WO2015006943A1 - 一种优选可信的wlan接入网的方法、装置及终端 - Google Patents

一种优选可信的wlan接入网的方法、装置及终端 Download PDF

Info

Publication number
WO2015006943A1
WO2015006943A1 PCT/CN2013/079549 CN2013079549W WO2015006943A1 WO 2015006943 A1 WO2015006943 A1 WO 2015006943A1 CN 2013079549 W CN2013079549 W CN 2013079549W WO 2015006943 A1 WO2015006943 A1 WO 2015006943A1
Authority
WO
WIPO (PCT)
Prior art keywords
access network
trusted
network
plmn
policy
Prior art date
Application number
PCT/CN2013/079549
Other languages
English (en)
French (fr)
Inventor
于游洋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2013/079549 priority Critical patent/WO2015006943A1/zh
Priority to CN201380000953.1A priority patent/CN104521293B/zh
Publication of WO2015006943A1 publication Critical patent/WO2015006943A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a terminal for a preferred trusted WLAN access network. Background technique
  • 3GPP Third Generation Partnership Project
  • LTE Long Term Evolution
  • a new mobile communication network architecture is defined, which can be called an evolved 3GPP packet switched domain.
  • the new 3GPP core network not only supports the 3GPP access technology, but also supports the non-3GPP access technology.
  • the UE User Equipment
  • the UE can perform the initial network through the configured network selection policy. select.
  • the UE mainly performs selection of a target access point based on PLMN (Public Land Mobile Network) information and access network (WLAN (Wireless Local Area Network)) status information.
  • PLMN Public Land Mobile Network
  • WLAN Wireless Local Area Network
  • the UE scans the surrounding WLAN network and obtains the WLAN network identifier (such as the SSID (Server Set Identifier)).
  • the UE obtains a priority list of the WLAN network identifier based on the configuration of the operator or the user's selection, and then sorts the scanned WLAN network according to the priority list of the WLAN network identifier (ie, the SSID priority list), and has the highest priority.
  • the WLAN network starts to query its corresponding PLMN.
  • the UE only considers the PLMN information and the SSID information in the WLAN when performing the target network selection.
  • the UE cannot optimize the trusted network access point.
  • the target access network the network cannot achieve the user demand of the preferred trusted access network, and the security guarantee of the user data access target access network is low, and the user experience is low.
  • the embodiments of the present invention provide a method, a device, and a terminal for a preferred trusted WLAN access network, which can implement a preferred trusted access network as a target access network user requirement, and ensure that user data is securely and reliably accessed. Network access improves the user experience of the user equipment selection target access network.
  • a first aspect of the embodiments of the present invention provides a method for a preferred trusted WLAN access network, which may include:
  • the trusted access network is selected as the target access network.
  • the acquiring the trusted access network according to the judgment result includes:
  • the trusted access network included in the visited network discovery and selection function V-ANDSF policy is obtained.
  • the obtaining the trusted access network according to the judgment result includes:
  • the trusted access network included in the H-ANDSF policy is obtained.
  • the H-ANDSF policy that is, the first network selection policy, includes:
  • a roaming relationship list that is, a PLMN list supporting the trusted access network
  • the determining whether the visited public land mobile network V-PLMN supports the trusted access network comprises: determining whether the V-PLMN is included in the roaming relationship list.
  • the V-PLMN if the V-PLMN is included in the roaming relationship list, the V-PLMN supports the trusted access network.
  • the first network selection policy includes a service provider list, where the service provider list includes a trusted state of the PLMN Instruction
  • the determining whether the visited public land mobile network V-PLMN supports the trusted access network comprises: determining whether the trusted status indication of the V-PLMN included in the service provider list is trusted.
  • the V-PLMN Support for trusted access networks.
  • the first network selection policy includes the V-PLMN supporting an access network trusted state indication
  • the determining whether the visited public land mobile network V-PLMN supports the trusted access network includes: determining whether the trusted state indication of the access network supported by the V-PLMN included in the first network selection policy is Is a trusted state.
  • the V-PLMN supports the trusted access network.
  • the selecting the trusted access network as the target access network includes:
  • the V-ANDSF policy that is, the second network selection policy, further includes: an SSID of the access network, and a trusted state indication of the access network, where the trusted state of the access network includes: trusted, or untrusted;
  • the obtaining the trusted access network included in the V-ANDSF policy includes: the identifier of the access network indicated by the trusted state in the access network obtained from the V-ANDSF policy is trusted, that is, the first preference Access Network.
  • the H-ANDSF policy that is, the first network selection policy, includes: an SSID of the access network, and a trustedness of the access network.
  • the status indication, the trusted status of the access network includes: trusted, or non-trusted;
  • the obtaining the trusted access network included in the H-ANDSF policy includes: obtaining, from the H-ANDSF policy, an identifier of the access network in which the trusted state indication is trusted in the access network, that is, the second preferred access network.
  • the first network selection policy further includes: routing information
  • the route type of the routing information includes at least one of a home domain, a home-routed route, and a local local-breakout route.
  • the routing information is used to determine whether the target access network needs to establish a connection with the home domain data gateway PGW, specifically:
  • routing information indicates that the route type is a home-routed route, determining the target The access network needs to establish a connection with the home domain PGW;
  • routing information indicates that the route type is a local-breakout route, it is determined that the target access network does not need to establish a connection with the home domain PGW.
  • the second network selection policy that is, the V-ANDSF policy, further includes: The access network and the PLMN identification information of the PGW that can be connected.
  • the trusted state indication in the access network of the V-PLMN is obtained from the V-ANDSF policy to be trusted Identification of the access network;
  • the priority of the first preferred access network is higher than the priority of the second preferred access network, and the priority of the second preferred access network is higher than the priority of the non-trusted access network.
  • a second aspect of the embodiments of the present invention provides an apparatus for a preferred trusted WLAN access network, which may include:
  • the acquiring module includes: a first acquiring unit, configured to acquire a visited network access discovery and selection function when the determining result of the determining module is yes a trusted access network included in the V-ANDSF policy;
  • a second acquiring unit configured to acquire the H-ANDSF when the determining result of the determining module is negative
  • the trusted access network included in the policy configured to acquire the H-ANDSF when the determining result of the determining module is negative.
  • the H-ANDSF policy that is, the first network selection policy includes:
  • a roaming relationship list that is, a PLMN list supporting the trusted access network
  • the determining module determines whether the visited public land mobile network V-PLMN supports the trusted access network
  • the determining module is specifically configured to: determine whether the V-PLMN is included in the roaming relationship list.
  • the V-PLMN supports the trusted access network.
  • the first network selection policy includes a service provider list, where the service provider list includes a trusted state of the PLMN Instruction
  • the determining module is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • the V-PLMN Support for trusted access networks.
  • the first network selection policy includes the V-PLMN supporting an access network trusted state indication
  • the determining module is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • V-PLMN included in the first network selection policy Determining whether the V-PLMN included in the first network selection policy supports a trusted state in the trusted state indication of the access network.
  • a seventh possible implementation if the V-PLMN included in the first network selection policy supports the trusted network, the trusted state indication is trusted. , V-PLMN supports trusted access network.
  • the selected one of the selected access networks is selected as the target access
  • the network time is specifically used to: select the trusted access network from the access network list as the target access network, where The priority of the trusted access network in the network access list is higher than the priority of the non-trusted access network.
  • the V-ANDSF policy that is, the second network selection policy, further includes: an SSID of the access network, and a trustedness of the access network.
  • the status indication, the trusted status of the access network includes: trusted, or non-trusted;
  • the first acquiring unit When acquiring the trusted access network included in the V-ANDSF policy, the first acquiring unit is specifically: the access network that is obtained from the V-ANDSF policy and whose trusted state is indicated as trusted.
  • the identifier is the first preferred access network.
  • the H-ANDSF policy that is, the first network selection policy, includes: an SSID of the access network, and a trusted state of the access network. Instructing, the trusted state of the access network includes: trusted, or non-trusted;
  • the method is: obtaining, from the H-ANDSF policy, that the trusted state indication in the access network is trusted.
  • the identifier of the access network is the second preferred access network.
  • the first network selection policy further includes: routing information
  • the route type of the routing information includes at least one of a home-routed route and a local-breakout route.
  • the routing information is used to determine whether the target access network needs to establish a connection with the home domain PGW, specifically: The routing information indicates that the route type is a home-routed route, and then determining that the target access network needs to establish a connection with the home domain PGW;
  • routing information indicates that the route type is a local-breakout route, it is determined that the target access network does not need to establish a connection with the home domain PGW.
  • the second network selection policy that is, the V-ANDSF policy, further includes: The access network and the PLMN identification information of the PGW that can be connected.
  • the first acquiring unit includes: an identifier of an access network indicated by the trusted state in the network as being trusted; a second processing sub-unit, configured to determine, according to the routing information in the first network selection policy, whether the target access network needs to establish a connection with the home domain PGW, and if the determination result is yes, determine the V-ANDSF policy Whether the trusted access network in the connection with the PLMN identification information of the PGW that can be connected includes the H-PLMN identifier;
  • a third processing subunit configured to be in the trusted access network and the PGW that can be connected
  • the trusted access network in the V-ANDSF policy is set as the first preferred access network.
  • the priority of the first preferred access network is higher than the priority of the second preferred access network, and the priority of the second preferred access network is higher than the priority of the non-trusted access network.
  • a third aspect of the embodiments of the present invention provides a terminal, which may include:
  • a memory for storing instructions
  • a processor configured to read an instruction from the memory, and perform the following operations according to the instruction: determining a target or visited public land mobile network V according to the acquired home access network discovery and selection function H-ANDSF policy - Whether the PLMN supports the trusted access network, according to the judgment result, obtains the trusted access network, and selects the trusted access network as the target access network.
  • the processor is specifically configured to: when acquiring the trusted access network according to the judgment result:
  • the trusted access network included in the visited network discovery and selection function V-ANDSF policy is obtained.
  • the processor is specifically configured to: when acquiring the trusted access network according to the judgment result:
  • the trusted access network included in the H-ANDSF policy is obtained.
  • the H-ANDSF policy that is, the first network selection policy includes:
  • a roaming relationship list that is, a PLMN list supporting the trusted access network
  • the processor is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • Determining whether the V-PLMN is included in the roaming relationship list Determining whether the V-PLMN is included in the roaming relationship list.
  • the V-PLMN supports the trusted access network.
  • the first network selection policy includes a service provider list, where the service provider list includes a trusted state of the PLMN Instruction
  • the processor is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • a sixth possible implementation if the trusted state indication of the V-PLMN included in the service provider list is trusted,
  • V-PLMN supports trusted access networks.
  • the first network selection policy includes the V-PLMN supporting an access network trusted state indication
  • the processor is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • V-PLMN included in the first network selection policy Determining whether the V-PLMN included in the first network selection policy supports a trusted state in the trusted state indication of the access network.
  • the trusted state indication is trusted.
  • V-PLMN supports trusted access network.
  • the processor is specific when the trusted access network is selected as the target access network For selecting the trusted access network from the access network list as the target access network, where the trusted access network has a higher priority than the non-trusted in the access network list The priority of the access network.
  • the V-ANDSF policy that is, the second network selection policy, further includes: an SSID of the access network, and a trustedness of the access network.
  • the status indication, the trusted status of the access network includes: trusted, or non-trusted;
  • the processor When the processor obtains the trusted access network included in the V-ANDSF policy, the processor is specifically configured to: obtain, from the V-ANDSF policy, an identifier of the access network in which the trusted state indication in the access network is trusted, That is The first preferred access network.
  • the H-ANDSF policy that is, the first network selection policy, includes: an SSID of the access network, and a trustedness of the access network.
  • the status indication, the trusted status of the access network includes: trusted, or non-trusted;
  • the processor is specifically configured to: when acquiring the trusted access network included in the H-ANDSF policy:
  • the identifier of the access network in which the trusted state indication in the access network is trusted is obtained in the H-ANDSF policy, that is, the second preferred access network.
  • the first network selection policy further includes: routing information
  • the route type of the routing information includes at least one of a home-routed route and a local-breakout route.
  • the routing information is used to determine whether the target access network needs to establish a connection with the home domain PGW, specifically: The routing information indicates that the route type is a home-routed route, and then determining that the target access network needs to establish a connection with the home domain PGW;
  • routing information indicates that the route type is a local-breakout route, it is determined that the target access network does not need to establish a connection with the home domain PGW.
  • the second network selection policy that is, the V-ANDSF policy, further includes: The access network and the PLMN identification information of the PGW that can be connected.
  • the trusted access network can be preferentially selected as the target access network, which can meet the needs of the user of the preferred trusted access network, improve the efficiency of the user to find a secure and reliable target access network, and improve the search target access network.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for a preferred trusted WLAN access network according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a second embodiment of a method for a preferred trusted WLAN access network according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a first embodiment of an apparatus for a preferred trusted WLAN access network according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of an acquiring module of a device for a preferred trusted WLAN access network according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of a second embodiment of an apparatus for a preferred trusted WLAN access network according to an embodiment of the present disclosure
  • FIG. 6 is another schematic structural diagram of an acquiring module of a device for a preferred trusted WLAN access network according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of an embodiment of a terminal according to an embodiment of the present invention. detailed description
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for a preferred trusted WLAN access network according to an embodiment of the present invention, which may include:
  • S101 Determine, according to the acquired home access network discovery and selection function H-ANDSF policy, whether the target or visited public land mobile network V-PLMN supports the trusted access network.
  • the user equipment before the user equipment performs the access network selection, the user equipment needs to establish a connection with the PGW (Packet Data Gateway) and obtain the IP address of the user equipment from the PGW. After obtaining the IP address from the PGW, the user equipment can find the H-ANDSF (Home Access Network Discovery and Selection Function) address and establish an IP connection with the H-ANDSF server.
  • the manner in which the user equipment searches for the IP address of the H-ANDSF server may include: first, statically configuring the identifier of the H-ANDSF server to the user equipment, and obtaining the H-ANDSF server by searching the static configuration information of the H-ANDSF server.
  • the manner in which the user equipment searches for the address of the H-ANDSF server includes, but is not limited to, the above-mentioned search mode.
  • the network selection policy request information may be sent to the H-ANDSF server to obtain the first network selection policy deployed by the H-ANDSF server.
  • the foregoing network selection policy request information may include: identifier information of the user equipment (for example, IP), current location information of the user equipment, capability information of the user equipment, and the like, where the capability information of the user equipment includes the user equipment.
  • Capability indication information such as indication information of the user equipment supporting the capability of the preferred trusted access network, and the like.
  • the H-ANDSF server may send the first network selection policy deployed by the user equipment to the user equipment, where the user equipment obtains the first deployment of the H-ANDSF server from the H-ANDSF server.
  • the corresponding access network selection operation can be performed according to the network selection policy.
  • the first network selection policy of the H-ANDSF server deployed by the user equipment includes: a roaming relationship list, a service provider list, a service provider trusted untrusted indication, and a V-PLMN (Visited Public Land Mobile Network) , visited public land mobile network) information about the deployed access network trusted state indication, the SSID of the access network, and the trusted state indication of the access network,
  • the roaming relationship list is a PLMN list in which a trusted access network is deployed, and the list includes one or more V-PLMN identifiers.
  • the trusted status of the access network includes: Trusted or untrusted.
  • the H-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is safe and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that there is an uncertain factor in the information included in the access point of the access network, the untrusted information or security is included. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the service provider list contains PLMN identification information, and indicates to each PLMN whether it is a trusted access or an untrusted access.
  • the H-ANDSF server may determine that the access point of a PLMN is a trusted access point, and may indicate that the PLMN is trusted; If they are all non-trusted access points, the PLMN may be indicated as being untrusted or not given any indication.
  • the user equipment when the user equipment is in the roaming state (the default user equipment is in the roaming state in the embodiment of the present invention), the user equipment also needs to find a V-ANDSF (Visited Access Network Discovery and Selection Function).
  • the IP address of the server establishing an IP connection with the V-ANDSF server.
  • the manner in which the user equipment searches for the V-ANDSF server may include: obtaining the IP address of the V-ANDSF server through the DNS server, etc., and the method does not limit the manner in which the user equipment searches for the V-ANDSF server, including but not limited to the foregoing the way.
  • the network selection policy request information may be sent to the V-ANDSF server to obtain the second network selection policy deployed by the V-NADSF server.
  • the V-ANDSF server may send the second network selection policy to the user equipment, and the user equipment may obtain the second network selection policy according to the network selection policy. Do the corresponding access network selection operation.
  • the foregoing second network selection policy includes: an SSID of the access network, a trusted state indication of the access network, and the like, where the trusted state of the access network includes: trusted, or non-trusted.
  • the V-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is secure and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that the information contained in the access point of the access network has an uncertain factor, it includes insecure information or security. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the user equipment may search for an access point of the surrounding WLAN to obtain an access point of the currently roaming V-PLMN.
  • Information including the access point SSID of the V-PLMN, status information of the access point, and the like.
  • the status information of the access point includes: a current load value of the access point, a current bandwidth occupation of the access network, a protocol type indicated by the access point, and the like.
  • the user equipment may perform the target access network selection according to the obtained access point information, combining the first network selection policy and the second network selection policy. Specifically, the user equipment obtains, from the H-ANDSF server, a roaming relationship list including the visited network in the first network selection policy, where the list includes one or more V-PLMN identifiers, and the user equipment acquires the currently roaming V- After the access point information of the PLMN, the V-PLMN may be included in the roaming relationship list of the visited network according to the access point identifier in the access point information.
  • the V-PLMN supports the trusted access network, and the second selected network may be preferentially deployed from the V-ANDSF server.
  • the policy selects the identifier of the access network in the access network of the V-PLMN as the trusted access network, and uses the trusted access network as the first priority access network.
  • the user equipment obtains the first service selection policy from the H-ANDSF server, including the service provider list, and the trusted or untrusted indication.
  • the second selected network policy deployed by the V-ANDSF server is selected to select the trusted network in the access network of the V-PLMN as the trusted access network. Identify and use the trusted access network as the first priority access network.
  • the V-PLMN may be determined to be known as the V-PL- All access networks deployed by the PLMN are non-trusted access networks, that is, all access networks deployed by the V-ANDSF server are non-trusted access networks.
  • the network selection policy searches for a trusted access network, and obtains the trusted access network in the first network selection policy deployed by the H-ANDSF server as the second preferred access network.
  • the trusted state indication of each access network deployed by the H-ANDSF server may be obtained from the first network selection policy, where the trusted network indication in the access network of the H-PLMN is obtained as a trusted access network.
  • the access network which identifies and indicates the trusted status as trusted, is set as the second preferred access network.
  • the identifiers of the access networks may be first obtained from the second network selection policy deployed by the V-ANDSF server, and according to the foregoing accesses.
  • the trusted status indication of the network determines whether the trusted network is included in the second network selection policy (the access network indicated as being trusted). If it is determined that the second network selection policy includes the trusted access network, the visited network in the first network selection policy deployed by the H-ANDSF server is further determined.
  • the roaming relationship list determines whether the V-PLMN identifier to which the trusted access network belongs is included in the roaming relationship list of the visited network or whether the V-PLMN indicates that the V-PLMN is trusted.
  • the second The trusted access network in the network selection policy is set as the first preferred access network. If it is determined that the second access network policy does not include the trusted access network, that is, all the access networks in the second network selection policy deployed by the V-ANDSF server are non-trusted access networks, and the user equipment may A trusted access network is searched from the first network selection policy deployed by the H-ANDSF server, and the trusted access network in the first network selection policy is set as the second preferred access network.
  • the user equipment finds an access point of the surrounding WLAN, and according to the status information of the access point, and the pre-acquired first network selection policy and V-ANDSF server deployed by the H-ANDSF server.
  • each access network may be prioritized to establish an access network list.
  • the third preferred access network may include a first network selection policy deployed by the H-ANDSF server, where the trusted state indication of the H-ANDSF server deployment is an untrusted access network and a V-ANDSF server deployed.
  • the trusted state of the V-ANDSF server deployed in the second-choice network policy is indicated as an untrusted access network.
  • the first preferred access network is first set as the first priority list item, that is, the trusted access network in the second network selection policy deployed by the V-ANDSF server. The highest priority is given, followed by the trusted access network in the first network selection policy deployed by the H-ANDSF server, and the last non-trusted access network. Setting the first preferred access network as the first priority list item in the access network priority list, and setting the second preferred access network as the second priority list item in the access network priority list. And setting the third preferred access network as the third priority list item in the access network priority list.
  • the second network selection policy may be adopted according to the second network selection policy.
  • the priority order of the access network deployed in the first preferred access network is prioritized. If the second preferred access network is more than one, the first preferred network may be deployed according to the first selected network. The access network priority order prioritizes each access network in the second preferred access network. Similarly, if the third priority access network has more than one, the first network selection policy or the second The access network priority order deployed in the network selection policy prioritizes each access network in the third preferred access network.
  • the V-ANDSF server deploys the second network selection policy according to the access point status of each access network.
  • Information such as the current load value of the access point of the access network, the current bandwidth occupancy of the access point, or the protocol type indicated by the access point when accessing the access network, will access the network A, B, The priority ranking of C is the highest, the second is B, and the last is C.
  • the access networks A, B, and C can be deployed according to the second network selection policy.
  • the priority order is sorted, that is, access network A has the highest priority, then B, and finally C, and access network C has a higher priority than each access network in the second preferred access network.
  • each of the second preferred access network and the third preferred access network may be prioritized to establish an access network list.
  • the user equipment may sequentially determine, according to the access network priority order in the access network list, whether each access network can have the highest priority among the PLMN priority list.
  • PLMN connection Specifically, the user equipment can obtain a static PLMN priority list based on the configuration of the operator.
  • the PLMN priority list can be statically stored in the user equipment, and the operator can also use the I-WLAN MO (Interworking-WLAN Management Object, I). - The WLAN management entity) or the ANDSF server sends to the user equipment.
  • the user equipment determines whether the highest priority access network can establish a connection with the highest priority PLMN from the highest priority access network.
  • the access network can be set as the final user equipment.
  • the target access network otherwise it continues to find out whether other access networks with lower priority can establish a connection with the highest priority PLMN until it is connected to the highest priority PLMN. If all the access networks in the access network list cannot be connected to the PLMN with the highest priority, it is determined whether the access network with the highest priority can be established with the PLMN with the highest priority, starting from the access network with the highest priority. If the result of the determination is yes, the access network is set as the target access network of the user equipment, otherwise it is continued to find whether other access networks with lower priority can establish a connection with the second highest priority PLMN. Loop until you find the final target access network.
  • the second network selection policy deployed by the V-ANDSF server and the first network selection policy deployed by the H-ANDSF server, and the roaming relationship list of the visited network in the first network selection policy or the trusted indication of the PLMN may be selected.
  • the trusted access network is used as the preferred access network, and the selected trusted access network may be prioritized, and the access network with higher priority is preferably used as the target access network to ensure user data.
  • the secure and reliable access to the target network saves the time for the user equipment to select the access network, and enhances the user experience of the user equipment selecting the target access network.
  • FIG. 2 is a schematic flowchart diagram of a second embodiment of a method for a preferred trusted WLAN access network according to an embodiment of the present disclosure, which may include: 5201. Determine whether the V-PLMN supports the trusted access network according to the obtained H-ANDSF policy. If the determination result is yes, step S202 is performed. If the determination result is no, step S203 is performed.
  • S202 Obtain, from the V-ANDSF policy, a label F of an access network in which the trusted state indication in the access network is trusted.
  • step S204 Determine, according to the routing information in the first network selection policy, whether the target access network needs to establish a connection with the home domain PGW. If the determination result is yes, step S205 is performed.
  • step S206 Determine whether the trusted access network in the V-ANDSF policy and the PLMN identity information of the PGW that can be connected include the H-PLMN identifier. If the determination result is yes, step S206 is performed.
  • the trusted access network and the PLMN identity information of the PGW that can be connected include the H-PLMN identifier, set the trusted access network in the V-ANDSF policy to be the first.
  • the access network is preferred.
  • S207 Select the trusted access network from the access network list as the target access network.
  • the user equipment before the user equipment performs the access network selection, the user equipment needs to establish a connection with the PGW, and obtain the IP address of the user equipment from the PGW. After obtaining the IP address from the PGW, the user equipment can find the H-ANDSF server address and establish an IP connection with the H-ANDSF server.
  • the manner in which the user equipment searches for the IP address of the H-ANDSF server may include: first, statically configuring the identifier of the H-ANDSF server to the user equipment, and obtaining the H-ANDSF server by searching static configuration information of the H-ANDSF server.
  • This embodiment does not limit the scheme for the user equipment to search for the H-ANDSF server address.
  • the manner in which the user equipment searches for the address of the H-ANDSF server includes, but is not limited to, the above-mentioned search mode.
  • the network selection policy request information may be sent to the H-ANDSF server to obtain the first network selection policy deployed by the H-ANDSF server.
  • the foregoing network selection policy request information may include: identifier information of the user equipment (for example, IP), current location information of the user equipment, capability information of the user equipment, and the like, where the capability information of the user equipment includes the user equipment.
  • Capability indication information such as indication information of the user equipment supporting the capability of the preferred trusted access network, and the like.
  • the first network selection policy that is deployed may be sent to the user equipment, and after the user equipment obtains the first network selection policy deployed by the H-ANDSF server from the H-ANDSF server, the corresponding access network may be made according to the network selection policy. Select an action.
  • the first network selection policy of the H-ANDSF server deployed by the user equipment includes: a roaming relationship list, a service provider list, a service provider trusted non-trusted indication, and an access network deployed by the V-PLMN.
  • the trusted state of the access network includes: trusted, or non-trusted.
  • the H-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is secure and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that there is an uncertain factor in the information included in the access point of the access network, the untrusted information or security is included. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the above service provider list includes PLMN identification information, and indicates to each PLMN whether it is a trusted access or an untrusted access.
  • the H-ANDSF server may determine that the access point of a PLMN is a trusted access point, and may indicate that the PLMN is trusted; If they are all non-trusted access points, the PLMN may be indicated as being untrusted or not given any indication.
  • the route type of the routing information includes: a home-routed route, a local-breakout route, and the like, and the route information user determines whether the target access network needs to establish a connection with the home domain PGW, specifically: if the route information displays the route If the type is home-routed, it can be determined that the target access network needs to establish a connection with the home domain PGW. If the routing information indicates that the route type is a local-breakout route, it can be determined that the target access network does not need to establish a connection with the home domain PGW.
  • the user equipment when the user equipment is in the roaming state (the default user equipment is in the roaming state in the embodiment of the present invention), the user equipment also needs to find the IP address of the V-ANDSF server and establish an IP connection with the V-ANDSF server.
  • the manner in which the user equipment searches for the V-ANDSF server may include: obtaining the IP address of the V-ANDSF server through the DNS server, etc., and the method does not limit the manner in which the user equipment searches for the V-ANDSF server, including but not limited to the foregoing the way.
  • the network selection policy request information may be sent to the V-ANDSF server to obtain the second network selection policy deployed by the V-NADSF server.
  • the V-ANDSF server may send the second network selection policy to the user equipment, and the user equipment may obtain the second network selection policy according to the network selection policy.
  • the access network should be selected for operation.
  • the foregoing second network selection policy includes: an SSID of the access network, a trusted state indication of the access network, and the like, where the trusted state of the access network includes: trusted, or non-trusted.
  • the V-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is secure and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that there is an uncertain factor in the information included in the access point of the access network, the untrusted information or security is included. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the foregoing second network selection policy further includes: a PLMN identity information that is established by the trusted access network (the first access network) and the PGW in the second network selection policy, where the identifier information indicates the access network The PLMN information to which the PGW can be connected.
  • the user equipment may search for an access point of the surrounding WLAN to obtain access point information of the currently roaming V-PLMN, including The access point SSID of the V-PLMN, the status information of the access point, and the like.
  • the status information of the access point includes: a current load value of the access point, a current bandwidth occupancy of the access network, a protocol type indicated by the access point, and the like.
  • the user equipment may perform the target according to the obtained access point information, combining the first network selection policy and the second network selection policy. Access network selection. Specifically, the user equipment obtains, from the H-ANDSF server, a roaming relationship list that includes the visited network in the first network selection policy, where the list includes one or more V-PLMN identifiers, and the user equipment acquires the currently roaming V- After the access point information of the PLMN, the V-PLMN may be included in the roaming relationship list of the visited network according to the access point identifier in the access point information.
  • the second selected network may be preferentially deployed from the V-ANDSF server.
  • the policy selects the identifier of the access network in the access network of the V-PLMN as the trusted access network, and uses the trusted access network as the first priority access network.
  • the user equipment obtains the first network selection policy from the H-ANDSF server, including the service provider list, and the trusted or untrusted indication.
  • the second selected network policy deployed by the V-ANDSF server is selected to select the trusted network in the access network of the V-PLMN as the trusted access network.
  • logo Specifically, after the trusted access network in the second network selection policy is selected, whether the target access network needs to be associated with the home domain PGW may be determined according to the routing information in the first network selection policy.
  • a connection is established, and if the result of the determination is yes, it may be further determined whether the PL-MN identity information of the trusted access network and the PGW established in the second network selection policy includes the H-PLMN identifier, and if the H-PLMN identifier is included,
  • the trusted access network in the second network selection policy may be directly connected to the home domain PGW, and the trusted access network in the second network selection policy may be set as the first preferred access network, otherwise the trusted network is indicated. If the access network cannot connect to the home domain PGW, it is not a preferred access network.
  • the V-PLMN may be determined to be known to be the V-PLMN.
  • All access networks deployed by the PLMN are non-trusted access networks, that is, all access networks deployed by the V-ANDSF server are untrusted access networks.
  • the user equipment is deployed from the H-ANDSF server.
  • the trusted access network is searched for, and the trusted access network in the first network selection policy deployed by the H-ANDSF server is obtained as the second preferred access network.
  • the trusted state indication of each access network deployed by the H-ANDSF server may be obtained from the first network selection policy, where the trusted network indication in the access network of the H-PLMN is obtained as a trusted access network.
  • the access network, which indicates the trusted status as a trusted access network, is set as the second preferred access network.
  • the identifier of each access network may be obtained from the second network selection policy deployed by the V-ANDSF server, and according to the foregoing
  • the trusted state indication of the incoming network indicates whether the trusted network is included in the second network selection policy (the access network indicated by the trusted state is trusted). If it is determined that the second network selection policy includes the trusted access network, further determining, according to the visited network roaming relationship list in the first network selection policy deployed by the H-ANDSF server, the trusted access network belongs to Whether the access point identifier of the V-PLMN is included in the roaming relationship list of the visited network or whether the V-PLMN is a trusted access.
  • the trusted connection in the second network selection policy is The access network is set as the first preferred access network (assuming that the first access network and the PGW establish a connection with the PLMN identity information, the H-PLMN identity is included in the network, and the specific judgment process may refer to the judgment description of the previous segment, and details are not described herein again) . If it is determined that the second access network policy does not include a trusted access network, that is, all the access networks in the second network selection policy deployed by the V-ANDSF server are non-trusted access networks, and the user equipment may The trusted access network is searched from the first network selection policy deployed by the H-ANDSF server, and the trusted access network in the first network selection policy is set as the second preferred access network.
  • the user equipment finds an access point of the surrounding WLAN, and according to the status information of the access point, and the pre-acquired first network selected by the H-ANDSF server.
  • the access networks may be prioritized. Establish an access network priority list.
  • the third preferred access network may include a trusted state indication of the H-ANDSF server deployed in the first network selection policy deployed by the H-ANDSF server, and the non-trusted access network and the V-ANDSF server are deployed.
  • the trusted state of the V-ANDSF server deployment in the second network selection policy is indicated as an untrusted access network.
  • the first preferred access network is first set as the first priority list item, that is, the trusted access network in the second network selection policy deployed by the V-ANDSF server. The highest priority is given, followed by the trusted access network in the first network selection policy deployed by the H-ANDSF server, and the last non-trusted access network. Setting the first preferred access network as the first priority list item in the access network list, and setting the second preferred access network as the second priority list item in the access network list, The third preferred access network is set as the third priority list item in the access network list.
  • the second network selection policy may be adopted according to the second network selection policy.
  • the priority order of the access network deployed in the first preferred access network is prioritized. If the second preferred access network is more than one, the first preferred network may be deployed according to the first selected network. The access network priority order prioritizes each access network in the second preferred access network. Similarly, if the third priority access network has more than one, the first network selection policy or the second The access network priority order deployed in the network selection policy prioritizes each access network in the third preferred access network.
  • the first preferred access network has more than one, for example, three trusted accesses including A, B, and C.
  • the network, and the V-ANDSF deploys the second network selection policy according to the access point status information of each access network, for example, the current load value of the access point of the access network when the access network is acquired, and the current access point of the access point.
  • the bandwidth occupancy, or the protocol type indicated by the access point, and the access network A, B, and C are ranked as the highest priority, the second is B, and the last is C, when the user equipment establishes access.
  • the access networks A, B, and C can be sorted according to the priority order deployed in the second network selection policy, that is, the access network A has the highest priority, then B, and finally C, and The priority of the incoming network C is higher than the priority of each access network in the second preferred access network.
  • each of the second preferred access network and the third preferred access network may be prioritized to establish an access network list.
  • the routing information in the first network selection policy deployed by the H-ANDSF server indicates that the home-routed route or the home-routed route and the local-breakout route are both available
  • the second network may be deployed according to the V-ANDSF server.
  • the first access network in the policy establishes a connection between the PLMN identity information and the PGW.
  • the trusted access network does not include the H-PLMN identity, that is, the trusted access network cannot be connected to the home domain PGW.
  • the user equipment may sequentially determine, according to the access network priority order in the access network list, whether each access network can have the highest priority among the PLMN priority list.
  • PLMN connection Specifically, the user equipment obtains a static PLMN priority list based on the configuration of the operator.
  • the PLMN priority list may be statically stored in the user equipment, and the operator may also send the information to the user equipment through the I-WLAN MO or the ANDSF server.
  • the user equipment determines whether the highest priority access network can establish a connection with the highest priority PLMN from the highest priority access network. If the determination result is yes, the access network can be set as the final user equipment.
  • the target accesses the network, otherwise it continues to search for other access networks with lower priority to establish a connection with the highest priority PLMN until it is connected to the highest priority PLMN. If all the access networks in the access network list cannot be connected to the PLMN with the highest priority, it is determined from the access network with the highest priority whether the access network with the highest priority can be established with the PLMN with the highest priority. If the result of the determination is yes, the access network is set as the target access network of the user equipment, otherwise, whether the other access networks with lower priority can be established to establish a connection with the second highest priority PLMN, Loop until you find the final target access network. Or the access network with the highest priority is used as the target access network and directly accesses.
  • the second network selection policy deployed by the V-ANDSF server and the first network selection policy deployed by the H-ANDSF server, and the roaming relationship list of the visited network in the first network selection policy or the V-PLMN are trusted.
  • non-trusted indication that the trusted access network is selected as the preferred access network, and the selected trusted access network may be prioritized, and the access network with higher priority is preferred as the target access.
  • the network ensures that the user data is securely and reliably accessed to the target network, and the access point of the target access network supports the connection of the home domain data gateway in the scenario in which the user equipment performs home domain routing, thereby avoiding reconnection of the access network.
  • the time for the user equipment to select the access network is saved, and the user experience effect of the user equipment selecting the target access network is enhanced.
  • FIG. 3 is a schematic structural diagram of a first embodiment of an apparatus for a preferred trusted WLAN access network according to an embodiment of the present invention.
  • the device of the preferred trusted WLAN access network described in this embodiment includes:
  • the determining module 10 is configured to determine, according to the acquired home access network discovery and selection function H-ANDSF policy, whether the target or visited public land mobile network V-PLMN supports the trusted access network.
  • the obtaining module 20 is configured to obtain a trusted access network according to the judgment result of the determining module.
  • the selection of the ear block 30 is used to select the trusted access network obtained by the obtained ear block as the target access network.
  • the ear block 20 (as shown in Figure 4) includes:
  • the first obtaining unit 21 is configured to: when the determining result of the determining module is YES, obtain a trusted access network included in the visited network discovery and selection function V-ANDSF policy.
  • the second obtaining unit 22 is configured to acquire, when the determining result of the determining module is negative, a trusted access network included in the H-ANDSF policy.
  • the device of the preferred trusted WLAN access network described in this embodiment may be a user equipment or the like. Before the user equipment selects the access network, it needs to establish a connection with the PGW and obtain the IP address of the user equipment from the PGW. After obtaining the IP address from the PGW, the user equipment can find the H-ANDSF server address and establish an IP connection with the H-ANDSF server.
  • the manner in which the user equipment searches for the IP address of the H-ANDSF server may include: first, statically configuring the identifier of the H-ANDSF server to the user equipment, and obtaining the H-ANDSF server by searching static configuration information of the H-ANDSF server.
  • This embodiment does not limit the scheme for the user equipment to search for the H-ANDSF server address.
  • the manner in which the user equipment searches for the address of the H-ANDSF server includes, but is not limited to, the above-mentioned search mode.
  • the network selection policy request information may be sent to the H-ANDSF server to obtain the first network selection policy deployed by the H-ANDSF server.
  • the foregoing network selection policy request information may include: identifier information of the user equipment (for example, IP), current location information of the user equipment, capability information of the user equipment, and the like, where the capability information of the user equipment includes the user equipment.
  • Capability indication information such as indication information of the user equipment's ability to support a preferred trusted access network, and the like.
  • the H-ANDSF server may send the first network selection policy deployed by the user equipment to the user equipment, where the user equipment obtains the first deployment of the H-ANDSF server from the H-ANDSF server.
  • the corresponding access network selection operation can be performed according to the network selection policy.
  • the first network selection policy of the H-ANDSF server deployed by the user equipment includes: a roaming relationship list, a service provider list, a service provider trusted untrusted indication, and an access network deployed by the V-PLMN.
  • Information such as a status indication, an SSID of the access network, and a trusted status indication of the access network, where the roaming relationship list is a PLMN in which a trusted access network is deployed.
  • the trusted status of the foregoing access network includes: trusted, or non-trusted.
  • the H-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is secure and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that the information contained in the access point of the access network has an uncertain factor, it includes insecure information or security. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the above-mentioned monthly service provider list includes PLMN identification information, and indicates to each PLMN whether it is a trusted access or an untrusted access. Specifically, when the first routing policy is deployed, the H-ANDSF server may determine that the access point of a PLMN is a trusted access point, and may indicate that the PLMN is trusted; If they are all non-trusted access points, the PLMN may be indicated as being untrusted or not given any indication.
  • the user equipment when the user equipment is in the roaming state (the default user equipment is in the roaming state in the embodiment of the present invention), the user equipment also needs to find the IP address of the V-ANDSF server to establish an IP connection with the V-ANDSF server.
  • the manner in which the user equipment searches for the V-ANDSF server may include: obtaining the IP address of the V-ANDSF server through the DNS server, etc., and the method does not limit the manner in which the user equipment searches for the V-ANDSF server, including but not limited to the foregoing the way.
  • the network selection policy request information may be sent to the V-ANDSF server to obtain the second network selection policy deployed by the V-NADSF server.
  • the V-ANDSF server may send the second network selection policy to the user equipment, and the user equipment may obtain the second network selection policy according to the network selection policy. Do the corresponding access network selection operation.
  • the foregoing second network selection policy includes: an SSID of the access network, a trusted state indication of the access network, and the like, where the trusted state of the access network includes: trusted, or untrustworthy.
  • the V-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is secure and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that there is an uncertain factor in the information included in the access point of the access network, the untrusted information or security is included. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the determining module 10 searches for the access point of the surrounding WLAN to obtain the current roaming V-PLMN.
  • Incoming point information including the access point SSID of the V-PLMN, status information of the access point, and the like.
  • the status information of the access point includes: a current load value of the access point, a current bandwidth occupation of the access network, a protocol type indicated by the access point, and the like.
  • the user equipment may perform the target according to the obtained access point information, combining the first network selection policy and the second network selection policy.
  • Access network selection Specifically, the user equipment obtains, from the H-ANDSF server, the roaming relationship list that includes the visited network in the first network selection policy, where the list includes one or more V-PLMN identifiers, and the determining module 10 of the user equipment obtains the current
  • the access point information of the V-PLMN is roamed, it is determined whether the V-PLMN is included in the roaming relationship list of the visited network according to the access point identifier in the access point information.
  • the judging module 10 judges that the currently roaming V-PLMN is included in the roaming relationship list of the visited network, it may be determined that the V-PLMN supports the trusted access network, and may obtain the first in the ear block 20
  • An obtaining unit 21 preferentially selects, from the second network selection policy deployed by the V-ANDSF server, an identifier of the access network indicated by the trusted state of the V-PLMN as a trusted access network, and uses the trusted access network as The first priority access network.
  • the determining module 10 determines that the V-PLMN is not in the roaming relationship list of the visited network in the first network selection policy, it may be determined that all access networks deployed by the V-PLMN are not trusted.
  • the access network that is, all the access networks deployed by the V-ANDSF server are all non-trusted access networks.
  • the user equipment acquires the first selection of the second obtaining unit 22 in the module 20 from the H-ANDSF server.
  • the network policy finds whether the trusted access network is included, and obtains the trusted access network in the first network selection policy deployed by the H-ANDSF server as the second preferred access network.
  • the trusted state indication of each access network deployed by the H-ANDSF server is obtained from the first network selection policy by the second obtaining unit 22 in the obtained mode, and the access network of the H-PLMN is obtained therefrom.
  • the trusted state is indicated as the identity of the trusted access network, and the access network indicated as the trusted state in the first network selection policy is set as the second preferred access network.
  • the implementation process of the obtaining module 20 for selecting the first preferred access network and the second preferred access network may be referred to the first embodiment of the method for preferentially authentic WLAN access networks provided by the embodiments of the present invention. Steps S101-S103 are not described herein again.
  • the determining module 10 may first obtain the identifiers of the access networks from the second network selection policy deployed by the V-ANDSF server, and according to The trusted status of each of the foregoing access networks indicates whether the trusted network is included in the second network selection policy (the access network indicated as being trusted). If it is determined that the second network selection policy includes the trusted access network V-PLMN, the first deployment according to the H-ANDSF server is further performed.
  • the roaming relationship list of the visited network in the network selection policy determines whether the access point identifier of the trusted access network V-PLMN is included in the visited network roaming relationship list or whether the V-PLMN indicates that it is trusted, if If the determination result is yes, the trusted access network may be obtained by the first obtaining unit 21 in the obtaining module 20, and the trusted access network in the second network selection policy is set as the first preferred access network. If the determining module 10 determines that the trusted network is not included in the second network selection policy, that is, all the access networks in the second network selection policy deployed by the V-ANDSF server are non-trusted access networks.
  • the user equipment can then search for the trusted access network from the first network selection policy deployed by the H-ANDSF server by using the second obtaining unit 22, and set the trusted access network in the first network selection policy to the second preferred connection.
  • Network access For details, refer to steps S101-S103 in the first embodiment of the method for the preferred trusted WLAN access network provided by the embodiment of the present invention, and details are not described herein again.
  • the user equipment finds an access point of the surrounding WLAN, and according to the status information of the access point, and the pre-acquired first network selection policy and V-ANDSF server deployed by the H-ANDSF server.
  • each access network may be prioritized to establish an access network list.
  • the third preferred access network may include a trusted state indication of the H-ANDSF server deployed in the first network selection policy deployed by the H-ANDSF server, and the non-trusted access network and the V-ANDSF server are deployed.
  • the trusted state of the V-ANDSF server deployment in the second network selection policy is indicated as an untrusted access network.
  • the first preferred access network is first set as the first priority list item, that is, the trusted access network in the second network selection policy deployed by the V-ANDSF server. The highest priority is given, followed by the trusted access network in the first network selection policy deployed by the H-ANDSF server, and the last non-trusted access network. Setting the first preferred access network as the first priority list item in the access network priority list, and setting the second preferred access network as the second priority list item in the access network priority list. And setting the third preferred access network as the third priority list item in the access network priority list.
  • the second network selection policy may be adopted according to the second network selection policy.
  • the priority order of the access network deployed in the first preferred access network is prioritized. If the second preferred access network is more than one, the first preferred network may be deployed according to the first selected network. The access network priority order prioritizes each access network in the second preferred access network. Similarly, if the third priority access network has more than one, the first network selection policy or the second The access network priority sequence deployed in the network selection policy will each access in the third preferred access network The network is prioritized.
  • the first preferred access network has more than one, for example, three trusted accesses including A, B, and C.
  • the network, and the V-ANDSF deploys the second network selection policy according to the access point status information of each access network, for example, the current load value of the access point of the access network when the access network is acquired, and the current access point of the access point.
  • the bandwidth occupancy, or the protocol type indicated by the access point, and the access network A, B, and C are ranked as the highest priority, followed by B, and finally C, when the user equipment establishes access.
  • the access networks A, B, and C can be sorted according to the priority order deployed in the second network selection policy, that is, the access network A has the highest priority, then B, and finally C, and The priority of the incoming network C is higher than the priority of each access network in the second preferred access network.
  • each access network in the second preferred access network and the third preferred access network may be prioritized, and finally each access network in the first preferred access network, and a second preferred access network.
  • Each access network in the access network and each access network in the third preferred access network are combined according to the priority order of each access network to establish an access network list.
  • steps S101-S103 in the first embodiment of the preferred trusted WLAN access network provided by the embodiment of the present invention. Let me repeat.
  • the selection of the access network may be sequentially determined according to the access network priority order in the access network list.
  • the user equipment obtains a static PLMN priority list based on the configuration of the operator.
  • the PLMN priority list may be statically stored in the user equipment, and the operator may also send the information to the user equipment through the I-WLAN MO.
  • the user equipment can determine, by the selection module 30, whether the highest priority access network can establish a connection with the highest priority PLMN from the highest priority access network. If the determination result is yes, the access network can be set.
  • the final target access network for the user equipment otherwise continue to find whether other access networks with lower priority can establish a connection with the highest priority PLMN until connected to the highest priority PLMN. If all the access networks in the access network list cannot be connected to the PLMN with the highest priority, it is determined from the access network with the highest priority whether the access network with the highest priority can be established with the PLMN with the highest priority. If the result of the determination is yes, the access network is set as the target access network of the user equipment, otherwise, whether the other access networks with lower priority can be established to establish a connection with the second highest priority PLMN, Loop until you find the final target access network. For a specific implementation process of selecting a target access network, refer to the steps in the first embodiment of the method for optimizing a trusted WLAN access network provided by the embodiment of the present invention. Steps S101-S103 will not be repeated here.
  • the device of the preferred trusted WLAN access network described in this embodiment may be based on the second network selection policy deployed by the V-ANDSF server and the first network selection policy deployed by the H-ANDSF server, and the first network selection policy.
  • the roaming relationship list of the visited network selects the trusted access network as the preferred access network, and may also prioritize the selected trusted access network, preferably the access network with higher priority
  • the target access network ensures that the user data is securely and reliably accessed to the target network, which saves the time for the user equipment to select the access network, and enhances the user experience effect of the user equipment selecting the target access network.
  • FIG. 5 is a schematic structural diagram of a second embodiment of an apparatus for a preferred trusted WLAN access network according to an embodiment of the present invention.
  • the device of the preferred trusted WLAN access network described in this embodiment includes:
  • the determining module 10 is configured to determine, according to the acquired home access network discovery and selection function H-ANDSF policy, whether the target or visited public land mobile network V-PLMN supports the trusted access network.
  • the obtaining module 40 is configured to obtain a trusted access network according to the judgment result of the determining module.
  • the selecting module 30 is configured to obtain a trusted access network according to the judgment result of the determining module.
  • the ear block 40 ( Figure 6) includes:
  • the first obtaining unit 41 is configured to acquire, when the determining module determines that the result is YES, access the trusted access network included in the V-ANDSF policy of the network discovery and selection function.
  • the first obtaining unit 41 includes:
  • the first processing sub-unit 411 is configured to obtain, from the V-ANDSF policy, an identifier of the access network indicated by the trusted state in the access network as being trusted.
  • the second processing sub-unit 412 is configured to determine, according to the routing information in the first network selection policy, whether the target access network needs to establish a connection with the home domain PGW, and if the determination result is yes, determine the V-ANDSF. Whether the trusted access network in the policy and the PLMN identity information of the PGW that can be connected include the H-PLMN identity.
  • a third processing sub-unit 413 configured to be in the trusted access network and the PGW that can be connected
  • the trusted access network in the V-ANDSF policy is set as the first preferred access network.
  • the second obtaining unit 42 is configured to acquire a trusted access network included in the H-ANDSF policy when the determining result of the determining module is negative.
  • the device of the preferred trusted WLAN access network described in this embodiment is specific.
  • the user equipment Before the user equipment selects the access network, it needs to establish a connection with the PGW and obtain the IP address of the user equipment from the PGW. After obtaining the IP address from the PGW, the user equipment can find the H-ANDSF server address and establish an IP connection with the H-ANDSF server.
  • the manner in which the user equipment searches for the IP address of the H-ANDSF server may include: first, statically configuring the identifier of the H-ANDSF server to the user equipment, and obtaining the H-ANDSF server by searching static configuration information of the H-ANDSF server.
  • This embodiment does not limit the scheme for the user equipment to search for the H-ANDSF server address.
  • the manner in which the user equipment searches for the address of the H-ANDSF server includes, but is not limited to, the foregoing search mode.
  • the network selection policy request information may be sent to the H-ANDSF server to obtain the first network selection policy deployed by the H-ANDSF server.
  • the foregoing network selection policy request information may include: identifier information of the user equipment (for example, IP), current location information of the user equipment, capability information of the user equipment, and the like, where the capability information of the user equipment includes the user equipment.
  • Capability indication information such as indication information of the user equipment's ability to support a preferred trusted access network, and the like.
  • the H-ANDSF server may send the first network selection policy deployed by the user equipment to the user equipment, where the user equipment obtains the first deployment of the H-ANDSF server from the H-ANDSF server.
  • the corresponding access network selection operation can be performed according to the network selection policy.
  • the first network selection policy of the H-ANDSF server deployed by the user equipment includes: a roaming relationship list, a service provider list, a service provider trusted untrusted indication, and an access network deployed by the V-PLMN.
  • the first network selection policy further includes: routing information and a preferred trusted access network indication, where the preferred trusted access network indication may indicate that the user equipment preferentially selects a secure and reliable access network (ie, Access network), in this embodiment, the first network selection policy includes a preferred trusted access network indication, that is, when the user equipment selects the access network, the trusted access network is preferentially selected.
  • the trusted state of the access network includes: trusted, or non-trusted. specific,
  • the H-ANDSF server can determine whether the access point of the access network is safe and reliable according to the data information in the SSID of each access network, and if it is determined that the access point of the access network is known. Safe and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that the access network is accessed If there is an uncertainty in the information contained in the point, that is, if the information containing unsafe information or security is unknown, the trusted state of the access network may be indicated as untrusted.
  • the above service provider list includes PLMN identification information, and indicates to each PLMN whether it is a trusted access or an untrusted access.
  • the H-ANDSF server may determine that the access point of a PLMN is a trusted access point, and may indicate that the PLMN is trusted; If they are all non-trusted access points, the PLMN may be indicated as being untrusted or not given any indication.
  • the route type of the routing information includes: a home-routed route, a local-breakout route, and the like, and the route information user determines whether the target access network needs to establish a connection with the home domain PGW, specifically: if the route information displays the route If the type is home-routed, it can be determined that the target access network needs to establish a connection with the home domain PGW. If the routing information indicates that the route type is a local-breakout route, it can be determined that the target access network does not need to establish a connection with the home domain PGW.
  • the user equipment when the user equipment is in the roaming state (the default user equipment is in the roaming state in the embodiment of the present invention), the user equipment also needs to find the IP address of the V-ANDSF server and establish an IP connection with the V-ANDSF server.
  • the manner in which the user equipment searches for the V-ANDSF server may include: obtaining the IP address of the V-ANDSF server through the DNS server, etc., and the method does not limit the manner in which the user equipment searches for the V-ANDSF server, including but not limited to the foregoing the way.
  • the network selection policy request information may be sent to the V-ANDSF server to obtain the second network selection policy deployed by the V-NADSF server from the V-ANDSF server.
  • the V-ANDSF server may send the second network selection policy to the user equipment, and the user equipment may obtain the second network selection policy according to the network selection policy. Do the corresponding access network selection operation.
  • the foregoing second network selection policy includes: an SSID of the access network, a trusted state indication of the access network, and the like, where the trusted state of the access network includes: trusted, or non-trusted.
  • the V-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is secure and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that there is an uncertain factor in the information contained in the access point of the access network, that is, the insecure information or security is included. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the foregoing second network selection policy further includes: a PLMN identity information that is established by the trusted access network and the PGW in the second network selection policy, where the identifier information indicates the PLMN information to which the PGW to which the access network can be connected belongs.
  • the determining module 10 searches for the access point of the surrounding WLAN to obtain the access of the currently roaming V-PLMN.
  • Point information including the access point SSID of the V-PLMN, status information of the access point, and the like.
  • the status information of the access point includes: a current load value of the access point, a current bandwidth occupation of the access network, a protocol type indicated by the access point, and the like.
  • the user equipment obtains the current roaming through the determining module 10.
  • the target access network selection may be performed according to the obtained access point information, combining the first network selection policy and the second network selection policy.
  • the user equipment obtains, from the H-ANDSF server, a roaming relationship list including a visited network in the first network selection policy, where the list includes one or more V-PLMN identifiers, and the determining module 10 of the user equipment obtains the current
  • the access point information of the V-PLMN is roamed, it is determined whether the V-PLMN is included in the roaming relationship list of the visited network according to the access point identifier in the access point information.
  • the V-PLMN supports the trusted access network, and may obtain the first acquiring unit in the ear block 40. 41. Selecting, from the second network selection policy deployed by the V-ANDSF server, the identifier of the access network indicated by the trusted state indication of the V-PLMN as the trusted access network. Alternatively, the user equipment obtains the first network selection policy from the H-ANDSF server, including the service provider list, and the trusted or untrusted indication.
  • the first processing unit 411 in the first acquiring unit 41 of the obtaining module 40 may obtain, from the second network selection policy, a trusted state indication of each access network deployed by the V-ANDSF server, and select a trusted state from the selected state. Indicates an access network that is trusted.
  • the second processing unit 412 can determine, according to the routing information in the first network selection policy, whether the target access network needs to The home domain PGW establishes a connection, and if the result of the determination is yes, it may further determine whether the PL-MN identity information of the trusted access network and the PGW established in the second network selection policy includes the H-PLMN identifier, and if the H-PLMN identifier is included, , indicating that the trusted access network in the second network selection policy can be directly connected to the home domain PGW, and the trusted access network in the second network selection policy can be set as the first preference by using the third processing unit 413.
  • the access network otherwise indicating that the trusted access network cannot connect to the home domain PGW, is not a preferred access network.
  • the determining module 10 determines that the V-PLMN is not in the visited network roaming relationship list in the first network selection policy, or the V-PLMN indicates that the V-PLMN is not trusted in the service provider list, it may be determined that the V-PLMN is not trusted in the service provider list. All access networks deployed by the V-PLMN are non-trusted access networks, that is, all access networks deployed by the V-ANDSF server are non-trusted access networks.
  • the second obtaining unit 42 of the obtaining module 40 can find out whether the trusted network is included in the first network selection policy deployed by the H-ANDSF server, and obtain the trusted connection in the first network selection policy deployed by the H-ANDSF server.
  • the network access is used as the second preferred access network.
  • the trusted state indication of each access network deployed by the H-ANDSF server may be obtained from the first network selection policy, where the trusted network indication in the access network of the H-PLMN is obtained as a trusted access network.
  • the access network which indicates the trusted status as a trusted access network, is set as the second preferred access network.
  • the specific implementation process of acquiring the first network selection policy and the second network selection policy by the user equipment, and the specific implementation process of selecting the first preferred access network and the second preferred access network may refer to the implementation of the present invention.
  • the second embodiment of the method for the preferred trusted WLAN access network provided by the example is not described herein again.
  • the identifier of each access network may be obtained from the second network selection policy deployed by the V-ANDSF server, and according to the foregoing
  • the trusted state indication of the incoming network indicates whether the trusted network is included in the second network selection policy (the access network indicated by the trusted state is trusted).
  • the second network selection policy includes the trusted access network, further determining, according to the roaming relationship list of the visited network in the first network selection policy deployed by the H-ANDSF server, the trusted access network belongs to Whether the access point identifier of the V-PLMN is included in the roaming relationship list of the visited network or whether the V-PLMN is a trusted access, and if the determination result is yes, the trusted access in the second selected network policy
  • the network is configured as a first preferred access network (assuming that the first access network and the PGW establish a connection with the PMN, the H-PLMN identifier is included in the network. For the specific determination process, refer to the judgment description of the previous segment, and details are not described herein again.
  • the second access network policy does not include the trusted access network, that is, all the access networks in the second network selection policy deployed by the V-ANDSF server are non-trusted access networks, and the user equipment may
  • the first network selection policy deployed by the H-ANDSF server is used to find the trusted access network, and the trusted access network in the first network selection policy is set as the second preferred access network.
  • the user equipment finds an access point of the surrounding WLAN, and according to the status information of the access point, and the pre-acquired first network selection policy and V-ANDSF server deployed by the H-ANDSF server.
  • each access network may be prioritized to establish an access network list.
  • the third preferred access network may include an H-ANDSF server deployed in the first network selection policy deployed by the H-ANDSF server, and the trusted state indication is an untrusted access network and The trusted state of the V-ANDSF server deployment in the second network selection policy deployed by the V-ANDSF server is indicated as an untrusted access network.
  • the first preferred access network may be first set as the first priority list item, that is, the trusted access in the second network selection policy deployed by the V-ANDSF server.
  • the network gives the highest priority, followed by the trusted access network in the first network selection policy deployed by the H-ANDSF server, and the last non-trusted access network.
  • Setting the first preferred access network as the first priority list item in the access network list, and setting the second preferred access network as the second priority list item in the access network list The third preferred access network is configured as a third priority list entry in the access network list.
  • the second network selection policy may be adopted according to the second network selection policy.
  • the priority order of the access network deployed in the first preferred access network is prioritized. If the second preferred access network is more than one, the second preferred access network may be deployed according to the first selected network policy.
  • the access network priority order prioritizes each access network in the second preferred access network.
  • the third priority access network has more than one, the first network selection policy or the second The access network priority order deployed in the network selection policy prioritizes each access network in the third preferred access network.
  • the first preferred access network has more than one, for example, three trusted accesses including A, B, and C.
  • the network, and the V-ANDSF deploys the second network selection policy according to the access point status information of each access network, for example, the current load value of the access point of the access network when the access network is acquired, and the current access point of the access point.
  • the bandwidth occupancy, or the protocol type indicated by the access point, and the access network A, B, and C are ranked as the highest priority, the second is B, and the last is C, when the user equipment establishes access.
  • the access networks A, B, and C can be sorted according to the priority order deployed in the second network selection policy, that is, the access network A has the highest priority, then B, and finally C, and The priority of the incoming network C is higher than the priority of each access network in the second preferred access network.
  • each of the second preferred access network and the third preferred access network may be prioritized to establish an access network list.
  • the user equipment may select the second option according to the V-ANDSF server deployment.
  • the first access network in the network policy establishes a connection between the PLMN identity information and the PGW.
  • the trusted access network does not include the H-PLMN identity, that is, the trusted access network cannot be connected to the home domain PGW.
  • the selecting module 30 may sequentially determine, according to the access network priority order in the access network list, whether each access network can be prioritized with the PLMN. The highest priority PLMN connection in the list.
  • the user equipment obtains a static PLMN priority list based on the configuration of the operator, and the PLMN priority list may be statically stored in the user equipment, and the operator may also send the information to the user equipment through the I-WLAN MO or the ANDSF server.
  • the user equipment selection module 30 determines, from the highest priority access network, whether the highest priority access network can establish a connection with the highest priority PLMN. If the determination result is yes, the access network can be set to The user equipment eventually accesses the network, otherwise it continues to find out whether other access networks with lower priority can establish a connection with the highest priority PLMN until it is connected to the highest priority PLMN.
  • the selection module 30 starts from the access network with the highest priority, and determines whether the access network with the highest priority can be the next highest priority.
  • the PLMN establishes a connection. If the judgment result is yes, the access network is set as the target access network of the user equipment, otherwise, whether the other access networks with lower priority can be established can be established with the second highest priority PLMN. Connect, loop like this until you find the final target access network. Or the access network with the highest priority is directly connected to the target access network.
  • the second embodiment of the method for the preferred trusted WLAN access network provided by the embodiment of the present invention is not described herein.
  • the device of the preferred trusted WLAN access network described in this embodiment may be based on the second network selection policy deployed by the V-ANDSF server and the first network selection policy deployed by the H-ANDSF server, and the first network selection policy.
  • the roaming relationship list of the visited network selects the trusted access network as the preferred access network, and may also prioritize the selected trusted access network, preferably the access network with higher priority
  • the target access network ensures that the user data is securely and reliably accessed to the target network, and the access point of the target access network supports the connection of the home domain data gateway in the scenario where the user equipment performs the home domain routing, thereby avoiding the access network.
  • the re-selection saves the time for the user equipment to select the access network, and enhances the user experience of the user equipment selecting the target access network.
  • FIG. 7 is a schematic structural diagram of an embodiment of a terminal according to an embodiment of the present invention.
  • the terminal described in this embodiment includes:
  • the memory 100 is configured to store instructions.
  • the processor 200 is configured to read an instruction from the memory, and perform the following operations according to the instruction: according to the acquired home access network discovery and selection function H-ANDSF policy, determine a target or Whether the visited public land mobile network V-PLMN supports the trusted access network, obtains the trusted access network according to the judgment result, and selects the trusted access network as the target access network.
  • the H-ANDSF policy that is, the first network selection policy, includes: a roaming relationship list, that is, a PLMN list supporting the trusted access network;
  • the processor is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • the V-PLMN if the V-PLMN is included in the roaming relationship list, the V-PLMN supports the trusted access network.
  • the first network selection policy includes a service provider list, where the service provider list includes a trusted status indication of the PLMN;
  • the processor is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • the trusted status indication of the V-PLMN is trusted, and the V-PLMN supports the trusted access network.
  • the first network selection policy includes an access network trusted state indication of the V-PLMN deployment
  • the processor is specifically configured to: when determining whether the visited public land mobile network V-PLMN supports the trusted access network:
  • the V-PLMN supports the trusted access network if the trusted state of the access network supported by the V-PLMN included in the first network selection policy is indicated as being trusted, the V-PLMN supports the trusted access network.
  • the terminal described in this embodiment may be a user equipment or the like. Before the user equipment selects the access network, you need to establish a connection with the PGW and obtain the IP address of the user equipment from the PGW. After obtaining the IP address from the PGW, the user equipment can find the H-ANDSF server address and establish an IP connection with the H-ANDSF server.
  • the manner in which the user equipment searches for the IP address of the H-ANDSF server may include: first, statically configuring the identifier of the H-ANDSF server to In the user equipment, the address of the H-ANDSF server is obtained by searching the static configuration information of the H-ANDSF server, and establishing an IP connection with the H-ANDSF server; or, by using the DNS server, searching for the IP address of the H-ANDSF server, and with the H- The ANDSF server establishes an IP connection, and so on.
  • This embodiment does not limit the scheme for the user equipment to find the H-ANDSF server address.
  • the manner in which the user equipment searches for the address of the H-ANDSF server includes, but is not limited to, the foregoing search mode.
  • the network selection policy request information may be sent to the H-ANDSF server to obtain the first network selection policy deployed by the H-ANDSF server.
  • the foregoing network selection policy request information may include: identifier information of the user equipment (for example, IP), current location information of the user equipment, capability information of the user equipment, and the like, where the capability information of the user equipment includes the user equipment.
  • Capability indication information such as indication information of the user equipment's ability to support a preferred trusted access network, and the like.
  • the H-ANDSF server may send the first network selection policy deployed by the user equipment to the user equipment, and the processor 200 of the user equipment acquires the H-ANDSF server from the H-ANDSF server.
  • the corresponding access network selection operation may be performed according to the network selection policy.
  • the first network selection policy of the H-ANDSF server deployed by the processor 200 of the user equipment includes: a roaming relationship list, a service provider list, a service provider trusted untrusted indication, and a V-PLMN deployment.
  • the roaming relationship list is a list of PLMNs in which the trusted access network is deployed, and the list includes one or more V-PLMN logo.
  • the first network selection policy further includes: routing information; the route type of the routing information, including at least one of a home-routed route and a local-breakout route.
  • the routing information is used to determine whether the target access network needs to establish a connection with the home domain PGW, which is:
  • routing information indicates that the route type is a home-routed route, determining that the target access network needs to establish a connection with the home domain PGW;
  • routing information indicates that the route type is a local-breakout route, it is determined that the target access network does not need to establish a connection with the home domain PGW.
  • the second network selection policy that is, the V-ANDSF policy, further includes: a PLMN in which the trusted access network in the second network selection policy establishes a connection with the PGW that can be connected Identification information.
  • the first network selection policy further includes: routing information and a preferred trusted access network indication, where the preferred trusted access network indication may indicate that the user equipment preferentially selects a secure and reliable access network (ie, Access network), the default first network selection policy in this embodiment includes a preferred trusted access network indication, that is, when the user equipment selects to access the network, the trusted access network is preferentially selected.
  • the trusted status of the foregoing access network includes: trusted, or non-trusted.
  • the H-ANDSF server may determine, according to the data information in the SSID of each access network, whether the access point of the access network is safe and reliable, and if it is determined that the access network is known If the access point is secure and reliable, it may indicate that the trusted state of the access network is trusted; if it is determined that there is an uncertain factor in the information contained in the access point of the access network, that is, the insecure information or security is included. When the information is not known, the trusted state of the access network may be indicated as being untrusted.
  • the above service provider list includes PLMN identification information, and indicates to each PLMN whether it is a trusted access or an untrusted access.
  • the H-ANDSF server may determine that the access point of a PLMN is a trusted access point, and may indicate that the PLMN is trusted; If they are all non-trusted access points, the PLMN may be indicated as being untrusted or not given any indication.
  • the route type of the routing information includes: a home-routed route, a local-breakout route, and the like, the user of the route information determines whether the target access network needs to establish a connection with the home domain PGW, specifically: if the route information indicates that the route type is The home-routed can determine that the target access network needs to establish a connection with the home domain PGW. If the routing information indicates that the route type is a local-breakout route, it can be determined that the target access network does not need to establish a connection with the home domain PGW.
  • the user equipment when the user equipment is in the roaming state (the default user equipment is in the roaming state in the embodiment of the present invention), the user equipment also needs to find the IP address of the V-ANDSF server and establish an IP connection with the V-ANDSF server.
  • the manner in which the user equipment searches for the V-ANDSF server may include: obtaining the IP address of the V-ANDSF server through the DNS server, etc., and the method does not limit the manner in which the user equipment searches for the V-ANDSF server, including but not limited to the foregoing the way.
  • the network selection policy request information may be sent to the V-ANDSF server to obtain the second network selection policy deployed by the V-NADSF server.
  • the V-ANDSF server may send the second network selection policy to the user equipment, and the processor 200 of the user equipment may obtain the second network selection policy.
  • the network selection strategy performs the corresponding access network selection operation.
  • the foregoing second network selection policy includes: an SSID of the access network, a trusted state indication of the access network, and the like, where the trusted state of the access network includes: trusted, or non-trusted.
  • the data information in the SSID of each access network determines whether the access point of the access network is secure and reliable.
  • the trusted state of the access network may be indicated as Trusted; if it is determined that there is an uncertainty in the information contained in the access point of the access network, that is, information containing unsafe information or security is unknown, the trusted state of the access network may be indicated. It is not trusted.
  • the foregoing second network selection policy further includes: the PLMN identification information that the trusted access network establishes a connection with the PGW in the second network selection policy, where the identifier information indicates the PLMN information to which the PGW to which the access network can be connected belongs. .
  • the processor 200 of the user equipment may search for an access point of the surrounding WLAN to obtain access of the currently roaming V-PLMN.
  • Point information including the access point SSID of the V-PLMN, status information of the access point, and the like.
  • the status information of the access point includes: a current load value of the access point, a current bandwidth occupancy of the access network, a protocol type indicated by the access point, and the like.
  • the processor 200 of the user equipment obtains the current roaming
  • the target access network selection may be performed according to the obtained access point information in combination with the first network selection policy and the second network selection policy.
  • the processor when the processor obtains the trusted access network according to the judgment result, the processor is specifically configured to:
  • the trusted access network included in the visited network discovery and selection function V-ANDSF policy is obtained.
  • the trusted access network included in the H-ANDSF policy is obtained.
  • the processor 200 of the user equipment obtains, from the H-ANDSF server, a roaming relationship list including the visited network in the first network selection policy, where the list includes one or more V-PLMN identifiers, and the processor of the user equipment
  • the network may determine, according to the access point identifier in the access point information, whether the V-PLMN is included in the visited network roaming relationship list. If it is determined that the currently roaming V-PLMN is included in the visited network roaming relationship list, it may be determined that the V-PLMN supports the trusted access network, and the second selected network policy may be preferentially deployed from the V-ANDSF server.
  • the identifier of the access network in the access network of the V-PLMN is selected as the identity of the trusted access network, and the trusted access network is used as the first priority access network.
  • the processor when the processor obtains the trusted access network of the V-PLMN included in the V-ANDSF policy, the processor is specifically configured to: Obtaining, from the V-ANDSF policy, an identifier of the access network indicated by the trusted state in the access network as being trusted;
  • the processor 200 may also determine, according to the routing information in the first network selection policy, whether the target access network needs to establish a connection with the home domain PGW. If the result of the determination is yes, it may be further determined whether the PLMN identification information of the trusted access network and the PGW in the second network selection policy includes the H-PLMN identifier, and if the H-PLMN identifier is included, the shell 'J indicates the second
  • the trusted access network in the network selection policy can be directly connected to the home domain PGW, and the trusted access network in the second network selection policy can be set as the first preferred access network, otherwise the trusted access is indicated.
  • the processor 200 determines that the V-PLMN is not in the visited network roaming relationship list in the first network selection policy, or the V-PLMN indicates that the V-PLMN is not trusted in the service provider list, it may determine that the V-PLMN is not trusted. All access networks deployed by the V-PLMN are non-trusted access networks, that is, all access networks deployed by the V-ANDSF server are non-trusted access networks.
  • the processor 200 of the user equipment the first network selection policy deployed by the H-ANDSF server is used to find whether the trusted access network is included, and the trusted access network in the first network selection policy deployed by the H-ANDSF server is obtained as the second preferred access network.
  • the processor 200 of the user equipment finds an access point of the surrounding WLAN, and according to the status information of the access point, and the pre-acquired first network selection policy of the H-ANDSF server deployment.
  • each access network may be prioritized and established.
  • the third preferred access network may include: the trusted state indication of the H-ANDSF server deployed in the first network selection policy deployed by the H-ANDSF server is an untrusted access network and the second selected network policy. The trusted state of the V-ANDSF server deployment is indicated as an untrusted access network.
  • the first preferred access network is first set as the first priority list item, that is, the second selection of the V-ANDSF server deployment.
  • the trusted access network in the network policy gives the highest priority, followed by the trusted access network in the first network selection policy deployed by the H-ANDSF server, and the last non-trusted access network. Setting the first preferred access network as the first priority list item in the access network list, and setting the second preferred access network as the second priority list item in the access network list,
  • the third preferred access network is set as the third priority list item in the access network list.
  • the second network selection policy may be adopted according to the second network selection policy.
  • the priority order of the access network deployed in the first preferred access network is prioritized. If the second preferred access network is more than one, the second preferred access network may be deployed according to the first selected network policy.
  • the access network priority order prioritizes each access network in the second preferred access network.
  • the third priority access network has more than one, the first network selection policy or the second The access network priority order deployed in the network selection policy prioritizes each access network in the third preferred access network.
  • the V-ANDSF server deploys the second network selection policy according to the access point status information of each access network, for example, the current load value of the access point of the access network when the access network is acquired, and the access point The current bandwidth usage, or the protocol type indicated by the access point, the access network A, B, and C are ranked as the highest priority, the second is B, and the last is C, when the user equipment is established.
  • the access networks A, B, and C can be sorted according to the priority order deployed in the second network selection policy, that is, the access network A has the highest priority, then B, and finally C, and The priority of the access network C is higher than the priority of each access network in the second preferred access network.
  • each of the second preferred access network and the third preferred access network may be prioritized to establish an access network list.
  • the processor 200 may be deployed according to the V-ANDSF server.
  • the PLMN identification information of the first access network and the PGW in the network selection policy is deleted.
  • the trusted access network does not include the H-PLMN identity, that is, the trusted access network of the home domain PGW cannot be connected.
  • the processor is specifically configured to: when the trusted access network is selected as the target access network:
  • the access network may be The access network priority order in the list sequentially determines whether each access network can connect with the PLMN with the highest priority in the PLMN priority list.
  • the user equipment obtains a static PLMN priority list based on the configuration of the operator.
  • the PLMN priority list may be statically stored in the user equipment, and the operator may also send the information to the user equipment through the I-WLAN MO or the ANDSF server.
  • the processor 200 of the user equipment determines whether the highest priority access network can establish a connection with the highest priority PLMN from the highest priority access network.
  • the access network can be set to The user equipment eventually accesses the network, otherwise it continues to find out whether other access networks with lower priority can establish a connection with the highest priority PLMN until it is connected to the highest priority PLMN. If all access networks in the access network priority list cannot be connected to the highest priority PLMN, it is determined from the access network with the highest priority whether the access network with the highest priority can be associated with the next highest priority. The PLMN establishes a connection. If the judgment result is yes, the access network is set as the target access network of the user equipment, otherwise, whether the other access networks with lower priority can be established to establish a connection with the second highest priority PLMN. , so loop until you find the final target access network. Or the access network with the highest priority is directly connected to the target access network.
  • the terminal described in this embodiment may be configured according to a second network selection policy deployed by the V-ANDSF server.
  • the first network selection policy deployed by the H-ANDSF server, and the roaming relationship list of the visited network in the first network selection policy the trusted access network is selected as the preferred access network, and the selected network may also be selected.
  • the access network is prioritized, and the access network with higher priority is used as the target access network, which ensures that the user data is securely and reliably accessed to the target network, and the target can be guaranteed in the scenario where the user equipment performs home domain routing.
  • the access point of the access network supports the connection of the home domain data gateway, avoids the reselection of the access network, saves the time for the user equipment to select the access network, and enhances the user experience effect of the user equipment selecting the target access network.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Abstract

本发明实施例提供了一种优选可信的WLAN接入网的方法,包括:根据获取的归属地接入网络发现和选择功能H-ANDSF策略,判断目标或拜访地公共陆地移动网络V-PLMN是否支持可信接入网;根据判断结果,获取可信接入网;选取所述可信接入网为目标接入网。本发明实施例还提供了一种优选可信的WLAN接入网的装置及终端。釆用本发明,具体可优先选择可信的接入网作为目标接入网的优点。

Description

一种优选可信的 WLAN接入网的方法、 装置及终端 技术领域
本发明涉及通信技术领域, 尤其涉及一种优选可信的 WLAN接入网的方 法、 装置及终端。 背景技术
为了应对无线宽带技术的挑战, 保持 3GPP ( Third Generation Partnership Project, 第三代合作伙伴计划)网络的领先优势, 3GPP在 2004年底制定了移 动通信网络的 LTE ( Long Term Evolution, 长期演进), 在此演进计划的指导 下, 定义了新的移动通信网络架构, 可称之为演进的 3GPP分组交换域。 新的 3GPP核心网络不但支持 3GPP接入技术, 同时也支持非 3GPP接入技术, 尤 其对于支持多种接入技术的 UE ( User Equipment, 用户设备), UE可以通过 配置的选网策略进行初始网络选择。
现有技术中 UE主要基于 PLMN(Public Land Mobile Network, 公共陆地 移动网络)信息与接入网络( WLAN ( Wireless Local Area Networks , 无线局域 网))状态信息进行目标接入点的选择。 UE扫描周围存在的 WLAN网络, 获 取 WLAN网络标识(如 SSID ( Server Set Identifier, 服务集合标识))。 UE基 于运营商的配置或用户的选择获取 WLAN网络标识的优先级列表, 再将扫描 到的 WLAN网络按照 WLAN网络标识的优先级列表 (即 SSID优先级列表) 进行排序, 并从优先级最高的 WLAN网络开始查询其所对应的 PLMN。
然而, 现有技术中 UE进行目标网络选择时只考虑了 PLMN信息与 WLAN 中的 SSID信息, 当 WLAN网络部署中存在可信的网络接入点时, UE无法优选 可信的网络接入点对应的网络作为目标接入网,无法实现优选可信的接入网络 的用户需求, 用户数据接入目标接入网的安全性保障低, 用户体验效果低。 发明内容
本发明实施例提供了一种优选可信的 WLAN接入网的方法、 装置及终端, 可实现优选可信接入网作为目标接入网络的用户需求,保证用户数据安全可靠 地接入目标接入网, 提高了用户设备选择目标接入网的用户体验效果。 本发明实施例第一方面提供了一种优选可信的 WLAN接入网的方法,其可 包括:
根据获取的归属地接入网络发现和选择功能 H-ANDSF策略,判断目标或 拜访地公共陆地移动网络 V-PLMN是否支持可信接入网;
根据判断结果, 获取可信接入网;
选取所述可信接入网为目标接入网。
结合第一方面, 在第一种可能的实现方式中, 所述根据判断结果, 获取可 信接入网, 包括:
当判断结果为是时, 获取拜访地接入网络发现和选择功能 V-ANDSF策略 中包含的可信接入网。
结合第一方面, 在第二种可能的实现方式中, 所述根据判断结果, 获取可 信接入网, 包括:
当判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
结合第一方面第一种可能的实现方式,在第三种可能的实现方式中, 所述 H-ANDSF策略即第一选网策略中包括:
漫游关系列表, 即支持可信接入网的 PLMN列表;
所述判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入网,包括: 判断所述漫游关系列表中是否包含所述 V-PLMN。
结合第一方面第三种可能的实现方式,在第四种可能的实现方式中,如果 所述漫游关系列表中含有所述 V-PLMN, 则 V-PLMN支持可信接入网。
结合第一方面第一种可能的实现方式,在第五种可能的实现方式中, 所述 第一选网策略中包括服务提供商列表,其中所述服务提供商列表中包含 PLMN 的可信状态指示;
所述判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入网,包括: 判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
结合第一方面第五种可能的实现方式,在第六种可能的实现方式中,如果 所述服务提供商列表中包含的所述 V-PLMN 的可信状态指示为可信, 则 V-PLMN支持可信接入网。
结合第一方面第一种可能的实现方式,在第七种可能的实现方式中, 所述 第一选网策略中包括所述 V-PLMN支持接入网可信状态指示;
所述判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入网,包括: 判断所述第一选网策略中包含的所述 V-PLMN支持的接入网的可信状态 指示中是否为可信状态。
结合第一方面第七种可能的实现方式,在第八种可能的实现方式中,如果 所述第一选网策略中包含的所述 V-PLMN支持的接入网的可信状态指示为可 信, 则 V-PLMN支持可信接入网。
结合第一方面至第一方面第八种可能的实现方式中任一种,在第九种可能 的实现方式中, 所述选取所述可信接入网为目标接入网, 包括:
从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
结合第一方面第一种可能的实现方式,在第十种可能的实现方式中, 所述
V-ANDSF策略即第二选网策略中还包括: 接入网的 SSID、接入网的可信状态 指示, 所述接入网的可信状态包括: 可信, 或者非可信;
所述获取 V-ANDSF策略中包含的可信接入网包括: 从所述 V-ANDSF策 略中获取的接入网中可信状态指示为可信的接入网的标识,即为第一优选接入 网。
结合第一方面第二种可能的实现方式,在第十一种可能的实现方式中, 所 述 H-ANDSF策略即第一选网策略中包括: 接入网的 SSID、 接入网的可信状 态指示, 所述接入网的可信状态包括: 可信, 或者非可信;
所述获取 H-ANDSF策略包含的可信接入网包括: 从所述 H-ANDSF策略 中获取接入网中可信状态指示为可信的接入网的标识, 即为第二优选接入网。
结合第一方面第一种可能的实现方式,在第十二种可能的实现方式中, 所 述第一选网策略中, 还包括: 路由信息;
所述路由信息的路由类型, 包括归属域 home-routed 路由、 本地 local-breakout路由中至少一种。
结合第一方面第十二种可能的实现方式,在第十三种种可能的实现方式中, 所述路由信息用于判断目标接入网是否需要与归属域数据网关 PGW建立连接, 具体为:
若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
结合第一方面第十三种可能的实现方式, 在第十四种可能的实现方式中, 所述第二选网策略即 V-ANDSF策略中, 还包括: 所述第二选网策略中的接入 网与可以连接的所述 PGW的 PLMN标识信息。
结合第一方面第十四种可能的实现方式, 在第十五种可能的实现方式中, 从所述 V-ANDSF策略中获取所述 V-PLMN的接入网中可信状态指示为可 信的接入网的标识;
根据所述第一选网策略中的路由信息判断目标接入网是否需要与所述归 属域 PGW建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信 接入网与可以连接的所述 PGW的 PLMN标识信息中是否包含 H-PLMN标识; 若所述可信接入网与所述 PGW建立连接的 PLMN标识信息中包含所述 H-PLMN标识, 则将所述 V-ANDSF策略中的可信接入网设定为第一优选接入 网。
结合第一方面第十种可能的实现方式或者第一方面第十一种可能的实现 方式或者第一方面第十五种可能的实现方式中任一种,在第十六种可能的实现 方式中, 所述第一优选接入网的优先级高于所述第二优选接入网的优先级, 所 述第二优选接入网的优先级高于非可信接入网的优先级。
本发明实施例第二方面提供了一种优选可信的 WLAN接入网的装置,其可 包括:
判断模块,用于根据获取的归属地接入网络发现和选择功能 H-ANDSF策 略, 判断目标或拜访地公共陆地移动网络 V-PLMN是否支持可信接入网; 获取模块, 用于根据所述判断模块的判断结果, 获取可信接入网; 选耳 莫块, 用于选取所述获取模块获取到的可信接入网为目标接入网。 结合第二方面, 在第一种可能的实现方式中, 所述获取模块, 包括: 第一获取单元, 用于在所述判断模块判断结果为是时, 获取拜访地接入网 络发现和选择功能 V-ANDSF策略中包含的可信接入网;
第二获取单元,用于在所述判断模块判断结果为否时,获取所述 H-ANDSF 策略包含的可信接入网。
结合第二方面第一种可能的实现方式,在第二种可能的实现方式中, 所述
H-ANDSF策略即第一选网策略中包括:
漫游关系列表, 即支持可信接入网的 PLMN列表;
所述判断模块在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接 入网时, 具体用于: 判断所述漫游关系列表中是否包含所述 V-PLMN。
结合第二方面第二种可能的实现方式,在第三种可能的实现方式中, 若所 述漫游关系列表中包含所述 V-PLMN, 则 V-PLMN支持可信接入网。
结合第二方面第一种可能的实现方式,在第四种可能的实现方式中, 所述 第一选网策略中包括服务提供商列表,其中所述服务提供商列表中包含 PLMN 的可信状态指示;
所述判断模块在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接 入网时具体用于:
判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
结合第二方面第四种可能的实现方式,在第五种可能的实现方式中, 若所 述服务提供商列表中包含的所述 V-PLMN的可信状态指示为可信,则 V-PLMN 支持可信接入网。
结合第二方面第一种可能的实现方式,在第六种可能的实现方式中, 所述 第一选网策略中包括所述 V-PLMN支持接入网可信状态指示;
所述判断模块在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接 入网时具体用于:
判断所述第一选网策略中包含的所述 V-PLMN支持接入网的可信状态指 示中是否为可信状态。
结合第二方面第六种可能的实现方式,在第七种可能的实现方式中, 若所 述第一选网策略中包含的所述 V-PLMN支持接入网的可信状态指示为可信, 则 V-PLMN支持可信接入网。
结合第二方面至第二方面第七种可能的所述方式中任一种,在第八种可能 的实现方式中,所述选耳 莫块在选取所述可信接入网为目标接入网时具体用于: 从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
结合第二方面第一种可能的实现方式,在第九种可能的实现方式中, 所述 V-ANDSF策略即第二选网策略中还包括: 接入网的 SSID、接入网的可信状态 指示, 所述接入网的可信状态包括: 可信, 或者非可信;
所述第一获取单元在获取 V-ANDSF策略中包含的可信接入网时具体为: 从所述 V-ANDSF策略中获取的接入网中可信状态指示为可信的接入网的标识, 即为第一优选接入网。
结合第二方面第二种可能的实现方式,在第十种可能的实现方式中, 所述 H-ANDSF策略即第一选网策略中包括: 接入网的 SSID、接入网的可信状态指 示, 所述接入网的可信状态包括: 可信, 或者非可信;
所述第二获取单元在获取 H-ANDSF策略包含的所述 H-PLMN的可信接 入网时具体为: 从所述 H-ANDSF策略中获取接入网中可信状态指示为可信的 接入网的标识, 即为第二优选接入网。
结合第二方面第一种可能的实现方式中, 在第十一种可能的实现方式中, 所述第一选网策略中, 还包括: 路由信息;
所述路由信息的路由类型, 包括 home-routed路由、 local-breakout路由中 至少一种。
结合第二方面第十一种可能的实现方式, 在第十二种可能的实现方式中, 所述路由信息用于判断目标接入网是否需要与归属域 PGW建立连接,具体为: 若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
结合第二方面第十二种可能的实现方式, 在第十三种可能的实现方式中, 所述第二选网策略即 V-ANDSF策略中, 还包括: 所述第二选网策略中的接入 网与可以连接的所述 PGW的 PLMN标识信息。
结合第二方面第十三种可能的实现方式, 在第十四种可能的实现方式中, 所述第一获取单元包括: 网中可信状态指示为可信的接入网的标识; 第二处理子单元,用于根据所述第一选网策略中的路由信息判断目标接入 网是否需要与所述归属域 PGW 建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信接入网与可以连接的所述 PGW的 PLMN标识信息中 是否包含 H-PLMN标识;
第三处理子单元, 用于在所述可信接入网与可以连接的所述 PGW 的
PLMN标识信息中包含所述 H-PLMN标识时 ,将所述 V-ANDSF策略中的可信 接入网设定为第一优选接入网。
结合第二方面第九种可能的实现方式或者第二方面第十种可能的实现方 式或者第二方面第十四中可能的实现方式中任一种,在第十五种可能的实现方 式中, 所述第一优选接入网的优先级高于所述第二优选接入网的优先级, 所述 第二优选接入网的优先级高于非可信接入网的优先级。
本发明实施例第三方面提供了一种终端, 其可包括:
存储器, 用于存储指令;
处理器, 用于从所述存储器中读取指令, 并根据所述指令执行如下操作: 根据获取的归属地接入网络发现和选择功能 H-ANDSF策略,判断目标或拜访 地公共陆地移动网络 V-PLMN是否支持可信接入网, 根据判断结果, 获取可 信接入网, 并选取所述可信接入网为目标接入网。
结合第三方面,在第一种可能的实现方式中 ,所述处理器在根据判断结果, 获取可信接入网时具体用于:
当判断结果为是时, 获取拜访地接入网络发现和选择功能 V-ANDSF策略 中包含的可信接入网。
结合第三方面,在第二种可能的实现方式中 ,所述处理器在根据判断结果, 获取可信接入网时具体用于:
当判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
结合第三方面第一种可能的实现方式,在第三种可能的实现方式中, 所述
H-ANDSF策略即第一选网策略中包括:
漫游关系列表, 即支持可信接入网的 PLMN列表;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述漫游关系列表中是否包含所述 V-PLMN。 结合第三方面第三种可能的实现方式,在第四种可能的实现方式中,如果 所述漫游关系列表中含有所述 V-PLMN, 则 V-PLMN支持可信接入网。
结合第三方面第一种可能的实现方式,在第五种可能的实现方式中, 所述 第一选网策略中包括服务提供商列表,其中所述服务提供商列表中包含 PLMN 的可信状态指示;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
结合第三方面第五种可能的实现方式,在第六种可能的实现方式中,如果 所述服务提供商列表中包含的所述 V-PLMN 的可信状态指示为可信, 则
V-PLMN支持可信接入网。
结合第三方面第一种可能的实现方式,在第七种可能的实现方式中, 所述 第一选网策略中包括所述 V-PLMN支持接入网可信状态指示;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述第一选网策略中包含的所述 V-PLMN支持接入网的可信状态指 示中是否为可信状态。
结合第三方面第七种可能的实现方式,在第八种可能的实现方式中,如果 所述第一选网策略中包含的所述 V-PLMN支持接入网的可信状态指示为可信, 则 V-PLMN支持可信接入网。
结合第三方面至第三方面第八种可能的实现方式中任一种,在第九种可能 的实现方式中, 所述处理器在选取所述可信接入网为目标接入网时具体用于: 从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
结合第三方面第一种可能的实现方式,在第十种可能的实现方式中, 所述 V-ANDSF策略即第二选网策略中还包括: 接入网的 SSID、接入网的可信状态 指示, 所述接入网的可信状态包括: 可信, 或者非可信;
所述处理器在获取 V-ANDSF策略中包含的可信接入网时具体用于: 从所 述 V-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标识, 即为 第一优选接入网。
结合第三方面第二种可能的实现方式,在第十一种可能的实现方式中, 所 述 H-ANDSF策略即第一选网策略中包括: 接入网的 SSID、 接入网的可信状 态指示, 所述接入网的可信状态包括: 可信, 或者非可信;
所述处理器在获取 H-ANDSF策略包含的可信接入网时具体用于:从所述
H-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标识, 即为第 二优选接入网。
结合第三方面第一种可能的实现方式,在第十二中可能的实现方式中, 所 述第一选网策略中, 还包括: 路由信息;
所述路由信息的路由类型, 包括 home-routed路由、 local-breakout路由中 至少一种。
结合第三方面第十二种可能的实现方式, 在第十三种可能的实现方式中, 所述路由信息用于判断目标接入网是否需要与归属域 PGW建立连接,具体为: 若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
结合第三方面第十三种可能的实现方式, 在第十四种可能的实现方式中, 所述第二选网策略即 V-ANDSF策略中, 还包括: 所述第二选网策略中的接入 网与可以连接的所述 PGW的 PLMN标识信息。
结合第三方面第十四种可能的实现方式, 在第十五种可能的实现方式中, 所述处理器在获取 V-ANDSF策略中包含的所述 V-PLMN的可信接入网时,具 体用于:
从所述 V-ANDSF策略中获取所述 V-PLMN的接入网中可信状态指示为可 信的接入网的标识;
根据所述第一选网策略中的路由信息判断目标接入网是否需要与所述归 属域 PGW建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信 接入网与可以连接的所述 PGW的 PLMN标识信息中是否包含 H-PLMN标识; 若所述可信接入网与可以连接的所述 PGW的 PLMN标识信息中包含所述 H-PLMN标识, 则将所述 V-ANDSF策略中的可信接入网设定为第一优选接入 网。 入网, 可优先选择可信接入网作为目标接入网络, 可满足优选可信的接入网络 的用户需求,提高了用户查找安全可靠的目标接入网络的效率,提升了查找目 标接入网络的用户体验效果。 附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要 使用的附图作简单地介绍,显而易见地, 下面描述中的附图仅仅是本发明的一 些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还 可以根据这些附图获得其他的附图。
图 1是本发明实施例提供的优选可信的 WLAN接入网的方法的第一实施 例流程示意图;
图 2是本发明实施例提供的优选可信的 WLAN接入网的方法的第二实施 例流程示意图;
图 3是本发明实施例提供的优选可信的 WLAN接入网的装置的第一实施 例结构示意图;
图 4是本发明实施例提供的优选可信的 WLAN接入网的装置的获取模块 的一结构示意图;
图 5是本发明实施例提供的优选可信的 WLAN接入网的装置的第二实施 例结构示意图;
图 6是本发明实施例提供的优选可信的 WLAN接入网的装置的获取模块 的另一结构示意图;
图 7是本发明实施例提供的终端的实施例结构示意图。 具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没有做出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。 参见图 1 , 是本发明实施例提供的优选可信的 WLAN接入网的方法的第 一实施例流程示意图, 其可包括:
S101 , 根据获取的归属地接入网络发现和选择功能 H-ANDSF策略, 判断 目标或拜访地公共陆地移动网络 V-PLMN是否支持可信接入网。
S102, 根据判断结果, 获取可信接入网。
S 103 , 选取所述可信接入网为目标接入网。
具体实现中,用户设备进行接入网选择之前, 需要先与 PGW ( Packet Data Gateway, 数据网关)建立连接, 从 PGW处获取用户设备的 IP地址。 用户设 备从 PGW获取到 IP地址之后则可查找 H-ANDSF ( Home Access Network Discovery and Selection Function, 归属地接入网络发现和选择功能)月良务器地 址,并与上述 H-ANDSF服务器建立 IP连接。具体的,用户设备查找 H-ANDSF 服务器的 IP地址的方式, 可包括: 先将 H-ANDSF服务器的标识静态配置到 用户设备中, 通过查找 H-ANDSF服务器的静态配置信息来获取 H-ANDSF服 务器的地址,与 H-ANDSF服务器建立 IP连接;或者,通过 DNS( Domain Name System, 域名系统 )服务器查找 H-ANDSF服务器的 IP地址, 并与 H-ANDSF 服务器建立 IP连接, 等。 本实施例不对用户设备查找 H-ANDSF服务器地址 的方案做限制,用户设备查找 H-ANDSF服务器的地址的方式包含但不限于上 述查找方式。
用户设备与 H-ANDSF服务器建立连接之后, 则可向 H-ANDSF服务器发 送选网策略请求信息,以获取 H-ANDSF服务器部署的第一选网策略。具体的, 上述选网策略请求信息, 可包括: 用户设备的标识信息 (例如 IP ) 、 用户设 备当前的位置信息, 用户设备的能力信息等, 其中, 上述用户设备的能力信息 中包含用户设备的能力指示信息,例如用户设备支持优选可信接入网的能力的 指示信息等。 H-ANDSF服务器接收到用户设备发送的选网策略请求信息之后, 则可将其部署的第一选网策略发送给用户设备,用户设备从 H-ANDSF服务器 处获取 H-ANDSF服务器部署的第一选网策略之后则可根据该选网策略做相应 的接入网选择操作。 具体的, 用户设备获取到的 H-ANDSF服务器部署的第一 选网策略中包括: 漫游关系列表、 服务提供商列表、 服务提供商可信非可信指 示、 V-PLMN( Visited Public Land Mobile Network,拜访地公共陆地移动网络 ) 部署的接入网可信状态指示、接入网的 SSID、接入网的可信状态指示等信息, 其中, 上述漫游关系列表为部署了可信接入网的 PLMN列表, 列表中包括一 个或者多个 V-PLMN标识。上述接入网的可信状态包括: 可信,或者非可信。 具体的, H-ANDSF服务器在部署第一选网策略时, 可根据各个接入网的 SSID 中的数据信息判断接入网的接入点是否安全、可靠, 若判断得知该接入网络的 接入点安全可靠, 则可指示该接入网的可信状态为可信; 若判断得知该接入网 的接入点包含的信息中有不确定因素,即包含有不安全信息或者安全性未可知 的信息时, 则可指示该接入网的可信状态为非可信。 服务提供商列表中包含 PLMN标识信息, 且对每个 PLMN指示其是否为可信接入或非可信接入。 具 体的, H-ANDSF服务器在部署第一选网策略时, 若判断某 PLMN部署的接入 点为可信接入点, 则可指示该 PLMN为可信; 若判断某 PLMN部署的接入点 均为非可信接入点, 则可指示该 PLMN为非可信, 或不给予任何指示。
具体实现中, 当用户设备处于漫游状态时(本发明实施例默认用户设备处 于漫游状态) , 用户设备还需要查找 V-ANDSF ( Visited Access Network Discovery and Selection Function, 拜访地接入网络发现和选择功能)服务器的 IP地址, 与 V-ANDSF服务器建立 IP连接。 具体的, 用户设备查找 V-ANDSF 服务器的方式可包括: 通过 DNS服务器获取 V-ANDSF服务器的 IP地址等, 本实施例不对用户设备查找 V-ANDSF服务器的方式做限制, 包含但不限于上 述查找方式。用户设备与 V-ANDSF服务器建立 IP连接之后,则可向 V-ANDSF 服务器发送选网策略请求信息,以获取 V-NADSF服务器部署的第二选网策略。 V-ANDSF服务器接收到用户设备发送的选网策略请求信息之后, 则可将其部 署的第二选网策略发送给用户设备,用户设备获取到第二选网策略之后则可根 据该选网策略做相应的接入网选择操作。 具体的, 上述第二选网策略中包括: 接入网的 SSID、接入网的可信状态指示等信息,其中,接入网可信状态包括: 可信, 或者非可信。 具体的, V-ANDSF服务器在部署第二选网策略时, 可根 据各个接入网的 SSID中的数据信息判断接入网的接入点是否安全、 可靠, 若 判断得知该接入网络的接入点安全可靠,则可指示该接入网的可信状态为可信; 若判断得知该接入网的接入点包含的信息中有不确定因素,即包含有不安全信 息或者安全性未可知的信息时, 则可指示该接入网的可信状态为非可信。
在一些可行的实施方式中,用户设备获取到第一选网策略和第二选网策略 之后, 则可查找周围的 WLAN的接入点, 获取当前漫游的 V-PLMN的接入点 信息, 包括 V-PLMN的接入点 SSID、 接入点的状态信息等。 其中, 上述接入 点的状态信息包括: 接入点当前的负荷值, 接入网当前的带宽占用情况, 接入 点指示的协议类型等。
用户设备获取到当前漫游的 V-PLMN的接入点信息之后, 则可根据获取 到的接入点信息, 结合第一选网策略和第二选网策略进行目标接入网选择。具 体的,用户设备从 H-ANDSF服务器获取到得第一选网策略中包括拜访地网络 的漫游关系列表, 该列表中包括一个或者多个 V-PLMN标识, 用户设备获取 到当前漫游的 V-PLMN的接入点信息之后, 则可根据该接入点信息中的接入 点标识判断该 V-PLMN是否包含在上述拜访地网络的漫游关系列表中。 若判 断得知当前漫游的 V-PLMN包含在上述拜访地网络的漫游关系列表中, 则可 判断得知 V-PLMN支持可信接入网, 可优先从 V-ANDSF服务器部署的第二 选网策略中选择 V-PLMN的接入网中可信状态指示为可信的接入网的标识, 并将该可信接入网作为第一优先接入网。 或者, 用户设备从 H-ANDSF服务器 获取到得第一选网策略中包括服务提供商列表,及可信或非可信指示。若当前 漫游的 V-PLMN指示为可信接入, 则优先从 V-ANDSF服务器部署的第二选 网策略中选择 V-PLMN的接入网中可信状态指示为可信的接入网的标识, 并 将该可信的接入网作为第一优先接入网。 此外, 若判断得知该 V-PLMN不在 第一选网策略中的拜访地网络的漫游关系列表中或 V-PLMN在服务提供商列 表中指示为非可信, 则可判断得知该 V-PLMN部署的所有接入网均为非可信 接入网, 即 V-ANDSF服务器部署的所有接入网均为非可信接入网, 此时, 用 户设备从 H-ANDSF服务器部署的第一选网策略中查找是否包含有可信接入网, 获取 H-ANDSF服务器部署的第一选网策略中可信接入网作为第二优选接入网。 具体的,可从第一选网策略中获取 H-ANDSF服务器部署的各个接入网的可信 状态指示, 从中获取 H-PLMN的接入网中可信状态指示为可信的接入网的标 识, 并将可信状态指示为可信的接入网设定为第二优选接入网。
此外, 在一些可行的实现方式中, 用户设备查找可信接入网时, 还可首先 从 V-ANDSF服务器部署的第二选网策略中获取各个接入网的标识,并根据上 述各个接入网的可信状态指示判断上述第二选网策略中是否包含可信接入网 (即可信状态指示为可信的接入网)。若判断得知第二选网策略中包括可信接 入网,则再进一步根据 H-ANDSF服务器部署的第一选网策略中的拜访地网络 的漫游关系列表判断上述可信的接入网所属的 V-PLMN标识是否包含在上述 拜访地网络的漫游关系列表中或 V-PLMN是否指示为可信,若判断结果为是, 则将第二选网策略中的可信接入网设定为第一优选接入网。若判断得知第二选 网策略中不包括可信接入网, 即 V-ANDSF服务器部署的第二选网策略中所有 的接入网均为非可信的接入网,用户设备则可从 H-ANDSF服务器部署的第一 选网策略中查找可信的接入网,将第一选网策略中的可信接入网设定为第二优 选接入网。
在一些可行的实施方式中, 用户设备查找到周围的 WLAN的接入点, 并 根据接入点的状态信息, 以及预先获取到的 H-ANDSF服务器部署的第一选网 策略和 V-ANDSF服务器部署的第二选网策略设定好第一优选接入网、第二优 选接入网以及第三优选接入网之后, 则可将各个接入网进行优先级排序, 建立 接入网列表。 其中, 上述第三优选接入网, 可包括 H-ANDSF服务器部署的第 一选网策略中 H-ANDSF 服务器部署的可信状态指示为非可信的接入网和 V-ANDSF服务器部署的第二选网策略中 V-ANDSF服务器部署的可信状态指 示为非可信的接入网。 具体的, 用户设备建立接入网列表时, 首先将上述第一 优选接入网设定为第一优先级列表项, 即将 V-ANDSF服务器部署的第二选网 策略中的可信接入网赋予最高优先级,其次是 H-ANDSF服务器部署的第一选 网策略中的可信接入网, 最后的非可信接入网。 即将第一优选接入网设定为接 入网优先级列表中的第一优先级列表项,将上述第二优选接入网设定为接入网 优先级列表中的第二优先级列表项,将上述第三优选接入网设定为接入网优先 级列表中的第三优先级列表项。在一些可行的实施方式中, 若第一优选接入网 多于一个,即 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一个, 则可根据第二选网策略中部署的接入网的优先级顺序将第一优选接入网中的 各个接入网进行优先级排序, 若第二优选接入网多于一个, 则可根据第一选网 策略中部署的接入网优先级顺序将第二优选接入网中的各个接入网进行优先 级排序, 同样的, 若第三优先级接入网多于一个, 则可根据第一选网策略或者 第二选网策略中部署的接入网优先级顺序将第三优选接入网中的各个接入网 进行优先级排序。 例如, 若 V-ANDSF服务器部署的第二选网策略中的可信接 入网多于一个, 即第一优选接入网多于一个, 例如, 包含 A、 B、 C三个可信 接入网, 并且 V-ANDSF部署第二选网策略时根据各个接入网的接入点状态信 息,例如获取到该接入网时该接入网的接入点当前的负荷值、接入点当前的带 宽占用情况、 或者接入点指示的协议类型等信息将接入网 A、 B、 C进行了优 选级排序为 A优先级最高、 其次为 B, 最后为 C, 则当用户设备建立接入网列 表时, 则可将接入网 A、 B、 C按照第二选网策略中部署的优先级顺序进行排 序, 即接入网 A的优先级最高, 再是 B, 最后是 C, 并且接入网 C的优先级 高于第二优选接入网中各个接入网的优先级。同理也可将第二优选接入网以及 第三优选接入网中的各个接入网进行优先级排序, 建立接入网列表。
在一些可行的实施方式中, 用户设备建立好接入网列表之后, 则可根据接 入网列表中的接入网优先级顺序依次判断各个接入网是否能够与 PLMN优先 级列表中优先级最高的 PLMN连接。 具体的, 用户设可备基于运营商的配置 获取静态的 PLMN优先级列表, 该 PLMN优先级列表可静态存储于用户设备 中 , 运营商也可通过 I-WLAN MO ( Interworking-WLAN Management Object, I-WLAN管理实体)或 ANDSF服务器发送给用户设备。 用户设备从最高优先 级的接入网开始判断最高优先级的接入网是否可以与优先级最高的 PLMN建 立连接, 若判断结果为是, 则可将上述接入网设定为用户设备最终的目标接入 网, 否则继续查找优先级较低的其他接入网是否可以与最高优先级的 PLMN 建立连接, 直到连接到最高优先级的 PLMN。如果接入网列表中的所有接入网 均不能连接到优先级最高的 PLMN, 则从优先级最高的接入网开始, 判断优先 级最高的接入网是否可以与次高优先级的 PLMN建立连接,若判断结果为是, 则将上述接入网设定为用户设备的目标接入网,否则继续查找优先级较低的其 他接入网是否可以与次高优先级的 PLMN建立连接, 如此循环, 直到找到最 终的目标接入网络。
本实施例可根据 V-ANDSF服务器部署的第二选网策略和 H-ANDSF服务 器部署的第一选网策略,以及第一选网策略中的拜访地网络的漫游关系列表或 PLMN可信指示选定可信的接入网作为优先选择的接入网,还可将选定的可信 接入网进行优先级排序,优选优先级较高的接入网作为目标接入网,保障了用 户数据安全可靠的接入目标网络, 节省了用户设备选择接入网的时间,增强了 用户设备选择目标接入网的用户体验效果。
参见图 2, 是本发明实施例提供的优选可信的 WLAN接入网的方法的第 二实施例流程示意图, 其可包括: 5201 ,根据获取的 H-ANDSF策略,判断 V-PLMN是否支持可信接入网, 若判断结果为是, 则执行步骤 S202, 若判断结果为否, 则执行步骤 S203。
5202,从所述 V-ANDSF策略中获取接入网中可信状态指示为可信的接入 网的标 F、。
S203 ,从所述 H-ANDSF策略中获取接入网中可信状态指示为可信的接入 网的标识, 并将所述接入网设定为第二优选接入网。
5204,根据第一选网策略中的路由信息判断目标接入网是否需要与所述归 属域 PGW建立连接, 若判断结果为是, 则执行步骤 S205。
5205 , 判断 V-ANDSF 策略中的可信接入网与可以连接的所述 PGW 的 PLMN标识信息中是否包含 H-PLMN标识,若判断结果为是,则执行步骤 S206。
5206,若所述可信接入网与可以连接的所述 PGW的 PLMN标识信息中包 含所述 H-PLMN标识, 则将所述 V-ANDSF策略中的可信接入网设定为第一 优选接入网。
5207 , 从接入网列表中选取所述可信接入网为所述目标接入网。
具体实现中, 用户设备进行接入网选择之前, 需要先与 PGW建立连接, 从 PGW处获取用户设备的 IP地址。 用户设备从 PGW获取到 IP地址之后则 可查找 H-ANDSF服务器地址,并与上述 H-ANDSF服务器建立 IP连接。具体 的,用户设备查找 H-ANDSF服务器的 IP地址的方式,可包括:先将 H-ANDSF 服务器的标识静态配置到用户设备中,通过查找 H-ANDSF服务器的静态配置 信息来获取 H-ANDSF服务器的地址,与 H-ANDSF服务器建立 IP连接;或者, 通过 DNS服务器查找 H-ANDSF服务器的 IP地址, 并与 H-ANDSF服务器建 立 IP连接, 等。 本实施例不对用户设备查找 H-ANDSF服务器地址的方案做 限制,用户设备查找 H-ANDSF服务器的地址的方式包含但不限于上述查找方 式。
用户设备与 H-ANDSF服务器建立连接之后, 则可向 H-ANDSF服务器发 送选网策略请求信息,以获取 H-ANDSF服务器部署的第一选网策略。具体的, 上述选网策略请求信息, 可包括: 用户设备的标识信息 (例如 IP ) 、 用户设 备当前的位置信息, 用户设备的能力信息等, 其中, 上述用户设备的能力信息 中包含用户设备的能力指示信息,例如用户设备支持优选可信接入网的能力的 指示信息等。 H-ANDSF服务器接收到用户设备发送的选网策略请求信息之后, 则可将其部署的第一选网策略发送给用户设备,用户设备从 H-ANDSF服务器 处获取 H-ANDSF服务器部署的第一选网策略之后则可根据该选网策略做相应 的接入网选择操作。 具体的, 用户设备获取到的 H-ANDSF服务器部署的第一 选网策略中包括: 漫游关系列表、 服务提供商列表、 服务提供商可信非可信指 示、 V-PLMN部署的接入网可信状态指示、 接入网的 SSID、 接入网的可信状 态指示等信息,其中,上述漫游关系列表为部署了可信接入网的 PLMN列表, 列表中包括一个或者多个 V-PLMN标识。上述接入网的可信状态包括:可信, 或者非可信。 具体的, H-ANDSF服务器在部署第一选网策略时, 可根据各个 接入网的 SSID中的数据信息判断接入网的接入点是否安全、 可靠, 若判断得 知该接入网络的接入点安全可靠, 则可指示该接入网的可信状态为可信; 若判 断得知该接入网的接入点包含的信息中有不确定因素,即包含有不安全信息或 者安全性未可知的信息时, 则可指示该接入网的可信状态为非可信。上述服务 提供商列表中包含 PLMN标识信息, 且对每个 PLMN指示其是否为可信接入 或非可信接入。 具体的, H-ANDSF服务器在部署第一选网策略时, 若判断某 PLMN部署的接入点为可信接入点, 则可指示该 PLMN 为可信; 若判断某 PLMN部署的接入点均为非可信接入点, 则可指示该 PLMN为非可信, 或不 给予任何指示。 此外, 上述路由信息的路由类型, 包括: home-routed路由, local-breakout路由等, 该路由信息用户判断目标接入网是否需要与归属域 PGW建立连接, 具体为: 若该路由信息显示该路由类型为 home-routed, 则可 判断目标接入网需要与归属域 PGW建立连接; 若该路由信息显示该路由类型 为 local-breakout路由, 则可判定目标接入网无需与归属域 PGW建立连接。
具体实现中, 当用户设备处于漫游状态时(本发明实施例默认用户设备处 于漫游状态),用户设备还需要查找 V-ANDSF服务器的 IP地址,与 V-ANDSF 服务器建立 IP连接。具体的,用户设备查找 V-ANDSF服务器的方式可包括: 通过 DNS服务器获取 V-ANDSF服务器的 IP地址等, 本实施例不对用户设备 查找 V-ANDSF服务器的方式做限制, 包含但不限于上述查找方式。 用户设备 与 V-ANDSF服务器建立 IP连接之后,则可向 V-ANDSF服务器发送选网策略 请求信息, 以获取 V-NADSF服务器部署的第二选网策略。 V-ANDSF服务器 接收到用户设备发送的选网策略请求信息之后,则可将其部署的第二选网策略 发送给用户设备,用户设备获取到第二选网策略之后则可根据该选网策略做相 应的接入网选择操作。 具体的, 上述第二选网策略中包括: 接入网的 SSID、 接入网的可信状态指示等信息, 其中, 接入网可信状态包括: 可信, 或者非可 信。 具体的, V-ANDSF服务器在部署第二选网策略时, 可根据各个接入网的 SSID 中的数据信息判断接入网的接入点是否安全、 可靠, 若判断得知该接入 网络的接入点安全可靠, 则可指示该接入网的可信状态为可信; 若判断得知该 接入网的接入点包含的信息中有不确定因素,即包含有不安全信息或者安全性 未可知的信息时, 则可指示该接入网的可信状态为非可信。 此外, 上述第二选 网策略中, 还包括: 第二选网策略中的可信的接入网 (第一接入网)与 PGW 建立连接的 PLMN标识信息,该标识信息表明该接入网可以连接的 PGW所属 的 PLMN信息。
在一些可行的实施方式中,用户设备获取到第一选网策略和第二选网策略 之后, 则可查找周围的 WLAN的接入点, 获取当前漫游的 V-PLMN的接入点 信息, 包括 V-PLMN的接入点 SSID、 接入点的状态信息等。 其中, 上述接入 点的状态信息包括: 接入点当前的负荷值, 接入网当前的带宽占用情况, 接入 点指示的协议类型等。
在一些可行的实施方式中, 用户设备获取到当前漫游的 V-PLMN的接入 点信息之后, 则可根据获取到的接入点信息, 结合第一选网策略和第二选网策 略进行目标接入网选择。 具体的, 用户设备从 H-ANDSF服务器获取到得第一 选网策略中包括拜访地网络的漫游关系列表, 该列表中包括一个或者多个 V-PLMN标识, 用户设备获取到当前漫游的 V-PLMN的接入点信息之后, 则 可根据该接入点信息中的接入点标识判断该 V-PLMN是否包含在上述拜访地 网络的漫游关系列表中。 若判断得知当前漫游的 V-PLMN包含在上述拜访地 网络的漫游关系列表中, 则可判断得知 V-PLMN支持可信接入网, 可优先从 V-ANDSF服务器部署的第二选网策略中选择 V-PLMN的接入网中可信状态指 示为可信的接入网的标识, 并将该可信接入网作为第一优先接入网。 或者, 用 户设备从 H-ANDSF服务器获取到得第一选网策略中包括服务提供商列表,及 可信或非可信指示。 若当前漫游的 V-PLMN 指示为可信接入, 则优先从 V-ANDSF服务器部署的第二选网策略中选择 V-PLMN的接入网中可信状态指 示为可信的接入网的标识。 具体的, 选定第二选网策略中的可信接入网之后, 还可根据第一选网策略中的路由信息判断目标接入网是否需要与归属域 PGW 建立连接, 所判断结果为是, 则可进一步判断第二选网策略中的可信接入网与 PGW建立连接的 PLMN标识信息中是否包含 H-PLMN标识 ,若包含 H-PLMN 标识, 则表明第二选网策略中的可信接入网可以直接连接到归属域 PGW, 则 可将第二选网策略中的可信接入网设定为第一优选接入网,否则表明该可信接 入网不能连接归属域 PGW, 则不作为优选接入网。 此外, 若判断得知该 V-PLMN不在第一选网策略中的拜访地网络漫游关系列表中 , 或 V-PLMN在 服务提供商列表中指示为非可信, 则可判断得知该 V-PLMN部署的所有接入 网均为非可信接入网, 即 V-ANDSF服务器部署的所有接入网均为非可信的接 入网, 此时, 用户设备从 H-ANDSF服务器部署的第一选网策略中查找是否包 含有可信的接入网,获取 H-ANDSF服务器部署的第一选网策略中可信接入网 作为第二优选接入网。 具体的, 可从第一选网策略中获取 H-ANDSF服务器部 署的各个接入网的可信状态指示, 从中获取 H-PLMN的接入网中可信状态指 示为可信的接入网的标识,并将可信状态指示为可信的接入网设定为第二优选 接入网。
此外, 在一些可行的实现方式中, 用户设备查找可信的接入网时, 还可首 先从 V-ANDSF服务器部署的第二选网策略中获取各个接入网的标识, 并根据 上述各个接入网的可信状态指示判断上述第二选网策略中是否包含可信接入 网(即可信状态指示为可信的接入网)。 若判断得知第二选网策略中包括可信 接入网, 则再进一步根据 H-ANDSF服务器部署的第一选网策略中的拜访地网 络漫游关系列表判断上述可信的接入网所属的 V-PLMN的接入点标识是否包 含在上述拜访地网络的漫游关系列表中或 V-PLMN是否为可信接入, 若判断 结果为是, 则将第二选网策略中的可信的接入网设定为第一优选接入网(假设 第一接入网与 PGW建立连接的 PLMN标识信息中包含 H-PLMN标识, 具体 判断过程可参考上一段的判断描述, 在此不再赘述)。 若判断得知第二选网策 略中不包括可信的接入网, 即 V-ANDSF服务器部署的第二选网策略中所有的 接入网均为非可信接入网,用户设备则可从 H-ANDSF服务器部署的第一选网 策略中查找可信接入网,将第一选网策略中的可信接入网设定为第二优选接入 网。
在一些可行的实施方式中, 用户设备查找到周围的 WLAN的接入点, 并 根据接入点的状态信息, 以及预先获取到的 H-ANDSF服务器部署的第一选网 策略和 V-ANDSF服务器部署的第二选网策略设定好第一优选接入网、第二优 选接入网以及第三优选接入网之后, 则可将各个接入网进行优先级排序, 建立 接入网优先级列表。 其中, 上述第三优选接入网, 可包括 H-ANDSF服务器部 署的第一选网策略中的 H-ANDSF服务器部署的可信状态指示为非可信的接入 网和 V-ANDSF服务器部署的第二选网策略中的 V-ANDSF服务器部署的可信 状态指示为非可信的接入网。 具体的, 用户设备建立接入网列表时, 首先将上 述第一优选接入网设定为第一优先级列表项, 即将 V-ANDSF服务器部署的第 二选网策略中的可信接入网赋予最高优先级,其次是 H-ANDSF服务器部署的 第一选网策略中的可信接入网, 最后的非可信的接入网。 即将第一优选接入网 设定为接入网列表中的第一优先级列表项,将上述第二优选接入网设定为接入 网列表中的第二优先级列表项,将上述第三优选接入网设定为接入网列表中的 第三优先级列表项。 在一些可行的实施方式中, 若第一优选接入网多于一个, 即 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一个,则可根据 第二选网策略中部署的接入网的优先级顺序将第一优选接入网中的各个接入 网进行优先级排序, 若第二优选接入网多于一个, 则可根据第一选网策略中部 署的接入网优先级顺序将第二优选接入网中的各个接入网进行优先级排序,同 样的, 若第三优先级接入网多于一个, 则可根据第一选网策略或者第二选网策 略中部署的接入网优先级顺序将第三优选接入网中的各个接入网进行优先级 排序。 例如, 若 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一 个, 即第一优选接入网多于一个, 例如, 包含 A、 B、 C三个可信接入网, 并 且 V-ANDSF部署第二选网策略时根据各个接入网的接入点状态信息,例如获 取到该接入网时该接入网的接入点当前的负荷值、接入点当前的带宽占用情况、 或者接入点指示的协议类型等信息将接入网 A、 B、 C进行了优选级排序为 A 优先级最高、 其次为 B, 最后为 C, 则当用户设备建立接入网列表时, 则可将 接入网 A、 B、 C按照第二选网策略中部署的优先级顺序进行排序, 即接入网 A的优先级最高, 再是 B, 最后是 C, 并且接入网 C的优先级高于第二优选接 入网中各个接入网的优先级。同理也可将第二优选接入网以及第三优选接入网 中的各个接入网进行优先级排序, 建立接入网列表。 此外, 对于 H-ANDSF服 务器部署的第一选网策略中的路由信息指示 home-routed路由或者 home-routed 路由与 local-breakout路由均可以时,可根据 V-ANDSF服务器部署的第二选网 策略中的第一接入网与所述 PGW建立连接的 PLMN标识信息删除可信接入网 中不包含 H-PLMN标识, 即不能连接归属域 PGW的可信的接入网。
在一些可行的实施方式中, 用户设备建立好接入网列表之后, 则可根据接 入网列表中的接入网优先级顺序依次判断各个接入网是否能够与 PLMN优先 级列表中优先级最高的 PLMN连接。 具体的, 用户设备基于运营商的配置获 取静态的 PLMN优先级列表,该 PLMN优先级列表可静态存储于用户设备中, 运营商也可通过 I-WLAN MO或 ANDSF服务器发送给用户设备。 用户设备从 最高优先级的接入网开始判断最高优先级的接入网是否可以与优先级最高的 PLMN建立连接,若判断结果为是, 则可将上述接入网设定为用户设备最终的 目标接入网,否则继续查找优先级较低的其他接入网是否可以与最高优先级的 PLMN建立连接,直到连接到最高优先级的 PLMN。如果接入网列表中的所有 接入网均不能连接到优先级最高的 PLMN, 则从优先级最高的接入网开始,判 断优先级最高的接入网是否可以与次高优先级的 PLMN建立连接, 若判断结 果为是, 则将上述接入网设定为用户设备的目标接入网, 否则继续查找优先级 较低的其他接入网是否可以与次高优先级的 PLMN建立连接, 如此循环, 直 到找到最终的目标接入网络。或者将优先级最高的接入网作为目标接入网, 直 接接入。
本实施例可根据 V-ANDSF服务器部署的第二选网策略和 H-ANDSF服务 器部署的第一选网策略,以及第一选网策略中的拜访地网络的漫游关系列表或 V-PLMN可信或非可信指示选定可信的接入网作为优先选择的接入网,还可将 选定的可信接入网进行优先级排序,优选优先级较高的接入网作为目标接入网 , 保障了用户数据安全可靠的接入目标网络,并且在用户设备进行归属域路由的 场景下可保证目标接入网的接入点支持归属域数据网关的连接,避免接入网络 重选, 节省了用户设备选择接入网的时间,增强了用户设备选择目标接入网的 用户体验效果。
参见图 3 , 是本发明实施例提供的优选可信的 WLAN接入网的装置的第 一实施例结构示意图。本实施例中所描述的优选可信的 WLAN接入网的装置, 包括:
判断模块 10,用于根据获取的归属地接入网络发现和选择功能 H-ANDSF 策略, 判断目标或拜访地公共陆地移动网络 V-PLMN是否支持可信接入网。 获取模块 20, 用于根据所述判断模块的判断结果, 获取可信接入网。 选耳 莫块 30, 用于选取所述获耳 莫块获取到的可信接入网为目标接入网。 其中, 获耳 莫块 20 (如图 4 ) , 包括:
第一获取单元 21 , 用于在所述判断模块判断结果为是时, 获取拜访地接 入网络发现和选择功能 V-ANDSF策略中包含的可信接入网。
第二获取单元 22 , 用于在所述判断模块判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
具体实现中, 本实施例中所描述的优选可信的 WLAN接入网的装置具体 可为用户设备等。 用户设备进行接入网选择之前, 需要先与 PGW建立连接, 从 PGW处获取用户设备的 IP地址。 用户设备从 PGW获取到 IP地址之后则 可查找 H-ANDSF服务器地址,并与上述 H-ANDSF服务器建立 IP连接。具体 的,用户设备查找 H-ANDSF服务器的 IP地址的方式,可包括:先将 H-ANDSF 服务器的标识静态配置到用户设备中,通过查找 H-ANDSF服务器的静态配置 信息来获取 H-ANDSF服务器的地址,与 H-ANDSF服务器建立 IP连接;或者, 通过 DNS服务器查找 H-ANDSF服务器的 IP地址, 并与 H-ANDSF服务器建 立 IP连接, 等。 本实施例不对用户设备查找 H-ANDSF服务器地址的方案做 限制,用户设备查找 H-ANDSF服务器的地址的方式包含但不限于上述查找方 式。
用户设备与 H-ANDSF服务器建立连接之后, 则可向 H-ANDSF服务器发 送选网策略请求信息,以获取 H-ANDSF服务器部署的第一选网策略。具体的, 上述选网策略请求信息, 可包括: 用户设备的标识信息 (例如 IP ) 、 用户设 备当前的位置信息, 用户设备的能力信息等, 其中, 上述用户设备的能力信息 中包含用户设备的能力指示信息,例如用户设备支持优选可信的接入网的能力 的指示信息等。 H-ANDSF服务器接收到用户设备发送的选网策略请求信息之 后, 则可将其部署的第一选网策略发送给用户设备, 用户设备从 H-ANDSF服 务器处获取 H-ANDSF服务器部署的第一选网策略之后则可根据该选网策略做 相应的接入网选择操作。 具体的, 用户设备获取到的 H-ANDSF服务器部署的 第一选网策略中包括: 漫游关系列表、服务提供商列表、服务提供商可信非可 信指示、 V-PLMN部署的接入网可信状态指示、 接入网的 SSID、 接入网的可 信状态指示等信息, 其中, 上述漫游关系列表为部署了可信接入网的 PLMN 列表,列表中包括一个或者多个 V-PLMN标识。上述接入网的可信状态包括: 可信, 或者非可信。 具体的, H-ANDSF服务器在部署第一选网策略时, 可根 据各个接入网的 SSID中的数据信息判断接入网的接入点是否安全、 可靠, 若 判断得知该接入网络的接入点安全可靠,则可指示该接入网的可信状态为可信; 若判断得知该接入网的接入点包含的信息中有不确定因素,即包含有不安全信 息或者安全性未可知的信息时, 则可指示该接入网的可信状态为非可信。上述 月良务提供商列表中包含 PLMN标识信息, 且对每个 PLMN指示其是否为可信 接入或非可信接入。 具体的, H-ANDSF服务器在部署第一选网策略时, 若判 断某 PLMN部署的接入点为可信接入点, 则可指示该 PLMN为可信; 若判断 某 PLMN部署的接入点均为非可信接入点, 则可指示该 PLMN为非可信, 或 不给予任何指示。
具体实现中, 当用户设备处于漫游状态时(本发明实施例默认用户设备处 于漫游状态),用户设备还需要查找 V-ANDSF服务器的 IP地址,与 V-ANDSF 服务器建立 IP连接。具体的,用户设备查找 V-ANDSF服务器的方式可包括: 通过 DNS服务器获取 V-ANDSF服务器的 IP地址等, 本实施例不对用户设备 查找 V-ANDSF服务器的方式做限制, 包含但不限于上述查找方式。 用户设备 与 V-ANDSF服务器建立 IP连接之后,则可向 V-ANDSF服务器发送选网策略 请求信息, 以获取 V-NADSF服务器部署的第二选网策略。 V-ANDSF服务器 接收到用户设备发送的选网策略请求信息之后,则可将其部署的第二选网策略 发送给用户设备,用户设备获取到第二选网策略之后则可根据该选网策略做相 应的接入网选择操作。 具体的, 上述第二选网策略中包括: 接入网的 SSID、 接入网的可信状态指示等信息, 其中, 接入网可信状态包括: 可信, 或者非可 信。 具体的, V-ANDSF服务器在部署第二选网策略时, 可根据各个接入网的 SSID 中的数据信息判断接入网的接入点是否安全、 可靠, 若判断得知该接入 网络的接入点安全可靠, 则可指示该接入网的可信状态为可信; 若判断得知该 接入网的接入点包含的信息中有不确定因素,即包含有不安全信息或者安全性 未可知的信息时, 则可指示该接入网的可信状态为非可信。
在一些可行的实施方式中,用户设备获取到第一选网策略和第二选网策略 之后, 则可通过其判断模块 10查找周围的 WLAN的接入点, 获取当前漫游的 V-PLMN的接入点信息,包括 V-PLMN的接入点 SSID、接入点的状态信息等。 其中, 上述接入点的状态信息包括: 接入点当前的负荷值, 接入网当前的带宽 占用情况, 接入点指示的协议类型等。
在一些可行的实施方式中, 用户设备获取到当前漫游的 V-PLMN的接入 点信息之后, 则可根据获取到的接入点信息, 结合第一选网策略和第二选网策 略进行目标接入网选择。 具体的, 用户设备从 H-ANDSF服务器获取到得第一 选网策略中包括拜访地网络的漫游关系列表, 该列表中包括一个或者多个 V-PLMN标识,用户设备的判断模块 10获取到当前漫游的 V-PLMN的接入点 信息之后, 则可根据该接入点信息中的接入点标识判断该 V-PLMN是否包含 在上述拜访地网络的漫游关系列表中。 若判断模块 10 判断得知当前漫游的 V-PLMN 包含在上述拜访地网络的漫游关系列表中, 则可判断得知 V-PLMN 支持可信接入网, 可通过获耳 莫块 20中的第一获取单元 21优先从 V-ANDSF 服务器部署的第二选网策略中选择 V-PLMN的接入网中可信状态指示为可信 的接入网的标识, 并将该可信接入网作为第一优先接入网。 此外, 若判断模块 10判断得知该 V-PLMN不在第一选网策略中的拜访地网络的漫游关系列表中, 则可判断得知该 V-PLMN部署的所有接入网均为非可信接入网,即 V-ANDSF 服务器部署的所有接入网均为非可信接入网, 此时, 用户设备则获取模块 20 中的第二获取单元 22从 H-ANDSF服务器部署的第一选网策略中查找是否包 含有可信接入网,获取 H-ANDSF服务器部署的第一选网策略中可信接入网作 为第二优选接入网。具体的, 可通过获耳 莫块 20中的第二获取单元 22从第一 选网策略中获取 H-ANDSF服务器部署的各个接入网的可信状态指示,从中获 取 H-PLMN的接入网中可信状态指示为可信的接入网的标识, 并将第一选网 策略中可信状态指示为可信的接入网设定为第二优选接入网。具体实现中, 获 取模块 20如何选定第一优选接入网和第二优选接入网的实现过程可参见本发 明实施例提供的优选可信的 WLAN 接入网的方法的第一实施例中的步骤 S101-S103, 在此不再赘述。
此外, 在一些可行的实现方式中, 用户设备查找可信接入网时, 还可通过 判断模块 10首先从 V-ANDSF服务器部署的第二选网策略中获取各个接入网 的标识,并根据上述各个接入网的可信状态指示判断上述第二选网策略中是否 包含可信接入网(即可信状态指示为可信的接入网)。 若判断得知第二选网策 略中包括可信接入网 V-PLMN,则再进一步根据 H-ANDSF服务器部署的第一 选网策略中的拜访地网络的漫游关系列表判断上述可信的接入网 V-PLMN的 接入点标识是否包含在上述拜访地网络漫游关系列表中或 V-PLMN是否指示 为可信, 若判断结果为是, 则可通过获取模块 20中的第一获取单元 21获取可 信接入网, 并将第二选网策略中的可信接入网设定为第一优选接入网。若判断 模块 10判断得知第二选网策略中不包括可信的接入网, 即 V-ANDSF服务器 部署的第二选网策略中所有的接入网均为非可信的接入网,用户设备则可通过 第二获取单元 22从 H-ANDSF服务器部署的第一选网策略中查找可信接入网, 将第一选网策略中的可信接入网设定为第二优选接入网。具体可参见本发明实 施例提供的优选可信的 WLAN 接入网的方法的第一实施例中的步骤 S101-S103, 在此不再赘述。
在一些可行的实施方式中, 用户设备查找到周围的 WLAN的接入点, 并 根据接入点的状态信息, 以及预先获取到的 H-ANDSF服务器部署的第一选网 策略和 V-ANDSF服务器部署的第二选网策略设定好第一优选接入网、第二优 选接入网以及第三优选接入网之后, 则可将各个接入网进行优先级排序, 建立 接入网列表。 其中, 上述第三优选接入网, 可包括 H-ANDSF服务器部署的第 一选网策略中的 H-ANDSF 服务器部署的可信状态指示为非可信的接入网和 V-ANDSF服务器部署的第二选网策略中的 V-ANDSF服务器部署的可信状态 指示为非可信的接入网。 具体的, 用户设备建立接入网列表时, 首先将上述第 一优选接入网设定为第一优先级列表项, 即将 V-ANDSF服务器部署的第二选 网策略中的可信接入网赋予最高优先级,其次是 H-ANDSF服务器部署的第一 选网策略中的可信接入网, 最后的非可信接入网。 即将第一优选接入网设定为 接入网优先级列表中的第一优先级列表项,将上述第二优选接入网设定为接入 网优先级列表中的第二优先级列表项,将上述第三优选接入网设定为接入网优 先级列表中的第三优先级列表项。在一些可行的实施方式中, 若第一优选接入 网多于一个, 即 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一 个,则可根据第二选网策略中部署的接入网的优先级顺序将第一优选接入网中 的各个接入网进行优先级排序, 若第二优选接入网多于一个, 则可根据第一选 网策略中部署的接入网优先级顺序将第二优选接入网中的各个接入网进行优 先级排序, 同样的, 若第三优先级接入网多于一个, 则可根据第一选网策略或 者第二选网策略中部署的接入网优先级顺序将第三优选接入网中的各个接入 网进行优先级排序。 例如, 若 V-ANDSF服务器部署的第二选网策略中的可信 接入网多于一个, 即第一优选接入网多于一个, 例如, 包含 A、 B、 C三个可 信接入网,并且 V-ANDSF部署第二选网策略时根据各个接入网的接入点状态 信息, 例如获取到该接入网时该接入网的接入点当前的负荷值、接入点当前的 带宽占用情况、 或者接入点指示的协议类型等信息将接入网 A、 B、 C进行了 优选级排序为 A优先级最高、 其次为 B, 最后为 C, 则当用户设备建立接入网 列表时, 则可将接入网 A、 B、 C按照第二选网策略中部署的优先级顺序进行 排序, 即接入网 A的优先级最高, 再是 B, 最后是 C, 并且接入网 C的优先 级高于第二优选接入网中各个接入网的优先级。同理也可将第二优选接入网以 及第三优选接入网中的各个接入网进行优先级排序,最后将第一优选接入网中 的各个接入网,第二优选接入网中的各个接入网以及第三优选接入网中的各个 接入网按照各个接入网的优先级顺序组合起来,建立接入网列表。具体实现中, 用户设备建立接入网列表的具体实现过程可参见本发明实施例提供的优选可 信的 WLAN接入网的方法的第一实施例中的步骤 S 101 -S 103 ,在此不再赘述。
在一些可行的实施方式中, 用户设备建立好接入网列表之后, 则可通过选 耳 莫块 30根据接入网列表中的接入网优先级顺序依次判断各个接入网是否能 够与 PLMN优先级列表中优先级最高的 PLMN连接, 从中选取可信接入网作 为目标接入网。 具体的, 用户设备基于运营商的配置获取静态的 PLMN优先 级列表, 该 PLMN优先级列表可静态存储于用户设备中, 运营商也可通过 I-WLAN MO发送给用户设备。 用户设备可通过选取模块 30从最高优先级的 接入网开始判断最高优先级的接入网是否可以与优先级最高的 PLMN建立连 接, 若判断结果为是, 则可将上述接入网设定为用户设备最终的目标接入网, 否则继续查找优先级较低的其他接入网是否可以与最高优先级的 PLMN建立 连接, 直到连接到最高优先级的 PLMN。如果接入网列表中的所有接入网均不 能连接到优先级最高的 PLMN, 则从优先级最高的接入网开始,判断优先级最 高的接入网是否可以与次高优先级的 PLMN建立连接, 若判断结果为是, 则 将上述接入网设定为用户设备的目标接入网 ,否则继续查找优先级较低的其他 接入网是否可以与次高优先级的 PLMN建立连接, 如此循环, 直到找到最终 的目标接入网络。具体实现中,选耳 莫块选定目标接入网的具体实现过程可参 见本发明实施例提供的优选可信的 WLAN接入网的方法的第一实施例中的步 骤 S101-S103 , 在此不再赘述。
本实施例中所描述的优选可信的 WLAN接入网的装置可根据 V-ANDSF 服务器部署的第二选网策略和 H-ANDSF服务器部署的第一选网策略, 以及第 一选网策略中的拜访地网络的漫游关系列表选定可信的接入网作为优先选择 的接入网,还可将选定的可信接入网进行优先级排序,优选优先级较高的接入 网作为目标接入网,保障了用户数据安全可靠的接入目标网络, 节省了用户设 备选择接入网的时间, 增强了用户设备选择目标接入网的用户体验效果。
参见图 5, 是本发明实施例提供的优选可信的 WLAN接入网的装置的第二 实施例结构示意图。 本实施例中所描述的优选可信的 WLAN接入网的装置, 包 括:
判断模块 10,用于根据获取的归属地接入网络发现和选择功能 H-ANDSF 策略, 判断目标或拜访地公共陆地移动网络 V-PLMN是否支持可信接入网。
获取模块 40, 用于根据所述判断模块的判断结果, 获取可信接入网。 选取模块 30, 用于根据所述判断模块的判断结果, 获取可信接入网。 其中, 获耳 莫块 40 (如图 6 ) , 包括:
第一获取单元 41 , 用于在所述判断模块判断结果为是时, 获取拜访地接 入网络发现和选择功能 V-ANDSF策略中包含的可信接入网。
其中, 第一获取单元 41 , 包括:
第一处理子单元 411 , 用于从所述 V-ANDSF策略中获取接入网中可信状 态指示为可信的接入网的标识。
第二处理子单元 412, 用于根据所述第一选网策略中的路由信息判断目标 接入网是否需要与所述归属域 PGW建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信接入网与可以连接的所述 PGW的 PLMN标识信息中 是否包含 H-PLMN标识。
第三处理子单元 413 , 用于在所述可信接入网与可以连接的所述 PGW的
PLMN标识信息中包含所述 H-PLMN标识时 ,将所述 V-ANDSF策略中的可信 接入网设定为第一优选接入网。
第二获取单元 42 , 用于在所述判断模块判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
具体实现中, 本实施例中所描述的优选可信的 WLAN接入网的装置具体 可以用户设备等。 用户设备进行接入网选择之前, 需要先与 PGW建立连接, 从 PGW处获取用户设备的 IP地址。 用户设备从 PGW获取到 IP地址之后则 可查找 H-ANDSF服务器地址,并与上述 H-ANDSF服务器建立 IP连接。具体 的,用户设备查找 H-ANDSF服务器的 IP地址的方式,可包括:先将 H-ANDSF 服务器的标识静态配置到用户设备中,通过查找 H-ANDSF服务器的静态配置 信息来获取 H-ANDSF服务器的地址,与 H-ANDSF服务器建立 IP连接;或者, 通过 DNS服务器查找 H-ANDSF服务器的 IP地址, 并与 H-ANDSF服务器建 立 IP连接, 等。 本实施例不对用户设备查找 H-ANDSF服务器地址的方案做 限制,用户设备查找 H-ANDSF服务器的地址的方式包含但不限于上述查找方 式。
用户设备与 H-ANDSF服务器建立连接之后, 则可向 H-ANDSF服务器发 送选网策略请求信息,以获取 H-ANDSF服务器部署的第一选网策略。具体的, 上述选网策略请求信息, 可包括: 用户设备的标识信息 (例如 IP ) 、 用户设 备当前的位置信息, 用户设备的能力信息等, 其中, 上述用户设备的能力信息 中包含用户设备的能力指示信息,例如用户设备支持优选可信的接入网的能力 的指示信息等。 H-ANDSF服务器接收到用户设备发送的选网策略请求信息之 后, 则可将其部署的第一选网策略发送给用户设备, 用户设备从 H-ANDSF服 务器处获取 H-ANDSF服务器部署的第一选网策略之后则可根据该选网策略做 相应的接入网选择操作。 具体的, 用户设备获取到的 H-ANDSF服务器部署的 第一选网策略中包括: 漫游关系列表、服务提供商列表、服务提供商可信非可 信指示、 V-PLMN部署的接入网可信状态指示、 接入网的 SSID、 接入网的可 信状态指示等信息, 其中, 上述漫游关系列表为部署了可信接入网的 PLMN 列表, 列表中包括一个或者多个 V-PLMN标识。 具体实现中, 第一选网策略 中还包括: 路由信息和优选可信接入网指示, 其中, 优选可信接入网指示可指 示用户设备优先选择安全可靠的接入网络(即可信的接入网络), 本实施例默 认第一选网策略中包括优选可信接入网指示,即用户设备选择接入网络时优先 选择可信的接入网。上述接入网的可信状态包括:可信,或者非可信。具体的,
H-ANDSF服务器在部署第一选网策略时, 可根据各个接入网的 SSID中的数 据信息判断接入网的接入点是否安全、可靠, 若判断得知该接入网络的接入点 安全可靠, 则可指示该接入网的可信状态为可信; 若判断得知该接入网的接入 点包含的信息中有不确定因素,即包含有不安全信息或者安全性未可知的信息 时, 则可指示该接入网的可信状态为非可信。 上述服务提供商列表中包含 PLMN标识信息, 且对每个 PLMN指示其是否为可信接入或非可信接入。 具 体的, H-ANDSF服务器在部署第一选网策略时, 若判断某 PLMN部署的接入 点为可信接入点, 则可指示该 PLMN为可信; 若判断某 PLMN部署的接入点 均为非可信接入点, 则可指示该 PLMN为非可信,或不给予任何指示。此外, 上述路由信息的路由类型, 包括: home-routed路由, local-breakout路由等, 该路由信息用户判断目标接入网是否需要与归属域 PGW建立连接, 具体为: 若该路由信息显示该路由类型为 home-routed, 则可判断目标接入网需要与归 属域 PGW建立连接; 若该路由信息显示该路由类型为 local-breakout路由, 则 可判定目标接入网无需与归属域 PGW建立连接。
具体实现中, 当用户设备处于漫游状态时(本发明实施例默认用户设备处 于漫游状态),用户设备还需要查找 V-ANDSF服务器的 IP地址,与 V-ANDSF 服务器建立 IP连接。具体的,用户设备查找 V-ANDSF服务器的方式可包括: 通过 DNS服务器获取 V-ANDSF服务器的 IP地址等, 本实施例不对用户设备 查找 V-ANDSF服务器的方式做限制, 包含但不限于上述查找方式。 用户设备 与 V-ANDSF服务器建立 IP连接之后,则可向 V-ANDSF服务器发送选网策略 请求信息, 以从 V-ANDSF服务器处获取 V-NADSF服务器部署的第二选网策 略。 V-ANDSF服务器接收到用户设备发送的选网策略请求信息之后, 则可将 其部署的第二选网策略发送给用户设备,用户设备获取到第二选网策略之后则 可根据该选网策略做相应的接入网选择操作。具体的, 上述第二选网策略中包 括: 接入网的 SSID、 接入网的可信状态指示等信息, 其中, 接入网可信状态 包括: 可信,或者非可信。具体的, V-ANDSF服务器在部署第二选网策略时, 可根据各个接入网的 SSID中的数据信息判断接入网的接入点是否安全、可靠, 若判断得知该接入网络的接入点安全可靠,则可指示该接入网的可信状态为可 信; 若判断得知该接入网的接入点包含的信息中有不确定因素, 即包含有不安 全信息或者安全性未可知的信息时, 则可指示该接入网的可信状态为非可信。 此外, 上述第二选网策略中, 还包括: 第二选网策略中的可信接入网与 PGW 建立连接的 PLMN标识信息,该标识信息表明该接入网可以连接的 PGW所属 的 PLMN信息。 在一些可行的实施方式中,用户设备获取到第一选网策略和第二选网策略 之后, 则可通过判断模块 10查找周围的 WLAN的接入点, 获取当前漫游的 V-PLMN的接入点信息,包括 V-PLMN的接入点 SSID、接入点的状态信息等。 其中, 上述接入点的状态信息包括: 接入点当前的负荷值, 接入网当前的带宽 占用情况, 接入点指示的协议类型等。
在一些可行的实施方式中, 用户设备通过判断模块 10获取到当前漫游的
V-PLMN的接入点信息之后,则可根据获取到的接入点信息,结合第一选网策 略和第二选网策略进行目标接入网选择。 具体的 , 用户设备从 H-ANDSF服务 器获取到得第一选网策略中包括拜访地网络的漫游关系列表,该列表中包括一 个或者多个 V-PLMN 标识, 用户设备的判断模块 10 获取到当前漫游的 V-PLMN 的接入点信息之后, 则可根据该接入点信息中的接入点标识判断该 V-PLMN是否包含在上述拜访地网络的漫游关系列表中。若判断得知当前漫游 的 V-PLMN包含在上述拜访地网络的漫游关系列表中,则可判断得知 V-PLMN 支持可信接入网, 可通过获耳 莫块 40中的第一获取单元 41优先从 V-ANDSF 服务器部署的第二选网策略中选择 V-PLMN的接入网中可信状态指示为可信 的接入网的标识。 或者, 用户设备从 H-ANDSF服务器获取到得第一选网策略 中包括服务提供商列表, 及可信或非可信指示。 具体的, 获取模块 40的第一 获取单元 41中的第一处理单元 411可从第二选网策略中获取 V-ANDSF服务 器部署的各个接入网的可信状态指示,从中选定可信状态指示为可信的接入网。 具体的, 第一处理单元 411设定好第二选网策略中的可信接入网之后, 第二处 理单元 412 则可根据第一选网策略中的路由信息判断目标接入网是否需要与 归属域 PGW建立连接, 所判断结果为是, 则可进一步判断第二选网策略中的 可信接入网与 PGW建立连接的 PLMN标识信息中是否包含 H-PLMN标识, 若包含 H-PLMN标识, 则表明第二选网策略中的可信接入网可以直接连接到 归属域 PGW, 进而可通过第三处理单元 413将第二选网策略中的可信接入网 设定为第一优选接入网, 否则表明该可信接入网不能连接归属域 PGW, 则不 作为优选接入网。 此外, 若判断模块 10判断得知该 V-PLMN不在第一选网策 略中的拜访地网络漫游关系列表中, 或 V-PLMN在服务提供商列表中指示为 非可信, 则可判断得知该 V-PLMN部署的所有接入网均为非可信接入网, 即 V-ANDSF服务器部署的所有接入网均为非可信的接入网, 此时, 用户设备则 可通过获取模块 40的第二获取单元 42从 H-ANDSF服务器部署的第一选网策 略中查找是否包含有可信接入网,获取 H-ANDSF服务器部署的第一选网策略 中可信接入网作为第二优选接入网。 具体的, 可从第一选网策略中获取 H-ANDSF服务器部署的各个接入网的可信状态指示,从中获取 H-PLMN的接 入网中可信状态指示为可信的接入网的标识,并将可信状态指示为可信的接入 网设定为第二优选接入网。 具体实现中, 上述用户设备获取第一选网策略、 第 二选网策略的具体实现过程, 以及第一优选接入网、第二优选接入网的选定的 具体实现过程可参见本发明实施例提供的优选可信的 WLAN接入网的方法的 第二实施例, 在此不再赘述。
此外, 在一些可行的实现方式中, 用户设备查找可信的接入网时, 还可首 先从 V-ANDSF服务器部署的第二选网策略中获取各个接入网的标识, 并根据 上述各个接入网的可信状态指示判断上述第二选网策略中是否包含可信接入 网(即可信状态指示为可信的接入网)。 若判断得知第二选网策略中包括可信 接入网, 则再进一步根据 H-ANDSF服务器部署的第一选网策略中的拜访地网 络的漫游关系列表判断上述可信接入网所属的 V-PLMN的接入点标识是否包 含在上述拜访地网络的漫游关系列表中或 V-PLMN是否为可信接入, 若判断 结果为是, 则将第二选网策略中的可信接入网设定为第一优选接入网(假设第 一接入网与 PGW建立连接的 PLMN标识信息中包含 H-PLMN标识, 具体判 断过程可参考上一段的判断描述, 在此不再赘述)。 若判断得知第二选网策略 中不包括可信接入网, 即 V-ANDSF服务器部署的第二选网策略中所有的接入 网均为非可信接入网,用户设备则可从 H-ANDSF服务器部署的第一选网策略 中查找可信接入网, 将第一选网策略中的可信接入网设定为第二优选接入网。 具体实现过程可参见本发明实施例提供的优选可信的 WLAN接入网的方法的 第二实施例, 在此不再赘述。
在一些可行的实施方式中, 用户设备查找到周围的 WLAN的接入点, 并 根据接入点的状态信息, 以及预先获取到的 H-ANDSF服务器部署的第一选网 策略和 V-ANDSF服务器部署的第二选网策略设定好第一优选接入网、第二优 选接入网以及第三优选接入网之后, 则可将各个接入网进行优先级排序, 建立 接入网列表。 其中, 上述第三优选接入网, 可包括 H-ANDSF服务器部署的第 一选网策略中的 H-ANDSF 服务器部署的可信状态指示为非可信的接入网和 V-ANDSF服务器部署的第二选网策略中的 V-ANDSF服务器部署的可信状态 指示为非可信的接入网。 具体的, 用户设备建立接入网列表时, 首先可将上述 第一优选接入网设定为第一优先级列表项, 即将 V-ANDSF服务器部署的第二 选网策略中的可信接入网赋予最高优先级,其次是 H- ANDSF服务器部署的第 一选网策略中的可信接入网, 最后的非可信接入网。 即可将第一优选接入网设 定为接入网列表中的第一优先级列表项,将上述第二优选接入网设定为接入网 列表中的第二优先级列表项,将上述第三优选接入网设定为接入网列表中的第 三优先级列表项。 在一些可行的实施方式中, 若第一优选接入网多于一个, 即 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一个, 则可根据第 二选网策略中部署的接入网的优先级顺序将第一优选接入网中的各个接入网 进行优先级排序,若第二优选接入网多于一个, 则可根据第一选网策略中部署 的接入网优先级顺序将第二优选接入网中的各个接入网进行优先级排序,同样 的, 若第三优先级接入网多于一个, 则可根据第一选网策略或者第二选网策略 中部署的接入网优先级顺序将第三优选接入网中的各个接入网进行优先级排 序。例如,若 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一个, 即第一优选接入网多于一个, 例如, 包含 A、 B、 C 三个可信接入网, 并且 V-ANDSF部署第二选网策略时根据各个接入网的接入点状态信息, 例如获取 到该接入网时该接入网的接入点当前的负荷值、 接入点当前的带宽占用情况、 或者接入点指示的协议类型等信息将接入网 A、 B、 C进行了优选级排序为 A 优先级最高、 其次为 B, 最后为 C, 则当用户设备建立接入网列表时, 则可将 接入网 A、 B、 C按照第二选网策略中部署的优先级顺序进行排序, 即接入网 A的优先级最高, 再是 B, 最后是 C, 并且接入网 C的优先级高于第二优选接 入网中各个接入网的优先级。同理也可将第二优选接入网以及第三优选接入网 中的各个接入网进行优先级排序, 建立接入网列表。 此外, 对于 H-ANDSF服 务器部署的第一选网策略中的路由信息指示 home-routed路由或者 home-routed 路由与 local-breakout路由均可以时,用户设备可根据 V-ANDSF服务器部署的 第二选网策略中的第一接入网与所述 PGW建立连接的 PLMN标识信息删除可 信接入网中不包含 H-PLMN标识, 即不能连接归属域 PGW的可信的接入网。 具体实现中,用户设备建立接入网列表的具体实现过程可参见本发明实施例提 供的优选可信的 WLAN接入网的方法的第二实施例, 在此不再赘述。 在一些可行的实施方式中, 用户设备建立好接入网优先级列表之后,选取 模块 30则可根据接入网列表中的接入网优先级顺序依次判断各个接入网是否 能够与 PLMN优先级列表中优先级最高的 PLMN连接。 具体的, 用户设备基 于运营商的配置获取静态的 PLMN优先级列表, 该 PLMN优先级列表可静态 存储于用户设备中,运营商也可通过 I-WLAN MO或 ANDSF服务器发送给用 户设备。 用户设备的选取模块 30从最高优先级的接入网开始判断最高优先级 的接入网是否可以与优先级最高的 PLMN建立连接, 若判断结果为是, 则可 将上述接入网设定为用户设备最终的目标接入网 ,否则继续查找优先级较低的 其他接入网是否可以与最高优先级的 PLMN建立连接, 直到连接到最高优先 级的 PLMN。 如果接入网列表中的所有接入网均不能连接到优先级最高的 PLMN, 选取模块 30则从优先级最高的接入网开始, 判断优先级最高的接入 网是否可以与次高优先级的 PLMN建立连接, 若判断结果为是, 则将上述接 入网设定为用户设备的目标接入网,否则继续查找优先级较低的其他接入网是 否可以与次高优先级的 PLMN建立连接, 如此循环, 直到找到最终的目标接 入网络。或者将优先级最高的接入网作为目标接入网,直接接入。具体实现中, 选取模块选定目标接入网的具体实现过程可参见本发明实施例提供的优选可 信的 WLAN接入网的方法的第二实施例, 在此不再赘述。
本实施例中所描述的优选可信的 WLAN接入网的装置可根据 V-ANDSF 服务器部署的第二选网策略和 H-ANDSF服务器部署的第一选网策略, 以及第 一选网策略中的拜访地网络的漫游关系列表选定可信的接入网作为优先选择 的接入网,还可将选定的可信接入网进行优先级排序,优选优先级较高的接入 网作为目标接入网,保障了用户数据安全可靠的接入目标网络, 并且在用户设 备进行归属域路由的场景下可保证目标接入网的接入点支持归属域数据网关 的连接, 避免接入网络重选, 节省了用户设备选择接入网的时间, 增强了用户 设备选择目标接入网的用户体验效果。
参见图 7, 是本发明实施例提供的终端的实施例结构示意图。 本实施例中 所描述的终端, 包括:
存储器 100, 用于存储指令。
处理器 200, 用于从所述存储器中读取指令, 并根据所述指令执行如下操 作: 根据获取的归属地接入网络发现和选择功能 H-ANDSF策略, 判断目标或 拜访地公共陆地移动网络 V-PLMN是否支持可信接入网, 根据判断结果, 获 取可信接入网, 并选取所述可信接入网为目标接入网。
在一些可行的实施方式中, 所述 H-ANDSF策略即第一选网策略中包括: 漫游关系列表, 即支持可信接入网的 PLMN列表;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述漫游关系列表中是否包含所述 V-PLMN。
在一些可信的实施方式中, 如果所述漫游关系列表中含有所述 V-PLMN, 则 V-PLMN支持可信接入网。
在一些可行的实施方式中, 所述第一选网策略中包括服务提供商列表, 其 中所述服务提供商列表中包含 PLMN的可信状态指示;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
在一些可行的实施方式中, 如果所述服务提供商列表中包含的所述
V-PLMN的可信状态指示为可信, 则 V-PLMN支持可信接入网。
在一些可行的实施方式中, 所述第一选网策略中包括所述 V-PLMN部署 的接入网可信状态指示;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述第一选网策略中包含的所述 V-PLMN支持的接入网的可信状态 指示中是否为可信状态。
在一些可行的实施方式中,如果所述第一选网策略中包含的所述 V-PLMN 支持的接入网的可信状态指示为可信, 则 V-PLMN支持可信接入网。
具体实现中, 本实施例中所描述的终端具体可为用户设备等。用户设备进 行接入网选择之前, 需要先与 PGW建立连接, 从 PGW处获取用户设备的 IP 地址。 用户设备从 PGW获取到 IP地址之后则可查找 H-ANDSF服务器地址, 并与上述 H-ANDSF服务器建立 IP连接。 具体的, 用户设备查找 H-ANDSF 服务器的 IP地址的方式, 可包括: 先将 H-ANDSF服务器的标识静态配置到 用户设备中, 通过查找 H-ANDSF服务器的静态配置信息来获取 H-ANDSF服 务器的地址, 与 H-ANDSF服务器建立 IP连接; 或者, 通过 DNS服务器查找 H-ANDSF服务器的 IP地址, 并与 H-ANDSF服务器建立 IP连接, 等。 本实 施例不对用户设备查找 H-ANDSF服务器地址的方案做限制, 用户设备查找 H-ANDSF服务器的地址的方式包含但不限于上述查找方式。
用户设备与 H-ANDSF服务器建立连接之后, 则可向 H-ANDSF服务器发 送选网策略请求信息,以获取 H-ANDSF服务器部署的第一选网策略。具体的, 上述选网策略请求信息, 可包括: 用户设备的标识信息 (例如 IP ) 、 用户设 备当前的位置信息, 用户设备的能力信息等, 其中, 上述用户设备的能力信息 中包含用户设备的能力指示信息,例如用户设备支持优选可信的接入网的能力 的指示信息等。 H-ANDSF服务器接收到用户设备发送的选网策略请求信息之 后, 则可将其部署的第一选网策略发送给用户设备, 用户设备的处理器 200 从 H-ANDSF服务器处获取 H-ANDSF服务器部署的第一选网策略之后则可根 据该选网策略做相应的接入网选择操作。具体的, 用户设备的处理器 200获取 到的 H-ANDSF服务器部署的第一选网策略中包括: 漫游关系列表、 服务提供 商列表、 服务提供商可信非可信指示、 V-PLMN部署的接入网可信状态指示、 接入网的 SSID、 接入网的可信状态指示等信息, 其中, 上述漫游关系列表为 部署了可信接入网的 PLMN列表, 列表中包括一个或者多个 V-PLMN标识。
在一些可行的实施方式中, 所述第一选网策略中, 还包括: 路由信息; 所述路由信息的路由类型, 包括 home-routed路由、 local-breakout路由中 至少一种。
所述路由信息用于判断目标接入网是否需要与归属域 PGW建立连接, 具 体为:
若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
在一些可行的实施方式中, 所述第二选网策略即 V-ANDSF策略中, 还包 括: 所述第二选网策略中的可信接入网与可以连接的所述 PGW建立连接的 PLMN标识信息。 具体实现中, 第一选网策略中还包括: 路由信息和优选可信接入网指示, 其中,优选可信接入网指示可指示用户设备优先选择安全可靠的接入网络(即 可信的接入网络) , 本实施例默认第一选网策略中包括优选可信接入网指示, 即用户设备选择接入网络时优先选择可信的接入网。上述接入网的可信状态包 括: 可信, 或者非可信。 具体的, H-ANDSF服务器在部署第一选网策略时, 可根据各个接入网的 SSID中的数据信息判断接入网的接入点是否安全、可靠, 若判断得知该接入网络的接入点安全可靠,则可指示该接入网的可信状态为可 信; 若判断得知该接入网的接入点包含的信息中有不确定因素, 即包含有不安 全信息或者安全性未可知的信息时, 则可指示该接入网的可信状态为非可信。 上述服务提供商列表中包含 PLMN标识信息, 且对每个 PLMN指示其是否为 可信接入或非可信接入。 具体的, H-ANDSF服务器在部署第一选网策略时, 若判断某 PLMN部署的接入点为可信接入点, 则可指示该 PLMN为可信; 若 判断某 PLMN部署的接入点均为非可信接入点,则可指示该 PLMN为非可信, 或不给予任何指示。 上述路由信息的路由类型, 包括: home-routed路由, local-breakout路由等, 该路由信息用户判断目标接入网是否需要与归属域 PGW建立连接, 具体为: 若该路由信息显示该路由类型为 home-routed, 则可 判断目标接入网需要与归属域 PGW建立连接; 若该路由信息显示该路由类型 为 local-breakout路由, 则可判定目标接入网无需与归属域 PGW建立连接。
具体实现中, 当用户设备处于漫游状态时(本发明实施例默认用户设备处 于漫游状态),用户设备还需要查找 V-ANDSF服务器的 IP地址,与 V-ANDSF 服务器建立 IP连接。具体的,用户设备查找 V-ANDSF服务器的方式可包括: 通过 DNS服务器获取 V-ANDSF服务器的 IP地址等, 本实施例不对用户设备 查找 V-ANDSF服务器的方式做限制, 包含但不限于上述查找方式。 用户设备 与 V-ANDSF服务器建立 IP连接之后,则可向 V-ANDSF服务器发送选网策略 请求信息, 以获取 V-NADSF服务器部署的第二选网策略。 V-ANDSF服务器 接收到用户设备发送的选网策略请求信息之后,则可将其部署的第二选网策略 发送给用户设备,用户设备的处理器 200获取到第二选网策略之后则可根据该 选网策略做相应的接入网选择操作。 具体的, 上述第二选网策略中包括: 接入 网的 SSID、 接入网的可信状态指示等信息, 其中, 接入网可信状态包括: 可 信, 或者非可信。 具体的, V-ANDSF服务器在部署第二选网策略时, 可根据 各个接入网的 SSID中的数据信息判断接入网的接入点是否安全、 可靠, 若判 断得知该接入网络的接入点安全可靠, 则可指示该接入网的可信状态为可信; 若判断得知该接入网的接入点包含的信息中有不确定因素,即包含有不安全信 息或者安全性未可知的信息时,则可指示该接入网的可信状态为非可信。此外, 上述第二选网策略中, 还包括: 第二选网策略中的可信接入网与 PGW建立连 接的 PLMN 标识信息, 该标识信息表明该接入网可以连接的 PGW 所属的 PLMN信息。
在一些可行的实施方式中,用户设备的处理器 200获取到第一选网策略和 第二选网策略之后, 则可查找周围的 WLAN 的接入点, 获取当前漫游的 V-PLMN的接入点信息 ,包括 V-PLMN的接入点 SSID、接入点的状态信息等。 其中, 上述接入点的状态信息包括: 接入点当前的负荷值, 接入网当前的带宽 占用情况, 接入点指示的协议类型等。
在一些可行的实施方式中, 用户设备的处理器 200 获取到当前漫游的
V-PLMN的接入点信息之后,则可根据获取到的接入点信息,结合第一选网策 略和第二选网策略进行目标接入网选择。
在一些可行的实施方式中, 所述处理器在根据判断结果, 获取可信接入网 时具体用于:
当判断结果为是时, 获取拜访地接入网络发现和选择功能 V-ANDSF策略 中包含的可信接入网。
当判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
具体的,用户设备的处理器 200从 H-ANDSF服务器获取到得第一选网策 略中包括拜访地网络的漫游关系列表, 该列表中包括一个或者多个 V-PLMN 标识,用户设备的处理器 200获取到当前漫游的 V-PLMN的接入点信息之后, 则可根据该接入点信息中的接入点标识判断该 V-PLMN是否包含在上述拜访 地网络漫游关系列表中。 若判断得知当前漫游的 V-PLMN包含在上述拜访地 网络漫游关系列表中, 则可判断得知 V-PLMN 支持可信接入网, 可优先从 V-ANDSF服务器部署的第二选网策略中选择 V-PLMN的接入网中可信状态指 示为可信的接入网的标识, 并将该可信接入网作为第一优先接入网。
在一些可行的实施方式中, 所述处理器在获取 V-ANDSF策略中包含的所 述 V-PLMN的可信接入网时, 具体用于: 从所述 V-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标 识;
根据所述第一选网策略中的路由信息判断目标接入网是否需要与所述归 属域 PGW建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信 接入网与可以连接的所述 PGW的 PLMN标识信息中是否包含 H-PLMN标识; 若所述可信接入网与可以连接的所述 PGW的 PLMN标识信息中包含所述 H-PLMN标识, 则将所述 V-ANDSF策略中的可信接入网设定为第一优选接入 网。
具体的, 处理器 200设定好第二选网策略中的可信接入网之后,还可根据 第一选网策略中的路由信息判断目标接入网是否需要与归属域 PGW建立连接 , 所判断结果为是, 则可进一步判断第二选网策略中的可信接入网与 PGW建立 连接的 PLMN标识信息中是否包含 H-PLMN标识 , 若包含 H-PLMN标识 , 贝' J 表明第二选网策略中的可信接入网可以直接连接到归属域 PGW, 则可将第二 选网策略中的可信接入网设定为第一优选接入网,否则表明该可信接入网不能 连接归属域 PGW, 则不作为优选接入网。 此外, 处理器 200 若判断得知该 V-PLMN不在第一选网策略中的拜访地网络漫游关系列表中 , 或 V-PLMN在 服务提供商列表中指示为非可信, 则可判断得知该 V-PLMN部署的所有接入 网均为非可信的接入网, 即 V-ANDSF服务器部署的所有接入网均为非可信的 接入网, 此时, 用户设备的处理器 200则从 H-ANDSF服务器部署的第一选网 策略中查找是否包含有可信接入网,获取 H-ANDSF服务器部署的第一选网策 略中可信接入网作为第二优选接入网。
在一些可行的实施方式中, 用户设备的处理器 200查找到周围的 WLAN 的接入点, 并根据接入点的状态信息, 以及预先获取到的 H-ANDSF服务器部 署的第一选网策略和 V-ANDSF服务器部署的第二选网策略设定好第一优选接 入网、第二优选接入网以及第三优选接入网之后, 则可将各个接入网进行优先 级排序, 建立接入网列表。 其中, 上述第三优选接入网, 可包括 H-ANDSF服 务器部署的第一选网策略中的 H-ANDSF服务器部署的可信状态指示为非可信 的接入网和第二选网策略中的 V-ANDSF服务器部署的可信状态指示为非可信 的接入网。 具体的, 用户设备的处理器 200建立接入网列表时, 首先将上述第 一优选接入网设定为第一优先级列表项, 即将 V-ANDSF服务器部署的第二选 网策略中的可信接入网赋予最高优先级,其次是 H-ANDSF服务器部署的第一 选网策略中的可信接入网, 最后的非可信接入网。 即将第一优选接入网设定为 接入网列表中的第一优先级列表项,将上述第二优选接入网设定为接入网列表 中的第二优先级列表项,将上述第三优选接入网设定为接入网列表中的第三优 先级列表项。 在一些可行的实施方式中, 若第一优选接入网多于一个, 即 V-ANDSF服务器部署的第二选网策略中的可信接入网多于一个, 则可根据第 二选网策略中部署的接入网的优先级顺序将第一优选接入网中的各个接入网 进行优先级排序,若第二优选接入网多于一个, 则可根据第一选网策略中部署 的接入网优先级顺序将第二优选接入网中的各个接入网进行优先级排序,同样 的,若第三优先级接入网多于一个, 则可根据第一选网策略或者第二选网策略 中部署的接入网优先级顺序将第三优选接入网中的各个接入网进行优先级排 序。 例如, 若 V-ANDSF服务器部署的第二选网策略中的可信的接入网多于一 个, 即第一优选接入网多于一个, 例如, 包含 A、 B、 C三个可信接入网, 并 且 V-ANDSF部署第二选网策略时根据各个接入网的接入点状态信息,例如获 取到该接入网时该接入网的接入点当前的负荷值、接入点当前的带宽占用情况、 或者接入点指示的协议类型等信息将接入网 A、 B、 C进行了优选级排序为 A 优先级最高、 其次为 B, 最后为 C, 则当用户设备建立接入网列表时, 则可将 接入网 A、 B、 C按照第二选网策略中部署的优先级顺序进行排序, 即接入网 A的优先级最高, 再是 B, 最后是 C, 并且接入网 C的优先级高于第二优选接 入网中各个接入网的优先级。同理也可将第二优选接入网以及第三优选接入网 中的各个接入网进行优先级排序, 建立接入网列表。 此外, 对于 H-ANDSF服 务器部署的第一选网策略中的路由信息指示 home-routed路由或者 home-routed 路由与 local-breakout路由均可以时,处理器 200可根据 V-ANDSF服务器部署 的第二选网策略中的第一接入网与所述 PGW建立连接的 PLMN标识信息删除 可信接入网中不包含 H-PLMN标识,即不能连接归属域 PGW的可信的接入网。
在一些可行的实施方式中,所述处理器在选取所述可信接入网为目标接入 网时具体用于:
从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
具体地, 用户设备的处理器 200建立好接入网列表之后, 则可根据接入网 列表中的接入网优先级顺序依次判断各个接入网是否能够与 PLMN优先级列 表中优先级最高的 PLMN连接。 具体的, 用户设备基于运营商的配置获取静 态的 PLMN优先级列表, 该 PLMN优先级列表可静态存储于用户设备中, 运 营商也可通过 I-WLAN MO或 ANDSF服务器发送给用户设备。用户设备的处 理器 200从最高优先级的接入网开始判断最高优先级的接入网是否可以与优 先级最高的 PLMN建立连接, 若判断结果为是, 则可将上述接入网设定为用 户设备最终的目标接入网,否则继续查找优先级较低的其他接入网是否可以与 最高优先级的 PLMN建立连接, 直到连接到最高优先级的 PLMN。 如果接入 网优先级列表中的所有接入网均不能连接到优先级最高的 PLMN,则从优先级 最高的接入网开始,判断优先级最高的接入网是否可以与次高优先级的 PLMN 建立连接, 若判断结果为是, 则将上述接入网设定为用户设备的目标接入网, 否则继续查找优先级较低的其他接入网是否可以与次高优先级的 PLMN建立 连接, 如此循环, 直到找到最终的目标接入网络。 或者将优先级最高的接入网 作为目标接入网, 直接接入。
本实施例中所描述的终端可根据 V-ANDSF服务器部署的第二选网策略和
H-ANDSF服务器部署的第一选网策略, 以及第一选网策略中的拜访地网络的 漫游关系列表选定可信的接入网作为优先选择的接入网,还可将选定的可信接 入网进行优先级排序,优选优先级较高的接入网作为目标接入网,保障了用户 数据安全可靠的接入目标网络,并且在用户设备进行归属域路由的场景下可保 证目标接入网的接入点支持归属域数据网关的连接,避免接入网络重选, 节省 了用户设备选择接入网的时间,增强了用户设备选择目标接入网的用户体验效 果。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程, 是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于计算机 可读取存储介质中, 该程序在执行时, 可包括如上述各方法的实施例的流程。 其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory, ROM )或随机存储记忆体(Random Access Memory, RAM )等。
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之 权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。

Claims

权 利 要 求
1、 一种优选可信的 WLAN接入网的方法, 其特征在于, 包括: 根据获取的归属地接入网络发现和选择功能 H-ANDSF策略,判断目标或 拜访地公共陆地移动网络 PLMN是否支持可信接入网;
根据判断结果, 获取可信接入网;
选取所述可信接入网为目标接入网。
2、 如权利要求 1的方法, 其特征在于, 所述根据判断结果, 获取可信接 入网, 包括:
当判断结果为是时, 获取拜访地接入网络发现和选择功能 V-ANDSF策略 中包含的可信接入网。
3、 如权利要求 1的方法, 其特征在于, 所述根据判断结果, 获取可信接 入网, 包括:
当判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
4、 如权利要求 2所述的方法, 其特征在于, 所述 H-ANDSF策略即第一 选网策略中包括:
漫游关系列表, 即支持可信接入网的 PLMN列表;
所述判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入网,包括: 判断所述漫游关系列表中是否包含所述 V-PLMN。
5、 如权利要求 4所述的方法, 其特征在于, 如果所述漫游关系列表中含 有所述 V-PLMN , 则 V-PLMN支持可信接入网。
6、 如权利要求 2所述的方法, 其特征在于, 所述第一选网策略中包括服 务提供商列表, 其中所述服务提供商列表中包含 PLMN的可信状态指示; 所述判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入网,包括: 判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
7、 如权利要求 6所述的方法, 其特征在于, 如果所述服务提供商列表中 包含的所述 V-PLMN的可信状态指示为可信, 则 V-PLMN支持可信接入网。
8、 如权利要求 2所述的方法, 其特征在于, 所述第一选网策略中包括所 述 V-PLMN支持接入网可信状态指示;
所述判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入网,包括: 判断所述第一选网策略中包含的所述 V-PLMN支持的接入网的可信状态 指示中是否为可信状态。
9、 如权利要求 8所述的方法, 其特征在于, 如果所述第一选网策略中包 含的所述 V-PLMN支持的接入网的可信状态指示为可信, 则 V-PLMN支持可 信接入网。
10、 如权利要求 1-9任一项所述的方法, 其特征在于, 所述选取所述可信 接入网为目标接入网, 包括:
从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
11、 如权利要求 2所述的方法, 其特征在于, 所述 V-ANDSF策略即第二 选网策略中还包括: 接入网的 SSID、 接入网的可信状态指示, 所述接入网的 可信状态包括: 可信, 或者非可信;
所述获取 V-ANDSF策略中包含的可信接入网包括: 从所述 V-ANDSF策 略中获取接入网中可信状态指示为可信的接入网的标识,即为第一优选接入网。
12、 如权利要求 3所述的方法, 其特征在于, 所述 H-ANDSF策略即第一 选网策略中包括: 接入网的 SSID、 接入网的可信状态指示, 所述接入网的可 信状态包括: 可信, 或者非可信;
所述获取 H-ANDSF策略包含的可信接入网包括: 从所述 H-ANDSF策略 中获取接入网中可信状态指示为可信的接入网的标识, 即为第二优选接入网。
13、 如权利要求 2所述的方法, 其特征在于, 所述第一选网策略中, 还包 括: 路由信息;
所述路由信息的路由类型, 包括归属域 home-routed 路由、 本地 local-breakout路由中至少一种。
14、 如权利要求 13所述的方法, 其特征在于, 所述路由信息用于判断目 标接入网是否需要与归属域数据网关 PGW建立连接, 具体为:
若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
15、 如权利要求 14 所述的方法, 其特征在于, 所述第二选网策略即 V-ANDSF策略中, 还包括: 所述第二选网策略中的接入网与可以连接的所述
PGW的 PLMN标识信息。
16、 如权利要求 15所述的方法, 其特征在于, 所述获取 V-ANDSF策略 中包含的所述 V-PLMN的可信接入网, 包括:
从所述 V-ANDSF策略中获取所述 V-PLMN的接入网中可信状态指示为可 信的接入网的标识;
根据所述第一选网策略中的路由信息判断目标接入网是否需要与所述归 属域 PGW建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信 接入网与可以连接的所述 PGW的 PLMN标识信息中是否包含 H-PLMN标识; 若所述可信接入网与可以连接的所述 PGW的 PLMN标识信息中包含所述
H-PLMN标识, 则将所述 V-ANDSF策略中的可信接入网设定为第一优选接入 网。
17、 如权利要求 11或 12或 16任一项所述的方法, 其特征在于, 所述第 一优选接入网的优先级高于所述第二优选接入网的优先级,所述第二优选接入 网的优先级高于非可信接入网的优先级。
18、 一种优选可信的 WLAN接入网的装置, 其特征在于, 包括: 判断模块,用于根据获取的归属地接入网络发现和选择功能 H-ANDSF策 略, 判断目标或拜访地公共陆地移动网络 V-PLMN是否支持可信接入网; 获取模块, 用于根据所述判断模块的判断结果, 获取可信接入网; 选耳 莫块, 用于选取所述获取模块获取到的可信接入网为目标接入网。
19、 如权利要求 18所述的装置, 其特征在于, 所述获取模块, 包括: 第一获取单元, 用于在所述判断模块判断结果为是时, 获取拜访地接入网 络发现和选择功能 V-ANDSF策略中包含的可信接入网;
第二获取单元,用于在所述判断模块判断结果为否时,获取所述 H-ANDSF 策略包含的可信接入网。
20、 如权利要求 19所述的装置, 其特征在于, 所述 H-ANDSF策略即第 一选网策略中包括:
漫游关系列表, 即支持可信接入网的 PLMN列表;
所述判断模块在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接 入网时, 具体用于: 判断所述漫游关系列表中是否包含所述 V-PLMN。
21、 如权利要求 20所述的装置, 其特征在于, 若所述漫游关系列表中包 含所述 V-PLMN, 则 V-PLMN支持可信接入网。
22、 如权利要求 19所述的装置, 其特征在于, 所述第一选网策略中包括 服务提供商列表, 其中所述服务提供商列表中包含 PLMN的可信状态指示; 所述判断模块在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接 入网时具体用于:
判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
23、 如权利要求 22所述的装置, 其特征在于, 若所述服务提供商列表中 包含的所述 V-PLMN的可信状态指示为可信, 则 V-PLMN支持可信接入网。
24、 如权利要求 19所述的装置, 其特征在于, 所述第一选网策略中包括 所述 V-PLMN支持接入网可信状态指示;
所述判断模块在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接 入网时具体用于:
判断所述第一选网策略中包含的所述 V-PLMN支持接入网的可信状态指 示中是否为可信状态。
25、 如权利要求 24所述的装置, 其特征在于, 若所述第一选网策略中包 含的所述 V-PLMN支持接入网的可信状态指示为可信, 则 V-PLMN支持可信 接入网。
26、 如权利要求 18-25任一项所述的装置, 其特征在于, 所述选取模块在 选取所述可信接入网为目标接入网时具体用于:
从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
27、 如权利要求 19所述的装置, 其特征在于, 所述 V-ANDSF策略即第 二选网策略中还包括: 接入网的 SSID、 接入网的可信状态指示, 所述接入网 的可信状态包括: 可信, 或者非可信;
所述第一获取单元在获取 V-ANDSF策略中包含的可信接入网时具体为: 从所述 V-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标识, 即为第一优选接入网。
28、 如权利要求 20所述的装置, 其特征在于, 所述 H-ANDSF策略即第 一选网策略中包括: 接入网的 SSID、 接入网的可信状态指示, 所述接入网的 可信状态包括: 可信, 或者非可信;
所述第二获取单元在获取 H-ANDSF策略包含的可信接入网时具体为:从 所述 H-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标识, 并 即为第二优选接入网。
29、 如权利要求 19所述的装置, 其特征在于, 所述第一选网策略中, 还 包括: 路由信息;
所述路由信息的路由类型, 包括 home-routed路由、 local-breakout路由中 至少一种。
30、 如权利要求 29所述的装置, 其特征在于, 所述路由信息用于判断目 标接入网是否需要与归属域 PGW建立连接, 具体为:
若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
31、 如权利要求 30 所述的装置, 其特征在于, 所述第二选网策略即 V-ANDSF策略中, 还包括: 所述第二选网策略中的可信接入网与可以连接的 所述 PGW的 PLMN标识信息。
32、 如权利要求 31所述的装置, 其特征在于, 所述第一获取单元包括: 网中可信状态指示为可信的接入网的标识;
第二处理子单元,用于根据所述第一选网策略中的路由信息判断目标接入 网是否需要与所述归属域 PGW 建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信接入网与可以连接的所述 PGW的 PLMN标识信息中 是否包含 H-PLMN标识;
第三处理子单元, 用于在所述可信接入网与可以连接的所述 PGW 的 PLMN标识信息中包含所述 H-PLMN标识时 ,将所述 V-ANDSF策略中的可信 接入网设定为第一优选接入网。
33、 如权利要求 27或 28或 32中任一项所述的装置, 其特征在于, 所述 第一优选接入网的优先级高于所述第二优选接入网的优先级,所述第二优选接 入网的优先级高于非可信接入网的优先级。
34、 一种终端, 其特征在于, 包括:
存储器, 用于存储指令;
处理器, 用于从所述存储器中读取指令, 并根据所述指令执行如下操作: 根据获取的归属地接入网络发现和选择功能 H-ANDSF策略,判断目标或拜访 地公共陆地移动网络 V-PLMN是否支持可信接入网, 根据判断结果, 获取可 信接入网, 并选取所述可信接入网为目标接入网。
35、 如权利要求 34所述的终端, 其特征在于, 所述处理器在根据判断结 果, 获取可信接入网时具体用于:
当判断结果为是时, 获取拜访地接入网络发现和选择功能 V-ANDSF策略 中包含的可信接入网。
36、 如权利要求 34所述的终端, 其特征在于, 所述处理器在根据判断结 果, 获取可信接入网时具体用于:
当判断结果为否时, 获取所述 H-ANDSF策略包含的可信接入网。
37、 如权利要求 35所述的终端, 其特征在于, 所述 H-ANDSF策略即第 一选网策略中包括:
漫游关系列表, 即支持可信接入网的 PLMN列表;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述漫游关系列表中是否包含所述 V-PLMN。
38、 如权利要求 37所述的终端, 其特征在于, 如果所述漫游关系列表中 含有所述 V-PLMN, 则 V-PLMN支持可信接入网。
39、 如权利要求 35所述的终端, 其特征在于, 所述第一选网策略中包括 服务提供商列表, 其中所述服务提供商列表中包含 PLMN的可信状态指示; 所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述服务提供商列表中包含的所述 V-PLMN的可信状态指示是否为 可信。
40、 如权利要求 39所述的终端, 其特征在于, 如果所述服务提供商列表 中包含的所述 V-PLMN的可信状态指示为可信,则 V-PLMN支持可信接入网。
41、 如权利要求 35所述的终端, 其特征在于, 所述第一选网策略中包括 所述 V-PLMN支持接入网可信状态指示;
所述处理器在判断拜访地公共陆地移动网络 V-PLMN是否支持可信接入 网时具体用于:
判断所述第一选网策略中包含的所述 V-PLMN支持的接入网的可信状态 指示中是否包含可信状态。
42、 如权利要求 41所述的终端, 其特征在于, 如果所述第一选网策略中 包含的所述 V-PLMN支持的接入网的可信状态指示为可信, 则 V-PLMN支持 可信接入网。
43、 如权利要求 34-42任一项所述的终端, 其特征在于, 所述处理器在选 取所述可信接入网为目标接入网时具体用于:
从接入网列表中选取所述可信接入网为所述目标接入网, 其中,在所述接 入网列表中所述可信接入网的优先级高于非可信接入网的优先级。
44、 如权利要求 35所述的终端, 其特征在于, 所述 V-ANDSF策略即第 二选网策略中还包括: 接入网的 SSID、 接入网的可信状态指示, 所述接入网 的可信状态包括: 可信, 或者非可信;
所述处理器在获取 V-ANDSF策略中包含的可信接入网时具体用于: 从所 述 V-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标识, 即为 第一优选接入网。
45、 如权利要求 36所述的终端, 其特征在于, 所述 H-ANDSF策略即第 一选网策略中包括: 接入网的 SSID、 接入网的可信状态指示, 所述接入网的 可信状态包括: 可信, 或者非可信;
所述处理器在获取 H-ANDSF策略包含的可信接入网时具体用于:从所述 H-ANDSF策略中获取接入网中可信状态指示为可信的接入网的标识, 即为第 二优选接入网。
46、 如权利要求 35所述的终端, 其特征在于, 所述第一选网策略中, 还 包括: 路由信息;
所述路由信息的路由类型, 包括 home-routed路由、 local-breakout路由中 至少一种。
47、 如权利要求 46所述的终端, 其特征在于, 所述路由信息用于判断目 标接入网是否需要与归属域 PGW建立连接, 具体为:
若所述路由信息显示所述路由类型为 home-routed路由, 则判定所述目标 接入网需要与所述归属域 PGW建立连接;
若所述路由信息显示所述路由类型为 local-breakout路由, 则判定所述目 标接入网无需与所述归属域 PGW建立连接。
48、 如权利要求 47 所述的终端, 其特征在于, 所述第二选网策略即 V-ANDSF策略中, 还包括: 所述第二选网策略中的接入网与可以连接的所述 PGW的 PLMN标识信息。
49、如权利要求 48所述的终端,其特征在于,所述处理器在获取 V-ANDSF 策略中包含的所述 V-PLMN的可信接入网时, 具体用于:
从所述 V-ANDSF策略中获取所述 V-PLMN的接入网中可信状态指示为可 信的接入网的标识; 根据所述第一选网策略中的路由信息判断目标接入网是否需要与所述归 属域 PGW建立连接, 若判断结果为是, 则判断所述 V-ANDSF策略中的可信 接入网与可以连接的所述 PGW的 PLMN标识信息中是否包含 H-PLMN标识; 若所述可信接入网与可以连接的所述 PGW的 PLMN标识信息中包含所述 H-PLMN标识, 则将所述 V-ANDSF策略中的可信接入网设定为第一优选接入 网。
50、 如权利要求 44或 45或 49任一项所述的终端, 其特征在于, 所述第 一优选接入网的优先级高于所述第二优选接入网的优先级,所述第二优选接入 网的优先级高于非可信接入网的优先级。
PCT/CN2013/079549 2013-07-17 2013-07-17 一种优选可信的wlan接入网的方法、装置及终端 WO2015006943A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2013/079549 WO2015006943A1 (zh) 2013-07-17 2013-07-17 一种优选可信的wlan接入网的方法、装置及终端
CN201380000953.1A CN104521293B (zh) 2013-07-17 2013-07-17 一种优选可信的wlan接入网的方法、装置及终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/079549 WO2015006943A1 (zh) 2013-07-17 2013-07-17 一种优选可信的wlan接入网的方法、装置及终端

Publications (1)

Publication Number Publication Date
WO2015006943A1 true WO2015006943A1 (zh) 2015-01-22

Family

ID=52345707

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/079549 WO2015006943A1 (zh) 2013-07-17 2013-07-17 一种优选可信的wlan接入网的方法、装置及终端

Country Status (2)

Country Link
CN (1) CN104521293B (zh)
WO (1) WO2015006943A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017113385A1 (zh) * 2015-12-31 2017-07-06 华为技术有限公司 数据分流方法、用户设备及系统
WO2022242421A1 (zh) * 2021-05-18 2022-11-24 华为技术有限公司 选网策略的确定方法及装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106912051B (zh) * 2017-02-27 2020-05-15 工业和信息化部电信研究院 一种在运营的开放网络中自动接入网络的方法及客户端

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060029027A1 (en) * 2004-08-09 2006-02-09 Adrian Buckley Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
CN101577909A (zh) * 2008-05-05 2009-11-11 大唐移动通信设备有限公司 非3gpp接入系统信任类型的获取方法、系统及装置
CN101945446A (zh) * 2009-07-10 2011-01-12 中兴通讯股份有限公司 一种用户设备处理策略冲突的方法及系统
CN102771146A (zh) * 2009-08-24 2012-11-07 株式会社东芝 用于多接口用户的plmn选择和系统间移动性策略冲突化解

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060029027A1 (en) * 2004-08-09 2006-02-09 Adrian Buckley Apparatus, and associated method, for facilitating communications by a mobile node in a multiple network radio communication system having interworking capability
CN101577909A (zh) * 2008-05-05 2009-11-11 大唐移动通信设备有限公司 非3gpp接入系统信任类型的获取方法、系统及装置
CN101945446A (zh) * 2009-07-10 2011-01-12 中兴通讯股份有限公司 一种用户设备处理策略冲突的方法及系统
CN102771146A (zh) * 2009-08-24 2012-11-07 株式会社东芝 用于多接口用户的plmn选择和系统间移动性策略冲突化解

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017113385A1 (zh) * 2015-12-31 2017-07-06 华为技术有限公司 数据分流方法、用户设备及系统
WO2022242421A1 (zh) * 2021-05-18 2022-11-24 华为技术有限公司 选网策略的确定方法及装置

Also Published As

Publication number Publication date
CN104521293A (zh) 2015-04-15
CN104521293B (zh) 2018-06-15

Similar Documents

Publication Publication Date Title
US11838114B2 (en) Method and apparatus for effective wireless LAN selection
JP4954704B2 (ja) ワイヤレスローカルエリアネットワーク(wlan)においてユーザ端末がアクセスモバイルネットワークを選択する最適化インタラクション方法
JP6708647B2 (ja) 無線アクセスネットワーク(ran)共有のための改良されたアクセスネットワーククエリプロトコル(anqp)シグナリング
WO2016202174A1 (zh) 一种网络接入方法、移动通信终端、网络服务器及网络接入系统
US9253717B2 (en) Method and terminal for selecting AP
US9264450B2 (en) Method of seamless policy based network discovery, selection and switching
EP1670180A1 (en) A fast interactive methodof user terminal in the wireless local area network (wlan) selecting access mobile network
WO2013177867A1 (zh) 一种公众陆地移动网选择方法、装置及终端
KR20150026759A (ko) 무선 랜에서 다중 연결을 지원하는 방법 및 장치
CN104247505A (zh) 用于利用anqp服务器能力增强andsf的系统和方法
WO2015106525A1 (zh) 一种选网方法和装置
WO2007003125A1 (fr) Procédé de recherche de prestataire de services de réseau et appareil idoine
JP2018503307A (ja) アクセスポイント(ap)において多数のサービスプロバイダをサポートするようにスケーリングするための改良されたアクセスネットワーククエリプロトコル(anqp)シグナリング
CN104066154A (zh) 选择无线局域网wlan运营商和wlan的方法及用户设备
WO2014153766A1 (zh) 策略融合的方法、ue及服务器
US10028215B2 (en) Method and terminal for selecting AP
WO2015006943A1 (zh) 一种优选可信的wlan接入网的方法、装置及终端
WO2014110952A1 (zh) 选择v-andsf方法及装置、接入网接入方法及装置
WO2014043916A1 (zh) 一种wlan接入方法和装置
CN105493540A (zh) 一种无线局域网用户侧设备及信息处理方法
JP2021508418A (ja) ネットワークコンポーネント、通信端末、通信端末を接続する方法及び通信ネットワークを使用する方法
CN104010380B (zh) 网络选择方法及用户设备
WO2011109983A1 (zh) 策略处理方法、andsf和ue
EP2385727A1 (en) Method for controlling a terminal operable to access a wireless access network
WO2014110821A1 (zh) 一种用户设备接入网络的方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13889743

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13889743

Country of ref document: EP

Kind code of ref document: A1