WO2019242467A1 - 一种防止流量欺诈的方法及装置 - Google Patents

一种防止流量欺诈的方法及装置 Download PDF

Info

Publication number
WO2019242467A1
WO2019242467A1 PCT/CN2019/088881 CN2019088881W WO2019242467A1 WO 2019242467 A1 WO2019242467 A1 WO 2019242467A1 CN 2019088881 W CN2019088881 W CN 2019088881W WO 2019242467 A1 WO2019242467 A1 WO 2019242467A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
network usage
user equipment
usage
session
Prior art date
Application number
PCT/CN2019/088881
Other languages
English (en)
French (fr)
Inventor
李华
何承东
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019242467A1 publication Critical patent/WO2019242467A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/47Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Definitions

  • This application relates to the field of communications, and more specifically, to a method and device for preventing traffic fraud in the field of communications.
  • service-based architecture network entities based on specific network functions that can be provided are called network functions.
  • function (NF) module network functions can be provided as a service.
  • any two network function modules can interact with each other in the manner of network function service invocation through a service-oriented interface.
  • the user's traffic is sent to the hUPF of the home network through the User Plane Function (vUPF) of the visited network.
  • vUPF User Plane Function
  • hSMF sends traffic to network elements related to charging.
  • the prefix v indicates the visited network and h indicates the home network).
  • the visited network may conduct some traffic fraud (such as reporting more traffic to the home network), resulting in billing disputes.
  • the present application provides a method and device for preventing traffic fraud.
  • the visited network reports network usage
  • the UE also reports the used network usage.
  • the home network judges whether there is possible traffic fraud by comparing the two to report the network usage. If there is traffic fraud, it is processed according to a preset policy.
  • this application provides a method for preventing traffic fraud.
  • the method includes: a first network element receiving a first network usage situation sent by a user equipment, wherein the first network element is a network element in a home network
  • the first network element obtains a second network usage situation sent by a second network element, wherein the second network element is a network element in a visited network that provides services for the user equipment; if the first network If the usage condition does not match the second network usage condition, processing is performed according to a preset policy.
  • the first network element may be an access and mobility management function (AMF), a session management network function (SMF), and a security edge protection agent (Security Edge) in the home network. Protection (Proxy) (SEPP), Authentication Server (Function) (AUSF), or Unified Data Management Network Element (UDM).
  • the first network element may be an AMF in the visited network.
  • the first network usage is the traffic used by the UE within a preset period of time, or the number of data packets transmitted and received within a preset period of time, or the service of a slice, calculated by the UE. Usage information, or business usage information for a session.
  • the second network usage is the traffic used by the UE within a preset period of time, or the number of data packets sent and received within a preset period of time, or service usage information of a slice (such as The traffic used or the number of packets sent or received by a slice), or the business usage information of a session (such as the traffic used or the number of packets sent or received by a session).
  • the first network usage is the network usage of the user equipment or the first slice or the first session counted by the user equipment;
  • the second network usage is the second network element Statistic network usage of the user equipment or the first slice or the first session, wherein the network usage is traffic information, or the network usage time, or the number of data packets sent and received; wherein the first The slice is any slice initiated by the user equipment; the first session is any session initiated by the user equipment.
  • the UE sends a first message authentication code to the first network element, where the message authentication code is based on sharing
  • the key and the first network usage are generated.
  • the first network element receives a first message authentication code sent by the user equipment; the first network element obtains a second message authentication code, and the second message authentication code is also based on the shared secret.
  • the key and the second network usage situation are generated; if the first message authentication code and the second message authentication code are the same, determining whether the first network usage situation matches the second network usage situation.
  • determining whether the first network usage condition matches the second network usage condition includes: determining whether the first network usage condition is the same as the second network usage condition; or, if the first network usage condition is the same; If the use situation and the second network use situation are both numerical values, it is determined whether the two numerical values are less than a preset threshold.
  • processing is performed according to a preset policy.
  • a preset policy there can be one or more preset policies, for example, a session can be released, or a server can be reported.
  • the processing according to a preset policy includes: terminating a session, or reporting to a server, or recording a detailed log of a user's network usage.
  • the method further includes: the first network element sends a service usage query request to the second network element; the service The use query request is used to instruct the second network element to feedback a network usage situation used by the user equipment.
  • a second aspect of the present invention discloses a method for preventing traffic fraud.
  • the method includes: a second network element receiving a first network usage situation sent by a user equipment, wherein the second network element is a network element in a visited network The second network element obtains a second network usage situation counted by the visited network; if the first network usage situation does not match the second network usage situation, processing is performed according to a preset policy.
  • the second network element may be a vAMF.
  • the first network usage situation is the traffic used by the UE within a preset time period, or the number of data packets transmitted and received during the preset time period, or the service usage information of a slice, or Business usage information for the session.
  • the second network usage is the traffic used by the UE within a preset period of time, or the number of data packets sent and received within a preset period of time, or the service usage information of a slice, or Is business usage information for a session.
  • the first network usage is the network usage of the user equipment or the first slice or the first session counted by the user equipment;
  • the second network usage is the second network element Statistic network usage of the user equipment or the first slice or the first session, wherein the network usage is traffic information, or the network usage time, or the number of data packets sent and received; wherein the first The slice is any slice initiated by the user equipment; the first session is any session initiated by the user equipment.
  • determining whether the first network usage condition matches the second network usage condition includes: determining whether the first network usage condition is the same as the second network usage condition; or, if the first network usage condition is the same; If the use situation and the second network use situation are both numerical values, it is determined whether the two numerical values are less than a preset threshold. Further, if the first network usage situation does not match the second network usage situation, processing is performed according to a preset policy. Among them, there can be one or more preset policies. For example, you can choose to release the session, and the session termination reason value is carried in the message that releases the session.
  • vAMF will continue to service and record the specific service usage records of the UE for later Provide evidence when disputes arise; for example, vAMF will report inconsistent traffic information to the operation and maintenance system; for example, vAMF will report inconsistent traffic information to the home network.
  • vAMF may select one or more types for operation.
  • the processing according to a preset policy includes: terminating a session, or reporting to a server, or recording a detailed log of a user's network usage.
  • comparing the network usage reported by the UE with the network usage of the UE counted by the network on the visited network side is to determine whether the UE has tampered with the data of the network usage of the UE. Then visit the network to file for later verification.
  • the comparison result can also be sent to the home network, so that the home network can also file a record.
  • the first network usage and the second network usage are also sent to a first network element; where the first A network element is a network element in the home network. Further, the home network determines whether there is an abnormality in traffic statistics according to the first network usage and the second network usage.
  • the second network element periodically sends a traffic query request to the user equipment according to the subscription information of the first network element . In order for the UE to feed back the network usage of the UE counted by the UE according to the traffic query request.
  • a third aspect of the present invention discloses a method for preventing traffic fraud.
  • the method includes: a user equipment generates a first message authentication code according to network usage and a shared key; and the user equipment sends the network usage to a visited network And the first message authentication code.
  • the UE in order to prevent the visited network from tampering with the UE ’s network usage, the UE also sends its own network usage and message authentication code to the visited network, which is then forwarded by the visited network to the home network. The network judges whether the network usage reported by the UE is consistent with the network usage of the UE reported by the visited network.
  • the shared key is a key shared between the UE and the home network, so the UE and the home network know how to generate or obtain the shared key.
  • the user equipment generates the shared key according to the identifier of the visited network and the intermediate key; the intermediate key is a key generated when the user equipment accesses the authentication, and the identifier of the visited network includes the visited network The name.
  • the first message authentication code may be one or more; the network usage includes at least one of the following parameters: the network usage of the user equipment, the network usage of the first slice, and the first slice.
  • the home network will feed back the comparison result to the UE.
  • the message authentication code will also be fed back. So that the UE can take measures according to the feedback comparison result.
  • the user equipment receives a comparison result fed back by the visited network and a second message authentication code; the user equipment verifies the second message authentication code; if the second message authentication code is successfully verified , Processing is performed according to the comparison result and a preset strategy.
  • the user equipment may verify the message authentication code according to the shared key.
  • a fourth aspect of the present invention discloses a device (the device is a network element in a home network), and the device may be used to execute the method described in the first aspect.
  • the device includes:
  • a receiving unit is configured to receive a first network usage situation sent by a user equipment, wherein the device is a network element in a home network; an acquisition unit is configured to obtain a second network usage situation sent by a second network element, wherein The second network element is a network element in a visited network providing services for the user equipment;
  • the processing unit is configured to perform processing according to a preset policy if the first network usage does not match the second network usage.
  • the device further includes a judgment unit
  • the receiving unit is further configured to receive a first message authentication code sent by the user equipment; wherein the message authentication code is generated according to a shared key and the first network usage situation; the obtaining unit is further configured to: Configured to obtain a second message authentication code, where the second message authentication code is generated according to the shared key and the second network usage situation; the judgment unit is configured to authenticate the first message if If the code is the same as the second message authentication code, it is determined whether the first network usage situation matches the second network usage situation.
  • the device further includes a sending unit
  • the sending unit is configured to send a service use query request to the second network element
  • the receiving unit is configured to receive a second network usage situation sent by a second network element.
  • a fifth aspect of the present invention discloses a device (the device is a network element in a visited network, such as AMF), and the device may be used to execute the method described in the second aspect.
  • the device includes a receiving unit, an obtaining unit, and a processing unit;
  • the receiving unit is configured to receive a first network usage situation sent by a user equipment, wherein the device is a network element in a visited network; and the obtaining unit is configured to obtain a second network usage situation counted by the visited network.
  • the processing unit is configured to perform processing according to a preset policy if the first network usage does not match the second network usage.
  • the device further includes a sending unit
  • the sending unit is configured to send the first network usage condition and the second network usage condition to a first network element, where the first network element is a network element in a home network.
  • the sending unit is further configured to periodically send a traffic query request to the user equipment according to the subscription information of the first network element; and the receiving unit is configured to receive a first network sent by the user equipment.
  • the device is a network element in a visited network.
  • a sixth aspect of the present invention discloses a user equipment, where the user equipment is configured to execute the method described in the third aspect.
  • the user equipment includes a generating unit and a sending unit;
  • the generating unit is configured to generate a first message authentication code according to network usage and a shared key
  • the sending unit is configured to send the network usage and the first message authentication code to the visited network.
  • the generating unit is further configured to generate the shared key according to an identifier of the visited network and an intermediate key; the intermediate key is a key generated when the user equipment accesses the authentication, and the identifier of the visited network includes The name of the visited network.
  • the user equipment further includes a receiving unit, a verification unit, and a processing unit;
  • the receiving unit is configured to receive a comparison result fed back by the visited network and a second message authentication code; the verification unit is configured to verify the second message authentication code; and the processing unit is configured to If the second message authentication code is successfully verified, it is processed according to the comparison result and a preset policy.
  • the present application provides a network element including a memory, a processor, a transceiver, and a computer program stored on the memory and executable on the processor.
  • a network element including a memory, a processor, a transceiver, and a computer program stored on the memory and executable on the processor.
  • the present application provides a network element including a memory, a processor, a transceiver, and a computer program stored on the memory and executable on the processor.
  • a network element including a memory, a processor, a transceiver, and a computer program stored on the memory and executable on the processor.
  • the present application provides a user equipment (such as an electronic device that transmits and receives information, such as a mobile phone, a tablet computer, and a wearable device).
  • the network element includes a memory, a processor, a transceiver, and a storage device stored in the memory.
  • the computer program running on the processor when the computer program in the memory is executed, the transceiver and the processor execute the method of the third aspect or any possible implementation manner of the third aspect.
  • the present application provides a computer-readable medium for storing a computer program, the computer program including instructions for performing the first aspect or the method in any possible implementation manner of the first aspect.
  • the present application provides a computer-readable medium for storing a computer program, the computer program including instructions for performing the second aspect or a method in any possible implementation manner of the second aspect.
  • the present application provides a computer-readable medium for storing a computer program, the computer program including instructions for performing the third aspect or the method in any possible implementation manner of the third aspect.
  • the present application provides a computer program product containing instructions that, when run on a computer, causes the computer to execute the above-mentioned first aspect or the method in any possible implementation manner of the first aspect.
  • the present application provides a computer program product containing instructions that, when run on a computer, causes the computer to perform the method in the second aspect or any possible implementation manner of the second aspect.
  • the present application provides a computer program product containing instructions that, when run on a computer, causes the computer to execute the method of the third aspect or any possible implementation manner of the third aspect.
  • the present application provides a chip including: an input interface, an output interface, at least one processor, and a memory, and the input interface, the output interface, the processor, and the memory are connected through a bus,
  • the processor is configured to execute code in the memory, and when the code is executed, the processor is configured to execute the foregoing first aspect or a method in any possible implementation manner of the first aspect.
  • the present application provides a chip including: an input interface, an output interface, at least one processor, and a memory, and the input interface, the output interface, the processor, and the memory are connected by a bus,
  • the processor is configured to execute code in the memory, and when the code is executed, the processor is configured to execute the foregoing second aspect or a method in any possible implementation manner of the second aspect.
  • the present application provides a chip including: an input interface, an output interface, at least one processor, and a memory, and the input interface, the output interface, the processor, and the memory are connected by a bus,
  • the processor is configured to execute code in the memory, and when the code is executed, the processor is configured to execute the third aspect or a method in any possible implementation manner of the third aspect.
  • FIG. 1 is a 5G roaming architecture diagram provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a method for preventing traffic fraud according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of another method for preventing traffic fraud according to an embodiment of the present application.
  • FIG. 4 is a logical structural diagram of a network element of a home network according to an embodiment of the present application.
  • FIG. 5 is a logical structural diagram of a network element that visits a network according to an embodiment of the present application
  • FIG. 6 is a logical structural diagram of a user equipment according to an embodiment of the present application.
  • FIG. 7 is a physical structural diagram of a device according to an embodiment of the present application.
  • FIG. 1 shows a schematic block diagram of a 5G roaming architecture according to an embodiment of the present application.
  • the network architecture is based on services, and a variety of different types of network function modules are obtained.
  • the network function modules interact with each other in the manner of network function service calls through service-oriented interfaces.
  • the network function module in the embodiment of the present application has specific functions and network interfaces, and may be a network element on dedicated hardware, a software instance running on dedicated hardware, or a related platform (such as a cloud infrastructure Examples of virtual functions on) are not limited in this embodiment of the present application.
  • Radio access network responsible for user equipment (UE) access. It can be understood that in the actual expression process, the RAN can also be abbreviated as AN.
  • the UE in the embodiment of the present application may be mobile or fixed, and the UE may refer to an access terminal, terminal device, mobile terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal , Mobile devices, user terminals, terminals, wireless communication devices, user agents or user devices, etc.
  • the access terminal can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital processing (PDA), and wireless communication.
  • 5G 5th generation
  • NR new wireless
  • Access and mobility management function (AMF) module responsible for functions similar to mobility management in existing mobile management entities (MME), for controlling UE access to network resources And manage the movement of the UE.
  • MME mobile management entities
  • the AMF module and the RAN module communicate with each other to process the access network control plane.
  • N2 is not a service interface.
  • AUSF Authentication server function
  • Session management function session management function, SMF
  • SMF session management function
  • Network open function (NEF) module responsible for providing network function services in the core network to external network entity services securely, as well as internal and external network information conversion.
  • Network function module refers to a network element capable of providing network services, such as AUSF, AMF, or UDM.
  • Network Function Database Function responsible for functions such as service discovery.
  • NEF Network Function Database Function
  • the full English name of the network function database can also be NF function.
  • PCF Policy control function
  • Unified data management (UDM) module including front end (FE) and user database (user data repository).
  • FE front end
  • UDR user subscription data storage server
  • Application function (AF) module provides application services.
  • UPF User Plane Function
  • UDM can be understood as UDM network element or UDM function network element
  • NRF can be understood as NRF network element or NRF function network element.
  • the AMF module has a service interface NAMF
  • the SMF module has a service interface NSMF
  • the AUSF module has a service interface NAUSF
  • the NEF module has a service interface NNEF
  • the NRF module has a service interface NNRF
  • the PCF module has Service-oriented interface NPCF
  • UDM module has service-oriented interface NUDM
  • AF module has service-oriented interface NAF.
  • the visited network may conduct some traffic fraud. For example, when vUPF forwards traffic to hUPF (the network element with the v prefix is the network element in the visited network, and the network element with the h prefix is the network element in the home network), adding some junk traffic will cause users The actual use of traffic is inconsistent with the traffic reported by the visited network, resulting in billing disputes.
  • the revenue sharing mode for example, the visited network charges the home network based on the traffic used by the user
  • the visited network may conduct some traffic fraud. For example, when vUPF forwards traffic to hUPF (the network element with the v prefix is the network element in the visited network, and the network element with the h prefix is the network element in the home network), adding some junk traffic will cause users The actual use of traffic is inconsistent with the traffic reported by the visited network, resulting in billing disputes.
  • the present invention provides a solution: when the visited network reports network usage (such as traffic data, duration data, and message reports) to the home network, the UE also reports the used network usage and the home network. By comparing the two reports of network usage, it is determined whether there is a possible traffic fraud.
  • the home network may feed back the judgment result to the visited network.
  • the UE will perform integrity protection on the network usage that needs to be reported; if the home network verifies that the integrity protection of the data sent by the UE is OK, it will compare the UE And visit the network to report network usage.
  • the home network can actively query or subscribe to network usage data when the UE is roaming.
  • the visited network can also perform traffic consistency detection: vAMF in the home network actively queries the network usage statistics counted by the UE and the network usage statistics of the UE counted by vSMF. If the two data are inconsistent or the difference between the two data Above the preset threshold, the visited network believes that the UE may maliciously report traffic information.
  • VAMF can handle it according to preset policies, such as choosing to release the session, or refusing to provide services to the UE, or continuing to service, and record the specific service usage records of the UE in order Provide evidence or inconsistent information with the flow information reported to the operation and maintenance system when disputes occur at a later stage.
  • vAMF may report inconsistent traffic information to the home network.
  • FIG. 2 shows a schematic flowchart of a method for preventing traffic fraud provided by an embodiment of the present application.
  • the method can be applied to the network architecture shown in FIG. 1.
  • the method includes:
  • the UE sends network usage to the vAMF.
  • the UE can send the network usage to the vAMF at a preset time interval; the preset time interval can be issued by the vAMF or by a network element in the home network.
  • the UE may send network usage information to the vAMF according to an instruction of the vAMF. For example, the UE receives a query request sent by the AMF; in response to the query request, the UE sends the network usage situation to the vAMF.
  • the network usage may be the traffic used by the UE within the preset time interval.
  • the UE needs to send network usage to the vAMF every 10 minutes, so the network usage sent is the traffic used by the UE in these 10 minutes.
  • 10 minutes is just an example. It can also be half an hour, an hour, etc. There is no restriction on the preset time interval.
  • the network usage may be service usage information of a slice (such as traffic usage of a slice).
  • the network usage may be service usage information of a certain type of slice (such as traffic usage of a certain type of switch within a preset time period).
  • a certain type of slice such as traffic usage of a certain type of switch within a preset time period.
  • Common types include eMBB (Enhanced Mobile Broadband, Enhanced Mobile Bandwidth), URLLC (Ultra-Reliable and Low-Latency Communication, extremely high reliability and low latency communication), and mMTC (massive machine type communication).
  • the network usage may also be the traffic usage of a session.
  • a network element such as AMF, AUSF, or hSEEP
  • AMF Access Mobility Management Function
  • AUSF Access Point Function
  • hSEEP hSEEP
  • a network element in the home network may subscribe to a user's service usage information or a slice of the user.
  • Service or service usage information of an APN access point name, access point name
  • the network element in the home network will call the vAMF service interface to query the network usage of the UE.
  • the vAMF will save the subscription information, and the subsequent The vAMF will send a network usage acquisition request to the UE according to the subscription information; accordingly, if the UE receives the network usage acquisition request, it will feedback the network usage to the vAMF.
  • the UE sends a first message to the vAMF, where the first message includes a network usage situation.
  • the network usage may be the total traffic used by the UE within a preset time period, or the number of data packets sent and received by the UE within a preset time period; of course, it may also be the count value of a slice or session. It can be understood that if the network usage is a count value of a slice or a used traffic of a slice, the first message should include the identifier of the slice. Correspondingly, if the network usage is a count of a session or the traffic used by a session, then the first message should include the identification of the session.
  • the UE may include a message verification code in the first message, so that after the network element of the home network successfully verifies the message verification code, Only then can the network usage sent by the UE be compared with the network usage of the UE counted by the visited network.
  • the UE can generate the message verification code based on the serving network identity (SNID); for example, the UE can also generate the message verification code based on Kausf and SNID.
  • the message verification code for example, the UE may also generate a message verification code based on the session identifier; for another example, the UE may also generate a message verification code based on the slice identifier, which is not listed here one by one.
  • the Kausf is a key generated during the authentication of the UE by the home network.
  • the Kausf generation process includes: When the UE accesses the network, the UE's identity is sent to the AMF, and then the AMF sends the UE's identity and the serving network identity to the AUSF (the serving network identity can be the name of the serving network) ), Then the AUSF sends the UE identity and the serving network identity to the UDM, and the UDM generates a Kausf based on the serving network identity, and sends the Kausf to the AUSF.
  • the Kausf generation process refer to section A.2 in TS33.501.
  • the N1Message needs to carry the identity of the UE, such as a user permanent identifier (Subscription, Permanent Identifier, SUPI) or a user hidden identifier (Subscription, Concealed Identifier, SUCI).
  • a user permanent identifier Subscriber, Permanent Identifier, SUPI
  • a user hidden identifier Subscriber, Concealed Identifier, SUCI
  • the vAMF obtains network usage of the UE, which is calculated by the network side.
  • the vAMF can call the service interface of the vSMF or use the interface message to query the network usage of the UE counted by the network side. If there are multiple vSMFs serving the UE, the service interface of each SMF is called to query Network usage of the UE counted by the network side. Specifically, after receiving the first query message sent by vAMF, vSMF queries vUPF for user service usage information. If there is a scenario in which a vSMF corresponds to multiple vUPFs, vSMF sends a second query message to multiple vUPFs. In response to the second query message, the vUPF returns network user service usage information to vSMF; in response to the first query message, vSMF returns network user service usage information to vAMF.
  • vAMF when invokes the service of vSMF, it can also carry slice information and / or session information.
  • vAMF compares the network usage reported by the UE with the network usage counted by the network. If the network usage sent by the UE does not match the network usage of the UE counted by the network side, the vAMF processes according to the configured policy. Specifically, if the network usage reported by the UE does not match the network usage of the UE counted by the network side, vAMF will have many optional operations, such as selecting to release the session, and optionally in the message for releasing the session. The session is terminated. Another example is that vAMF will continue to service and record the specific service usage records of the UE to provide evidence in the event of disputes. Another example is that vAMF will report inconsistent traffic information to the operation and maintenance system.
  • vAMF will The home network reports inconsistent traffic information. It should be noted that, for the above-mentioned optional operations, vAMF can select one operation and multiple operations, such as continuing to provide services to the UE, recording network usage information of the UE, and The network element sends an alert indicating that the traffic information is inconsistent.
  • the vAMF sends the network usage reported by the UE and the network usage of the UE counted by the visited network to the home network;
  • the vAMF sends a second message to a network element (such as hAUSF, hAMF, or hSEPP) of the home network; the second message includes the network usage reported by the UE, and the network usage of the UE visited by the network statistics Situation and message verification code; in addition, the second message also includes the identity of the UE and the identity of the visited network.
  • a network element such as hAUSF, hAMF, or hSEPP
  • the network usage reported by the UE can be understood that the network usage reported by the UE, the network usage of the UE counted by the visited network, the message verification code, the identity of the UE, and the identity of the visited network, the above parameters can be sent in a message, You can also send them separately.
  • the data reported by the UE and the network-side statistics obtained by the vAMF can be sent to the home network respectively.
  • vAMF sends a UE report message to the home network, and the message reported by the UE includes the network usage of the UE, a message verification code, the identity of the UE, and the identity of the visited network; vAMF can also send the visited network to the home network.
  • a reported message, the message reported by the visited network includes the network usage of the UE, the UE's identity, and the visited network's statistics as counted by the visited network.
  • the home network determines a processing measure according to the network usage reported by the UE and the network usage of the UE counted by the visited network.
  • the network element (such as hAUSF, hAMF, or hSEPP) of the home network first generates a message verification code according to the method negotiated with the UE (that is, the network element of the home network generates a message verification code. The method is the same as that used by the UE to generate the message verification code.) Then compare the generated message verification code with the message verification code in the second message. If the two message verification codes do not match, the message reported by the UE is modified. At this time, the home network may terminate the session or report to the server according to a preset policy;
  • the home network can choose Release the session or report to the server.
  • the home network returns a comparison result to the visited network vAMF, so that the vAMF operates according to the comparison result and a preset policy. For example, if the comparison indicates that the network usage reported by the UE does not match the network usage of the UE counted by the visited network, the vAMF will choose to release the session; of course, the vAMF may continue to serve, but the match will be recorded The result is abnormal.
  • the home network may use the integrity encryption key to generate a message authentication code MAC-result of the comparison result; and send the comparison result and the message authentication code MAC-result of the comparison result to the UE.
  • the UE verifies whether the message authentication code is modified and performs subsequent processing according to the verification result.
  • the network elements in the visited network can obtain the network usage reported by the UE and the network usage of the UE counted by the visited network, and then match the two, and then according to the matching
  • the result and the preset policy are processed; further, since the UE will also feed back the message authentication code of the UE ’s network usage, the home network can verify whether the data fed back by the UE has been tampered with the message authentication code, The authenticity of the feedback data from the UE is further determined; further, the network use situation fed back by the UE can verify whether the data fed back from the visited network is true, thereby reducing the possibility of billing disputes.
  • FIG. 3 shows a specific method for preventing traffic fraud. This method can be applied to the network architecture shown in FIG. 1. The method includes:
  • the UE sends an N1 interface message (N1Message) to vAMF;
  • the preset policy may be that the traffic used by the UE reaches a preset threshold, or the length of time that the UE uses the network reaches the preset usage time, and the preset policy may also be that the current time meets the requirements of the preset period (such as every Report once every 1 hour, or once every 5 minutes. There is no restriction on the preset period.)
  • the method further includes: vAMF sends a traffic query request to the UE; then the implementation of step 1 may be: in response to the traffic query request sent by the vAMF, the UE sends N1 Interface message (N1Message) to vAMF.
  • N1Message N1 Interface message
  • the network element of the home network such as (AUSF, hSEEP, UDM) calls the service interface of vAMF
  • vAMF will send a traffic query request to the UE;
  • the network element of the home network subscribes to a user VAMF will save the subscription information and initiate a traffic query request to the UE based on the subscription information.
  • the traffic query request can be periodic or instantaneous.
  • vAMF will also trigger a service usage query request to the UE.
  • the UE reports network traffic usage of the UE or service usage information under a certain slice or a certain APN.
  • the service usage information may be the network traffic usage of a certain UE, or the number of data packets sent and received by a certain UE within a preset time period, or the network traffic usage of a certain slice, or the network of an APN. Traffic usage is not limited here.
  • the N1Message carries a UE-counter and a message authentication code (MAC, message authentication code).
  • the message authentication code is generated by the UE, so it can be marked as MAC-UE.
  • the UE-counter may be the total traffic or the number of sending and receiving packets used by the UE, or the traffic or the number of sending and receiving packets of a certain slice or some slices, or the certain or some session traffic or the number of sending and receiving packets, and if it is The slice or the counter of a certain session.
  • the slice information or the session information (such as the session identifier) is also carried.
  • the UE may generate a UE-MAC according to a preset key and a UE-counter.
  • vAMF After receiving the N1 message reported by the UE, vAMF sends a traffic query request to vSMF;
  • vAMF can call the service interface of the vSMF or use interface messages to query the service usage statistics on the network side. If there are multiple vSMFs serving the UE, then each service interface of each SMF is called to obtain the services for querying the network statistics. Usage amount.
  • the vAMF when invokes the service of the vSMF, it can also carry slice information and / or session information related to the SMF.
  • vSMF After receiving the traffic query request, vSMF sends a traffic query request to vUPF;
  • the vSMF sends a traffic query request to the vUPF through an N4 interface (N4Message); if there is a scenario in which a vSMF corresponds to multiple vUPFs, the vSMF sends a query request to multiple vUPFs, respectively;
  • vUPF returns the network-side traffic query result to vSMF
  • vSMF returns the results of network traffic query to vAMF
  • vSMF can provide feedback through Nsmf message and response message.
  • vSMF sends query requests to multiple vUPFs, it will receive multiple vUPF feedback data, and vSMF will summarize the received data.
  • the vUPF-counter value of vUPF statistics is equal to multiple vUPF feedback. The sum of the values.
  • the vSMF can forward the received data directly to the vAMF, and the vAMF summarizes the received data to obtain the vUPF-counter value of the vUPF statistics.
  • the vAMF compares the UE-counter reported by the UE and the vUPF-counter counted by the network side. If the difference between the two is greater than a preset threshold, the visited network believes that the UE may maliciously report traffic information, and the vAMF can process the configuration information.
  • vAMF may choose to release the session, wherein the message for releasing the session carries the reason for the termination of the session;
  • vAMF can continue to service and record the specific service usage records of the UE in order to provide evidence in the event of disputes in the future;
  • vAMF can report inconsistent traffic information to the operation and maintenance system
  • vAMF can report inconsistent traffic information to the home network.
  • vAMF can choose one or more of the above processing methods.
  • the sixth step is an optional step, because the home network will also compare the two data later, and feed back the comparison result to vAMF, and vAMF can perform subsequent processing according to the comparison result fed back by the home network.
  • vAMF sends the UE-counter reported by the UE and the vUPF-counter counted by the network to the home network;
  • the vAMF sends the above two values to the home network to verify whether the two values match.
  • vAMF can send messages through N32 and Nausfmessge.
  • the message further includes a user identifier, a visited network ID, and a UE-MAC.
  • the network element of the home network After receiving the message, the network element of the home network performs UE-MAC verification
  • a network element (such as hAUSF or hSEPP or hAMF or hUDM) of the home network generates a NET-MAC according to a preset key (the same as the preset key on the UE side) and the UE-counter, and uses the NET- Comparison of MAC and UE-MAC. If the NET-MAC is inconsistent with the UE-MAC or the difference between the two is greater than a preset threshold, the message reported by the UE is modified. At this time, the home network can terminate the session or report according to a preset policy. server;
  • the home network may choose to release the session according to the configuration, and the message for releasing the session carries the reason for the termination of the session.
  • the home network returns the comparison result to the visited network vAMF;
  • the comparison result can be returned through the N32 NausfMessage message.
  • the comparison result can be a character string (such as true for matching and false for non-matching); it can also be a numerical value, such as 1 for matching and 0 for mismatching. There are many ways to characterize the comparison result, and there is no limitation here.
  • the comparison result may also be a vUPF-counter counted by the network side
  • the message may also include the message authentication code MAC-result of the comparison result (generated based on the preset key and the comparison result);
  • vAMF compares the two values, and vAMF can process based on the comparison result.
  • vAMF can also be left unprocessed and can wait for the result fed back by the home network to process. If the comparison results are inconsistent (after exceeding the threshold), vAMF can choose to release the session according to the local policy.
  • the vAMF sends the comparison result to the UE.
  • the vAMF can feedback the comparison result to the UE through the N1 message response.
  • the feedback message may further include a MAC-result.
  • vAMF can process based on the configuration information.
  • vAMF may choose to release the session, wherein the message for releasing the session carries the reason for the termination of the session;
  • vAMF can continue to service and record the specific service usage records of the UE in order to provide evidence in the event of disputes in the future;
  • vAMF can report inconsistent traffic information to the operation and maintenance system
  • vAMF can report inconsistent traffic information to the home network.
  • vAMF can choose one or more of the above processing methods.
  • the UE uses the preset key KEY to perform integrity verification on the MAC-result. If the verification is successful, it will continue to perform subsequent processing based on the result of the result. If the result of matching failure is returned, the UE will terminate the session, or set to lower the access priority of the PLMN (Public Land Mobile Network, public land mobile network) or prohibit access.
  • PLMN Public Land Mobile Network, public land mobile network
  • vUPF-counter which needs to verify the integrity of the MAC-result. It can be understood whether the MAC-UE and MAC-result are consistent, and if they are consistent, the verification is passed.
  • the visited network can compare the data reported by the UE with the data obtained by the network side to determine whether the UE has tampered with the network traffic usage. Can take timely measures to reduce the loss of the serving network; further, the home network can verify the UE-counter message authentication code to determine whether the information reported by the UE has been tampered with, and if it has not been tampered with, it can further compare the UE If the reported UE-counter and the vUPF-counter counted on the network side are inconsistent, effective measures can be taken immediately to reduce or avoid subsequent billing disputes.
  • the present invention provides another possible implementation manner.
  • a traffic query triggered by UPF is performed.
  • the method includes:
  • vUPF sends a traffic query request to vAMF.
  • the traffic query request may carry the identity of the UE.
  • the traffic query request may carry an identifier of the UE and a session identifier.
  • the traffic query request may carry the identifier of the UE and the APN.
  • the traffic query request may also carry a vUPF-counter.
  • the vAMF sends a traffic query request to the UE.
  • the UE needs to feed back the network usage of the UE, such as the traffic in a preset period of time or the number of data packets sent and received. If the traffic query request includes the identifier of the UE and the session identifier, the UE will feedback the network traffic usage corresponding to the session, such as the traffic used or the data packets sent and received in a preset time period.
  • the UE feeds back network usage information counted by the UE to the vAMF.
  • this embodiment will also perform steps 2-5 shown in FIG. 3 to obtain vUPF-counter through vSMF. If the traffic query request sent by vUPF to vAMF includes vUPF-counter, this embodiment skips steps 2-5 shown in FIG. 3.
  • FIG. 4 shows a network element in the home network (which has been exemplified in the above embodiment)
  • FIG. 5 shows a network element (such as AMF) in a visited network
  • FIG. 6 shows a user terminal.
  • the device 400 includes:
  • the receiving unit 401 is configured to receive a first network usage situation sent by a user equipment, where the device is a network element in a home network;
  • the obtaining unit 402 is configured to obtain a second network usage situation sent by a second network element, where the second network element is a network element in a visited network that provides services for the user equipment;
  • the processing unit 403 is configured to perform processing according to a preset policy if the first network usage situation does not match the second network usage situation.
  • the apparatus 400 further includes a determining unit 404;
  • the receiving unit 401 is further configured to receive a first message authentication code sent by the user equipment, where the message authentication code is generated according to a shared key and the first network usage situation;
  • the obtaining unit 402 is further configured to obtain a second message authentication code, where the second message authentication code is generated according to the shared key and the second network usage situation;
  • the judging unit 404 is configured to judge whether the first network usage condition matches the second network usage condition if the first message authentication code and the second message authentication code are the same.
  • the device 400 further includes a sending unit 405;
  • the receiving unit 401 is configured to receive a second network usage situation sent by a second network element.
  • the apparatus 500 includes a receiving unit 501, an obtaining unit 502, and a processing unit 503;
  • the receiving unit 501 is configured to receive a first network usage situation sent by a user equipment, where the device is a network element in a visited network;
  • An obtaining unit 502 configured to obtain a second network usage situation of the visited network statistics
  • the processing unit 503 is configured to perform processing according to a preset policy if the first network usage situation does not match the second network usage situation.
  • the apparatus 500 further includes a sending unit 504;
  • the sending unit 504 is configured to send the first network usage condition and the second network usage condition to a first network element, where the first network element is a network element in a home network.
  • the sending unit 504 is further configured to periodically send a traffic query request to the user equipment according to the subscription information of the first network element; and the receiving unit 501 is configured to receive the first network usage sent by the user equipment.
  • the user equipment 600 includes a generating unit 601 and a sending unit 602.
  • a generating unit 601, configured to generate a first message authentication code according to network usage and a shared key
  • the sending unit 602 is configured to send the network usage situation and the first message authentication code to the visited network.
  • the generating unit 601 is further configured to generate the shared key according to an identifier of the visited network and an intermediate key; the intermediate key is a key generated when the user equipment accesses the authentication, and the identifier of the visited network includes all The name of the visited network.
  • the user equipment 600 further includes a receiving unit 603, a verification unit 604, and a processing unit 605;
  • a receiving unit 603, configured to receive a comparison result fed back by the visited network and a second message authentication code
  • a verification unit 604 configured to verify the second message authentication code
  • the processing unit 605 is configured to perform processing according to the comparison result and a preset policy if the second message authentication code is successfully verified.
  • the devices 400, 500, and 600 are embodied in the form of functional units.
  • the term "unit" herein may refer to an application-specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a proprietary processor, or a group of processors) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and / or other suitable components that support the functions described.
  • ASIC application-specific integrated circuit
  • the device 400 may specifically be a network element in the home network shown in FIG. 3 described above, and the device 400 may be used to execute the home network network element shown in FIG. 3 as the main execution. The processes and / or steps are not repeated here in order to avoid repetition.
  • the device 500 may specifically be the AMF in the visited network shown in FIG. 3 described above, and the device 500 may be used to execute the above-mentioned flow performed by the AMF as the main body in FIG. 3 and / or Steps, to avoid repetition, will not repeat them here.
  • the user equipment 600 may be specifically the UE shown in FIG. 3 described above, and the user equipment 600 may be used to execute the processes and / or steps performed by the UE in FIG. 3 as the main body, To avoid repetition, we will not repeat them here.
  • the logic units shown in FIGS. 4 to 6 can be implemented according to the hardware architecture shown in FIG. 7.
  • the hardware device shown in FIG. 7 may include a processor 710, a transceiver 720, and a memory 730.
  • the processor 710, the transceiver 720, and the memory 730 communicate with each other through an internal connection path.
  • the related functions implemented by the processing unit, the obtaining unit, and the determining unit in FIG. 4 may be implemented by the processor 710, and the related functions implemented by the receiving unit and the sending unit may be implemented by the processor 710 controlling the transceiver 720.
  • related functions implemented by the processing unit and the acquiring unit in FIG. 5 may be implemented by the processor 710, and related functions implemented by the receiving unit and the transmitting unit may be implemented by the processor 710 controlling the transceiver 720.
  • the related functions implemented by the processing unit, the generating unit, and the verification unit in FIG. 6 may be implemented by the processor 710, and the related functions implemented by the receiving unit and the transmitting unit may be implemented by the processor 710 controlling the transceiver 720.
  • the processor 710 may include one or more processors, for example, one or more central processing units (CPUs).
  • processors for example, one or more central processing units (CPUs).
  • the processor may be a single-core CPU, or Can be a multi-core CPU.
  • the transceiver 720 is used to send and receive data and / or signals, and to receive data and / or signals.
  • the transceiver may include a transmitter and a receiver for transmitting data and / or signals and a receiver for receiving data and / or signals.
  • the memory 730 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), erasable programmable memory (EPROM), read-only memory A compact disc (compact disc, read-only memory, CD-ROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable memory
  • read-only memory A compact disc (compact disc, read-only memory, CD-ROM).
  • the memory 730 is used to store related instructions and data.
  • the memory 730 is configured to store program code and data of the authorization module, and may be a separate device or integrated in the processor 710.
  • FIG. 7 only shows a simplified design of the authorization module.
  • the authorization module may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all the authorization modules that can implement this application are protected by this application. Within range.
  • the device 700 may be a chip, for example, it may be a communication chip that can be used in an authorization module to implement related functions of the processor 710 in the authorization module.
  • the chip can be a field programmable gate array, a dedicated integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, and a programmable controller or other integrated chip to realize related functions.
  • the chip may optionally include one or more memories for storing program code, and when the code is executed, the processor implements a corresponding function.
  • FIG. 7 the structure of the network elements involved in FIGS. 4 to 6 can be as shown in FIG. 7, and includes components such as a processor, a transceiver, and a memory.
  • the memory stores program code. When the code is executed, each network element performs the functions shown in FIG. 2 or FIG. 3.
  • the network elements in the home network and the network elements in the visited network in the embodiments of the present application have specific functions and network interfaces, and may be different network elements on the same dedicated hardware or the same dedicated hardware.
  • Different software instances running on the server may also be different virtual function instances on the same related platform (such as on a cloud infrastructure), which is not limited in the embodiment of the present application.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted through the computer-readable storage medium.
  • the computer instructions may be transmitted from a website site, computer, server, or data center through wired (for example, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (for example, infrared, wireless, microwave, etc.) Another website site, computer, server, or data center for transmission.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that includes one or more available medium integration.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a digital versatile disc (DVD)), or a semiconductor medium (for example, an SSD).
  • the processes may be completed by a computer program instructing related hardware.
  • the program may be stored in a computer-readable storage medium. When the program is executed, It may include the processes of the method embodiments described above.
  • the foregoing storage medium includes various media that can store program codes, such as a ROM or a RAM, a magnetic disk, or an optical disc.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the functions When the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing storage medium includes various media that can store program codes, such as a U disk, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种防止流量欺诈的方法和装置,该方法包括:在拜访网络上报网络使用情况的同时,用户设备也上报网络使用情况,归属网络通过比较二者上报网络使用情况,判断是否存在可能的流量欺诈,如果存在流量欺诈,则根据预设策略进行处理。通过本发明提供的技术方案,可以针对流量欺诈采取措施,从而尽可能减少用户与运营商之间的计费纠纷。

Description

一种防止流量欺诈的方法及装置
本申请要求于2018年6月20日提交中国国家知识产权局、申请号为201810638701.6、发明名称为“一种防止流量欺诈的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,更具体地,涉及通信领域中防止流量欺诈的方法及装置。
背景技术
随着通信系统的不断发展,基于服务的网络架构(service based architecture,SBA)得到的广泛的应用,在基于服务的网络架构中,根据能够提供的特定网络功能的网络实体称为网络功能(network function,NF)模块,网络功能可以以服务的方式提供。
如图1所示,在基于服务的网络架构中,任意两个网络功能模块可以通过服务化接口以网络功能服务调用的方式交互。用户在漫游时,对于归属网络路由的场景,用户的流量通过拜访网络的用户面网元(User Plane Function,vUPF)发给归属网络的hUPF,再由拜访网络的hUPF报给拜访网络hSMF,由hSMF把流量发给计费相关的网元。(后文中前缀v表示拜访网络,h表示归属网络)。
在漫游场景下,如果拜访网络根据使用收入分成的模式,拜访网络可能进行一些流量欺诈行为(比如向归属网络多谎报些流量),从而导致计费纠纷。
发明内容
本申请提供一种防止流量欺诈的方法和设备,在拜访网络上报网络使用情况的同时,UE也上报使用的网络使用情况,归属网络通过比较二者上报网络使用情况,判断是否存在可能的流量欺诈,如果存在流量欺诈,则根据预设策略进行处理。通过本发明提供的技术方案,可以针对流量欺诈采取措施,从而尽可能减少用户与运营商之间的计费纠纷。
第一方面,本申请提供了一种防止流量欺诈的方法,该方法包括:第一网元接收用户设备发送的第一网络使用情况,其中,所述第一网元为归属网络中的网元;所述第一网元获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
举例来说,第一网元可以是归属网络中的接入和移动性管理功能(Access and Mobility Management Function,AMF),会话管理网元(Session Management Function,SMF)、安全边缘保护代理(Security Edge Protection Proxy,SEPP)、认证服务器(Authentication Server Function,AUSF)、或统一数据管理网元(Unified Data Management,UDM)。第一网元可以是拜访网络中的AMF。
另外,需要指出的是,第一网络使用情况是UE侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息,或者是某个会话的业务使用信息。相应的,第二网络使用情况是网络侧统计的所述UE在预设时间段内 使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息(比如某个切片使用的流量或收发数据包的数量),或者是某个会话的业务使用信息(比如某个会话使用的流量或收发数据包的数量)。举例来说,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
结合第一方面,需要指出的是,UE为了保证自己上报的信息在传输过程中的完整性,会向所述第一网元发送第一消息鉴别码,其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的。相应的,所述第一网元接收所述用户设备发送的第一消息鉴别码;所述第一网元获取第二消息鉴别码,其中,所述第二消息鉴别码也是根据所述共享密钥和所述第二网络使用情况生成的;若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。
可以理解的是,如果所述第一消息鉴别码和所述第二消息鉴别码相同,说明UE上报的消息在传输过程中没有被篡改。其中,所述判断所述第一网络使用情况与所述第二网络使用情况是否匹配,包括:判断所述第一网络使用情况与所述第二网络使用情况是否相同;或者,如果第一网络使用情况与所述第二网络使用情况均为数值的话,判断两个数值是否小于预设阈值。
进一步的,若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。其中,预设策略可以有一条或多条,比如可以释放会话,或者上报服务器等。举例来说,所述根据预设策略进行处理,包括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。
结合第一方面,进一步需要指出的是,促使UE和拜访网络分别上报网络使用情况的机制有很多,比如可以是归属网络中的网元触发的,也有可能是vAMF触发的,也有可能是vUPF触发的,也有可能是hUPF触发的,在此不做限制。举例来说,所述第一网元接收用户设备发送的第一网络使用情况之前,所述方法还包括:所述第一网元向所述第二网元发送业务使用查询请求;所述业务使用查询请求用于指示所述第二网元反馈所述用户设备所使用的网络使用情况。
本发明第二方面公开了一种防止流量欺诈的方法,所述方法包括:第二网元接收用户设备发送的第一网络使用情况,其中,所述第二网元为拜访网络中的网元;所述第二网元获取所述拜访网络统计的第二网络使用情况;若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
需要指出的是,所述第二网元可以是vAMF。第一网络使用情况是UE侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的业务使用信息,或者是某个会话的业务使用信息。相应的,第二网络使用情况是网络侧统计的所述UE在预设时间段内使用的流量,或者在预设时间段内收发数据包的数量,或者是某个切片的 业务使用信息,或者是某个会话的业务使用信息。举例来说,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
其中,所述判断所述第一网络使用情况与所述第二网络使用情况是否匹配,包括:判断所述第一网络使用情况与所述第二网络使用情况是否相同;或者,如果第一网络使用情况与所述第二网络使用情况均为数值的话,判断两个数值是否小于预设阈值。进一步的,若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。其中,预设策略可以有一条或多条,比如可以选释放会话,且在释放会话的消息中携带会话终结的原因值;再比如vAMF会继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;再比如,vAMF会向操作维护系统上报流量信息不一致信息;在比如,vAMF会向归属网络上报流量信息不一致信息。需要指出的是,针对上述多条预设策略,vAMF可以选择一种或多种进行操作。举例来说,所述根据预设策略进行处理,包括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。
可以理解的是,在拜访网络侧将UE上报的网络使用情况与网络侧统计的所述UE的网络使用情况进行比较,是为了确定UE是否篡改了所述UE的网络使用情况的数据。进而拜访网络可以备案,以便后续进行查证。当然,也可以向归属网络发送比较结果,让归属网络也进行备案。
可以理解的是,为了让归属网络了解所述UE的网络使用情况是否正常,也向向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。进而由归属网络根据所述第一网络使用情况和所述第二网络使用情况判断是否存在流量统计的异常。
进一步需要指出的是,如果归属网络订阅了查询UE的网络使用情况的消息,那么所述第二网元根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求。以便UE根据该流量查询请求反馈所述UE统计的所述UE的网络使用情况。
本发明第三方面公开了一种防止流量欺诈的方法,所述方法包括:用户设备根据网络使用情况以及共享密钥生成第一消息鉴别码;所述用户设备向拜访网络发送所述网络使用情况以及第一消息鉴别码。
可以理解的是,UE为了避免拜访网络随意篡改所述UE的网络使用情况,那么UE也会将自身网络使用情况以及消息鉴证码发送给拜访网络,再由拜访网络转发给归属网络,最后由归属网络判断UE上报的网络使用情况与拜访网络上报的所述UE的网络使用情况是否一致。
可以理解的是,UE生成第一消息鉴别码是需要用到共享密钥的。也就说在生成第一消息鉴证码之前,是需要生成共享密钥的。该共享密钥是UE与归属网络之间共享的密钥,因此UE和归属网络是知道如何生成或获取共享密钥的。举例来说,所述用户设备根据拜访网络的 标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。其中,所述第一消息鉴别码可以为一个或者多个;所述网络使用情况包括下述参数中的至少一个参数:所述用户设备的网络使用情况,第一切片的网络使用情况以及第一会话对应的网络使用情况;相应的,所述第一消息鉴别码与所述网络使用情况中的参数一一对应;其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
进一步需要指出的是,归属网络比较完UE上报的网络使用情况与拜访网络上报的所述UE的网络使用情况之后,是会向UE反馈比较结果的,为了保证消息在传输过程中的完整性,也会反馈消息鉴证码。以便UE根据反馈的比较结果采取措施。具体的,所述用户设备接收所述拜访网络反馈的比对结果和第二消息鉴别码;所述用户设备对所述第二消息鉴别码进行验证;若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。其中,该用户设备可以根据共享密钥对所述消息鉴别码进行验证。
本发明第四方面公开了一种装置(该装置为归属网络中的网元),该装置可用于执行第一方面所述的方法。具体的,所述装置包括:
接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为归属网络中的网元;获取单元,用于获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;
处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
可选的,所述装置还包括判断单元;
所述接收单元,还用于接收所述用户设备发送的第一消息鉴别码;其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的;所述获取单元,还用于获取第二消息鉴别码,其中,所述第二消息鉴别码是根据所述共享密钥和所述第二网络使用情况生成的;所述判断单元,用于若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。
可选的,所述装置还包括发送单元;
所述发送单元,用于向所述第二网元发送业务使用查询请求;
所述接收单元,用于接收第二网元发送的第二网络使用情况。
本发明第五方面公开了一种装置(该装置为拜访网络中的网元,比如为AMF),该装置可用于执行第二方面所描述的方法。具体的,所述装置包括接收单元,获取单元以及处理单元;
所述接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元;所述获取单元,用于获取所述拜访网络统计的第二网络使用情况;所述处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
可选的,所述装置还包括发送单元;
所述发送单元,用于向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其 中,所述第一网元为归属网络中的网元。
进一步的,所述发送单元,还用于根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求;所述接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元。
本发明第六方面公开了一种用户设备,该用户设备用于执行第三方面所述的方法。具体的,所述用户设备包括生成单元和发送单元;
所述生成单元,用于根据网络使用情况以及共享密钥生成第一消息鉴别码;
所述发送单元,用于向拜访网络发送所述网络使用情况以及第一消息鉴别码。
可选的,所述生成单元,还用于根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。
可选的,所述用户设备还包括接收单元,验证单元以及处理单元;
所述接收单元,用于接收所述拜访网络反馈的比对结果和第二消息鉴别码;所述验证单元,用于对所述第二消息鉴别码进行验证;所述处理单元,用于若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。
第七方面,本申请提供了一种网元,该网元包括存储器、处理器、收发器及存储在该存储器上并可在该处理器上运行的计算机程序,当存储器中的计算机程序被执行时,该收发器和处理器执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第八方面,本申请提供了一种网元,该网元包括存储器、处理器、收发器及存储在该存储器上并可在该处理器上运行的计算机程序,当存储器中的计算机程序被执行时,该收发器和处理器执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第九方面,本申请提供了一种用户设备(比如手机,平板电脑、穿戴设备等具有收发信息的电子设备),该网元包括存储器、处理器、收发器及存储在该存储器上并可在该处理器上运行的计算机程序,当存储器中的计算机程序被执行时,该收发器和处理器执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第十方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第一方面或第一方面的任意可能的实现方式中的方法的指令。
第十一方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第二方面或第二方面的任意可能的实现方式中的方法的指令。
第十二方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第三方面或第三方面的任意可能的实现方式中的方法的指令。
第十三方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第十四方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第十五方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第十六方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过总线相连,所述处 理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第十七方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过总线相连,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第十八方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过总线相连,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述第三方面或第三方面的任意可能的实现方式中的方法。
附图说明
图1是本申请实施例提供的一种5G漫游架构图;
图2是本申请实施例提供的一种防止流量欺诈的方法的示意性流程图;
图3是本申请实施例提供的另一种防止流量欺诈的方法的示意性流程图;
图4是本申请实施例提供的一种归属网络的网元的逻辑结构图;
图5是本申请实施例提供的一种拜访网络的网元的逻辑结构图;
图6是本申请实施例提供的一种用户设备的逻辑结构图;
图7是本申请实施例的一种装置的物理结构图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
图1示出了本申请实施例提供的5G漫游架构的示意性框图。该网络架构以服务为基础,得到多种不同类型的网络功能模块,网络功能模块之间通过服务化接口以网络功能服务调用的方式进行交互。
应理解,本申请实施例中的网络功能模块具有特定功能和网络接口,可以是专用硬件上的网元,也可以是专用硬件上运行的软件实例,还可以是相关平台(如云基础设施上)上的虚拟功能实例,本申请实施例对此不作限定。
下面将结合图1对该基于服务的网络架构中的各个模块进行介绍:
无线接入网络(radio access network,RAN):负责用户设备(user equipment,UE)的接入。可以理解的是,在实际表述过程中,RAN也可以简写为AN。
可选地,本申请实施例中的UE可以是移动的或固定的,该UE可以指接入终端、终端设备、移动终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。接入终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)系统中的用户设备。
访问与移动性管理功能(access and mobility management function,AMF)模块:负 责与现有的移动管理实体(mobile management entity,MME)中的移动性管理类似的功能,用于控制UE对网络资源的访问和对UE的移动进行管理。AMF模块与RAN模块互相通信,以对接入网控制面进行处理,其中,N2不是服务化接口。
鉴权服务功能(authentication server function,AUSF)模块:负责密钥的生成,以及与UE之间的双向鉴权。
会话管理功能(session management function,SMF)模块:负责管理UE的会话,包括会话的建立、修改和释放。
网络开放功能(network exposure function,NEF)模块:负责将核心网内的网络功能服务安全地提供给外部网络实体服务,以及内外网信息转换等。
网络功能(network fuction)模块:是指一个能够提供网络服务的网元,比如AUSF、AMF或UDM。
网络功能数据库功能(Network repository function,NRF)模块:负责服务发现等功能。当然,网络功能数据库的英文全称还可以是NF repository function.
策略管控功能(policy control function,PCF)模块:负责管理网络行为的统一策略框架;提供策略规则给控制平面执行等功能。
统一数据管理(unified data management,UDM)模块:包括前端(front end,FE)和用户数据库(user data repository,UDR)。其中,FE负责信用评级处理、位置管理、订阅管理等功能,并可以访问存储在UDR中的用户订阅数据,UDR是一个用户订阅数据存储服务器,负责向前端提供用户订阅数据。
应用功能(application function,AF)模块:提供应用服务。
用户面功能(User Plane Function,UPF)模块:可提供数据包检测、转发、流量使用报告等功能。
其中,上述各个模块也可以解释为各个网元或功能网元。比如UDM可以理解为UDM网元或UDM功能网元,NRF可以理解为NRF网元或NRF功能网元。
如图1中所示,AMF模块具有服务化接口NAMF、SMF模块具有服务化接口NSMF、AUSF模块具有服务化接口NAUSF、NEF模块具有服务化接口NNEF、NRF模块具有服务化接口NNRF、PCF模块具有服务化接口NPCF、UDM模块具有服务化接口NUDM、AF模块具有服务化接口NAF。
应理解,本申请实施例中的各个网络功能模块的服务化接口的还可以为其它名称,本申请实施例对此不作限定。
需要指出的是,在漫游场景下,如果拜访网络使用收入分成的模式(例如拜访网络根据用户使用的流量向归属网络结算收费),拜访网络可能进行一些流量欺诈行为。比如,vUPF在给hUPF转发流量时(带有v前缀的网元为拜访网络中的网元,带有h前缀的网元为归属网络中的网元),增加一些垃圾流量,就会造成用户实际使用的流量和拜访网络上报的流量不一致的情况,从而导致计费纠纷。
针对上述问题,本发明提供了一种解决方案:在拜访网络向归属网络上报网络使用情况(如流量数据,时长数据,消息报数)的同时,UE也会上报使用的网络使用情况,归属网络通过比较二者上报网络使用情况,判断是否存在可能的流量欺诈。可选的,归属网络可能会向所述拜访网络反馈判断结果。进一步的,为保护UE上报的网络使用情况不被拜访网络篡改, UE会对需要上报的网络使用情况进行完整性保护;如果归属网络验证UE发送的数据的完整性保护没问题,就会比较UE和拜访网络上报的网络使用情况。另外,需要指出的是,归属网络可以主动查询或者订阅UE漫游时的网络使用情况数据。
另外,拜访网络也可以进行流量一致性的检测:归属网络中的vAMF主动查询UE统计的网络使用情况和vSMF统计的所述UE的网络使用情况,如果两者数据不一致或两者数据的差值大于预设阈值,拜访网络认为UE可能恶意上报流量信息,vAMF可以根据预设策略进行处理,比如选释放会话,或者拒绝给UE提供服务,或者继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据或和向操作维护系统上报流量信息不一致信息。另外,vAMF可能会向归属网络上报流量信息不一致信息。
图2示出了本申请实施例提供的防止流量欺诈的方法的示意性流程图,该方法可以应用于如图1中所示的网络架构。所述方法包括:
S101.UE向vAMF发送网络使用情况;
需要指出的是,UE可以按照预设的时间间隔向vAMF发送网络使用情况;该预设的时间间隔可以是vAMF下发的,也可以是归属网络中的网元下发的。
可选的,UE可以根据vAMF的指示向所述vAMF发送网络使用情况。比如,所述UE接收所述AMF发送的查询请求;响应于所述查询请求,所述UE向所述vAMF发送所述网络使用情况。
另外,需要指出的是,网络使用情况可以是所述UE在所述预设时间间隔内所述使用的流量。比如,UE需要每隔10分钟向vAMF发送一次网络使用情况,那么发送的网络使用情况就是这10分钟内UE所使用的流量。另外,10分钟只是举例,也可以是半个小时,一个小时等等,在此不对预设的时间间隔做限制。
可选的,网络使用情况可以是某个切片的的业务使用信息(比如某个切片的流量使用情况)。
可选的,网络使用情况可以是某类型切片的的业务使用信息(比如某类型切换在预设时间段内的流量使用情况)。常见的类型包括eMBB(Enhanced Mobile Broadband,增强移动带宽)、URLLC(Ultra-Reliable and Low-Latency Communication,极高可靠极低时延通信)以及mMTC(massive machine type communication,海量物联网通信)。
可选的,网络使用情况还可以是某个会话的流量使用情况。
另外,需要指出的是,在本发明的一种可能的实现方式中,归属网络中的网元(比如AMF、AUSF或hSEEP)可能订阅了某个用户的业务使用信息或者该用户某个切片的业务或者某个APN(access point name,接入点名称)的业务使用信息,那么该归属网络中的网元就会调用vAMF的服务接口以查询UE的网络使用情况。具体的,如果该归属网络中的网元订阅了某个用户的业务使用信息或者该用户某个切片的业务或者某个APN的业务使用信息,那么该vAMF中就会保存该订阅信息,后续该vAMF就会根据该订阅信息向所述UE发送网络使用情况获取请求;相应的,若UE收到该网络使用情况获取请求,就会向所述vAMF反馈所述网络使用情况。
在本发明的一种可能的实现方式中,UE向vAMF发送第一消息,该第一消息中包括网络使用情况。比如,该网络使用情况可以是UE在预设时间段内使用的总流量,也可以是UE在 预设时间段内收发数据包的数量;当然,还可以是某个切片或会话的计数值,可以理解的是,如果该网络使用情况是某个切片的计数值或者某个切片的使用的流量,那么该第一消息中应该包括该切片的标识。相应的,如果该网络使用情况是某个会话的计数值或者某个会话的使用的流量,那么该第一消息中应该包括该会话的标识。另外,为了保证UE发送的数据不被篡改,因此需要进行完整性保护,具体的,UE可以在第一消息中包含一个消息验证码,以使得归属网络的网元验证该消息验证码成功后,才会进一步比较UE发送的网络使用情况和拜访网络统计的该UE的网络使用情况。
结合上述可能的实现方式,需要指出的是,消息验证码生成的方式有很多,比如UE可以根据服务网络标识(serving network identity,SNID)生成该消息验证码;比如UE还可以根据Kausf和SNID生成该消息验证码;比如UE还可以根据会话标识生成消息验证码;再比如UE还可以根据切片标识生成消息验证码,在此不再一一列举。
其中,所述Kausf是所述UE被所述归属网络鉴权过程中生成的密钥。其中Kausf的生成过程包括:UE在接入网络的过程中,会向AMF发送UE的标识,之后AMF会向AUSF发送所述UE的标识以及服务网络标识(该服务网络标识可以是服务网络的名称),接着所述AUSF会向UDM发送所述UE的标识以及服务网络标识,再者UDM会基于所述服务网络标识生成Kausf,并向所述AUSF发送所述Kausf。具体的,Kausf的生成过程可参考TS33.501中的A.2章节。
另外,该N1Message中需要携带UE的标识,比如用户永久标识(Subscription Permanent Identifier,SUPI)或用户隐藏标识(Subscription Concealed Identifier,SUCI)。
S102、vAMF获取网络侧统计的所述UE的网络使用情况;
具体的,vAMF可以调用vSMF的服务接口或者使用接口消息以查询网络侧统计的所述UE的网络使用情况,如果存在多个vSMF为所述UE服务,则分别调用每个SMF的服务接口以查询网络侧统计的所述UE的网络使用情况。具体的,vSMF收到vAMF发送的查第一询消息后,所述vSMF向vUPF查询用户业务使用信息,如果存在一个vSMF对应多个vUPF的场景,则vSMF分别向多个vUPF发送第二查询消息;响应于所述第二查询消息,所述vUPF向vSMF返回网络侧的用户业务使用信息;响应于所述第一查询消息,vSMF向vAMF返回网络侧的用户业务使用信息.
可选的,vAMF调用vSMF的服务时,还可以携带切片信息和或会话信息。
可选的,vAMF会比较UE上报的网络使用情况和网络侧统计的网络使用情况。如果UE发送的网络使用情况和网络侧统计的所述UE的网络使用情况不匹配,则所述vAMF根据配置的策略进行处理。具体的,如果所述UE上报的网络使用情况和网络侧统计的所述UE的网络使用情况不匹配,vAMF会有很多可选的操作,比如选释放会话,可选的在释放会话的消息中携带会话终结的;再比如vAMF会继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;再比如,vAMF会向操作维护系统上报流量信息不一致信息;在比如,vAMF会向归属网络上报流量信息不一致信息。需要指出的是,针对上述可选的操作,vAMF可以选择一种进行操作,可以选择多种进行操作,比如继续向所述UE提供服务,记录所述UE的网络使用信息,以及向归属网络的网元发送流量信息不一致的告警提示。
S103、vAMF向归属网络发送所述UE上报的网络使用情况和拜访网络统计的所述UE的网络使用情况;
可以理解的是的,vAMF向归属网络的网元(如hAUSF、hAMF或hSEPP)发送第二消息; 所述第二消息中包括UE上报的网络使用情况、拜访网络统计的所述UE的网络使用情况以及消息验证码;另外,所述第二消息中还包括所述UE的标识和拜访网络的标识。
另外,可以理解的是,UE上报的网络使用情况、拜访网络统计的所述UE的网络使用情况以、消息验证码、所述UE的标识以及拜访网络的标识,上述参数可以通过一个消息发送,也可以分别发送。
另外,可以理解的是,UE上报的数据和vAMF获取的网络侧统计的数据可以分别发送给归属网络。比如,vAMF向归属网络发送UE上报消息,该UE上报的消息中包括所述UE的网络使用情况、消息验证码、UE的标识以及拜访网络的标识;vAMF还可以向归属网络发送所述拜访网络上报的消息,该拜访网络上报的消息包括所述拜访网络统计的所述UE的网络使用情况、UE的标识以及拜访网络的标识。
S104、所述归属网络根据所述UE上报的网络使用情况和拜访网络统计的所述UE的网络使用情况确定处理措施。
需要指出的是,在判断UE上报的数据与拜访网络上报的数据是否匹配之前,还需要验证UE上报的数据是否被修改,因此,需要验证消息验证码是否匹配。
具体的,归属网络的网元(如hAUSF、hAMF或hSEPP)收到第二消息后,首先根据与UE协商好的方法生成消息验证码(也就是说,归属网络的网元生成消息验证码的方法与UE生成消息验证码的方法是一样的),然后将生成的消息验证码与第二消息中消息验证码的比较,如果两个消息验证码不匹配,则说明UE上报的消息被修改,此时归属网络可以根据预先设置策略终结会话或上报服务器;
如果两个消息验证码匹配,则比较UE上报的网络使用情况和拜访网络统计的网络使用情况,如果UE上报的网络使用情况和拜访网络统计的网络使用情况不匹配,则归属网络可以根据配置选释放会话,或上报服务器。
可选的,归属网络向拜访网络vAMF返回比较结果,以使得vAMF根据所述比较结果和预设的策略进行操作。比如,如果比较结果指示UE上报的网络使用情况和拜访网络统计的所述UE的网络使用情况不匹配,则所述vAMF会选择释放会话;当然,vAMF也可能会继续服务,但是会记录该匹配结果异常。
可选的,归属网络可以使用完整性加密密钥生成比较结果的消息鉴权码MAC-result;并向UE发送所述比较结果以及比较结果的消息鉴权码MAC-result。相应的,UE收到所述比较结果以及比较结果的消息鉴权码MAC-result后,会验证消息鉴权码是否被修改,并根据验证结果进行后续处理。
从而可知,通过本发明实施例提供的技术方案,拜访网络中的网元可以获取UE上报的网络使用情况以及拜访网络统计的所述UE的网络使用情况,进而将两者进行匹配,再根据匹配结果和预设的策略进行处理;进一步,由于UE还会反馈所述UE的网络使用情况的消息鉴权码,因此归属网络可以通过该消息鉴权码验证所述UE反馈的数据是否被篡改,进而确定UE反馈数据的真实性;再者,通过UE反馈的网络使用情况可以验证拜访网络反馈的数据是否属实,进而减少计费纠纷的可能性。
基于图2所描述的防止流量欺诈的思想,图3示出了一种具体的防止流量欺诈的方法, 该方法可以应用于如图1中所示的网络架构。所述方法包括:
1.当满足预设策略时,UE发送N1接口消息(N1Message)给vAMF;
需要指出的是,预设策略可以是UE使用的流量达到预设阈值,或UE使用网络的时长达到预设使用时长,所述预设策略还可以是当前时间满足预设周期的要求(比如每个1小时上报一次,或每个5分钟上报一次,在此不对预设周期做限制)。
可选的,在步骤1之前,所述方法还包括:vAMF向所述UE发送流量查询请求;那么步骤1的实现方式可以是:响应于所述vAMF发送的流量查询请求,所述UE发送N1接口消息(N1Message)给vAMF。需要指出的是,如果归属网络的网元如(AUSF,hSEEP,UDM)调用vAMF的服务接口,那么vAMF就会向所述UE发送流量查询请求;另外,如果归属网络的网元订阅某个用户的业务使用信息,那么vAMF就会保存该订阅信息,并且根据订阅信息向UE发起流量查询请求,当然,可以理解的是,该流量查询请求可以周期性的,也可以使即时的,在此不做限制。还有一种场景,如果归属网络的网元查询某个用户的业务使用信息或者该用户某个切片的业务或者某个APN的业务使用信息,那么也会触发vAMF向UE发送业务使用情况查询请求,相应的,UE上报所述UE的网络流量使用情况或者某个切片或者某个APN下的业务使用信息。该业务使用信息可以是某个UE的网络流量使用情况,或者是某个UE在于预设时间段内收发数据包的数量,或者是某个切片的网络流量使用情况,或者是某个APN的网络流量使用情况,在此不对业务使用信息做限定。
进一步需要指出的是,N1Message中携带UE-counter以及消息鉴别码(MAC,message authentication code)。该消息鉴别码是UE生成的,因此可以标记为MAC-UE。其中,UE-counter可以是UE使用的总流量或者收发包数量,或和是某个或者某些切片的流量或者收发包数量,或和是某个或者某些会话流量或者收发包数量,如果是切片或者某个会话的counter,UE在发给vAMF的消息中,会同时携带切片信息或者会话信息(如会话标识)。
在本发明的一种可能的实现方式中,UE可以根据预设密钥和UE-counter生成UE-MAC。其中,预设密钥Key是根据Kausf(相关解释可参照图2对应的实施例)和服务网络名称SNID推导得出,如Key=KDF(Kausf,SNID),相应的,UE-MAC可以根据所述预设密钥Key以及UE-counter得到,如MAC-UE=KDF(key,UE-counter);其中,KDF一种推演函数。
2.vAMF收到UE上报的N1message后,会向vSMF发送流量查询请求;
具体的,vAMF可以调用vSMF的服务接口或者使用接口消息,查询网络侧统计的业务使用量,如果存在多个vSMF为UE服务,则分别调用每个SMF的服务接口,获取查询网络侧统计的业务使用量。
可选的,vAMF调用vSMF的服务时,还可以携带与该SMF相关的切片信息和或会话信息。
3、vSMF收到查询流量请求后,会向vUPF发送流量查询请求;
具体的,vSMF通过N4接口(N4Message)向vUPF发送流量查询请求;如果存在一个vSMF对应多个vUPF的场景,则vSMF分别向多个vUPF发送查询请求;
4、vUPF向vSMF返回网络侧的流量查询结果;
5、vSMF向vAMF返回网络侧的流量查询结果;
具体的,vSMF可以通过Nsmf message response消息进行反馈。
需要指出的是,如果vSMF分别向多个vUPF发送查询请求,就会接收到多个vUPF反馈的数据,vSMF会将接收到的数据进行汇总,比如vUPF统计的数值vUPF-counter等于多个vUPF 反馈的数值之和。可选的,vSMF可以将接收到的数据直接转发给vAMF,由vAMF对接收到的数据进行汇总以获得vUPF统计的数值vUPF-counter。
6、vAMF比较UE上报的UE-counter和网络侧统计的vUPF-counter,如果两者差值大于预设阈值,则拜访网络认为UE可能恶意上报流量信息,vAMF可以根据配置信息进行处理。
可选的,vAMF可以选释放会话,其中,在释放会话的消息中携带会话终结的原因;
可选的,vAMF可以继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;
可选的,vAMF可以向操作维护系统上报流量信息不一致信息;
可选的,vAMF可以向归属网络上报流量信息不一致信息。
其中,需要指出的是,vAMF可以选择上述一种或多种处理方式。
另外,可以理解的是,第六步为可选步骤,因为归属网络后续也会比较这两个数据,并将比较结果反馈给vAMF,vAMF可以根据归属网络反馈的比较结果进行后续的处理。
7.vAMF向归属网络发送UE上报的UE-counter和网络侧统计的vUPF-counter;
可理解的是,vAMF向归属网络发送上述两个数值是为了由归属网络进行验证两个数值是否匹配。
可选的,vAMF可以通过N32 Nausf messge进行消息的发送。
可选的,所述消息中还包含用户标识、拜访网络ID以及UE-MAC。
8、归属网络的网元收到消息后,进行UE-MAC的验证;
具体的,归属网络的网元(如hAUSF或hSEPP或hAMF或hUDM)根据预设密钥Key(与UE侧的预设密钥相同)和UE-counter生成NET-MAC,并将所述NET-MAC与UE-MAC的比较,如果NET-MAC与UE-MAC不一致或者两者差值大于预设阈值,则说明UE上报的消息被修改,此时归属网络可以根据预先设置策略终结会话,或上报服务器;
如果NET-MAC与UE-MAC一致或者两者差值小于或等于预设阈值,则比较UE上报的UE-counter和网络侧统计的vUPF-counter,如果UE上报的UE-counter和网络侧统计的vUPF-counter不匹配(不相等或两者的差值大于预设计数值),则归属网络可以根据配置,选释放会话,其中,在释放会话的消息中携带会话终结的原因。
9、归属网络向拜访网络vAMF返回比较结果;
其中,需要指出的是,可通过N32 Nausf Message消息返回比较结果。
其中,该比较结果可以是个字符串(比如true表示匹配,false表示不匹配);还可以是数值,比如1标识匹配,0标识不匹配,表征比较结果的方式有很多,在此不做限制。
可选的,该比较结果还可以是网络侧统计的vUPF-counter,该消息中还可以包括比较结果的消息鉴权码MAC-result(根据预设密钥和比较结果生成的);
需要指出的是,在第6步,vAMF将两个数值进行了比较,vAMF可以基于比较结果进行处理,当然,vAMF还可以先不进行处理,可以等待归属网络反馈的结果进行处理。如果当比较结果不一致(超出阈值后),vAMF可以根据本地的策略选择释放会话。
10.vAMF向UE发送比较结果。
需要指出的是,vAMF可以通过N1 message response向UE反馈比较结果。
可选的,该反馈消息中还可以包括MAC-result。
另外,可以理解的是,如果第六步中,vAMF没有根据配置信息或预设策略进行处理,那么此时可以根据比较结果进行处理。如果比较结果指示两个数值不匹配,那么vAMF可以根据配置信息进行处理。
可选的,vAMF可以选释放会话,其中,在释放会话的消息中携带会话终结的原因;
可选的,vAMF可以继续服务,并记录UE的具体业务使用记录,以便后期产生争议时提供证据;
可选的,vAMF可以向操作维护系统上报流量信息不一致信息;
可选的,vAMF可以向归属网络上报流量信息不一致信息。
其中,需要指出的是,vAMF可以选择上述一种或多种处理方式。
11.根据result的结果进行后续处理。
可选的,如果反馈消息中包括MAC-result,那么UE会使用预设密钥KEY对MAC-result进行完整性验证,如果验证通过,会继续根据result的结果进行后续处理。如果返回匹配失败的结论,UE就会终止会话,或者设置降低该PLMN(Public Land Mobile Network,公共陆地移动网络)的接入优先级或则禁止接入。
另外,需要指出的是,如果result是网络侧统计的vUPF-counter,那么就需要UE比较UE-counter和网络侧统计的vUPF-counter;进一步需要指出的是,比较UE-counter和网络侧统计的vUPF-counter,需要对MAC-result进行完整性验证。可以理解的是,比较MAC-UE和MAC-result是否一致,如果一致,则验证通过。
结合上述实施例可知,通过该实施例提供的技术方案,拜访网络可以将UE上报的数据和网络侧获取的数据进行比对以确定UE是否篡改网络流量使用情况,如果确定UE篡改网络流量使用情况,可以及时采取应对措施,从而减少服务网络的损失;进一步的,归属网络可以通过验证UE-counter的消息鉴别码以确定UE的上报的信息是否被篡改,如果没有被篡改的话,可以进一步比较UE上报的UE-counter和网络侧统计的vUPF-counter,如果两个数据不一致,则可以立刻采取有效措施,以减少或避免后续的计费纠纷。
结合图3所示的实施例,本发明提供了另一种可能的实现方式。与图3所述的实施例相比,本实施例中是UPF触发的流量查询。具体的,所述方法包括:
1、vUPF向vAMF发送流量查询请求。
可选的,所述流量查询请求中可以携带UE的标识。
可选的,所述流量查询请求中可以携带UE的标识以及会话标识。
可选的,所述流量查询请求中可以携带UE的标识以及APN。
可选的,所述流量查询请求中可以也可以携带vUPF-counter。
2、vAMF向UE发送流量查询请求。
相应的,如果流量查询请求包含UE的标识,那么UE就要反馈所述UE的网络使用情况,比如预设时间段内的流量或收发数据包的数量等。如果流量查询请求包含UE的标识以及会话标识,那么UE就会反馈这个会话所对应的网络流量使用情况,比如预设时间段内使用的流量或收发的数据包。
3.所述UE向所述vAMF反馈UE统计的网络使用信息。
需要指出的是,如果vUPF向vAMF发送的流量查询请求中没有vUPF-counter,那么,本 实施例还会执行图3所示的2-5步,以通过vSMF获取vUPF-counter。如果vUPF向vAMF发送的流量查询请求中包含vUPF-counter,本实施例就跳过图3所示的2-5步。
后续的步骤可参考图3实施例中的6-11步。
上面结合图2至图3详细描述了本申请实施例提供的防止流量欺诈的方法,下面将结合图4至图6描述本申请实施例提供的防止流量欺诈的装置,图4至图6所示的装置可执行上述方法实施例所描述的方法。其中,图4所示的为归属网络中的网元(已在上述实施例中进行了举例说明),图5为拜访网络中的网元(比如AMF),图6为用户终端。
具体的,如4所示,该装置400包括:
接收单元401,用于接收用户设备发送的第一网络使用情况,其中,所述装置为归属网络中的网元;
获取单元402,用于获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;
处理单元403,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
可选的,所述装置400还包括判断单元404;
接收单元401,还用于接收所述用户设备发送的第一消息鉴别码;其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的;
获取单元402,还用于获取第二消息鉴别码,其中,所述第二消息鉴别码是根据所述共享密钥和所述第二网络使用情况生成的;
判断单元404,用于若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。
可选的,装置400还包括发送单元405;
发送单元405,用于向所述第二网元发送业务使用查询请求;
接收单元401,用于接收第二网元发送的第二网络使用情况。
具体的,如图5所示,该装置500包括接收单元501,获取单元502以及处理单元503;
接收单元501,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元;
获取单元502,用于获取所述拜访网络统计的第二网络使用情况;
处理单元503,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
可选的,装置500还包括发送单元504;
发送单元504,用于向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。
可选的,发送单元504,还用于根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求;接收单元501,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元。
如图6所示,该用户设备600包括生成单元601和发送单元602;
生成单元601,用于根据网络使用情况以及共享密钥生成第一消息鉴别码;
发送单元602,用于向拜访网络发送所述网络使用情况以及第一消息鉴别码。
可选的,生成单元601,还用于根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。
可选的,用户设备600还包括接收单元603,验证单元604以及处理单元605;
接收单元603,用于接收所述拜访网络反馈的比对结果和第二消息鉴别码;
验证单元604,用于对所述第二消息鉴别码进行验证;
处理单元605,用于若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。
应理解,这里的装置400、500以及600以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置400可以具体为上述图3所示的归属网络中的网元,装置400可以用于执行上述图3中归属网络网元为主体所执行流程和/或步骤,为避免重复,在此不再赘述。在一个可选例子中,本领域技术人员可以理解,装置500可以具体为上述图3所示的拜访网络中的AMF,装置500可以用于执行上述图3中AMF为主体所执行流程和/或步骤,为避免重复,在此不再赘述。在一个可选例子中,本领域技术人员可以理解,用户设备600可以具体为上述图3所示的UE,用户设备600可以用于执行上述图3中UE为主体所执行流程和/或步骤,为避免重复,在此不再赘述。
另外,需要指出的是,图4至6所示的逻辑单元均可依据图7所示的硬件架构来实现。该图7所示的硬件装置可以包括处理器710、收发器720和存储器730,该处理器710、收发器720和存储器730通过内部连接通路互相通信。
具体的,图4中的处理单元、获取单元、判断单元所实现的相关功能可以由处理器710来实现,接收单元和发送单元所实现的相关功能可以由处理器710控制收发器720来实现。
具体的,图5中的处理单元、获取单元所实现的相关功能可以由处理器710来实现,接收单元和发送单元所实现的相关功能可以由处理器710控制收发器720来实现。
具体的,图6中的处理单元、生成单元以及验证单元所实现的相关功能可以由处理器710来实现,接收单元和发送单元所实现的相关功能可以由处理器710控制收发器720来实现。
该处理器710可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器720用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以 包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器730包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable read only memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器730用于存储相关指令及数据。
存储器730用于存储授权模块的程序代码和数据,可以为单独的器件或集成在处理器710中。
可以理解的是,图7仅仅示出了授权模块的简化设计。在实际应用中,授权模块还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的授权模块都在本申请的保护范围之内。
在一种可能的设计中,装置700可以为芯片,例如可以为可用于授权模块中的通信芯片,用于实现授权模块中处理器710的相关功能。该芯片可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
另外,需要指出的是,图4至图6所涉及的网元,其构造均可如图7所示,包括处理器,收发器,存储器等部件,存储器中存储有程序代码,当所述程序代码被执行时,各个网元执行如图2或图3所示的功能。
应理解,本申请实施例中的归属网络中的网元以及拜访网络中的网元均为具有特定功能和网络接口,可以是同一个专用硬件上的不同网元,也可以是同一个专用硬件上运行的不同软件实例,还可以是同一个相关平台(如云基础设施上)上的不同虚拟功能实例,本申请实施例对此不作限定。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,数字通用光盘(digital versatile disc,DVD))、或者半导体介质(例如SSD)等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或RAM、磁碟或者光盘等各种可存储程序代码的介质。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算 法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (28)

  1. 一种防止流量欺诈的方法,其特征在于,所述方法包括:
    第一网元接收用户设备发送的第一网络使用情况,其中,所述第一网元为归属网络中的网元;
    所述第一网元获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;
    若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述第一网元接收所述用户设备发送的第一消息鉴别码;其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的;
    所述第一网元获取第二消息鉴别码,其中,所述第二消息鉴别码是根据所述共享密钥和所述第二网络使用情况生成的;
    若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一网元接收用户设备发送的第一网络使用情况之前,所述方法还包括:
    所述第一网元向所述第二网元发送业务使用查询请求;所述业务使用查询请求用于指示所述第二网元反馈所述用户设备所使用的网络使用情况。
  4. 根据权利要求1至3任一所述的方法,其特征在于,所述根据预设策略进行处理,包括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
  6. 一种防止流量欺诈的方法,其特征在于,所述方法包括:
    第二网元接收用户设备发送的第一网络使用情况,其中,所述第二网元为拜访网络中的网元;
    所述第二网元获取所述拜访网络统计的第二网络使用情况;
    若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    所述第二网元向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。
  8. 根据权利要求7所述的方法,其特征在于,所述第二网元接收用户设备发送的第一网络使用情况之前,所述方法还包括:
    所述第二网元根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求。
  9. 根据权利要求6至8任一所述的方法,其特征在于,所述根据预设策略进行处理,包 括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。
  10. 根据权利要求6至9任一所述的方法,其特征在于,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
  11. 一种防止流量欺诈的方法,其特征在于,所述方法包括:
    用户设备根据网络使用情况以及共享密钥生成第一消息鉴别码;
    所述用户设备向拜访网络发送所述网络使用情况以及第一消息鉴别码。
  12. 根据权利要求11所述的方法,其特征在于,所述用户设备根据网络使用情况以及共享密钥生成消息鉴别码之前,所述方法还包括:
    所述用户设备根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。
  13. 根据权利要求11或12所述的方法,其特征在于,所述方法还包括:
    所述用户设备接收所述拜访网络反馈的比对结果和第二消息鉴别码;
    所述用户设备对所述第二消息鉴别码进行验证;
    若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。
  14. 根据权利要求11至13任一所述的方法,其特征在于,所述第一消息鉴别码可以为一个或者多个;所述网络使用情况包括下述参数中的至少一个参数:所述用户设备的网络使用情况,第一切片的网络使用情况以及第一会话对应的网络使用情况;相应的,所述第一消息鉴别码与所述网络使用情况中的参数一一对应;其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
  15. 一种装置,其特征在于,所述装置包括:
    接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为归属网络中的网元;
    获取单元,用于获取第二网元发送的第二网络使用情况,其中,所述第二网元为为所述用户设备提供服务的拜访网络中的网元;
    处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
  16. 根据权利要求15所述的装置,其特征在于,所述装置还包括判断单元;
    所述接收单元,还用于接收所述用户设备发送的第一消息鉴别码;其中,所述消息鉴别码是根据共享密钥和所述第一网络使用情况生成的;
    所述获取单元,还用于获取第二消息鉴别码,其中,所述第二消息鉴别码是根据所述共享密钥和所述第二网络使用情况生成的;
    所述判断单元,用于若所述第一消息鉴别码和所述第二消息鉴别码相同,则判断所述第一网络使用情况与所述第二网络使用情况是否匹配。
  17. 根据权利要求15或16所述的装置,其特征在于,所述装置还包括发送单元;
    所述发送单元,用于向所述第二网元发送业务使用查询请求;
    所述接收单元,用于接收第二网元发送的第二网络使用情况。
  18. 根据权利要求15至17任一所述的装置,其特征在于,所述处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则终止会话,或上报服务器,或记录用户网络使用情况的详细日志。
  19. 根据权利要求15至18任一所述的装置,其特征在于,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
  20. 一种装置,其特征在于,所述装置包括接收单元,获取单元以及处理单元;
    所述接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元;
    所述获取单元,用于获取所述拜访网络统计的第二网络使用情况;
    所述处理单元,用于若所述第一网络使用情况与所述第二网络使用情况不匹配,则根据预设策略进行处理。
  21. 根据权利要求20所述的装置,其特征在于,所述装置还包括发送单元;
    所述发送单元,用于向第一网元发送所述第一网络使用情况和所述第二网络使用情况;其中,所述第一网元为归属网络中的网元。
  22. 根据权利要求21所述的装置,其特征在于,
    所述发送单元,还用于根据所述第一网元的订阅信息,周期性的向所述用户设备发送流量查询请求;
    所述接收单元,用于接收用户设备发送的第一网络使用情况,其中,所述装置为拜访网络中的网元。
  23. 根据权利要求20至22任一所述的装置,其特征在于,所述根据预设策略进行处理,包括:终止会话,或上报服务器,或记录用户网络使用情况的详细日志。
  24. 根据权利要求20至23任一所述的装置,其特征在于,所述第一网络使用情况是所述用户设备统计的所述用户设备或第一切片或第一会话的网络使用情况;所述第二网络使用情况是所述第二网元统计的所述用户设备或第一切片或第一会话的网络使用情况,其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
  25. 一种用户设备,其特征在于,所述用户设备包括生成单元和发送单元;
    所述生成单元,用于根据网络使用情况以及共享密钥生成第一消息鉴别码;
    所述发送单元,用于向拜访网络发送所述网络使用情况以及第一消息鉴别码。
  26. 根据权利要求15所述的用户设备,其特征在于,
    所述生成单元,还用于根据拜访网络的标识以及中间密钥生成所述共享密钥;所述中间密钥为用户设备接入鉴权时生成的密钥,拜访网络的标识包括所述拜访网络的名称。
  27. 根据权利要求25或26所述的用户设备,其特征在于,所述用户设备还包括接收单元,验证单元以及处理单元;
    所述接收单元,用于接收所述拜访网络反馈的比对结果和第二消息鉴别码;
    所述验证单元,用于对所述第二消息鉴别码进行验证;
    所述处理单元,用于若所述第二消息鉴别码被验证成功,则根据所述比对结果和预设策略进行处理。
  28. 根据权利要求25至27任一所述的用户设备,其特征在于,所述第一消息鉴别码可以为一个或者多个;所述网络使用情况包括下述参数中的至少一个参数:所述用户设备的网络使用情况,第一切片的网络使用情况以及第一会话对应的网络使用情况;相应的,所述第一消息鉴别码与所述网络使用情况中的参数一一对应;其中,所述网络使用情况为流量信息,或网络使用的时长,或收发数据包的数量;其中,所述第一切片为所述用户设备发起的任一个切片;所述第一会话为所述用户设备发起的任一个会话。
PCT/CN2019/088881 2018-06-20 2019-05-28 一种防止流量欺诈的方法及装置 WO2019242467A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810638701.6A CN110621019A (zh) 2018-06-20 2018-06-20 一种防止流量欺诈的方法及装置
CN201810638701.6 2018-06-20

Publications (1)

Publication Number Publication Date
WO2019242467A1 true WO2019242467A1 (zh) 2019-12-26

Family

ID=68919860

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/088881 WO2019242467A1 (zh) 2018-06-20 2019-05-28 一种防止流量欺诈的方法及装置

Country Status (2)

Country Link
CN (1) CN110621019A (zh)
WO (1) WO2019242467A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022203553A1 (en) * 2021-03-26 2022-09-29 Telefonaktiebolaget Lm Ericsson (Publ) Using user equipment to gather local break out network resource usage information for communication sessions

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI738205B (zh) * 2020-02-06 2021-09-01 鑽贏雲股份有限公司 雲端代理執行程式系統及其執行方法
CN115843028A (zh) * 2021-09-18 2023-03-24 华为技术有限公司 网络验证的方法和装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098648A (zh) * 2009-12-14 2011-06-15 中兴通讯股份有限公司 漫游计费方法和系统
CN104270734A (zh) * 2014-09-05 2015-01-07 华为技术有限公司 一种跨plmn漫游数据业务在线计费方法及设备
CN107547212A (zh) * 2016-06-24 2018-01-05 中兴通讯股份有限公司 一种基于分离架构的计费方法、装置和系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100370734C (zh) * 2006-03-13 2008-02-20 华为技术有限公司 一种wap业务计费方法
CN101102596A (zh) * 2007-07-09 2008-01-09 向杰 一种在用户侧产生呼叫详细记录的方法
US9210578B2 (en) * 2012-07-12 2015-12-08 Nokia Technologies Oy Methods and apparatus for authentication
CN104507065B (zh) * 2015-01-14 2018-09-25 南京理工大学 异构无线网络中不可否认性计费方法
CN106817228A (zh) * 2015-11-27 2017-06-09 中兴通讯股份有限公司 数据计费方法和装置
CN107809411B (zh) * 2016-09-09 2021-12-03 华为技术有限公司 移动网络的认证方法、终端设备、服务器和网络认证实体

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098648A (zh) * 2009-12-14 2011-06-15 中兴通讯股份有限公司 漫游计费方法和系统
CN104270734A (zh) * 2014-09-05 2015-01-07 华为技术有限公司 一种跨plmn漫游数据业务在线计费方法及设备
CN107547212A (zh) * 2016-06-24 2018-01-05 中兴通讯股份有限公司 一种基于分离架构的计费方法、装置和系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
3GPP: "Technical Specification Group Services and System Aspects; Study on the Security Aspects of the Next Generation System", 3GPP TR 33.899, vol. SA WG3, no. V1.3.0, 21 August 2017 (2017-08-21), pages 1 - 605, XP051450230 *
HUAWEI ET AL.: "Discussion on Fraudulent Registration Request Threats", 3GPP TSG SA WG3 (SECURITY) MEETING #91 S 3-181285, vol. SA WG3, 9 April 2018 (2018-04-09) - 20 April 2018 (2018-04-20), XP051438388 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022203553A1 (en) * 2021-03-26 2022-09-29 Telefonaktiebolaget Lm Ericsson (Publ) Using user equipment to gather local break out network resource usage information for communication sessions

Also Published As

Publication number Publication date
CN110621019A (zh) 2019-12-27

Similar Documents

Publication Publication Date Title
US11956361B2 (en) Network function service invocation method, apparatus, and system
WO2020220865A1 (zh) 网络功能服务的身份校验方法及相关装置
WO2020024764A1 (zh) 一种鉴权过程中验证用户设备标识的方法及装置
WO2020221219A1 (zh) 通信方法和通信设备
US11601555B2 (en) Methods and apparatuses for service layer charging correlation with underlying networks
WO2019196699A1 (zh) 一种获取安全策略的方法及设备
WO2023165150A1 (zh) 一种通信方法、装置、卫星融合网关及可读存储介质
KR102224368B1 (ko) D2D(device to device) 통신에서의 과금 정보 기록을 위한 방법 및 시스템
WO2019242467A1 (zh) 一种防止流量欺诈的方法及装置
WO2019205792A1 (zh) 计费的方法、装置及系统
WO2021057128A1 (zh) 一种基于nf的通信方法、设备及存储介质
US20220272607A1 (en) Network Access Method and Communication Apparatus
WO2021197185A1 (zh) 一种通信方法和通信装置
WO2014101228A1 (zh) 无线网络的能力开放系统、网关、代理和方法
US11197157B2 (en) Method, apparatus, and system for performing authentication on terminal in wireless local area network
CN110519750B (zh) 报文处理方法、设备及系统
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
US20220329492A1 (en) Data collection method and apparatus
WO2021196913A1 (zh) 一种终端参数更新的保护方法和通信装置
WO2018076298A1 (zh) 一种安全能力协商方法及相关设备
KR100730561B1 (ko) 휴대 인터넷 단말기의 네트워크 진입 동작을 제어하는 방법및 시스템과, 상기 휴대 인터넷 단말기
WO2016165443A1 (zh) 一种保护机器类通信设备的方法、网络实体及mtc设备
WO2018120150A1 (zh) 网络功能实体之间的连接方法及装置
US20240223547A1 (en) Network Supported Authentication
US20220353340A1 (en) Communication Method and Communication Apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19822624

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19822624

Country of ref document: EP

Kind code of ref document: A1