only limit all services on the terminal. Defects in accessing the network.
  • FIG. 1 is a flowchart of a method according to Embodiment 1 of the present invention.
  • the first embodiment of the present invention provides a service access control method, which may include the following steps:
  • the TFT information may include: the access information and/or the forbidden access information, where the allowed access information includes the flow template information corresponding to the allowed access information, and the forbidden access information includes the forbidden access Flow template information corresponding to the information.
  • the flow template information is any combination of a source IP address, a destination IP address, a source port number, a destination port number, an upper layer protocol number, and an application identifier.
  • the step 102 of the first embodiment of the present invention may specifically include:
  • the method may include: sending an attach request message to the network side device.
  • the acquiring the TFT information may include: receiving an attach accept message sent by the network side device, where The TFT information is carried in the attach accept message.
  • the user terminal may send an attach request message to the network side device, and when the network side device feeds back the user terminal attach accept message, the user terminal may obtain the TFT information from the attach accept message.
  • the acquiring the TFT information may include: receiving the TFT information delivered by the policy charging rule function PCRF.
  • the method step of this embodiment can receive the TFT information delivered by the PCRF by the PGW.
  • the acquiring the TFT information may include: acquiring locally configured TFT information.
  • the method step of this embodiment may obtain locally configured TFT information by the PGW.
  • the service access control method provided by the first embodiment of the present invention acquires TFT information.
  • the service data access control When the service data access control is started, when the UE sends service data to the network or the external network sends service data to the UE, it determines the service data to be sent. Whether it is within the allowed access range of the TFT information. If yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the service data that needs to be prohibited from being accessed is prohibited from being controlled, and some service data is allowed to be accessed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Embodiment 2 The service access control method provided in Embodiment 1 of the present invention is described below by taking a specific scenario as an example.
  • Embodiment 2 The service access control method provided in Embodiment 1 of the present invention is described below by taking a specific scenario as an example.
  • FIG. 2 is a signaling diagram of an application scenario of a service access control method according to Embodiment 2. As shown in FIG. 2, the interaction process of the second embodiment is as follows:
  • the UE sends an attach request message to a mobility management entity (MME, Mobility Management Entity).
  • MME Mobility Management Entity
  • the MME sends a create session request message to a serving gateway (SGW, Serving GateWay).
  • SGW Serving GateWay
  • the SGW forwards a session request message to the packet data network gateway (PGW, PDN GateWay).
  • PGW packet data network gateway
  • the UE initiates an attach request to the MME, and the MME selects the PGW and the SGW to initiate a default load to the PGW.
  • the PGW establishes an IP-Connected Network (IP-Connected Access Network) session with the Policy and Charging Rules Function (PCRF), and the PCRF provides TFT information to the PGW.
  • IP-Connected Network IP-Connected Access Network
  • PCRF Policy and Charging Rules Function
  • the TFT information may also be obtained by acquiring locally configured TFT information. This embodiment of the present invention does not limit this.
  • the TFT information may include: allowing access information and/or prohibiting access information.
  • the allowed access information and the forbidden access information respectively include corresponding flow template information, where the flow template information is an protocol (IP, Internet Protocol) address, a destination IP address, a source port number, and a destination port number that are interconnected between the source networks. , any combination of upper layer protocol number and application identifier.
  • IP Internet Protocol
  • the PGW when the PGW receives the TFT information, when the external network sends the service data to the UE, if the service data access control is started, and the PGW receives the service data of the external network, it determines whether the service data is in the TFT information. Within the allowed access range, if the judgment result is yes, the service data is allowed to access; if the judgment result is no, the service data access is prohibited.
  • the specific determining step may be: determining whether the information of the service data is consistent with the flow template information of the allowed access information, and if yes, determining that the service data is within the allowed access range of the TFT information, otherwise, determining The service data is not within the allowed access range of the TFT information.
  • determining whether the information of the service data is consistent with the flow template information of the forbidden access information and if yes, determining that the service data is not within the allowed access range of the TFT information; otherwise, determining the location The service data is within the allowed access range of the TFT information.
  • the PGW sends a create session response message to the SGW.
  • the Create Session Response message carries the TFT information that the PCRF provides to the PGW or the PGW for local configuration.
  • the SGW forwards a create session response message to the MME.
  • the creation session response message carries TFT information.
  • the MME sends an attach accept message to the UE.
  • the PGW acquires the TFT information in the IP-CAN session with the PCRF, or locally configures the TFT information, and sends a session creation response message through the SGW and the MME, and carries the TFT to the UE. That is, the Create Session Response message sent in Step 205 and Step 206 and the Attach Accept message sent in Step 207 both carry TFT information.
  • the attach request message sent by the MME to the UE carries TFT information.
  • the TFT information may include: allowing access information and/or prohibiting access information.
  • the allowed access information and the forbidden access information respectively include corresponding flow template information, where the flow template information is any combination of a source IP address, a destination IP address, a source port number, a destination port number, an upper layer protocol number, and an application identifier.
  • the specific determining step may be: determining whether the information of the service data is consistent with the flow template information of the allowed access information, and if yes, determining that the service data is within the allowed access range of the TFT information, otherwise, determining The service data is not within the allowed access range of the TFT information.
  • determining whether the information of the service data is consistent with the flow template information for the forbidden access information and if yes, determining that the service data is not within the allowed access range of the TFT information, otherwise determining the location The service data is within the allowed access range of the TFT information.
  • the service access control method provided by the second embodiment of the present invention obtains the TFT information.
  • the service data access control When the service data access control is started, when the UE sends the service data to the network or the external network sends the service data to the UE, the service to be sent is determined. Whether the data is within the allowed access range of the TFT information. If the service data access is allowed, if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and some service data is allowed to be accessed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Embodiment 3 Embodiment 3:
  • FIG. 3 is a flowchart of a method according to Embodiment 3 of the present invention.
  • a service access control method may include the following steps:
  • TFT information where the TFT information carries indication information.
  • the acquiring the TFT information includes: receiving the first request sent by the network side device The first request message carries TFT information.
  • the first request message includes: an activation dedicated bearer request message sent by the network side device, a request packet data protocol (PDP, context data protocol) context activation message, and an enhanced enhanced packet system (EPS, Evolved Packet System) bearer request.
  • PDP request packet data protocol
  • EPS enhanced enhanced packet system
  • the user terminal may receive the first request message sent by the network side device, and obtain the TFT information from the first request message.
  • the acquiring the TFT information includes: receiving the second request message, where the second request message carries the TFT information, including: the IP-CAN session modification flow message delivered by the policy charging rule function PCRF.
  • the method of the method in this embodiment may receive the TFT information delivered by the PCRF by the network device such as the PGW or the GGSN.
  • the acquiring the TFT information includes: acquiring locally configured TFT information.
  • the method steps in this embodiment may obtain locally configured TFT information by a network device such as a PGW or a GGSN.
  • the service access control method provided in Embodiment 3 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network sends service data to the UE.
  • determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and the access of some service data is allowed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Embodiments 4 to 8 of the present invention are specific examples of the service access control method provided by the present invention.
  • FIG. 4 is a signaling diagram of an application scenario of a service access control method according to Embodiment 4.
  • the interaction process of the fourth embodiment method is as follows: 401.
  • the PCRF sends an IP-CAN session modification process message to the PGW, where the IP-CAN session modification process message carries TFT information, where the TFT information carries indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the step 401 may also be: Configuring TFT information locally in the PGW, where the TFT information carries the indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the PGW After the PGW receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information sent by the PGW is allowed to be accessed; if the result of the determination is no, the service data access corresponding to the TFT information sent by the PGW is prohibited.
  • the PGW sends a create bearer request message to the SGW.
  • the device that creates the bearer request message carries the TFT information.
  • the SGW forwards the create bearer request message sent by the PGW to the MME.
  • the forwarded request message also carries the TFT information.
  • Steps 402-403 can be summarized as follows:
  • the PGW creates a dedicated bearer to the MME, and each bearer carries a TFT information, and the TFT information carries the indication information.
  • the MME sends an activate dedicated bearer request message to the UE.
  • the activation dedicated bearer request message sent in step 404 carries the TFT information.
  • the UE After the UE receives the Activate Dedicated Bearer Request message sent by the MME, the UE obtains the TFT information from the Activate Dedicated Bearer Request message.
  • the service data access control When the service data access control is started, the UE sends the service data to the network, and determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information that is sent by the UE is allowed to be accessed; if the result of the determination is no, the service data corresponding to the TFT information sent by the UE is prohibited from being accessed.
  • the UE feeds back a dedicated bearer accept message to the MME.
  • the MME sends a create bearer response message to the SGW.
  • the SGW sends a create bearer response message to the PGW.
  • Steps 405-407 can be summarized as follows: UE feedback activates dedicated bearer accept message to MME, MME Create a bearer response to the PGW.
  • the service access control method provided in Embodiment 4 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network sends service data to the UE.
  • determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and the access of some service data is allowed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Embodiment 5 can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Embodiment 5 of the present invention can be applied to a 2G/3G network.
  • FIG. 5 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 5.
  • the interaction process of the fifth embodiment is as follows:
  • the PCRF sends an IP-CAN session modification process message to the PGW, where the IP-CAN session modification process message carries the TFT information, where the TFT information carries the indication information.
  • the indication information is used to indicate whether the service data corresponding to the TFT information is allowed to be accessed.
  • the step 501 may also be: Configuring TFT information locally on the PGW, where the TFT information carries the indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the PGW After the PGW receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information sent by the PGW is allowed to be accessed; if the result of the determination is no, the service data access corresponding to the TFT information sent by the PGW is prohibited.
  • the PGW sends a create bearer request message to the SGW.
  • the device that creates the bearer request message carries the TFT information.
  • the SGW forwards the Create 7-Packet Request message sent by the PGW to a Serving GPRS Support Node (SGSN).
  • SGSN Serving GPRS Support Node
  • the forwarded creation request message also carries the TFT information.
  • Steps 502-503 can be summarized as follows:
  • the PGW creates a dedicated bearer to the SGSN, and each bearer carries a TFT information, and the TFT information carries the indication information.
  • the SGSN sends a request for a secondary PDP context activation message to the UE.
  • the requesting secondary PDP context activation message sent by step 504 carries the TFT information.
  • the UE After receiving the request for the secondary PDP context activation message sent by the SGSN, the UE obtains the TFT information from the requesting the secondary PDP context activation message.
  • the service data access control When the service data access control is started, when the UE sends the service data to the network, it is determined whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information sent by the UE is allowed to be accessed; if the determination result is no, the service data corresponding to the TFT information sent by the UE is prohibited from being accessed.
  • the UE feeds back a secondary PDP context request message to the SGSN.
  • the SGSN sends a create bearer response message to the SGW.
  • the SGSN sends an activate secondary PDP context accept message to the UE.
  • the SGW sends a create bearer response message to the PGW.
  • the service access control method provided in Embodiment 5 of the present invention acquires TFT information, the TFT information carries indication information, service data access control is started, when the UE sends service data to the network, or when the external network sends service data to the UE. And determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and the access of some service data is allowed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 6 Example 6:
  • FIG. 6 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 6. As shown in FIG. 6, the interaction process of the sixth embodiment method is as follows:
  • the PCRF sends an IP-CAN session modification flow message to the PGW, and the IP-CAN session is repaired.
  • the TFT information is carried in the process information, and the TFT information carries the indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the step 601 can also be: Configuring TFT information locally on the PGW, where the TFT information carries the indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the PGW After the PGW receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information sent by the PGW is allowed to be accessed; if the determination result is no, the service data access corresponding to the TFT information sent by the PGW is prohibited.
  • the PGW sends an update bearer request message to the SGW.
  • the update bearer request message carries TFT information.
  • the SGW forwards the update request message sent by the PGW to the MME.
  • the forwarded update bearer request message also carries TFT information.
  • Steps 602-603 can be summarized as follows:
  • the PGW updates the bearer to the MME, and each bearer carries a TFT information, and the TFT information carries the indication information.
  • the MME sends a modify EPS bearer request message to the UE.
  • the modified EPS bearer request message sent by the step 604 carries the TFT information.
  • the UE After receiving the modified EPS bearer request message sent by the MME, the UE obtains the TFT information from the modified EPS bearer request message.
  • the UE sends the service data to the network, and determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information that is sent by the UE is allowed to be accessed; if the result of the determination is no, the service data corresponding to the TFT information sent by the UE is prohibited from being accessed.
  • the UE feeds back the modified EPS bearer accept message to the MME.
  • the MME sends an update 7-load response message to the SGW.
  • the SGW sends an update bearer response message to the PGW.
  • Steps 605-607 can be summarized as: UE feedback EPS bearer modify accept message to the MME, MME updates 7
  • the service access control method provided in Embodiment 6 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network, or
  • the external network sends the service data to the UE, it is determined whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and some service data is allowed to be accessed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 7 Example 7:
  • the interaction process of the method in the seventh embodiment of the present invention is an application scenario in which the service access control method is applied to a 2G/3G network.
  • FIG. 7 is an application scenario signaling diagram of the service access control method provided in Embodiment 7.
  • the interaction process of the method of the seventh embodiment is as follows:
  • the PCRF sends an IP-CAN session modification process message to the PGW, where the IP-CAN session modification process message carries the TFT information, where the TFT information carries the indication information.
  • the indication information is used to indicate whether the service data corresponding to the TFT information is allowed to be accessed.
  • the step 701 may also be: Configuring TFT information locally on the PGW, where the TFT information carries the indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the PGW After the PGW receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information sent by the PGW is allowed to be accessed; if the result of the determination is no, the service data access corresponding to the TFT information sent by the PGW is prohibited.
  • the PGW sends an update bearer request message to the SGW.
  • the update bearer request message carries TFT information.
  • the SGW forwards the update bearer request message sent by the PGW to the SGSN.
  • the forwarded update bearer request message also carries the TFT information.
  • Steps 702-703 can be summarized as follows:
  • the PGW updates the bearer to the SGSN, and each bearer carries a TFT information, and the TFT information carries the indication information.
  • the SGSN sends a modify PDP context request message to the UE.
  • the modified PDP context request message sent in step 704 carries the TFT information.
  • the UE After receiving the modified PDP context request message sent by the SGSN, the UE obtains the TFT information from the modified PDP context request message.
  • the service data access control When the service data access control is started, when the UE sends the service data to the network, it is determined whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information that is sent by the UE is allowed to be accessed; if the result of the determination is no, the service data corresponding to the TFT information sent by the UE is prohibited from being accessed.
  • the UE feeds back and modifies the PDP context accept message to the SGSN.
  • the SGSN sends an update bearer response message to the SGW.
  • the SGW sends an update bearer response message to the PGW.
  • Steps 705-707 can be summarized as follows:
  • the UE feeds back a modified PDP context accept message to the SGSN, and the SGSN updates the create response to the PGW.
  • the service access control method provided in Embodiment 7 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network sends service data to the UE.
  • determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited.
  • Example 8 When the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and the access of some service data is allowed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • the eighth embodiment of the present invention is an application scenario in which a service access control method is applied to a traditional network SGSN and a Gateway GPRS Support Node (GGSN) as an example.
  • FIG. 8 is a signaling diagram of an application scenario of the service access control method provided in Embodiment 8.
  • the interaction process of the eighth embodiment method is as follows: 801.
  • the PCRF sends an IP-CAN session modification process message to the GGSN, where the IP-CAN session modification process message carries TFT information, where the TFT information carries indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the step 801 may also be: configuring TFT information locally in the GGSN, where the TFT information carries indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the GGSN After the GGSN receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information sent by the GGSN is allowed to be accessed; if the determination result is no, the service data access corresponding to the TFT information sent by the GGSN is prohibited.
  • the GGSN sends an update PDP context request message to the SGSN.
  • the update PDP context request message carries the TFT information.
  • the SGSN sends a modify PDP context request message to the UE.
  • the modified PDP context request message sent by the step 803 carries the TFT information, and the TFT information carries the indication information.
  • the UE After receiving the modified PDP context request message sent by the SGSN, the UE obtains the TFT information from the modified PDP context request message.
  • the UE sends the service data to the network, and determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information that is sent by the UE is allowed to be accessed; if the result of the determination is no, the service data corresponding to the TFT information sent by the UE is prohibited from being accessed.
  • the UE feeds back a modified PDP context accept message to the SGSN.
  • the SGSN sends an update PDP context response message to the GGSN.
  • the service access control method provided in Embodiment 8 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network sends service data to the UE.
  • determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the service data that needs to be prohibited from being accessed is prohibited from being controlled, and the actual demand is allowed.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 9 Example 9:
  • FIG. 9 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 9. As shown in Figure 9, in the application scenario where the SGSN and the GGSN are connected, the interaction between the terminal and each network-side device is as follows:
  • the mobile station (MS, mobile station) sends a PDP secondary context activation request message to the SGSN.
  • the SGSN sends a Create PDP Context Request message to the GGSN.
  • the GGSN interacts with the PCRF, and the PCRF sends an IP-CAN session modification process message to the GGSN, where the IP-CAN session modification process message carries the TFT information, and the TFT information carries the indication information.
  • the indication information is used to indicate whether the service data corresponding to the TFT information is allowed to be accessed.
  • the step 903 may also be: configuring TFT information locally in the GGSN, where the TFT information carries indication information.
  • the indication information is used to indicate whether to allow service data access corresponding to the TFT information.
  • the GGSN After the GGSN receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information sent by the GGSN is allowed to be accessed; if the determination result is no, the service data access corresponding to the TFT information sent by the GGSN is prohibited.
  • the GGSN feeds back a PDP context response message to the SGSN.
  • the created PDP context response message carries TFT information.
  • the SGSN feeds back a secondary PDP context accept message to the UE.
  • the active secondary PDP context accept message sent in step 905 carries the TFT information, and the TFT information carries the indication information.
  • the UE After the UE receives the activated secondary PDP context accept message sent by the SGSN, the UE obtains the TFT information from the activated secondary PDP context accept message.
  • the UE sends the service data to the network, and determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information that is sent by the UE is allowed to be accessed; if the determination result is no, the service data access corresponding to the TFT information sent by the UE is prohibited.
  • the service access control method provided in Embodiment 9 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network sends service data to the UE.
  • determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and the access of some service data is allowed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 10 Example 10:
  • FIG. 10 is a signaling diagram of an application scenario of a service access control method provided in Embodiment 10. As shown in Figure 10, in the application scenario where the SGSN and the GGSN are connected, the interaction between the terminal and each network-side device is as follows:
  • the PCRF sends an IP-CAN session modification process message to the GGSN, where the IP-CAN session modification process message carries the TFT information, and the TFT information carries the indication information.
  • the indication information is used to indicate whether the service data corresponding to the TFT information is allowed to be accessed.
  • the step 1001 may also be: Configuring TFT information locally in the GGSN, where the TFT information carries indication information.
  • the indication information is used to indicate whether the service data corresponding to the TFT information is allowed to be accessed.
  • the GGSN After the GGSN receives the IP-CAN session modification process message sent by the PCRF, it determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the result of the determination is yes, the service data corresponding to the TFT information sent by the GGSN is allowed to be accessed; if the determination result is no, the service data access corresponding to the TFT information sent by the GGSN is prohibited.
  • the GGSN sends an initial PDP context activation request message to the SGSN.
  • the initial PDP context activation request message carries TFT information.
  • the SGSN sends a request for a secondary PDP context activation message to the UE.
  • the requesting secondary PDP context activation message sent in step 1003 carries TFT information,
  • the TFT information carries indication information.
  • the UE After receiving the request for the secondary PDP context activation message sent by the SGSN, the UE obtains the TFT information from the request secondary PDP context activation message.
  • the UE sends the service data to the network, and determines whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed.
  • the service data corresponding to the TFT information that is sent by the UE is allowed to be accessed; if the result of the determination is no, the service data corresponding to the TFT information sent by the UE is prohibited from being accessed.
  • the UE initiates a secondary PDP context activation process to the GGSN.
  • the SGSN sends an initial PDP context activation response message to the GGSN.
  • the service access control method provided in Embodiment 10 of the present invention acquires TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network sends service data to the UE.
  • determining whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data access is allowed, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and the access of some service data is allowed according to actual needs.
  • the method in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 11 Example 11:
  • FIG. 11a is a schematic diagram of a device according to Embodiment 11 of the present invention.
  • a service access control apparatus 1A may include:
  • the obtaining unit 10 is configured to obtain TFT information.
  • the determining unit 11 is configured to determine, when the service data access control is started, whether the service data is within the allowed access range of the TFT information acquired by the obtaining unit 10;
  • the executing unit 12 is configured to allow the service data to be accessed when the determining unit 11 determines that the result is YES. When the determining unit determines that the result is no, the service data access is prohibited.
  • FIG. 1 ib is a schematic diagram of another apparatus provided in Embodiment 11 of the present invention. This device is optimized for the device shown in Figure 11a.
  • a service access control apparatus 1B may further include:
  • the obtaining unit 10 may include: a first receiving unit 13 configured to receive an attach accept message sent by the network side device, where the attach accept message carries the TFT information.
  • the service access control apparatus 1B of this embodiment may be, for example, a terminal device such as a UE in the method embodiments 1 to 2.
  • FIG. 11c is a schematic diagram of another apparatus according to Embodiment 11 of the present invention. This device is optimized for the device shown in Figure 11a.
  • the obtaining unit 10 may further include: a second receiving unit 14 configured to receive TFT information delivered by the PCRF.
  • the service access control apparatus 1C of this embodiment may be, for example, a network device such as a PGW or a GGSN in the method embodiment.
  • FIG. 1 id is another schematic diagram of the apparatus provided in the eleventh embodiment of the present invention. This device is optimized for the device shown in Figure 11a.
  • the obtaining unit 10 of the service access control device 1D may include: an obtaining module 15 for acquiring locally configured TFT information.
  • the service access control apparatus 1D of this embodiment may be, for example, a PGW in the method embodiment or
  • GGSN Gateway Node Network equipment
  • the TFT information includes: an access permission information and/or a forbidden access information, where the permission access information includes a flow template corresponding to the allowed access information.
  • the information of the forbidden access information includes flow template information corresponding to the forbidden access information, where the flow template information is a source IP address, a destination IP address, a source port number, a destination port number, an upper layer protocol number, and an application identifier.
  • the determining unit 11 is specifically configured to: determine whether the information of the service data is consistent with the flow template information corresponding to the allowed access information, and if yes, determine that the service data is within the allowed access range of the TFT information, otherwise Determining that the service data is not within the allowed access range of the TFT information; and/or determining whether the information of the service data is consistent with the flow template information corresponding to the forbidden access information, and if yes, determining The service data is not within the allowed access range of the TFT information, otherwise it is determined that the service data is within the allowed access range of the TFT information.
  • a service access control apparatus is provided to obtain the TFT information.
  • the UE sends the service data to the network or the external network sends the information to the UE.
  • the service data it is determined whether the service data to be sent is within the allowed access range of the TFT information. If the service data access is allowed, if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and some service data is allowed to be accessed according to actual needs.
  • the device in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 12 Example 12:
  • FIG. 12a is a schematic diagram of a device according to Embodiment 12 of the present invention.
  • a service access control device 2A may include:
  • the obtaining unit 20 is configured to acquire TFT information, where the TFT information carries the indication information, and the determining unit 21 is configured to determine, when the service data access control is started, whether the indication information carried by the TFT information acquired by the acquiring unit 21 indicates Allowing access to service data corresponding to the TFT information;
  • the executing unit 22 is configured to allow the service data to be accessed when the determining unit 21 determines that the result is YES. When the determining unit determines that the result is no, the service data access is prohibited.
  • FIG. 12b is a schematic diagram of another apparatus according to Embodiment 12 of the present invention.
  • This device is optimized for the device shown in Figure 12a.
  • the acquiring unit 20 of the service access control device 2B may include: a first receiving unit 23, configured to receive a first request message sent by the network side device, where the first request message is The TFT information carries the information, and the TFT information carries the indication information;
  • the first request message includes:
  • the active dedicated bearer request message sent by the network side device the request secondary packet message protocol PDP context activation message, the modified enhanced packet system EPS bearer request message, the modified PDP context request message, the activated secondary PDP context accept message, and the request twice PDP context activation message.
  • the service access control device 2B of this embodiment may be, for example, a terminal device such as a UE in Embodiments 3 to 10 of the method of the present invention.
  • FIG. 12c is a schematic diagram of another apparatus according to Embodiment 12 of the present invention. This device is optimized for the device shown in Figure 12a.
  • a service access control device 2C the acquiring unit 20 of the service access control device, may further include:
  • the receiving unit 24 is configured to receive a second request message, where the second request message carries TFT information, where the TFT information carries indication information, and the second request message includes: an IP-CAN session modification flow message delivered by the PCRF .
  • the service access control device 2C of this embodiment may be, for example, a network device such as a PGW or a GGSN in Embodiments 3 to 10 of the method of the present invention.
  • FIG. 12d is a schematic diagram of another apparatus according to Embodiment 12 of the present invention. This device is optimized for the device shown in Figure 12a.
  • the acquiring unit 20 of the service access control device 2D may include: an obtaining module 25, configured to acquire locally configured TFT information, where the TFT information carries indication information.
  • the service access control device 2D of this embodiment may be, for example, a network device such as a PGW or a GGSN in Embodiments 3 to 10 of the method of the present invention.
  • a service access control apparatus provided in Embodiment 12 of the present invention is configured to acquire TFT information, where the TFT information carries indication information, when the service data access control is started, when the UE sends service data to the network, or the external network sends the UE to the UE.
  • the service data is sent, it is determined whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data is allowed to access, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and some service data is allowed to be accessed according to actual needs.
  • the device in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Example 13 Example 13:
  • FIG. 13 is a schematic diagram of a device according to Embodiment 13 of the present invention.
  • a service access control apparatus may include:
  • At least one processor 30, input device 31, output device 32, and memory 33 may be connected by a bus or other means.
  • Figure 13 shows an example of a connection through a bus.
  • the processor 30 performs the following steps: acquiring TFT information; determining, when the service data access control is started, whether the service data is within the allowed access range of the TFT information; and when the result is YES, allowing the service Data access; prohibiting the number of services when the result of the determination is negative According to access.
  • the processor 30 when performing the acquiring TFT information, may perform the following steps: receiving an attach accept message sent by the network side device, where the attach accept message carries the TFT information.
  • the processor 30 when performing the acquiring TFT information, may perform the following steps: receiving the TFT information delivered by the PCRF.
  • the processor 30 when performing the acquiring TFT information, may specifically perform the following steps: Obtain the locally configured TFT information.
  • the memory 33 may store TFT information, where the TFT information includes: permission access information and/or forbidden access information, where the permission access information includes the flow corresponding to the allowed access information.
  • the template information, the forbidden access information includes flow template information corresponding to the forbidden access information, where the flow template information is a source IP address, a destination IP address, a source port number, a destination port number, an upper layer protocol number, and an application. Any combination of logos.
  • the processor 30 when the processor 30 performs the step of determining whether the service data is within the allowed access range of the TFT information acquired by the obtaining unit 10 when the service data access control is started, the following steps may be specifically performed. Determining whether the information of the service data is consistent with the flow template information corresponding to the allowed access information, and if yes, determining that the service data is within the allowed access range of the TFT information; otherwise, determining the service The data is not in the range of allowed access of the TFT information; and/or, determining whether the information of the service data is consistent with the flow template information corresponding to the forbidden access information, and if yes, determining that the service data is not in the Within the range of allowed access of the TFT information, it is determined that the service data is within the range of allowed access of the TFT information.
  • a service access control apparatus is configured to acquire TFT information, and when service data access control is started, when a UE sends service data to a network, or when an external network sends service data to a UE, it is determined to be sent. Whether the service data is within the allowed access range of the TFT information. If the service data access is allowed, if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and some service data is allowed to be accessed according to actual needs.
  • the device in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • Embodiment 14 is configured to acquire TFT information, and when service data access control is started, when a UE sends service data to a network, or when an external network sends service data to a UE, it is determined to be sent. Whether the service data is within the allowed
  • FIG. 14 is a schematic diagram of a device according to Embodiment 14 of the present invention.
  • a service access control apparatus may include: at least one processor 40, an input device 41, an output device 42, and a memory 43.
  • the processor 40, the input device 41, the output device 42, and the memory 43 may be connected by a bus or other means.
  • Figure 14 shows an example of a connection through a bus.
  • the processor 40 performs the following steps: acquiring TFT information, the TFT information carrying indication information; determining, when the service data access control is started, whether the indication information carried by the TFT information indicates that the service data corresponding to the TFT information is allowed Accessing; when the result is judged to be YES, the service data is allowed to access; when it is determined that the result is no, the service data access is prohibited.
  • the processor 40 performs the following steps: performing the step of acquiring the TFT information, where the TFT information carries the indication information, and performing the following steps: receiving the first request message sent by the network side device, where the first The request message carries TFT information, and the TFT information carries indication information.
  • the storage unit 43 stores the first request message, where the first request message includes: an activation dedicated bearer request message sent by the network side device, a request secondary packet message protocol PDP context activation message, and an enhanced enhanced packet system EPS bearer request message. Modifying the PDP context request message, activating the secondary PDP context accept message, and requesting the secondary PDP context activation message.
  • the processor 40 performs the following steps when performing the acquiring TFT information, where the TFT information carries the indication information: receiving the second request message, where the second request message carries the TFT information,
  • the TFT information carries indication information.
  • the storage unit 43 stores the second request message, and the second request message includes: an IP-CAN session modification flow message delivered by the PCRF.
  • the processor 40 performs the following steps: performing the acquiring TFT information, where the TFT information carries the indication information, and performing the following steps: acquiring the locally configured TFT information, where the TFT information carries the indication information.
  • the service access control device provided in Embodiment 14 of the present invention is configured to acquire TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network to the UE.
  • the device in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • the service access control device provided in Embodiment 14 of the present invention is configured to acquire TFT information, and the TFT information carries indication information.
  • the UE sends service data to the network or the external network to the UE.
  • the service data it is determined whether the indication information carried in the TFT information indicates that the service data corresponding to the TFT information is allowed to be accessed. If the judgment result is yes, the service data is allowed to access, and if not, the service data access is prohibited. Therefore, when the service data access control is started, the access control of the service data that needs to be prohibited from being accessed is allowed, and some service data is allowed to be accessed according to actual needs.
  • the device in this embodiment can perform access control or prohibition control on the service data transmitted in the network in a targeted manner, effectively solve the congestion situation in the network, and does not affect normal service data access.
  • the medium can be a read only memory, a magnetic disk or a compact disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供一种业务接入控制方法和装置,先获取TFT信息,当业务数据接入控制启动时,判断业务数据是否在TFT信息的允许接入范围内或者判断TFT信息携带的指示信息是否指示允许TFT信息对应的业务数据接入,若判断结果为是,则允许业务数据接入,若判断结果为否,则禁止业务数据接入。能够对特定业务进行限制或者允许特定业务接入网络。解决了现有技术中,不能实现对特定业务进行允许接入控制或者限制接入控制的缺陷。

Description

一种业务接入控制方法和装置 技术领域
本发明实施例涉及网络通信技术领域,尤其涉及一种业务接入控制方法和 装置。
背景技术
近年来, 移动互联网应用发展十分迅速, 用户可以通过手机等用户设备 ( UE, User Equipment ),轻松从网络上下载安装各种应用程序进行应用。但是, 一些应用程序通常需要接入网络中才能进行使用,如果网络中同时接入过多的 应用程序, 则会造成网路拥堵的情况发生, 并且, 一些应用程序会在没有得到 用户允许的情况下泄露用户的个人信息, 不能保障用户的权益。 因此, 需要一 种机制, 能够使网络禁止某些应用的接入。 当有自然灾害发生时, 分组域的应 用变得非常重要, 例如, 提供灾害信息公告栏服务或灾害语音信息服务等, 可 以让人们确认亲属的安全。 这时, 运营商需要在网络拥塞的情况下, 保证优先 为上述重要服务提供接入连接。
因此, 需要一种既能够禁止不必要应用接入网络, 又能允许特定业务接入 网络的方法。现有的第三代合作伙伴计划( 3GPP , Third Generation Partnership Project )技术中,提出了接入控制的机制,如接入级别禁止 (ACB , Access Class Barring) , 域接入控制 (DSAC, Domain Specific Access Control ), 业务接入 控制( SSAC , Service Specific Access Control)和扩展的接入控制( EAB , Extended Access Barring )等。 ACB和 EAB在网络侧拥塞情况下,会限制终端上所有应 用发起请求(MO, mobile origination ), DSAC机制只是控制终端发起 CS或 者 PS域业务, SSAC也只是控制发起 voice/video业务。 由此, 发明人在对现 有技术的实践与研究中发现, 现有的针对 3GPP技术提出的接入控制机制中, 只能对与终端设备交互的全部业务统一进行限制或者只能够限制几种类型业 务,换言之,现有技术中的所有接入控制机制都不能实现对特定业务进行允许 接入控制或者限制接入控制。
发明内容
鉴于现有技术的以上缺陷, 本发明提供一种业务接入控制方法和装置, 可 以对特定业务进行限制或者允许特定业务接入网络,解决了现有技术中, 只能 限制终端上所有业务接入网络的缺陷。
一种业务接入控制方法, 包括:
获取业务流模板(TFT, Traffic Flow Template )信息;
当业务数据接入控制启动时, 判断业务数据是否在所述 TFT信息的允许 接入范围内;
若判断结果为是, 则允许所述业务数据接入; 若判断结果为否, 则禁止所 述业务数据接入。
一种业务接入控制方法, 包括:
获取 TFT信息, 所述 TFT信息携带指示信息;
当业务数据接入控制启动时, 判断所述 TFT信息携带的指示信息是否指 示允许所述 TFT信息对应的业务数据接入;
若判断结果为是, 则允许所述业务数据接入; 若判断结果为否, 则禁止所 述业务数据接入。
一种业务接入控制装置, 包括:
获取单元, 获取 TFT信息;
判断单元, 用于当业务数据接入控制启动时, 判断业务数据是否在所述获 取单元获取到的 TFT信息的允许接入范围内;
执行单元, 用于在所述判断单元判断出结果为是时, 允许所述业务数据接 入; 在所述判断单元判断出结果为否时, 禁止所述业务数据接入。
一种业务接入控制装置, 包括:
获取单元,, 获取 TFT信息, 所述 TFT信息携带指示信息;
判断单元, 用于当业务数据接入控制启动时, 判断所述获取单元获取到的 所述 TFT信息携带的指示信息是否指示允许所述 TFT信息对应的业务数据接 入;
执行单元, 用于在所述判断单元判断出结果为是时, 允许所述业务数据接 入; 在所述判断单元判断出结果为否时, 禁止所述业务数据接入。
从以上技术方案可以看出, 本发明实施例具有以下优点: 本发明提供一种业务接入控制方法和装置, 获取 TFT信息, 当业务数据 接入控制启动时, 判断业务数据是否在 TFT信息的允许接入范围内或者判断 TFT信息携带的指示信息是否指示允许 TFT信息对应的业务数据接入, 若判 断结果为是, 则允许业务数据接入, 若判断结果为否, 则禁止业务数据接入。 能够对特定业务进行限制或者允许特定业务接入网络。解决了现有技术中, 不 能实现对特定业务进行允许接入控制或者限制接入控制的缺陷。
附图说明
图 1为本发明实施例一提供的方法流程图;
图 2为实施例二提供的业务接入控制方法的应用场景信令图;
图 3为本发明实施例三提供的方法流程图;
图 4为实施例四提供的业务接入控制方法的应用场景信令图;
图 5为实施例四提供的业务接入控制方法的应用场景信令图;
图 6为实施例六提供的业务接入控制方法的应用场景信令图;
图 7为实施例七提供的业务接入控制方法的应用场景信令图;
图 8为实施例八提供的业务接入控制方法的应用场景信令图;
图 9为实施例九提供的业务接入控制方法的应用场景信令图;
图 10为实施例十提供的业务接入控制方法的应用场景信令图;
图 11a为本发明实施例十一提供的装置示意图;
图 lib为本发明实施例十一提供的另一种装置示意图;
图 11c为本发明实施例十一提供的另一种装置示意图;
图 lid为本发明实施例十一提供的另一种装置示意图;
图 12a为本发明实施例十二提供的装置示意图;
图 12b为本发明实施例十二提供的另一种装置示意图;
图 12c为本发明实施例十二提供的另一种装置示意图;
图 12d为本发明实施例十二提供的另一种装置示意图;
图 13为本发明实施例十三提供的装置示意图;
图 14为本发明实施例十四提供的装置示意图。
具体实施方式
本发明实施例提供了一种业务接入控制方法和装置,用于对特定业务进行 限制或者允许特定业务接入网络,解决了现有技术中, 只能限制终端上所有业 务接入网络的缺陷。
为使得本发明的发明目的、 特征、 优点能够更加的明显和易懂, 下面将结 合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、 完整地描 述,显然,下面所描述的实施例仅仅是本发明一部分实施例,而非全部实施例。 基于本发明中的实施例, 本领域的技术人员所获得的所有其他实施例,都属于 本发明保护的范围。 实施例一:
请参阅图 1 , 图 1为本发明实施例一提供的方法流程图。 如图 1所示, 本 发明实施例一提供一种业务接入控制方法, 可以包括以下步骤:
101、 获取 TFT信息。
102、 当业务数据接入控制启动时, 判断业务数据是否在所述 TFT信息的 允许接入范围内。
103、 若判断结果为是, 则允许所述业务数据接入; 若判断结果为否, 则 禁止所述业务数据接入。
其中, TFT信息可以包括: 允许接入信息和 /或禁止接入信息, 所述允许 接入信息包括所述允许接入信息对应的流模板信息,所述禁止接入信息包括所 述禁止接入信息对应的流模板信息。
所述流模板信息为源 IP地址、 目的 IP地址、 源端口号、 目的端口号、 上 层协议号以及应用标识的任意组合。
本发明实施例一的步骤 102具体可以包括:
判断业务数据的信息是否与所述允许接入信息的流模板信息一致, 若是, 则判断出所述业务数据在所述 TFT信息的允许接入范围内, 否则, 判断出所 述业务数据不在所述 TFT信息的允许接入范围内。
和 /或,
判断业务数据的信息是否与为所述禁止接入信息的流模板信息一致, 若 是, 则判断出所述业务数据不在所述 TFT信息的允许接入的范围内, 否则判 断出所述业务数据在所述 TFT信息的允许接入范围内。
进一步地, 获取 TFT信息之前可以包括: 向网络侧设备发送附着请求消 息。 所述获取 TFT信息可以包括: 接收网络侧设备发送的附着接受消息, 所 述附着接受消息中携带所述 TFT信息。
本实施例方法步骤可以由用户终端向网络侧设备发送附着请求消息,当网 络侧设备反馈给用户终端附着接受消息,用户终端可以从该附着接受消息中获 取 TFT信息。
更进一步地, 所述获取 TFT信息可以包括: 接收策略计费规则功能 PCRF 下发的 TFT信息。
本实施例方法步骤可以由 PGW接收 PCRF下发的 TFT信息。
更进一步地, 所述获取 TFT信息可以包括: 获取本地配置的 TFT信息。 本实施例方法步骤可以由 PGW获取本地配置的 TFT信息。
本发明实施例一提供的一种业务接入控制方法, 获取 TFT信息, 当业务 数据接入控制启动时, UE向网络发送业务数据或者外部网络向 UE发送业务 数据时, 判断要发送的业务数据是否在该 TFT信息的允许接入范围内。 若在 则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据 接入控制启动时, 对一些需要被禁止接入的业务数据进行禁止接入控制的同 时, 根据实际的需要, 允许一些业务数据的接入。 本实施例方法可以有针对性 地对网络中传输的业务数据进行接入控制或者禁止控制,有效解决网络中的拥 堵情况, 并且不影响正常的业务数据接入。
以下以一具体场景为例,对本发明实施例一提供的业务接入控制方法进行 描述。 实施例二:
请参阅图 2,图 2为实施例二提供的业务接入控制方法的应用场景信令图。 如图 2所示, 实施例二方法的交互过程如下:
201、 UE向移动性管理实体 (MME, Mobility Management Entity)发送附着 请求消息。
202、 MME发送创建会话请求消息给服务网关( SGW, Serving GateWay )。
203、 SGW 向分组数据网网关(PGW, PDN GateWay )转发创建会话请 求消息。
本实施例方法由 UE向 MME发起附着请求, MME选择 PGW和 SGW后 发起默认 7 载建立到 PGW。 204、 PGW 与策略计费规则功能 (PCRF , Policy and Charging Rules Function )建立 IP连接接入网给 ( IP-CAN, IP- Connectivity Access Network) 会话, PCRF提供 TFT信息给 PGW。
一个实施例中,也可以通过以下方式获取 TFT信息:获取本地配置的 TFT 信息。 本发明实施例对此不作限定。
本实施例中, TFT信息可以包括: 允许接入信息和 /或禁止接入信息。 允 许接入信息和禁止接入信息分别包括对应的流模板信息,所述流模板信息为源 网络之间互连的协议( IP , Internet Protocol )地址、 目的 IP地址、 源端口号、 目的端口号、 上层协议号以及应用标识的任意组合。
值得指出的是, 由于 PGW接收到 TFT信息, 当外部网络向 UE发送业务 数据时, 若业务数据接入控制启动, PGW接收到外部网络的业务数据时, 则 判断业务数据是否在该 TFT信息的允许接入范围内, 若判断结果为是, 则允 许该业务数据接入; 若判断结果为否, 则禁止该业务数据接入。 具体的判断步 骤可以是: 判断业务数据的信息是否与所述允许接入信息的流模板信息一致, 若是, 则判断出所述业务数据在所述 TFT信息的允许接入范围内, 否则, 判 断出所述业务数据不在所述 TFT信息的允许接入范围内。 和 /或, 判断业务数 据的信息是否与所述禁止接入信息的流模板信息一致, 若是, 则判断出所述业 务数据不在所述 TFT信息的允许接入的范围内, 否则, 判断出所述业务数据 在所述 TFT信息的允许接入范围内。
205、 PGW向 SGW发送创建会话响应消息。
该创建会话响应消息中携带 PCRF提供给 PGW或者 PGW本地配置的 TFT 信息。
206、 SGW向 MME转发创建会话响应消息。
该创建会话响应消息中携带 TFT信息。
207、 MME发送附着接受消息给 UE。
步骤 204中, PGW在与 PCRF建立 IP-CAN会话中获取 TFT信息, 或者 本地配置 TFT信息, 通过 SGW和 MME发送创建会话响应消息, 携带该 TFT 发送给 UE。 即步骤 205和步骤 206发送的创建会话响应消息以及步骤 207发 送的附着接受消息中均携带有 TFT信息。 MME发送给 UE的附着请求消息中携带有 TFT信息。 本实施例中, TFT 信息可以包括: 允许接入信息和 /或禁止接入信息。 允许接入信息和禁止接入 信息分别包括对应的流模板信息,所述流模板信息为源 IP地址、 目的 IP地址、 源端口号、 目的端口号、 上层协议号以及应用标识的任意组合。
当 UE需要发送业务数据时,判断该业务数据是否在该 TFT信息的允许接 入范围内, 若判断结果为是, 则允许该业务数据接入; 若判断结果为否, 则禁 止该业务数据接入。具体的判断步骤可以是: 判断业务数据的信息是否与所述 允许接入信息的流模板信息一致, 若是, 则判断出所述业务数据在所述 TFT 信息的允许接入范围内, 否则, 判断出所述业务数据不在所述 TFT信息的允 许接入范围内。 和 /或, 判断业务数据的信息是否与为所述禁止接入信息的流 模板信息一致, 若是, 则判断出所述业务数据不在所述 TFT信息的允许接入 的范围内, 否则判断出所述业务数据在所述 TFT信息的允许接入范围内。
本发明实施例二提供的一种业务接入控制方法, 获取 TFT信息, 业务数 据接入控制启动时, 当 UE向网络发送业务数据时或者外部网络向 UE发送业 务数据时, 判断要发送的业务数据是否在该 TFT信息的允许接入范围内。 若 在则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数 据接入控制启动时,在对一些需要被禁止接入的业务数据进行禁止接入控制的 同时, 根据实际的需要, 允许一些业务数据的接入。 本实施例方法可以有针对 性地对网络中传输的业务数据进行接入控制或者禁止控制,有效解决网络中的 拥堵情况, 并且不影响正常的业务数据接入。 实施例三:
请参阅图 3, 图 3为本发明实施例三提供的方法流程图。
如图 3所示, 一种业务接入控制方法, 可以包括以下步骤:
301、 获取 TFT信息, 所述 TFT信息携带指示信息。
302、 当业务数据接入控制启动时, 判断所述 TFT信息携带的指示信息是 否指示允许所述 TFT信息对应的业务数据接入。
303、 若判断结果为是, 则允许所述业务数据接入; 若判断结果为否, 则 禁止所述业务数据接入。
进一步地, 所述获取 TFT信息包括: 接收网络侧设备发送的第一请求消 息, 所述第一请求消息中携带 TFT信息。
所述第一请求消息包括: 网络侧设备发送的激活专用承载请求消息、请求 二次分组数据协议 (PDP, Packet Data Protocol )上下文激活消息、 修改增强 型分组系统 (EPS, Evolved Packet System)承载请求消息、 修改 PDP上下文请求 消息、 激活二次 PDP上下文接受消息以及请求二次 PDP上下文激活消息。
本实施例方法步骤可以由用户终端接收网络侧设备发送的第一请求消息, 从该第一请求消息中获取 TFT信息。
更进一步地, 所述获取 TFT信息包括: 接收第二请求消息, 所述第二请 求消息中携带 TFT信息, 包括: 策略计费规则功能 PCRF下发的 IP-CAN会 话修改流程消息。
本实施例方法步骤可以由 PGW或者 GGSN等网络设备接收 PCRF下发的 TFT信息。
更进一步地, 所述获取 TFT信息包括: 获取本地配置的 TFT信息。
本实施例方法步骤可以由 PGW或者 GGSN等网络设备获取本地配置的 TFT信息。
本发明实施例三中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。
本发明实施例四至实施例八为本发明提供的业务接入控制方法的具体场 景举例。 实施例四:
请参阅图 4,图 4为实施例四提供的业务接入控制方法的应用场景信令图。 如图 4所示, 实施例四方法的交互过程如下: 401、 PCRF向 PGW下发 IP-CAN会话修改流程消息, 该 IP-CAN会话修 改流程消息中携带 TFT信息, 该 TFT信息携带指示信息。 其中, 该指示信息 用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是, 步骤 401也可以为: 在 PGW本地配置 TFT信息, 该 TFT 信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业 务数据接入。
在 PGW收到 PCRF下发的 IP-CAN会话修改流程消息之后,判断 TFT信 息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。
若判断结果为是,则允许通过 PGW发送的该 TFT信息对应的业务数据接 入; 若判断结果为否, 则禁止通过 PGW发送的该 TFT信息对应的业务数据接 入。
402、 PGW发送创建承载请求消息到 SGW。
其中, 创建承载请求消息中携带有 TFT信息。
403、 SGW向 MME转发 PGW发送的该创建承载请求消息。
其中, 该转发的创建 载请求消息中同样携带有 TFT信息。
步骤 402-403可以概括为: PGW创建专用承载到 MME, 并且每个承载中 对应携带一个 TFT信息, 该 TFT信息携带指示信息。
404、 MME发送激活专用承载请求消息到 UE。
其中, 步骤 404所发送的激活专用承载请求消息中携带有 TFT信息。 在 UE收到 MME发送的激活专用承载请求消息之后, UE从该激活专用 承载请求消息中获取到 TFT信息。 当业务数据接入控制启动, UE向网络发送 业务数据时, 判断 TFT信息携带的指示信息是否指示允许该 TFT信息对应的 业务数据接入。
若判断结果为是,则允许 UE发送的该 TFT信息对应的业务数据接入;若 判断结果为否, 则禁止 UE发送的该 TFT信息对应的业务数据接入。
405、 UE反馈激活专用承载接受消息到 MME。
406、 MME发送创建承载响应消息到 SGW。
407、 SGW发送创建承载响应消息到 PGW。
步骤 405-407可以概括为: UE反馈激活专用承载接受消息给 MME, MME 创建承载响应到 PGW。
本发明实施例四中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例五:
本发明实施例五可以适用于 2G/3G网络。请参阅图 5, 图 5为实施例五提 供的业务接入控制方法的应用场景信令图。
如图 5所示, 实施例五方法的交互过程如下:
501、 PCRF向 PGW下发 IP-CAN会话修改流程消息, 该 IP-CAN会话修 改流程消息中携带 TFT信息, 该 TFT信息携带指示信息。 其中, 该指示信息 用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是, 步骤 501也可以为: 在 PGW本地配置 TFT信息, 该 TFT 信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业 务数据接入。
在 PGW收到 PCRF下发的 IP-CAN会话修改流程消息之后,判断 TFT信 息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。
若判断结果为是,则允许通过 PGW发送的该 TFT信息对应的业务数据接 入; 若判断结果为否, 则禁止通过 PGW发送的该 TFT信息对应的业务数据接 入。
502、 PGW发送创建承载请求消息到 SGW。
其中, 创建承载请求消息中携带有 TFT信息。
503、 SGW 向服务分组无线服务技术支持节点(SGSN, Serving GPRS Support Node)转发 PGW发送的该创建 7 载请求消息。 其中, 转发的创建^^载请求消息中同样携带有 TFT信息。
步骤 502-503可以概括为: PGW创建专用承载到 SGSN,并且每个承载中 对应携带一个 TFT信息, 该 TFT信息携带指示信息。
504、 SGSN发送请求二次 PDP上下文激活消息到 UE。
其中, 步骤 504所发送的请求二次 PDP上下文激活消息中携带有 TFT信 息。
在 UE收到 SGSN发送的请求二次 PDP上下文激活消息之后, UE从请求 二次 PDP上下文激活消息中获取到 TFT信息。 业务数据接入控制启动时, 当 UE向网络发送业务数据时,判断该 TFT信息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。 若判断结果为是, 则允许 UE发送的该 TFT 信息对应的业务数据接入;若判断结果为否,则禁止 UE发送的该 TFT信息对 应的业务数据接入。
505、 UE反馈激活二次 PDP上下文请求消息到 SGSN。
506、 SGSN发送创建承载响应消息给 SGW。
507、 SGSN发送激活二次 PDP上下文接受消息到 UE。
508、 SGW发送创建承载响应消息给 PGW。
本发明实施例五中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 业务数据接入控制启动, UE向网络发送业务数据时或者 外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允许 该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例六:
请参阅图 6,图 6为实施例六提供的业务接入控制方法的应用场景信令图。 如图 6所示, 实施例六方法的交互过程如下:
601、 PCRF向 PGW下发 IP-CAN会话修改流程消息,该 IP-CAN会话修 改流程信息中携带 TFT消息, 该 TFT信息携带指示信息。 其中, 该指示信息 用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是, 步骤 601也可以为: 在 PGW本地配置 TFT信息, 该 TFT 信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业 务数据接入。
在 PGW收到 PCRF下发的 IP-CAN会话修改流程消息之后,判断 TFT信 息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。 若判断结 果为是, 则允许通过 PGW发送的该 TFT信息对应的业务数据接入; 若判断结 果为否, 则禁止通过 PGW发送的该 TFT信息对应的业务数据接入。
602、 PGW发送更新承载请求消息到 SGW。
其中, 更新承载请求消息中携带有 TFT信息。
603、 SGW向 MME转发 PGW发送的该更新 载请求消息。
其中, 该转发的更新承载请求消息中同样携带有 TFT信息。
步骤 602-603可以概括为: PGW更新承载到 MME, 并且每个承载中对应 携带一个 TFT信息, 该 TFT信息携带指示信息。
604、 MME发送修改 EPS承载请求消息到 UE。
其中, 步骤 604所发送的修改 EPS承载请求消息携带有 TFT信息。
在 UE收到 MME发送的修改 EPS承载请求消息之后, UE从修改 EPS承 载请求消息中获取到 TFT信息。 当业务数据接入控制启动, UE向网络发送业 务数据时, 判断 TFT信息携带的指示信息是否指示允许该 TFT信息对应的业 务数据接入。若判断结果为是,则允许 UE发送的该 TFT信息对应的业务数据 接入; 若判断结果为否, 则禁止 UE发送的该 TFT信息对应的业务数据接入。
605、 UE反馈修改 EPS承载接受消息到 MME。
606、 MME发送更新 7 载响应消息到 SGW。
607、 SGW发送更新承载响应消息到 PGW。
步骤 605-607可以概括为: UE反馈修改 EPS承载接受消息给 MME, MME 更新 7|载响应到 PGW。
本发明实施例六中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例七:
本发明实施例七方法的交互过程为业务接入控制方法应用于 2G/3G 网络 的应用场景。 请参阅图 7, 图 7为实施例七提供的业务接入控制方法的应用场 景信令图。
如图 7所示, 实施例七方法的交互过程如下:
701、 PCRF向 PGW下发 IP-CAN会话修改流程消息,该 IP-CAN会话修 改流程消息中携带 TFT信息, 该 TFT信息携带指示信息。 其中, 该指示信息 用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是, 步骤 701也可以为: 在 PGW本地配置 TFT信息, 该 TFT 信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业 务数据接入。
在 PGW收到 PCRF下发的 IP-CAN会话修改流程消息之后,判断 TFT信 息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。
若判断结果为是,则允许通过 PGW发送的该 TFT信息对应的业务数据接 入; 若判断结果为否, 则禁止通过 PGW发送的该 TFT信息对应的业务数据接 入。
702、 PGW发送更新承载请求消息给 SGW。
其中, 更新承载请求消息中携带有 TFT信息。
703、 SGW向 SGSN转发 PGW发送的该更新承载请求消息。
其中, 转发的更新承载请求消息中同样携带有 TFT信息。
步骤 702-703可以概括为: PGW更新承载到 SGSN,并且每个承载中对应 携带一个 TFT信息, 该 TFT信息携带指示信息。 704、 SGSN发送修改 PDP上下文请求消息到 UE。
其中, 步骤 704所发送的修改 PDP上下文请求消息携带有 TFT信息。 在 UE收到 SGSN发送的修改 PDP上下文请求消息之后, UE从该修改 PDP 上下文请求消息中获取到 TFT信息。 当业务数据接入控制启动时, UE向网络 发送业务数据时, 判断 TFT信息携带的指示信息是否指示允许该 TFT信息对 应的业务数据接入。
若判断结果为是,则允许 UE发送的该 TFT信息对应的业务数据接入;若 判断结果为否, 则禁止 UE发送的该 TFT信息对应的业务数据接入。
705、 UE反馈修改 PDP上下文接受消息到 SGSN。
706、 SGSN发送更新承载响应消息到 SGW。
707、 SGW发送更新承载响应消息到 PGW。
步骤 705-707可以概括为: UE反馈修改 PDP上下文接受消息给 SGSN, SGSN更新创建^载响应到 PGW。 本发明实施例七中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例八:
本发明实施例八为以业务接入控制方法应用于传统网络 SGSN 与网关分 组无线服务技术支持节点 (GGSN, Gateway GPRS Support Node)连接为例的应 用场景。 请参阅图 8, 图 8为实施例八提供的业务接入控制方法的应用场景信 令图。
如图 8所示, 实施例八方法的交互过程如下: 801、 PCRF向 GGSN下发 IP-CAN会话修改流程消息, 该 IP- CAN会话 修改流程消息中携带 TFT信息, 该 TFT信息携带指示信息。 其中, 该指示信 息用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是,步骤 801也可以为:在 GGSN本地配置 TFT信息,该 TFT 信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业 务数据接入。
在 GGSN收到 PCRF下发的 IP-CAN会话修改流程消息之后, 判断 TFT 信息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。 若判断 结果为是, 则允许通过 GGSN发送的该 TFT信息对应的业务数据接入; 若判 断结果为否, 则禁止通过 GGSN发送的该 TFT信息对应的业务数据接入。
802、 GGSN发送更新 PDP上下文请求消息到 SGSN。
其中, 更新 PDP上下文请求消息中携带有 TFT信息。
803、 SGSN发送修改 PDP上下文请求消息给 UE。
其中, 步骤 803所发送的修改 PDP上下文请求消息中携带 TFT信息, 该 TFT信息携带指示信息。
在 UE收到 SGSN发送的修改 PDP上下文请求消息之后, UE从该修改 PDP 上下文请求消息中获取到 TFT信息。 当业务数据接入控制启动, UE向网络发 送业务数据时, 判断该 TFT信息携带的指示信息是否指示允许该 TFT信息对 应的业务数据接入。
若判断结果为是,则允许 UE发送的该 TFT信息对应的业务数据接入;若 判断结果为否, 则禁止 UE发送的该 TFT信息对应的业务数据接入。
804、 UE反馈修改 PDP上下文接受消息到 SGSN。
805、 SGSN发送更新 PDP上下文响应消息到 GGSN。
本发明实施例八中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例九:
请参阅图 9,图 9为实施例九提供的业务接入控制方法的应用场景信令图。 如图 9所示, 在 SGSN和 GGSN连接的应用场景中, 终端与各网络侧设备的 交互过程如下:
901、 移动台(MS, mobile station)发送 PDP二次上下文激活请求消息到 SGSN。
902、 SGSN向 GGSN发送创建 PDP上下文请求消息。
903、 GGSN与 PCRF交互, PCRF向 GGSN下发 IP-CAN会话修改流程 消息, 该 IP-CAN会话修改流程消息中携带 TFT信息, 该 TFT信息携带指示 信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是,步骤 903也可以为:在 GGSN本地配置 TFT信息,该 TFT 信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应的业 务数据接入。
在 GGSN收到 PCRF下发的 IP-CAN会话修改流程消息之后, 判断 TFT 信息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。 若判断 结果为是, 则允许通过 GGSN发送的该 TFT信息对应的业务数据接入; 若判 断结果为否, 则禁止通过 GGSN发送的该 TFT信息对应的业务数据接入。
904、 GGSN反馈创建 PDP上下文响应消息到 SGSN。
该创建 PDP上下文响应消息中携带 TFT信息。
905、 SGSN反馈激活二次 PDP上下文接受消息到 UE。
其中,步骤 905所发送的激活二次 PDP上下文接受消息中携带 TFT信息, 该 TFT信息携带指示信息。
在 UE收到 SGSN发送的激活二次 PDP上下文接受消息之后, UE从该激 活二次 PDP上下文接受消息中获取到 TFT信息。 当业务数据接入控制启动, UE向网络发送业务数据时,判断该 TFT信息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。 若判断结果为是,则允许 UE发送的该 TFT信息对应的业务数据接入;若 判断结果为否, 则禁止 UE发送的该 TFT信息对应的业务数据接入。
本发明实施例九中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例十:
请参阅图 10, 图 10为实施例十提供的业务接入控制方法的应用场景信令 图。 如图 10所示, 在 SGSN和 GGSN连接的应用场景中, 终端与各网络侧设 备的交互过程如下:
1001、 PCRF向 GGSN下发 IP-CAN会话修改流程消息,该 IP-CAN会话 修改流程消息中携带 TFT信息, 该 TFT信息携带指示信息。 其中, 该指示信 息用于指示是否允许 TFT信息对应的业务数据接入。
值得指出的是, 步骤 1001也可以为: 在 GGSN本地配置 TFT信息, 该 TFT信息携带指示信息。 其中, 该指示信息用于指示是否允许 TFT信息对应 的业务数据接入。
在 GGSN收到 PCRF下发的 IP-CAN会话修改流程消息之后, 判断 TFT 信息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。 若判断 结果为是, 则允许通过 GGSN发送的该 TFT信息对应的业务数据接入; 若判 断结果为否, 则禁止通过 GGSN发送的该 TFT信息对应的业务数据接入。
1002、 GGSN发送初始 PDP上下文激活请求消息到 SGSN。
该初始 PDP上下文激活请求消息中携带 TFT信息。
1003、 SGSN发送请求二次 PDP上下文激活消息到 UE。
其中,步骤 1003所发送的请求二次 PDP上下文激活消息中携带 TFT信息, 该 TFT信息携带指示信息。
在 UE收到 SGSN发送的请求二次 PDP上下文激活消息之后, UE从该请 求二次 PDP上下文激活消息中获取到 TFT信息。 当业务数据接入控制启动, UE向网络发送业务数据时,判断该 TFT信息携带的指示信息是否指示允许该 TFT信息对应的业务数据接入。
若判断结果为是,则允许 UE发送的该 TFT信息对应的业务数据接入;若 判断结果为否, 则禁止 UE发送的该 TFT信息对应的业务数据接入。
1004、 UE发起到 GGSN之间的二次 PDP上下文激活流程。
1005、 SGSN发送初始 PDP上下文激活响应消息到 GGSN。
本发明实施例十中提供的一种业务接入控制方法,获取 TFT信息,该 TFT 信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数据时或 者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否指示允 许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务数据接入控制启动时, 在对一 些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需要, 允 许一些业务数据的接入。本实施例方法可以有针对性地对网络中传输的业务数 据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影响正常 的业务数据接入。 实施例十一:
请参阅图 11a, 图 11a为本发明实施例十一提供的装置示意图。 如图 11a 所示, 一种业务接入控制装置 1A, 可以包括:
获取单元 10, 用于获取 TFT信息;
判断单元 11 , 用于当业务数据接入控制启动时, 判断业务数据是否在获 取单元 10获取到的 TFT信息的允许接入范围内;
执行单元 12, 用于在判断单元 11判断出结果为是时, 允许所述业务数据 接入; 在所述判断单元判断出结果为否时, 禁止所述业务数据接入。
请一并参阅图 l ib ,图 l ib为本发明实施例十一提供的另一种装置示意图。 该装置为图 11a所示装置的优化。 如图 l ib所示, 一个实施例中, 一种业务接 入控制装置 1B, 还可以包括: 获取单元 10可以包括: 第一接收单元 13, 用于接收网络侧设备发送的附 着接受消息, 所述附着接受消息中携带所述 TFT信息。
本实施例的业务接入控制装置 1B可以是例如方法实施例一至二中的 UE 等终端设备。
请一并参阅图 11c,图 11c为本发明实施例十一提供的另一种装置示意图。 该装置为图 11a所示装置的优化。 如图 11c所示, 一个实施例中, 一种业务接 入控制装置 1C, 获取单元 10还可以包括: 第二接收单元 14, 用于接收 PCRF 下发的 TFT信息。
本实施例的业务接入控制装置 1C可以是例如方法实施例中的 PGW或者 GGSN等网络设备。
请一并参阅图 l id,图 l id为本发明实施例十一提供的另一种装置示意图。 该装置为图 11a所示装置的优化。 如图 l id所示, 一个实施例中, 一种业务接 入控制装置 1D的获取单元 10可以包括: 获取模块 15, 用于获取本地配置的 TFT信息。
本实施例的业务接入控制装置 1D可以是例如方法实施例中的 PGW或者
GGSN等网络设备。
值得指出的是, 本发明实施十一提供的装置中, 所述 TFT信息包括: 允 许接入信息和 /或禁止接入信息, 所述允许接入信息包括所述允许接入信息对 应的流模板信息,所述禁止接入信息分别包括所述禁止接入信息对应的流模板 信息, 所述流模板信息为源 IP地址、 目的 IP地址、 源端口号、 目的端口号、 上层协议号以及应用标识的任意组合;
判断单元 11 , 具体用于: 判断业务数据的信息是否与所述允许接入信息 对应的流模板信息一致, 若是, 则判断出所述业务数据在所述 TFT信息的允 许接入范围内, 否则, 则判断出所述业务数据不在所述 TFT信息的允许接入 的范围内; 和 /或, 判断业务数据的信息是否与为所述禁止接入信息对应的流 模板信息一致, 若是, 则判断出所述业务数据不在所述 TFT信息的允许接入 的范围内, 否则判断出所述业务数据在所述 TFT信息的允许接入的范围内。
本发明实施例十一提供的一种业务接入控制装置, 用于获取 TFT信息, 当业务数据接入控制启动, UE向网络发送业务数据时或者外部网络向 UE发 送业务数据时, 判断要发送的业务数据是否在该 TFT信息的允许接入范围内。 若在则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务 数据接入控制启动时,在对一些需要被禁止接入的业务数据进行禁止接入控制 的同时, 根据实际的需要, 允许一些业务数据的接入。 本实施例装置可以有针 对性地对网络中传输的业务数据进行接入控制或者禁止控制,有效解决网络中 的拥堵情况, 并且不影响正常的业务数据接入。 实施例十二:
请参阅图 12a, 图 12a为本发明实施例十二提供的装置示意图。 如图 12a 所示, 一种业务接入控制装置 2A, 可以包括:
获取单元 20, 用于获取 TFT信息, 所述 TFT信息携带指示信息; 判断单元 21 , 用于当业务数据接入控制启动时, 判断获取单元 21获取到 的所述 TFT信息携带的指示信息是否指示允许所述 TFT信息对应的业务数据 接入;
执行单元 22, 用于在判断单元 21判断出结果为是时, 允许所述业务数据 接入; 在所述判断单元判断出结果为否时, 禁止所述业务数据接入。
请一并参阅图 12b,图 12b为本发明实施例十二提供的另一种装置示意图。 该装置为图 12a所示装置的优化。 如图 12b所示, 一个实施例中, 业务接入控 制装置 2B的获取单元 20, 可以包括: 第一接收单元 23 , 用于接收网络侧设 备发送的第一请求消息, 所述第一请求消息中携带 TFT信息, 所述 TFT信息 携带指示信息;
所述第一请求消息包括:
网络侧设备发送的激活专用承载请求消息、 请求二次分组报文协议 PDP 上下文激活消息、 修改增强型分组系统 EPS承载请求消息、 修改 PDP上下文 请求消息、激活二次 PDP上下文接受消息以及请求二次 PDP上下文激活消息。
本实施例的业务接入控制装置 2B可以是例如本发明方法实施例三至十中 的 UE等终端设备。
请一并参阅图 12c,图 12c为本发明实施例十二提供的另一种装置示意图。 该装置为图 12a所示装置的优化。 如图 12c所示, 一个实施例中, 一种业务接 入控制装置 2C, —种业务接入控制装置的获取单元 20, 还可以包括: 第二接 收单元 24, 用于接收第二请求消息, 所述第二请求消息中携带 TFT信息, 所 述 TFT信息携带指示信息; 所述第二请求消息包括: PCRF下发的 IP-CAN会 话修改流程消息。
本实施例的业务接入控制装置 2C可以是例如本发明方法实施例三至十中 的 PGW或者 GGSN等网络设备。
请一并参阅图 12d,图 12d为本发明实施例十二提供的另一种装置示意图。 该装置为图 12a所示装置的优化。 如图 12d所示, 一个实施例中, 一种业务接 入控制装置 2D的获取单元 20, 可以包括: 获取模块 25 , 用于获取本地配置 的 TFT信息, 所述 TFT信息携带指示信息。
本实施例的业务接入控制装置 2D可以是例如本发明方法实施例三至十中 的 PGW或者 GGSN等网络设备。
本发明实施例十二中提供的一种业务接入控制装置, 用于获取 TFT信息, 该 TFT信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数 据时或者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否 指示允许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数 据接入,若否,则禁止该业务数据接入。从而可以在业务数据接入控制启动时, 在对一些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需 要, 允许一些业务数据的接入。本实施例装置可以有针对性地对网络中传输的 业务数据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影 响正常的业务数据接入。 实施例十三:
请参阅图 13, 图 13为本发明实施例十三提供的装置示意图。 如图 13所 示, 一种业务接入控制装置, 可以包括:
至少一个处理器 30、 输入装置 31、 输出装置 32和存储器 33。 本发明实 施例中, 处理器 30、 输入装置 31、 输出装置 32和存储器 33可以通过总线或 其他方式连接。 图 13以通过总线连接为例。
其中, 处理器 30执行以下步骤: 获取 TFT信息; 当业务数据接入控制启 动时, 判断业务数据是否在所述 TFT信息的允许接入范围内; 在判断出结果 为是时, 允许所述业务数据接入; 在所述判断出结果为否时, 禁止所述业务数 据接入。
本发明的一个实施例中, 处理器 30在执行获取 TFT信息时, 具体可以执 行以下步骤: 接收网络侧设备发送的附着接受消息, 所述附着接受消息中携带 所述 TFT信息。
本发明的一个实施例中, 处理器 30在执行获取 TFT信息时, 具体可以执 行以下步骤: 接收 PCRF下发的 TFT信息。
本发明的一个实施例中, 处理器 30在执行获取 TFT信息时, 具体可以执 行以下步骤: 获取本地配置的 TFT信息。
本发明的一个实施例中,存储器 33可以存储有 TFT信息,所述 TFT信息 包括: 允许接入信息和 /或禁止接入信息, 所述允许接入信息包括所述允许接 入信息对应的流模板信息,所述禁止接入信息分别包括所述禁止接入信息对应 的流模板信息, 所述流模板信息为源 IP地址、 目的 IP地址、 源端口号、 目的 端口号、 上层协议号以及应用标识的任意组合。
本发明的一个实施例中, 处理器 30在执行当业务数据接入控制启动时, 判断业务数据是否在获取单元 10获取到的 TFT信息的允许接入范围内的步骤 时, 具体可以执行以下步骤: 判断业务数据的信息是否与所述允许接入信息对 应的流模板信息一致, 若是, 则判断出所述业务数据在所述 TFT信息的允许 接入范围内, 否则, 则判断出所述业务数据不在所述 TFT信息的允许接入的 范围内; 和 /或, 判断业务数据的信息是否与为所述禁止接入信息对应的流模 板信息一致, 若是, 则判断出所述业务数据不在所述 TFT信息的允许接入的 范围内, 否则判断出所述业务数据在所述 TFT信息的允许接入的范围内。
本发明实施例十三提供的一种业务接入控制装置, 用于获取 TFT信息, 当业务数据接入控制启动, UE向网络发送业务数据时或者外部网络向 UE发 送业务数据时, 判断要发送的业务数据是否在该 TFT信息的允许接入范围内。 若在则允许该业务数据接入, 若否, 则禁止该业务数据接入。 从而可以在业务 数据接入控制启动时,在对一些需要被禁止接入的业务数据进行禁止接入控制 的同时, 根据实际的需要, 允许一些业务数据的接入。 本实施例装置可以有针 对性地对网络中传输的业务数据进行接入控制或者禁止控制,有效解决网络中 的拥堵情况, 并且不影响正常的业务数据接入。 实施例十四:
请参阅图 14, 图 14为本发明实施例十四提供的装置示意图。 如图 14所 示, 一种业务接入控制装置, 可以包括: 至少一个处理器 40、 输入装置 41、 输出装置 42和存储器 43。 本发明实施例中, 处理器 40、 输入装置 41、 输出 装置 42和存储器 43可以通过总线或其他方式连接。 图 14以通过总线连接为 例。
其中, 处理器 40执行以下步骤: 获取 TFT信息, 所述 TFT信息携带指示 信息; 当业务数据接入控制启动时,判断所述 TFT信息携带的指示信息是否指 示允许所述 TFT信息对应的业务数据接入; 在判断出结果为是时, 允许所述 业务数据接入; 在判断出结果为否时, 禁止所述业务数据接入。
本发明的一个实施例中, 处理器 40执行在执行获取 TFT信息, 所述 TFT 信息携带指示信息的步骤时, 具体可以执行以下步骤: 接收网络侧设备发送的 第一请求消息, 所述第一请求消息中携带 TFT信息, 所述 TFT信息携带指示 信息。
其中, 存储单元 43存储有第一请求消息, 第一请求消息包括: 网络侧设 备发送的激活专用承载请求消息、 请求二次分组报文协议 PDP上下文激活消 息、 修改增强型分组系统 EPS承载请求消息、 修改 PDP上下文请求消息、 激 活二次 PDP上下文接受消息以及请求二次 PDP上下文激活消息。
本发明的一个实施例中, 处理器 40执行在执行获取 TFT信息, 所述 TFT 信息携带指示信息时, 具体可以执行以下步骤: 接收第二请求消息, 所述第二 请求消息中携带 TFT信息, 所述 TFT信息携带指示信息。
其中, 存储单元 43存储有第二请求消息, 第二请求消息包括: PCRF下 发的 IP-CAN会话修改流程消息。
本发明的一个实施例中, 处理器 40执行在执行获取 TFT信息, 所述 TFT 信息携带指示信息时, 具体可以执行以下步骤: 获取本地配置的 TFT信息, 所述 TFT信息携带指示信息。
本发明实施例十四中提供的一种业务接入控制装置, 用于获取 TFT信息, 该 TFT信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数 据时或者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否 指示允许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数 据接入,若否,则禁止该业务数据接入。从而可以在业务数据接入控制启动时, 在对一些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需 要, 允许一些业务数据的接入。本实施例装置可以有针对性地对网络中传输的 业务数据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影 响正常的业务数据接入。
本发明实施例十四中提供的一种业务接入控制装置, 用于获取 TFT信息, 该 TFT信息携带指示信息, 当业务数据接入控制启动, UE向网络发送业务数 据时或者外部网络向 UE发送业务数据时,判断 TFT信息携带的指示信息是否 指示允许该 TFT信息对应的业务数据接入。 若判断结果为是则允许该业务数 据接入,若否,则禁止该业务数据接入。从而可以在业务数据接入控制启动时, 在对一些需要被禁止接入的业务数据进行禁止接入控制的同时,根据实际的需 要, 允许一些业务数据的接入。本实施例装置可以有针对性地对网络中传输的 业务数据进行接入控制或者禁止控制,有效解决网络中的拥堵情况, 并且不影 响正常的业务数据接入。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤 是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可 读存储介质中, 上述提到的存储介质可以是只读存储器, 磁盘或光盘等。
以上对本发明所提供的一种业务接入控制方法和装置进行了详细介绍,对 于本领域的一般技术人员,依据本发明实施例的思想,在具体实施方式及应用 范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。

Claims

权 利 要 求
1、 一种业务接入控制方法, 其特征在于, 包括:
获取业务流模板 TFT信息;
当业务数据接入控制启动时, 判断业务数据是否在所述 TFT信息的允许 接入范围内;
若判断结果为是, 则允许所述业务数据接入; 若判断结果为否, 则禁止所 述业务数据接入。
2、 根据权利要求 1 所述的业务接入控制方法, 其特征在于, 所述获取 TFT信息包括:
接收网络侧设备发送的附着接受消息,所述附着接受消息中携带所述 TFT 信息。
3、根据权利要求 2所述的业务接入控制方法,其特征在于,所述获取 TFT 信息包括:
接收策略计费规则功能 PCRF下发的 TFT信息。
4、根据权利要求 2所述的业务接入控制方法,其特征在于,所述获取 TFT 信息包括:
获取本地配置的 TFT信息。
5、 根据权利要求 1-4中任意一项所述的业务接入控制方法, 其特征在于, 所述 TFT信息包括: 允许接入信息和 /或禁止接入信息, 所述允许接入信 息包括所述允许接入信息对应的流模板信息,所述禁止接入信息包括所述禁止 接入信息对应的流模板信息;
所述判断业务数据是否在所述 TFT信息的允许接入范围内包括: 判断业务数据的信息是否与所述允许接入信息对应的流模板信息一致,若 是, 则判断出所述业务数据在所述 TFT信息的允许接入范围内, 否则, 判断 出所述业务数据不在所述 TFT信息的允许接入范围内;
和 /或,
判断业务数据的信息是否与所述禁止接入信息对应的流模板信息一致,若 是, 则判断出所述业务数据不在所述 TFT信息的允许接入的范围内, 否则判 断出所述业务数据在所述 TFT信息的允许接入范围内。
6、 根据权利要求 5所述的业务接入控制方法, 其特征在于,
所述流模板信息为源 IP地址、 目的 IP地址、 源端口号、 目的端口号、 上 层协议号以及应用标识的任意组合。
7、 一种业务接入控制方法, 其特征在于, 包括:
获取 TFT信息, 所述 TFT信息携带指示信息;
当业务数据接入控制启动时, 判断所述 TFT信息携带的指示信息是否指 示允许所述 TFT信息对应的业务数据接入;
若判断结果为是, 则允许所述业务数据接入; 若判断结果为否, 则禁止所 述业务数据接入。
8、 根据权利要求 7所述的业务接入控制方法, 其特征在于,
所述 TFT信息为源 IP地址、 目的 IP地址、 源端口号、 目的端口号、 上层 协议号以及应用标识的任意组合。
9、 根据权利要求 7或 8所述的业务接入控制方法, 其特征在于, 所述获取 TFT信息包括:
接收网络侧设备发送的第一请求消息, 所述第一请求消息中携带 TFT信 息, 所述 TFT信息携带指示信息;
所述第一请求消息包括:
网络侧设备发送的激活专用承载请求消息、 请求二次分组报文协议 PDP 上下文激活消息、 修改增强型分组系统 EPS承载请求消息、 修改 PDP上下文 请求消息、激活二次 PDP上下文接受消息以及请求二次 PDP上下文激活消息。
10、 根据权利要求 9 所述的业务接入控制方法, 其特征在于, 所述获取 TFT信息包括: 接收第二请求消息, 所述第二请求消息中携带 TFT信息; 所 述第二请求消息包括:
策略计费规则功能 PCRF下发的 IP-CAN会话修改流程消息。
11、 根据权利要求 9 所述的业务接入控制方法, 其特征在于, 所述获取
TFT信息包括:
获取本地配置的 TFT信息。
12、 一种业务接入控制装置, 其特征在于, 包括:
获取单元, 用于获取 TFT信息; 判断单元, 用于当业务数据接入控制启动时, 判断业务数据是否在所述获 取单元获取到的 TFT信息的允许接入范围内;
执行单元, 用于在所述判断单元判断出结果为是时, 允许所述业务数据接 入; 在所述判断单元判断出结果为否时, 禁止所述业务数据接入。
13、 根据权利要求 12所述的业务接入控制装置, 其特征在于, 所述获取 单元包括: 第一接收单元, 用于接收网络侧设备发送的附着接受消息, 所述附 着接受消息中携带所述 TFT信息。
14、 根据权利要求 13所述的业务接入控制装置, 其特征在于, 所述获取 单元包括: 第二接收单元, 用于接收 PCRF下发的 TFT信息。
15、 根据权利要求 13所述的业务接入控制装置, 其特征在于, 所述获取 单元包括: 获取模块, 用于获取本地配置的 TFT信息。
16、 根据权利要求 12-15中任意一项所述的业务接入控制装置, 其特征在 于, 所述 TFT信息包括: 允许接入信息和 /或禁止接入信息, 所述允许接入信 息和禁止接入信息分别包括对应的流模板信息;
所述判断单元, 具体用于: 判断业务数据的信息是否与所述允许接入信息 的流模板信息一致, 若是, 则判断出所述业务数据在所述 TFT信息的允许接 入范围内, 否则, 则判断出所述业务数据不在所述 TFT信息的允许接入的范 围内;
和 /或,
判断业务数据的信息是否与为所述禁止接入信息的流模板信息一致, 若 是, 则判断出所述业务数据不在所述 TFT信息的允许接入的范围内, 否则判 断出所述业务数据在所述 TFT信息的允许接入的范围内。
17、 根据权利要求 16所述的业务接入控制装置, 其特征在于, 所述流模 板信息为源 IP地址、 目的 IP地址、 源端口号、 目的端口号、 上层协议号以及 应用标识的任意组合。
18、 一种业务接入控制装置, 其特征在于, 包括:
获取单元, 用于获取 TFT信息, 所述 TFT信息携带指示信息; 判断单元, 用于当业务数据接入控制启动时, 判断所述获取单元获取到的 所述 TFT信息携带的指示信息是否指示允许所述 TFT信息对应的业务数据接 入;
执行单元, 用于在所述判断单元判断出结果为是时, 允许所述业务数据接 入; 在所述判断单元判断出结果为否时, 禁止所述业务数据接入。
19、 根据权利要求 18所述的业务接入控制装置, 其特征在于, 所述获取 单元包括: 第一接收单元, 用于接收网络侧设备发送的第一请求消息, 所述第 一请求消息中携带 TFT信息, 所述 TFT信息携带指示信息;
所述第一请求消息包括:
网络侧设备发送的激活专用承载请求消息、 请求二次分组报文协议 PDP 上下文激活消息、 修改增强型分组系统 EPS承载请求消息、 修改 PDP上下文 请求消息、激活二次 PDP上下文接受消息以及请求二次 PDP上下文激活消息。
20、 根据权利要求 18或 19所述的业务接入控制装置, 其特征在于, 所述 获取单元包括: 第二接收单元, 用于接收第二请求消息, 所述第二请求消息中 携带 TFT信息, 所述 TFT信息携带指示信息;
所述第二请求消息包括: PCRF下发的 IP-CAN会话修改流程消息。
21、 根据权利要求 18或 19所述的业务接入控制装置, 其特征在于, 所述 获取单元包括: 获取模块, 用于获取本地配置的 TFT信息, 所述 TFT信息携 带指示信息。
PCT/CN2013/076194 2013-05-24 2013-05-24 一种业务接入控制方法和装置 WO2014186974A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201380001926.6A CN104322013A (zh) 2013-05-24 2013-05-24 一种业务接入控制方法和装置
EP13885338.7A EP2993829A4 (en) 2013-05-24 2013-05-24 SERVICE ACCESS CONTROL METHOD AND DEVICE
PCT/CN2013/076194 WO2014186974A1 (zh) 2013-05-24 2013-05-24 一种业务接入控制方法和装置
US14/949,704 US20160088547A1 (en) 2013-05-24 2015-11-23 Service Access Control Method and Apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/076194 WO2014186974A1 (zh) 2013-05-24 2013-05-24 一种业务接入控制方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/949,704 Continuation US20160088547A1 (en) 2013-05-24 2015-11-23 Service Access Control Method and Apparatus

Publications (1)

Publication Number Publication Date
WO2014186974A1 true WO2014186974A1 (zh) 2014-11-27

Family

ID=51932730

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/076194 WO2014186974A1 (zh) 2013-05-24 2013-05-24 一种业务接入控制方法和装置

Country Status (4)

Country Link
US (1) US20160088547A1 (zh)
EP (1) EP2993829A4 (zh)
CN (1) CN104322013A (zh)
WO (1) WO2014186974A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586596B (zh) 2013-10-30 2022-11-04 交互数字专利控股公司 用于处理优先级服务拥塞的系统和方法
CN107360117B (zh) * 2016-05-09 2020-03-13 阿里巴巴集团控股有限公司 数据处理的方法、装置及系统
EP4199579B1 (en) 2016-07-07 2024-06-05 Huawei Technologies Co., Ltd. Network resource management method, apparatus, and system
CN110291798B (zh) * 2016-12-09 2021-02-09 诺基亚技术有限公司 位置相关应用管理

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345679A (zh) * 2008-08-21 2009-01-14 中兴通讯股份有限公司 动态业务的QoS保证方法、系统以及AAA和Anchor SFA
CN102325350A (zh) * 2011-07-20 2012-01-18 大唐移动通信设备有限公司 基于默认承载的业务过滤方法和设备
CN102891830A (zh) * 2011-07-18 2013-01-23 中兴通讯股份有限公司 保障流媒体业务服务质量的方法及系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009025600A1 (en) * 2007-08-23 2009-02-26 Telefonaktiebolaget Lm Ericsson (Publ) Method for simple retrieval of network access selection information.
CN102014370B (zh) * 2009-09-07 2014-04-30 中兴通讯股份有限公司 一种选择转换代理的方法和系统
US9204415B2 (en) * 2009-10-30 2015-12-01 Panasonic Intellectual Property Corporation Of America Communication system and apparatus for status dependent mobile services
EP2502401B1 (en) * 2009-11-20 2013-11-06 Telefonaktiebolaget LM Ericsson (publ) Controlling packet filter installation in a user equipment
EP2524476A1 (en) * 2010-01-12 2012-11-21 Nokia Siemens Networks OY Controlling traffic flow template generation
WO2011123806A2 (en) * 2010-04-02 2011-10-06 Interdigital Patent Holdings, Inc. Methods for policy management
JP6396808B2 (ja) * 2012-02-17 2018-09-26 インターデイジタル パテント ホールディングス インコーポレイテッド 輻輳を処理するおよび/またはユーザ体感品質を管理するための階層的トラフィック区分化

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345679A (zh) * 2008-08-21 2009-01-14 中兴通讯股份有限公司 动态业务的QoS保证方法、系统以及AAA和Anchor SFA
CN102891830A (zh) * 2011-07-18 2013-01-23 中兴通讯股份有限公司 保障流媒体业务服务质量的方法及系统
CN102325350A (zh) * 2011-07-20 2012-01-18 大唐移动通信设备有限公司 基于默认承载的业务过滤方法和设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2993829A4 *

Also Published As

Publication number Publication date
CN104322013A (zh) 2015-01-28
US20160088547A1 (en) 2016-03-24
EP2993829A4 (en) 2016-04-20
EP2993829A1 (en) 2016-03-09

Similar Documents

Publication Publication Date Title
JP4742171B2 (ja) 移動通信方法、呼制御ノード、優先度制御ノード及び移動管理ノード
WO2009043209A1 (fr) Procédé permettant d'établir une porteuse vers un terminal utilisateur en mode repos
EP3370393B1 (en) Method for supporting an emergency call in a mobile communication system
JP6068037B2 (ja) 移動局、ネットワーク装置及び移動通信方法
US20110182244A1 (en) Method for supporting context management by home node-b
WO2012097706A1 (zh) 一种承载修改的系统及方法
WO2011098051A1 (zh) 优先级业务处理方法、装置和系统
WO2011006450A1 (zh) 业务处理方法及通信设备
TWI678117B (zh) 在通信網路中用於緊急處理的方法及裝置
US9629179B2 (en) Method and device for processing local access connection
US20160088547A1 (en) Service Access Control Method and Apparatus
WO2018058365A1 (zh) 一种网络接入授权方法、相关设备及系统
WO2016165307A1 (zh) 决策服务质量QoS的方法、网络侧网元及系统
WO2009076814A1 (zh) 一种pcc规则更新方法和设备
US11303761B2 (en) Service data flow processing method and related device
WO2011085623A1 (zh) 本地接入网关获取终端的寻呼信息的方法和系统
JP2016537853A (ja) データ接続のためのオンデマンドQoS
US10321299B2 (en) Mobile data service control for a wireless communication device
WO2011150649A1 (zh) 分组数据网关重分配的方法和装置
WO2011032522A1 (zh) 一种实现本地接入的系统及方法
WO2016150115A1 (zh) 一种承载建立方法、分组数据网关、服务网关及系统
WO2014206318A1 (zh) 一种紧急呼叫实现方法、设备及系统
WO2011063692A1 (zh) 一种数据缓存单元区分网络链接类型的方法及系统
JP2011155704A (ja) 移動通信方法
JP2023150480A (ja) 通信システム及び通信制御方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13885338

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2013885338

Country of ref document: EP