WO2020034817A1 - 策略控制方法、设备及系统 - Google Patents

策略控制方法、设备及系统 Download PDF

Info

Publication number
WO2020034817A1
WO2020034817A1 PCT/CN2019/097541 CN2019097541W WO2020034817A1 WO 2020034817 A1 WO2020034817 A1 WO 2020034817A1 CN 2019097541 W CN2019097541 W CN 2019097541W WO 2020034817 A1 WO2020034817 A1 WO 2020034817A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
terminal
policy control
mobility management
policy
Prior art date
Application number
PCT/CN2019/097541
Other languages
English (en)
French (fr)
Inventor
宗在峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020034817A1 publication Critical patent/WO2020034817A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/12Reselecting a serving backbone network switching or routing node

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a method, device, and system for policy control.
  • access and mobility management (AMF) network elements It can interact with policy control function (policy control function (PCF) network elements in order to obtain the policies of the terminal and access and mobility management policies.
  • policy control function policy control function
  • the terminal of a roaming user registers with a visited public land mobile network (VPLMN) in the visiting process.
  • a visited-PCF (V-PCF) network element in the terminal's visiting place interacts with a PCF (home-PCF, H-PCF) network element in the terminal's visiting place, so that the AMF network element located in the visiting place of the terminal can obtain the terminal Strategies, and access and mobility management strategies.
  • the policy of the terminal may be formulated by the V-PCF network element for the terminal, and the V-PCF network element may save the policy of the terminal formulated by the V-PCF network element in the visited unified database (visited- unified data repository (V-UDR).
  • V-UDR visited- unified data repository
  • the embodiments of the present application provide a method, a device, and a system for controlling a policy, so that storage resources of a V-UDR network element can be saved.
  • a policy control method includes: a first mobile management network element of a first visited network determines that the terminal leaves the first visited network; the first mobile management network element reports to the first mobile management network element; The policy control network element of the first visited network sends instruction information, which is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element of the first visited network. Based on the policy control method provided in the embodiment of the present application, after the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a second mobility management network element from the second visited network A first context transmission request message, the first context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the network of one visited place to the network of another visited place, which is not specifically limited in the embodiment of the present application.
  • the first mobility management network element determining that the terminal leaves the first visited network is specifically: the first mobility management network element receives a third mobility management network element from a home network of the terminal A second context transmission request message, the second context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the visited network to the home network of the terminal, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration request from the terminal, and the deregistration request uses For requesting to perform deregistration of the terminal. That is, in the embodiment of the present application, the terminal may initiate de-registration of the terminal, so that the terminal leaves the first visited network where the terminal is currently located, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration notification from a data management network element, and the deregistration The notification is used to notify the first mobility management network element to perform deregistration of the terminal. That is to say, in the embodiment of the present application, the network side may initiate de-registration of the terminal, so that the terminal leaves the first visited network, and this embodiment of the present application does not specifically limit this.
  • the policy control method before the first mobility management network element determines that the terminal leaves the first visited network, the policy control method further includes: the first mobility management network element receives a registration request from the terminal; Sending, by the first mobility management network element, a third context transmission request message to a fourth mobility management network element in the first visited network, where the third context transmission request message is used to request the context of the terminal; the first mobile The management network element receives a context transmission response from the fourth mobile management network element, where the context transmission response includes the identity of the unified database network element; the first mobility management network element sends the unified database network element to the policy control network element Identification, the identification of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the first mobility management network element of the first visited network may obtain the first mobility management network element from the fourth mobility management network element of the first visited network.
  • the identity of the unified database network element of the visited network, and when the policy association is created, the identity of the unified database network element is sent to the policy control network element, so that the policy control network element can unify the identity corresponding to the identity of the unified database network element.
  • the database network element obtains the policy of the terminal. Therefore, based on this solution, when a terminal moves between different mobile management network elements in the same visited network, it is ensured that different policy control network elements can find the same unified database network element, and then can be retrieved from the unified database network element. Get the policy of this terminal.
  • the policy control method before the first mobility management network element determines that the terminal leaves the first visited network, the policy control method further includes: the first mobility management network element receives a registration request from the terminal; The first mobility management network element sends a policy association creation request message to the policy control network element; the first mobility management network element receives the identity of the unified database network element from the policy control network element. That is, in the embodiment of the present application, when the terminal registers with the first visited network, the first mobility management network element that the terminal initially accesses can obtain the policy control selected when the terminal initially accesses the first visited network. The identity of the unified database network element selected by the network element.
  • the policy control method further includes: the first mobility management network element receives a fourth context transmission request message from a fifth mobility management network element in the first visited network, and the fourth context The transmission request message is used to request to obtain the context of the terminal; the first mobility management network element sends a context transmission response to the fifth mobility management network element, the context transmission response includes an identifier of the unified database network element, and the unified database network element Is used to obtain the terminal's policy from the consolidated database network element.
  • the first mobility management network element that the terminal initially accesses can obtain the information selected by the terminal when the terminal first accesses the first visited network.
  • the identity of the unified database network element selected by the policy control network element enables the subsequent terminal to provide the identity of the unified database network element to the latest mobility management network element when a re-selection of the mobility management network element occurs in the first visited network.
  • the latest mobile management network element provides the policy control network element of the latest first visited network, and the policy control network element of the latest first visited network can obtain the unified database network corresponding to the identity of the unified database network element. Meta acquisition terminal strategy. Therefore, based on this solution, when a terminal moves between different mobile management network elements in the same visited network, it is ensured that different policy control network elements can find the same unified database network element, and then can be retrieved from the unified database network element. Get the policy of this terminal.
  • a policy control method includes: a policy control network element of a first visited network receives instruction information from a first mobility management network element of the first visited network, the instruction information It is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element of the first visited network; the policy control network element sends a delete request message to the unified database network element according to the instruction information, and the deletion The request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the policy control method before the policy control network element receives the instruction information of the first mobility management network element from the first visited network, the policy control method further includes: the policy control network element receives the The identity of the unified database network element of a mobile management network element; the policy controls the network element to obtain the policy of the terminal from the unified database network element corresponding to the identity of the unified database network element.
  • the policy control network element can obtain the policy of the terminal from the unified database network element corresponding to the identifier of the unified database network element.
  • the policy control method before the policy control network element receives the instruction information of the first mobility management network element from the first visited network, the policy control method further includes: the policy control network element receives the A policy association creation request message of a mobile management network element; the policy control network element selects the unified database network element to save the terminal's policy; the policy control network element sends the identity of the unified database network element to the first mobility management network element .
  • the first mobility management network element may obtain the identity of the unified database network element when creating a policy association.
  • a policy control method includes: a first mobility management network element of a first visited network receives a registration request from a terminal; the first mobility management network element requests the first visited location A second mobility management network element in the network sends a first context transmission request, where the first context transmission request message is used to request the context of the terminal; the first mobility management network element receives the context from the second mobility management network element A transmission response, where the context transmission response includes the identity of the unified database network element of the first visited network; the first mobility management network element sends the identity of the unified database network element to the policy control network element of the first visited network, The identity of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the first mobility management network element of the first visited network may obtain the first mobility management network element from the second mobility management network element of the first visited network.
  • the identity of the unified database network element of the visited network and the identity of the unified database network element can be sent to the policy control network element, so that the policy control network element can obtain it from the unified database network element corresponding to the identity of the unified database network element.
  • the strategy of the terminal therefore, based on this solution, when the terminal moves between different mobility management network elements in the same visited network, it is guaranteed that different policy control network elements can find the same unified database network element, and from this unified The strategy for obtaining the terminal in the database network element.
  • the policy control method further includes: the first mobility management network element determining that the terminal leaves the first visited network; the first mobility management network element sending instruction information to the policy control network element, The instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a second mobility management network element from the second visited network A first context transmission request message, the first context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the network of one visited place to the network of another visited place, which is not specifically limited in the embodiment of the present application.
  • the first mobility management network element determining that the terminal leaves the first visited network is specifically: the first mobility management network element receives a third mobility management network element from a home network of the terminal A second context transmission request message, the second context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the visited network to the home network of the terminal, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration request from the terminal, and the deregistration request uses For requesting to perform deregistration of the terminal. That is, in the embodiment of the present application, the terminal may initiate de-registration of the terminal, so that the terminal leaves the first visited network where the terminal is currently located, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration notification from a data management network element, and the deregistration The notification is used to notify the first mobility management network element to perform deregistration of the terminal. That is to say, in the embodiment of the present application, the network side may initiate de-registration of the terminal, so that the terminal leaves the first visited network, and this embodiment of the present application does not specifically limit this.
  • a policy control method includes: a policy control network element of a first visited network receives the first visited location from a first mobile management network element of the first visited network; The identity of the unified database network element of the network; the policy controls the network element to obtain the policy of the terminal from the unified database network element corresponding to the identity of the unified database network element.
  • the policy controlled network element since the first mobility management network element of the first visited network can send the identity of the unified database network element of the first visited network to the policy controlled network element, the policy controlled network element The policy of the terminal can be obtained from the unified database network element corresponding to the identity of the unified database network element.
  • the policy control method includes: the policy control network element receives instruction information from the first mobility management network element, the instruction information is used to instruct the policy control network element to delete the unified database network element The policy of the saved terminal; the policy controls the network element to send a delete request message to the unified database network element according to the instruction information, and the delete request message is used to request deletion of the policy of the terminal stored in the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • a first mobility management network element has a function of implementing the method described in the first aspect or the third aspect.
  • This function can be realized by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • a first mobility management network element including: a processor and a memory; the memory is configured to store a computer execution instruction, and when the first mobility management network element is running, the processor executes the memory stored in the memory.
  • the computer executes instructions to cause the first mobility management network element to execute the policy control method according to any one of the first aspect or the third aspect.
  • a first mobility management network element including: a processor; the processor is configured to be coupled to the memory, and after reading an instruction in the memory, execute the first aspect or the first aspect according to the instruction.
  • the strategy control method according to any one of the three aspects.
  • a computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute any one of the first or third aspects described above.
  • a computer program product containing instructions which, when run on a computer, enables the computer to execute the policy control method according to any one of the first aspect or the third aspect.
  • an apparatus for example, the apparatus may be a chip system
  • the apparatus includes a processor, and is configured to support a first mobility management network element to implement the functions involved in the first aspect or the third aspect, For example, it is determined that the terminal leaves the first visited network.
  • the device further includes a memory, which is configured to store program instructions and data necessary for the first mobility management network element.
  • the device is a chip system, it may be composed of a chip, or it may include a chip and other discrete devices.
  • a policy control network element has a function of implementing the method described in the second aspect or the fourth aspect.
  • This function can be realized by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • a policy control network element including: a processor and a memory; the memory is configured to store computer execution instructions; when the policy control network element is running, the processor executes the computer execution stored in the memory; An instruction to make the policy control network element execute the policy control method according to any one of the second aspect or the fourth aspect.
  • a policy control network element including: a processor; the processor is configured to be coupled to a memory, and after reading an instruction in the memory, execute the second or fourth aspect according to the instruction.
  • the method of policy control according to any one of the aspects.
  • a computer-readable storage medium stores instructions, and when the computer-readable storage medium is run on a computer, the computer can execute any one of the second aspect or the fourth aspect.
  • the strategy control method is provided.
  • a computer program product containing instructions which when executed on a computer, enables the computer to execute the policy control method according to any one of the second aspect or the fourth aspect.
  • an apparatus for example, the apparatus may be a chip system
  • the apparatus includes a processor, and is configured to support a policy control network element to implement the functions involved in the second or fourth aspect, for example,
  • the policy of the terminal is obtained from the unified database network element corresponding to the identity of the unified database network element.
  • the device further includes a memory, which is configured to store program instructions and data necessary for the policy control network element.
  • the device is a chip system, it may be composed of a chip, or it may include a chip and other discrete devices.
  • a policy control system includes: a first mobility management network element of a first visited network and a policy control network element of the first visited network; the first mobility management network Element, which is used to determine that the terminal leaves the first visited network; the first mobility management network element is further used to send instruction information to a policy control network element of the first visited network, and the instruction information is used to indicate the policy
  • the control network element deletes the policy of the terminal stored in the unified database network element of the first visited network; the policy control network element is configured to receive the instruction information from the first mobility management network element, and according to the instruction information , Sending a delete request message to the unified database network element, where the delete request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the policy control system further includes the unified database network element; the unified database network element is configured to delete the policy of the terminal stored in the unified database network element according to the delete request message.
  • the unified database network element is configured to delete the terminal stored in the unified database network element according to the delete request message, and is specifically configured to: according to the delete request message, at a preset time If a policy request or a policy update request of the terminal is not received, the policy of the terminal stored in the unified database network element is deleted.
  • the first mobility management network element is further configured to receive a registration request from the terminal; the first mobility management network element is further configured to provide a fourth mobility to the first visited network The management network element sends a third context transmission request, where the third context transmission request message is used to request the context of the terminal; the first mobility management network element is further configured to receive a context transmission response from the fourth mobility management network element.
  • the context transmission response includes the identity of the unified database network element; the first mobility management network element is further configured to send the identity of the unified database network element to the policy control network element; the policy control network element is further configured to receive The identity of the unified database network element from the first mobility management network element, and the policy of the terminal is obtained from the unified database network element corresponding to the identity of the unified database network element.
  • the first mobility management network element is further configured to receive a registration request from the terminal; the first mobility management network element is further configured to send a policy association creation request message to the policy control network element.
  • the policy control network element is further configured to receive the policy association creation request message from the first mobility management network element and select the unified database network element to save the policy of the terminal; the policy control network element is also used to The first mobility management network element sends the identity of the unified database network element; the first mobility management network element is further configured to receive the identity of the unified database network element from the policy control network element.
  • a policy control system includes a first mobility management network element of a first visited network, a second mobility management network element of a first visited network, and a first visited network.
  • a network policy control network element a first mobility management network element for receiving a registration request from a terminal, and sending a first context transmission request to a second mobility management network element, the first context transmission request message being used to request to obtain the The context of the terminal; a second mobility management network element for receiving a first context transmission request from the first mobility management network element, and sending a context transmission response to the first mobility management network element, the context transmission response including the first visit
  • the identity of the unified database network element of the local network; the first mobility management network element is further configured to receive a context transmission response from the second mobility management network element, and send the identity of the unified database network element to the policy control network element;
  • the policy control network element is configured to receive the identity of the unified database network element from the first mobility management network element, and Policy for the terminal library network element identifie
  • the first mobility management network element is further configured to determine that the terminal leaves the first visited network; the first mobility management network element is further configured to send instruction information to the policy control network element.
  • the instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element; the policy control network element is further configured to receive the instruction information from the first mobility management network element, and according to The instruction information sends a delete request message to the unified database network element, and the delete request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the policy control system further includes the unified database network element described above; the unified database network element is configured to delete the policy of the terminal stored in the unified database network element according to the delete request message.
  • the unified database network element deletes the terminal's policy stored in the unified database network element according to the deletion request message, specifically: the unified database network element presets the deletion request message in the preset If no policy request or policy update request of the terminal is received within the time, the policy of the terminal stored in the unified database network element is deleted.
  • FIG. 1 is a schematic diagram of a 5G network architecture in an existing hometown routing roaming scenario
  • FIG. 2 is a schematic diagram of a 5G network architecture in an existing local grooming roaming scenario
  • FIG. 3 is a first schematic architecture diagram of a policy control system according to an embodiment of the present application.
  • FIG. 4 is a second schematic architecture diagram of a policy control system according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 7 is a second schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 8 is a third flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 9 is a fourth flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 11 is a schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 12 is a first schematic structural diagram of a first mobility management network element according to an embodiment of the present application.
  • FIG. 13 is a first schematic structural diagram of a policy control network element according to an embodiment of the present application.
  • FIG. 14 is a second schematic structural diagram of a first mobility management network element according to an embodiment of the present application.
  • FIG. 15 is a second schematic structural diagram of a policy control network element according to an embodiment of the present application.
  • the network architecture includes the VPLMN of the terminal and the home land mobile network (HPLMN) of the terminal.
  • the terminal is currently located in the VPLMN of the terminal, and the VPLMN of the terminal includes an access device, a user plane function (UPF) 1 network element, an AMF network element, and a visited-session session management function network element (visited-session) management function (SMF) network element, V-PCF network element, or V-UDR network element, etc .
  • the HPLMN of this terminal includes a UPF2 network element, an SMF (home-SMF, H-SMF) network element, H- A PCF network element, a home-UDR (H-UDR) network element at home, a unified data management (UDM) network element, or an application function (AF) network element.
  • UPF2 network element an SMF (home-SMF, H-SMF) network element, H- A PCF network element, a home-UDR (H-UDR) network element at home,
  • the terminal accesses the 5G network through the access device, and the terminal communicates with the AMF network element through the next generation network (n) interface 1 (referred to as N1); the access device communicates with the AMF network element through the N2 interface (referred to as N2).
  • N1 next generation network interface 1
  • N2 next generation network
  • AMF network element communicates with V-SMF network element through N11 interface (N11), communicate with V-PCF network element through N15 interface (N15), and N8 interface (Referred to as N8) communicates with UDM network elements;
  • V-SMF network elements communicate with H-SMF network elements through N16 interface (referred to as N16), communication with V-PCF network elements through N7 interface (referred to as N7), and N4 interface (referred to as N4) communicates with the UPF1 network element;
  • the UPF1 network element communicates with the UPF2 network element through the N9 interface (referred to as N9);
  • the H-SMF network element communicates with the H-PCF network element through the N7 interface (referred to as N7) and the N10 interface (referred to as N10)
  • V-PCF network elements communicate with H-PCF network elements through N24 interface (referred to as N24);
  • V-UDR network elements communicate with V-PCF network
  • control plane network elements such as AMF network element, V-SMF network element, H-SMF network element, V-PCF network element, H-PCF network element or UDM network element in the 5G network shown in FIG. 1 You can also use service-oriented interfaces to interact.
  • the external service-oriented interface provided by the AMF network element may be Namf; the external service-oriented interface provided by the V-SMF network element may be Nvsmf; the external service-oriented interface provided by the H-SMF network element may be Nhsmf; the H-PCF network element
  • the external serviced interface provided by the V-PCF network element can be Nhpcf; the external serviced interface provided by the V-PCF network element can be Nvpcf; the external serviced interface provided by the UDM network element can be Nudm, etc.
  • the 5G system architecture diagram in the 23501 standard which will not be repeated here.
  • FIG. 2 it is a schematic diagram of a 5G network architecture in an existing local grooming roaming scenario.
  • the network architecture includes the VPLMN of the terminal and the HPLMN of the terminal.
  • the terminal is currently located in the VPLMN of the terminal, and the VPLMN of the terminal includes an access device, a UPF network element, an AMF network element, an SMF network element, a V-PCF network element, a V-UDR network element, or an AF network element, etc .
  • the HPLMN of the terminal includes an H-PCF network element, a UDM network element, or an H-UDR network element.
  • the terminal accesses the 5G network through the access device, and the terminal communicates with the AMF network element through N1;
  • the access device communicates with the AMF network element through N2, and communicates with the UPF network element through N3;
  • the AMF network element communicates with the SMF network element through N11 , Communicate with V-PCF network elements through N15, and UDM network elements through N8;
  • SMF network elements communicate with V-PCF network elements through N7, communicate with UPF network elements through N4, and communicate with UDM network elements through N10;
  • UPF network The V-PCF network element communicates with the H-PCF network element through N24, and communicates with the AF network element through N5;
  • the V-UDR network element communicates with the V-PCF network element;
  • H -UDR network element communicates with H-PCF network element.
  • AMF network element V-SMF network element, H-SMF network element, SMF network element, V-PCF network element, H-PCF network element or UDM in the 5G network shown in FIG. 1 or FIG. 2
  • Network elements such as network elements on the control plane can also use service-oriented interfaces for interaction.
  • the external service interface provided by AMF network elements can be Namf; the external service interface provided by SMF network elements can be Nsmf; the external service interface provided by V-SMF network elements can be Nvsmf; H-SMF network elements provide external services
  • the service-oriented interface provided by the H-PCF network element may be Nhpcf; the service-oriented interface provided by the V-PCF network element may be NVPCF; the service-oriented interface provided by the UDM network element may be Nudm ,Wait.
  • the 5G system architecture diagram in the 23501 standard which will not be repeated here.
  • the 5G network architecture shown in FIG. 1 or FIG. 2 only provides a VPLMN by way of example.
  • the terminal may also move from one VPLMN to another VPLMN.
  • the network elements in the VPLMN in different scenarios
  • For the connection methods please refer to the network elements and connection methods in the VPLMN in the 5G network architecture shown in FIG. 1 or FIG. 2, which will not be described one by one here.
  • a VPLMN includes an AMF network element, a V-SMF network element, a V-PCF network element, or a V-UDR network element.
  • a VPLMN can include multiple AMF network elements, multiple V-SMF network elements, multiple V-PCF network elements, or multiple V-UDR network elements.
  • Different AMF network elements can pass through the N14 interface (referred to as N14 for short). ) Communication; different V-PCF network elements can communicate through N24, and so on.
  • N14 referred to as N14 for short.
  • an HPLMN includes an H-PCF network element or an H-UDR network element.
  • HPLMN can include multiple H-PCF network elements or H-UDR network elements, and different H-PCF network elements can communicate through N24, etc.
  • H-PCF network elements can communicate through N24, etc.
  • the terminals involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to a wireless modem; Including subscriber unit, cellular phone, smart phone, wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop (computer), cordless phone (wireless local phone) or wireless local loop (WLL) station, machine type communication (MTC) terminal, user equipment (user equipment) , UE), mobile station (MS), terminal device (terminal device) or relay user equipment.
  • the relay user equipment may be, for example, a 5G residential gateway (RG).
  • RG 5G residential gateway
  • the access device referred to in the embodiments of the present application refers to a device that accesses a core network.
  • the access device may be a base station, a broadband network service gateway (BNG), an aggregation switch, or non-third-generation cooperation.
  • BNG broadband network service gateway
  • 3GPP 3rd generation partnership project
  • the base station may include various forms of base stations, such as: macro base stations, micro base stations (also called small stations), relay stations, access points, and the like.
  • At least one or more of the following or similar expressions refers to any combination of these items, including any combination of single or plural items.
  • at least one (a), a, b, or c can be expressed as: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • words such as “first” and “second” are used to distinguish between the same or similar items having substantially the same functions and functions. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the number and execution order, and the words “first” and “second” are not necessarily different.
  • the network architecture and service scenarios described in the embodiments of the present application are intended to more clearly illustrate the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided in the embodiments of the present application. With the evolution of the network architecture and the emergence of new service scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • the policy control system 30 includes a first mobility management network element 301 of a first visited network and a policy control network element of a first visited network. 302.
  • the first mobility management network element 301 is used to determine that after the terminal leaves the first visited network, the terminal sends instruction information to the policy control network element 302, where the instruction information is used to instruct the policy control network element 302 to delete the first visited network. Unified terminal policies stored in database NEs.
  • the policy control network element 302 is configured to receive instruction information from the first mobility management network element 301, and send a deletion request message to the unified database network element according to the instruction information, where the deletion request message is used to request deletion of the storage in the unified database network element Terminal strategy.
  • the first mobility management network element 301 and the policy control network element 302 may communicate directly, or may communicate through forwarding by other devices, which is not specifically limited in this embodiment of the present application.
  • the terminal of the roaming user leaves the visited network where the current mobile management network element is located, because the original mobile management network element and the newly selected mobile management network element are not in the same network, the terminal has left the original The visited network, and whether it will still access the visited network in the future is unknown, so the policies of these roaming user terminals saved in the original unified database network element may not be used in the future, or only after a long time It will be used, and even if used, it may be out of date, which will waste the storage resources of the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete the first database of the first visited network and save it in the unified database network element. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the policy control system 30 provided in the embodiment of the present application may further include a unified database network element 303.
  • the unified database network element 303 is configured to delete the terminal's strategy stored in the unified database network element according to the delete request message, which is not specifically limited in this embodiment of the present application.
  • a policy control system 40 includes a first mobile management network element 401 of a first visited network, and a first visited place.
  • the first mobility management network element 401 is configured to receive a registration request from a terminal and send a first context transmission request to the second mobility management network element 402.
  • the first context transmission request message is used to request the context of the terminal ( context).
  • the first mobility management network element 401 is further configured to receive a context transmission response from the second mobility management network element 402, where the context transmission response includes an identifier of a unified database network element of the first visited network.
  • the first mobility management network element 401 is further configured to send the identity of the unified database network element to the policy control network element 403.
  • the policy control network element 403 is configured to receive the identity of the unified database network element from the first mobility management network element 401, and obtain the policy of the terminal from the unified database network element corresponding to the identity of the unified database network element.
  • the first mobility management network element 401 and the policy control network element 403 may communicate directly, or may communicate through forwarding by other devices, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element 401 and the second mobility management network element 402 may communicate directly or may be communicated through forwarding by other devices, which is not specifically limited in this embodiment of the present application. .
  • the first mobility management network element of the first visited network can obtain the first mobility management network element from the second mobility management network element of the first visited network.
  • the identity of the unified database network element of the visited network and sends the identity of the unified database network element to the policy control network element, so that the policy control network element can obtain the terminal from the unified database network element corresponding to the identity of the unified database network element Therefore, based on this solution, when the terminal moves between different mobile management network elements in the same visited network, it is ensured that different policy control network elements can find the same unified database network element, and then from this unified database The strategy of obtaining the terminal in the network element.
  • the policy control system shown in FIG. 3 or FIG. 4 may be applied to the 5G network architecture in the home routing roaming scenario shown in FIG. 1 or the 5G network architecture in the local grooming roaming scenario shown in FIG. 2, It can also be applied to other roaming network architectures in the future, which is not specifically limited in this embodiment of the present application.
  • the network element or entity corresponding to the first mobility management network element 301 in FIG. 3, the first mobility management network element 401 or the second mobility management network element 402 in FIG. 4 may be the VPLMN in the above 5G network architecture.
  • AMF network element; the network element or entity corresponding to the policy control network element 302 in FIG. 3 or the policy control network element 403 in FIG. 4 may be the V-PCF network element in the VPLMN in the above 5G network architecture.
  • the first mobility management network element 301 or the policy control network element 302 in FIG. 3 or the first mobility management network element 401 or the policy control network element 403 in FIG. 4 may be implemented by one device. It can also be implemented by multiple devices together, or it can be a functional module in one device, which is not specifically limited in this embodiment of the present application. It can be understood that the foregoing functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualized functions instantiated on a platform (for example, a cloud platform).
  • FIG. 5 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application.
  • the communication device 500 includes a processor 501, a communication line 502, a memory 503, and at least one communication interface (in FIG. 5, only the communication interface 504 is taken as an example for description).
  • the processor 501 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors for controlling the execution of the program of the solution of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line 502 may include a path for transmitting information between the aforementioned components.
  • the communication interface 504 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • RAN radio access network
  • WLAN wireless local area networks
  • the memory 503 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM-ready-only memory (EEPROM)), compact disc (read-only memory (CD-ROM)) or other optical disk storage, optical disk storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory may exist independently, and is connected to the processor through the communication line 502. The memory can also be integrated with the processor.
  • the memory 503 is configured to store a computer execution instruction for executing the solution of the present application, and the execution is controlled by the processor 501.
  • the processor 501 is configured to execute computer execution instructions stored in the memory 503, so as to implement the policy control method provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 501 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 5.
  • the communication device 500 may include multiple processors, such as the processor 501 and the processor 508 in FIG. 5. Each of these processors may be a single-CPU processor or a multi-CPU processor.
  • a processor herein may refer to one or more devices, circuits, and / or processing cores for processing data (such as computer program instructions).
  • the communication device 500 may further include an output device 505 and an input device 506.
  • the output device 505 is in communication with the processor 501 and can display information in a variety of ways.
  • the output device 505 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • the input device 506 is in communication with the processor 501 and can receive user input in a variety of ways.
  • the input device 506 may be a mouse, a keyboard, a touch screen device, or a sensing device.
  • the above-mentioned communication device 500 may be a general-purpose device or a special-purpose device.
  • the communication device 500 may be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a device with a similar structure in FIG. 5. device.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 500.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example.
  • the HPLMN of the terminal includes a UDM The network element, the H-PCF1 network element, the H-PCF2 network element, and the H-UDR network element.
  • the terminal leaves the VPLMN1 where the AMF1 network element, the V-PCF1 network element, and the V-UDR1 network element are located, and enters the AMF2 network element,
  • the VPLMN2 in which the V-PCF2 network element and the V-UDR2 network element are located, as shown in FIG. 6, is a policy control method provided by this embodiment of the present application, including the following steps:
  • the terminal moves, and sends a registration request message to the AMF2 network element through the access device in the VPLMN2, so that the AMF2 network element receives the registration request message from the terminal.
  • the AMF2 network element sends a context transfer request (context transfer request) message to the AMF1 network element, so that the AMF1 network element receives the context transmission request message from the AMF2 network element, and the context transmission request message is used to request the context of the terminal.
  • context transfer request context transfer request
  • the AMF1 network element after the AMF1 network element receives the context transmission request message from the AMF2 network element, it can know that the terminal leaves the VPLMN1 where the AMF1 network element is located, which is described here in a unified manner, and will not be described again below.
  • the AMF1 network element sends a context transfer response (context transfer response) message to the AMF2 network element, so that the AMF2 network element receives the context transmission response message from the AMF1 network element.
  • the context transmission response message includes the context of the terminal.
  • the context of the terminal sent by the AMF1 network element to the AMF2 network element does not include the identity of the V-PCF1 network element in VPLMN1.
  • the AMF2 network element registers with the UDM network element and obtains the contract data of the terminal.
  • the AMF2 network element sends a registration complete notification to the AMF1 network element, so that the AMF1 network element receives the registration completion notification from the AMF2 network element.
  • the deregistration completion notification is used to notify the completion of registration of the AMF1 network element with the AMF2 network element.
  • the AMF2 network element after the AMF2 network element is registered with the UDM network element, it may also subscribe to the contract data modification notification.
  • the AMF2 network element may also subscribe to the contract data modification notification.
  • the UDM network element sends a deregistration notification request to the AMF1 network element, so that the AMF1 network element receives the deregistration notification request from the UDM network element.
  • the deregistration notification request is used by the AMF1 network element to delete the context of the terminal.
  • the AMF1 network element sends a deregistration notification response to the UDM network element, so that the UDM network element receives the deregistration notification response from the AMF1 network element.
  • the AMF1 network element may cancel the subscription to the contract data modification notification.
  • the AMF2 network element does not receive the identity of the V-PCF1 network element, the AMF2 network element reselects the V-PCF network element and the H-PCF network element, assuming that the V-PCF2 network element and the H-PCF2 network element are respectively, The AMF2 network element sends a policy association creation request 1 to the V-PCF2 network element, so that the V-PCF2 network element receives a policy association creation request message 1 from the AMF2 network element, and the policy association creation request message 1 is used to request the creation of a policy association. .
  • the policy association here refers to an association between the AMF2 network element and the V-PCF2 network element. This association is used for the AMF2 network element to pass the current access-related parameters of the terminal to the V-PCF2 network element, and V -The PCF2 network element provides the policy of the terminal to the AMF2 network element, and the related description can refer to the definition of the existing policy association, which is not repeated here.
  • the policy association creation request message 1 in the embodiment of the present application may be, for example, a policy control creation request (policy control create request) message 1, which is not specifically limited in this embodiment of the present application.
  • the policy association creation request message 1 may further include indication information 1, which is used to instruct the terminal to move from other public land mobile network (PLMN) to V -VPLMN2 where the PCF2 network element is located, which is not specifically limited in this embodiment of the present application.
  • PLMN public land mobile network
  • the V-PCF2 network element sends a policy association creation response message 1 to the AMF2 network element, so that the AMF2 network element receives the policy association creation response message 1 from the V-PCF2 network element.
  • the policy association creation response message 1 in the embodiment of the present application may be, for example, a policy control creation response message 1.
  • the embodiment of the present application does not specifically limit this.
  • the V-PCF2 network element sends a query request 1 to the V-UDR2 network element, so that the V-UDR2 network element receives the query request 1 from the V-PCF2 network element.
  • the query request 1 is used to request a policy for acquiring a terminal stored in a V-UDR2 network element.
  • the V-UDR2 network element sends a query response 1 to the V-PCF2 network element, so that the V-PCF2 network element receives the query response 1 from the V-UDR2 network element.
  • the query response 1 includes the policy of the terminal stored in the V-UDR2 network element; otherwise, the query response 1 does not include the policy of the terminal.
  • step S608 includes the indication information 1
  • steps S609-S610 which are collectively described here and will not be described in detail below.
  • the V-PCF2 network element sends a policy association creation request message 2 to the H-PCF2 network element, so that the H-PCF2 network element receives the policy association creation request message 2 from the V-PCF2 network element, and the policy association creation request message 2 Used to request the creation of a policy association.
  • the policy association here refers to an association between the V-PCF2 network element and the H-PCF2 network element. This association is used for the H-PCF2 network element to provide the terminal's policy to the V-PCF2 network element, and the related description. Please refer to the definition of the existing policy association, which will not be repeated here.
  • the policy association creation request message 2 in the embodiment of the present application may be, for example, a policy control creation request message 2, which is not specifically limited in this embodiment of the present application.
  • the H-PCF2 network element sends a query request 2 to the H-UDR network element, so that the H-UDR network element receives the query request 2 from the H-PCF2 network element.
  • the query request 2 is used to request a policy of a terminal stored in an H-UDR network element.
  • the H-UDR network element sends a query response 2 to the H-PCF2 network element, so that the H-PCF2 network element receives the query response 2 from the H-UDR network element.
  • the query response 2 includes the policy of the terminal stored in the H-UDR network element; otherwise, the query response 2 does not include the policy of the terminal.
  • the H-PCF2 network element sends a policy association creation response message 2 to the V-PCF2 network element, so that the V-PCF2 network element receives the policy association creation response message 2 from the H-PCF2 network element.
  • the policy association creation response message 2 includes the policy of the terminal after the update of the H-PCF2 network element. This is not specifically limited.
  • the updated terminal policy may also be referred to as the terminal policy formulated for the terminal, which is described here in a unified manner, and is not described in detail below.
  • the policy association creation response message 2 in the embodiment of the present application may, for example, create a response message 2 for policy control, which is not specifically limited in this embodiment of the present application.
  • the V-PCF2 network element formulates the terminal policy for the terminal, or the H-PCF2 network element updates the policy of the terminal, the V-PCF2 network element sends an N1N2 message transmission request (N1N2 message transfer transfer request to the AMF2 network element). ), So that the AMF2 network element receives the N1N2 message transmission request from the V-PCF2 network element.
  • the N1N2 message transmission request includes the policy of the terminal formulated by the V-PCF2 network element for the terminal.
  • the N1N2 message transmission request includes the updated terminal policy of the H-PCF2 network element, which is not specifically limited in this embodiment of the application. .
  • the V-PCF2 network element if the V-PCF2 network element does not receive the policy of the terminal in the query response 1, or although the V-PCF2 network element 2 receives the policy of the terminal, the V-PCF2 network element The policy of the terminal needs to be updated. At this time, the V-PCF2 network element formulates the policy of the terminal for the terminal, which is described here in a unified manner, and will not be described in detail below.
  • the policy association creation response message 1 in the embodiment of the present application may, for example, create a response message 1 for policy control, which is not specifically limited in this embodiment of the present application.
  • the AMF1 network element sends a policy association deletion request 1 to the V-PCF1 network element, so that the V-PCF1 network element receives the policy association deletion request 1 from the AMF1 network element.
  • the policy association deletion request 1 is used to request the V-PCF1 network element to delete the policy association created by the AMF1 network element and the V-PCF1 network element.
  • the policy association deletion request 1 includes indication information 2, which is used to instruct the V-PCF1 network element to delete the policy of the terminal stored in the V-UDR1 network element.
  • the policy association deletion request 1 in the embodiment of the present application may be, for example, a policy control deletion request (policy control delete request) message 1, which is not specifically limited in this embodiment of the present application.
  • policy control delete request policy control delete request
  • the V-PCF1 network element sends a delete request to the V-UDR1 network element, so that the V-UDR1 network element receives the delete request from the V-PCF1 network element.
  • the deletion request is used to request to delete the policy of the terminal stored in the V-UDR1 network element.
  • the V-UDR1 network element may directly delete the policy of the terminal stored in the V-UDR1 network element.
  • the V-UDR1 network element may not receive the policy request or policy of the terminal sent by other V-PCF network elements within a preset time.
  • the policy of the terminal stored in the V-UDR1 network element is deleted.
  • a V-UDR1 network element may start a timer after receiving a delete request from a V-PCF1 network element. If the V-UDR1 network element does not receive the V-PCF network element's If the terminal requests a policy or a policy update, the V-UDR1 network element may delete the policy of the terminal stored in the V-UDR1 network element.
  • the embodiment of the present application does not limit the manner for determining the timer time.
  • the V-UDR1 network element sends a deletion response to the V-PCF1 network element, so that the V-PCF1 network element receives the deletion response from the V-UDR1 network element.
  • the deletion response is used to indicate that the V-UDR1 network element has deleted the saved policy of the terminal.
  • the V-PCF1 network element sends a policy association deletion response 1 to the AMF1 network element, so that the AMF1 network element receives the policy association deletion response 1 from the V-PCF1 network element.
  • the policy association deletion response 1 is used to indicate that the policy association created by the AMF1 network element and the V-PCF1 network element before the V-PCF1 network element has been deleted.
  • the policy association deletion response 1 in the embodiment of the present application may be, for example, a policy control deletion response message 1. This embodiment of the present application does not specifically limit this.
  • the V-PCF1 network element sends a policy association deletion request 2 to the H-PCF1 network element.
  • the policy association deletion request 2 is used to request the H-PCF1 network element to delete the policy association created by the H-PCF1 network element and the H-PCF1 network element.
  • the policy association deletion request 2 in the embodiment of the present application may be, for example, a policy control deletion request message 2, which is not specifically limited in this embodiment of the present application.
  • the H-PCF1 network element sends an update request 1 to the H-UDR network element, so that the H-UDR network element receives the update request 1 from the H-PCF1 network element.
  • the update request 1 is used for an H-UDR network element that stores a policy of a terminal maintained by the H-PCF1 network element.
  • the H-UDR network element sends an update response 1 to the H-PCF1 network element, so that the H-PCF1 network element receives the update response 1 from the H-UDR network element.
  • the H-PCF1 network element sends a policy association deletion response 2 to the V-PCF1 network element.
  • the policy association deletion response 2 is used to indicate that the H-PCF1 network element and the H-PCF1 network element create a policy association before the H-PCF1 network element has been deleted.
  • the policy association deletion response 2 in the embodiment of the present application may be, for example, a policy control deletion request response 2, which is not specifically limited in this embodiment of the present application.
  • the AMF2 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF2 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and thus can prompt the V-PCF1 network element to delete the -UDR1 network element
  • the saved terminal strategy can therefore save storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S601 to S625 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the home routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example. It is assumed that the terminal is connected to the AMF1 network. Element, V-PCF1 element, and V-UDR1 element, etc., leave VPLMN1, enter AMF3 element, H-PCF1 element, UDM element, and H-UDR element, as shown in Figure 7. As shown, a policy control method provided by an embodiment of the present application includes the following steps:
  • the terminal moves, and sends a registration request message to the AMF3 network element through the access device in the HPLMN, so that the AMF3 network element receives the registration request message from the terminal.
  • S702-S707 is similar to steps S602-S607 in FIG. 6, except that the AMF2 network element in VPLMN2 in steps S602-S607 is replaced with the AMF3 network element in HPLMN in the embodiment of the present application. With reference to the embodiment shown in FIG. 6, details are not described herein again.
  • the AMF3 network element Since the AMF3 network element does not receive the identity of the V-PCF1 network element, the AMF3 network element reselects the H-PCF network element. Assuming that it is an H-PCF2 network element, the AMF3 network element sends a policy association to the H-PCF2 network element. A creation request message, so that the H-PCF2 network element receives a policy association creation request from an AMF3 network element, and the policy association creation request message is used to request the creation of a policy association.
  • the policy association creation request message in the embodiment of the present application may be, for example, a policy control creation request message, which is not specifically limited in this embodiment of the present application.
  • the H-PCF2 network element sends a policy association creation response message to the AMF3 network element, so that the AMF3 network element receives the policy association creation response message from the H-PCF2 network element.
  • the policy association creation response message in the embodiment of the present application may, for example, create a response message for policy control, which is not specifically limited in this embodiment of the present application.
  • the H-PCF2 network element sends a query request to the H-UDR network element, so that the H-UDR network element receives the query request from the H-PCF2 network element.
  • the query request is used to request a policy for the terminal stored in the H-UDR network element.
  • the H-UDR network element sends a query response to the H-PCF2 network element, so that the H-PCF2 network element receives the query response 2 from the H-UDR network element.
  • the query response includes the policy of the terminal stored in the H-UDR network element; otherwise, the policy of the terminal is not included in the query response.
  • the H-PCF2 network element determines a policy for updating the terminal, the H-PCF2 network element sends an N1N2 message transmission request to the AMF3 network element, so that the AMF3 network element receives the N1N2 message transmission request from the H-PCF2 network element .
  • the N1N2 message transmission request includes an updated terminal policy of the H-PCF2 network element, which is not specifically limited in this embodiment of the present application.
  • the policy association creation response message in the embodiment of the present application may, for example, create a response message for policy control, which is not specifically limited in this embodiment of the present application.
  • S713-S720 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • the AMF3 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF3 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and thus can prompt the V-PCF1 network element to delete the V-UDR1 network element.
  • the strategy of the terminal can therefore save the storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S701 to S721 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example. It is assumed that the HPLMN of the terminal includes H -PCF1 network element and H-UDR network element, the terminal initiates the de-registration process at VPLMN1 where AMF1 network element, V-PCF1 network element, and V-UDR1 network element are located, as shown in Figure 8,
  • a policy control method provided in an embodiment of the present application includes the following steps:
  • the terminal sends a de-registration request (de-registration request) message to the AMF1 network element through the access device in VPLMN1, so that the AMF1 network element receives the de-registration request message from the terminal.
  • the deregistration request message is used to request deregistration of the execution terminal.
  • the AMF1 network element after the AMF1 network element receives the deregistration request message from the terminal, it can learn that the terminal leaves the VPLMN1 where the AMF1 network element is located, which is described here in a unified manner, and will not be described in detail below.
  • S802-S809 are the same as steps S617-S624 in FIG. 6. For related description, refer to the embodiment shown in FIG. 6, and details are not described herein again.
  • the AMF1 network element sends a de-registration acceptance message to the terminal through the access device, so that the terminal receives the de-registration acceptance message from the AMF1 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and thus can instruct the V-PCF1 network element to delete the terminal stored in the V-UDR1 network element in time. This strategy can save storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S801 to S811 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example.
  • the HPLMN of the terminal includes a UDM
  • a policy control method according to an embodiment of the present application includes the following steps:
  • the UDM network element sends a de-registration notification to the AMF1 network element, so that the AMF1 network element receives the de-registration notification from the UDM network element.
  • the deregistration notification is used to notify the AMF1 network element to perform deregistration of the terminal.
  • the AMF1 network element after receiving the deregistration notification from the UDM network element, the AMF1 network element can learn that the terminal leaves the VPLMN1 where the AMF1 network element is located, which will be collectively described here, and will not be described in detail below.
  • the AMF1 network element sends a de-registration response (de-registration acknowledgement) to the UDM network element, so that the UDM network element receives the de-registration response from the AMF1 network element.
  • the terminal sends a de-registration request (de-registration request) message to the AMF1 network element through the access device in VPLMN1, so that the AMF1 network element receives the de-registration request message from the terminal.
  • the deregistration request message is used to request deregistration of the execution terminal.
  • step S903 it is not necessary to perform step S903, but the AMF1 network element performs implicit deregistration, which is not specifically limited in the embodiment of the present application.
  • S904-S911 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • step S912 the AMF1 network element sends a de-registration acceptance message to the terminal through the access device, so that the terminal receives the de-registration acceptance message from the AMF1 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and then can prompt the V-PCF1 network element to delete the V-UDR1 network element The strategy of the terminal can therefore save the storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S901 to S913 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 4 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example.
  • the HPLMN of the terminal includes a UDM Network element, H-PCF1 network element, H-PCF2 network element, and H-UDR network element
  • the terminal performs relocation of AMF network element in VPLMN1, and reselects from AMF4 network element in source area in VPLMN1 to VPLMN1
  • the AMF1 network element in the target area, the source area in VPLMN1 also includes the V-PCF4 network element and the V-UDR1 network element, and the target area in VPLMN1 also includes the V-PCF1 network element and the V-UDR1 network element, as shown in the figure.
  • a policy control method includes the following steps:
  • the terminal moves, and sends a registration request message to the AMF1 network element through the access device in VPLMN1, so that the AMF1 network element receives the registration request message from the terminal.
  • the AMF1 network element sends a context transmission request message to the AMF4 network element, so that the AMF4 network element receives the context transmission request message from the AMF1 network element, and the context transmission request message is used to request the context of the terminal.
  • the AMF4 network element after the AMF4 network element receives the context transmission request message from the AMF1 network element, it can learn that the terminal has reselected the AMF network element in the VPLMN1, which will be described collectively here, and will not be described in detail below.
  • the AMF4 network element sends a context transmission response message to the AMF1 network element, so that the AMF1 network element receives the context transmission response message from the AMF4 network element.
  • the context transmission response message includes the context of the terminal.
  • the context of the terminal sent by the AMF4 network element to the AMF1 network element includes the identity of the V-PCF4 network element in the source area.
  • the context transmission response message further includes an identifier of the V-UDR1 network element that stores the policy of the terminal in VPLMN1.
  • the V-UDR1 network element is a V-UDR network element selected by the V-PCF network element selected when the terminal first accesses the VPLMN1, and the V-PCF network element initially selected will identify the V-UDR1 network element. It is sent to the AMF network element selected by the terminal when it initially accesses the VPLMN1. When the initial AMF network element performs the AMF network element reselection in VPLMN1, the identity of the V-UDR1 network element is provided to the latest AMF network element.
  • the V-UDR1 is stored in the current AMF4 network element.
  • the identification of the network element is taken as an example.
  • the AMF4 network element may be the AMF network element selected when the terminal first accesses the VPLMN1, or may be the latest AMF network element before the reselection of the AMF network element occurs. This embodiment of the present application does not specifically limit this.
  • S1004-S1007 are similar to steps S604-S607 in FIG. 6, except that the AMF2 network element in VPLMN2 in steps S604-S607 is replaced with the AMF1 network element in VPLMN1 in the embodiment of the present application, and step S604- The AMF1 network element in VPLMN1 in S607 is replaced with the AMF4 network element in VPLMN1 in the embodiment of the present application.
  • the AMF1 network element receives the identity of the V-PCF4 network element, the AMF1 network element still reselects the V-PCF network element and the H-PCF network element, assuming that it is the V-PCF1 network element and the H-PCF2 network element, respectively.
  • the AMF1 network element sends a policy association creation request message 1 to the V-PCF1 network element, so that the V-PCF1 network element receives the policy association creation request message 1 from the AMF1 network element, and the policy association creation request message 1 is used to request the creation of a policy.
  • the policy association creation request message 1 further includes the identity of the V-UDR1 network element obtained in step S1003.
  • the policy association creation request message 1 in the embodiment of the present application may be, for example, a policy control creation request message 1, which is not specifically limited in this embodiment of the present application.
  • the V-PCF1 network element sends a policy association creation response message 1 to the AMF1 network element, so that the AMF1 network element receives the policy association creation response message 1 from the V-PCF1 network element.
  • the policy association creation response message 1 in the embodiment of the present application may, for example, create a response message 1 for policy control, which is not specifically limited in this embodiment of the present application.
  • the V-PCF1 network element sends a query request 1 to the V-UDR1 network element corresponding to the identity of the V-UDR1 network element, so that the V-UDR1 network element receives the query request 1 from the V-PCF1 network element.
  • the query request 1 is used to request a policy of a terminal stored in a V-UDR1 network element.
  • the V-UDR1 network element sends a query response 1 to the V-PCF1 network element, so that the V-PCF1 network element receives the query response 1 from the V-UDR1 network element.
  • the query response 1 includes the policy of the terminal stored in the V-UDR1 network element; otherwise, the query response 1 does not include the terminal's policy.
  • S1012-S1015 are similar to steps S612-S615 in FIG. 6, except that the V-PCF2 network element in steps S612-S615 is replaced with the V-PCF1 network element in the embodiment of the present application.
  • the V-PCF2 network element in steps S612-S615 is replaced with the V-PCF1 network element in the embodiment of the present application.
  • the embodiment shown in FIG. 6 is not repeated here.
  • the V-PCF1 network element sends an N1N2 message transmission request to the AMF1 network element, so that the AMF1 network element receives the N1N2 message transmission request from the V-PCF1 network element.
  • the N1N2 message transmission request includes the updated V-PCF1 network element. Endpoint strategy.
  • the N1N2 message transmission request includes the updated H-PCF2 network element.
  • the policy of the terminal is not specifically limited in this embodiment of the present application.
  • the policy association creation response message 1 in the embodiment of the present application may, for example, create a response message 1 for policy control, which is not specifically limited in this embodiment of the present application.
  • the AMF4 network element sends a policy association deletion request 1 to the V-PCF4 network element, so that the V-PCF4 network element receives the policy association deletion request 1 from the AMF4 network element.
  • the policy association deletion request 1 is used to request the V-PCF4 network element to delete the policy association created by the AMF4 network element and the V-PCF4 network element.
  • the policy association deletion request 1 in the embodiment of the present application may be, for example, a policy control deletion request message 1, which is not specifically limited in this embodiment of the present application.
  • the V-PCF4 network element sends a policy association deletion response 1 to the AMF4 network element, so that the AMF4 network element receives the policy association deletion response 1 from the V-PCF4 network element.
  • the policy association deletion response 1 is used to indicate that the policy association created by the AMF4 network element and the V-PCF4 network element before the V-PCF4 network element has been deleted.
  • the policy association deletion response 1 in the embodiment of the present application may be, for example, a policy control deletion response message 1, which is not specifically limited in this embodiment of the present application.
  • S1019-S1022 is similar to steps S621-S624 in FIG. 6, except that the V-PCF1 network element in steps S621-S624 is replaced with the V-PCF4 network element in the embodiment of the present application.
  • the V-PCF1 network element in steps S621-S624 is replaced with the V-PCF4 network element in the embodiment of the present application.
  • the embodiment shown in FIG. 6 is not repeated here.
  • the AMF1 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF1 network element.
  • the AMF1 network element in VPLMN1 can obtain the identity of the V-UDR1 network element in VPLMN1 from the AMF4 network element in VPLMN1, and
  • the identity of the V-UDR1 network element is sent to the newly selected V-PCF1 network element, so that the V-PCF1 network element can obtain the terminal's identity from the V-UDR1 network element corresponding to the identity of the V-UDR1 network element.
  • the terminal moves between different AMF network elements in VPLMN1, it is guaranteed that different V-PCFs can find the same V-UDR1 network element, and the terminal can be obtained from the V-UDR1.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S1001 to S1023 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the HPLMN of the terminal includes the UDM network element, H-PCF1 network element, and H-UDR network element in FIG. 10, and the AMF network element selected when the terminal first accesses VPLMN1 shown in FIG. 10 is
  • the AMF4 network element is taken as an example to provide a policy control method provided in the embodiment of the present application. As shown in FIG. 11, the method includes the following steps:
  • the terminal sends a registration request message to the AMF4 network element through the access device in VPLMN1, so that the AMF4 network element receives the registration request message from the terminal.
  • the AMF4 network element registers with the UDM network element, and obtains the contract data of the terminal.
  • the AMF4 network element after the AMF4 network element is registered with the UDM network element, it may also subscribe to the contract data modification notification.
  • the AMF4 network element may also subscribe to the contract data modification notification.
  • AMF4 network element selects V-PCF network element and H-PCF network element, assuming V-PCF4 network element and H-PCF1 network element respectively, then AMF4 network element sends policy association creation request 1 to V-PCF4 network element, In this way, the V-PCF4 network element receives a policy association creation request message 1 from the AMF4 network element, and the policy association creation request message 1 is used to request the creation of a policy association.
  • the policy association creation request message 1 in the embodiment of the present application may be, for example, a policy control creation request message 1, which is not specifically limited in this embodiment of the present application.
  • the policy association creation request message 1 may further include indication information 1, which is used to instruct the terminal to register to VPLMN1 where the V-PCF4 network element is located, which is not described in this embodiment of the present application. Specific limitations.
  • S1104-S1111 is similar to steps S609-S616 in FIG. 6, except that the V-PCF2 network element in steps S609-S616 is replaced with the V-PCF4 network element in the embodiment of the present application, and the steps S609-S616 are replaced.
  • AMF2 network element is replaced by the AMF4 network element in the embodiment of the present application
  • the V-UDR2 network element in steps S609-S616 is replaced by the V-UDR1 network element in the embodiment of the present application.
  • the H in step S609-S616 is replaced by -The PCF2 network element is replaced with the H-PCF1 network element in the embodiment of the present application.
  • the policy association creation response message 1 in step S1104 in the embodiment of the present application may further include the identification of the V-UDR1 network element, so that the AMF4 network element stores the identification of the V-UDR1 network element. Not specifically limited.
  • the V-PCF4 network element may also send the identification of the V-UDR1 network element to the AMF4 network element through a newly defined message, which is not specifically limited in this embodiment of the present application.
  • step S1103 includes the indication information 1
  • the AMF4 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF4 network element.
  • the AMF4 network element initiates a paging, and the terminal initiates a service request process to enter the connected state.
  • the AMF4 network element When the terminal is in a connected state, the AMF4 network element provides the terminal with the received terminal policy.
  • S1115 The terminal updates the policy of the terminal, and returns the result of the policy update of the terminal to the AMF4 network element.
  • the AMF4 network element sends a N1 message notification to the V-PCF4 network element, so that the V-PCF4 network element receives the N1 message notification from the AMF4 network element.
  • the N1 message is used to indicate the result of the policy update of the terminal.
  • the AMF4 network element that the terminal initially accesses can obtain the V-UDR1 network selected by the V-PCF4 network element that the terminal initially selects when accessing the VPLMN1.
  • Element identification so that when subsequent terminals reselect AMF network elements in VPLMN1, the V-UDR1 network element identification can be provided to the latest AMF network element, and the latest AMF network element to the latest V-PCF The network element, and thus the latest V-PCF network element, can obtain the terminal's policy from the V-UDR1 network element corresponding to the identity of the V-UDR1 network element.
  • the terminal can be used for different AMF network elements in VPLMN1.
  • V-PCFs When moving from time to time, it is guaranteed that different V-PCFs can find the same V-UDR1 network element, and then the terminal's policy can be obtained from the V-UDR1.
  • the actions of the AMF4 network element or the V-PCF4 network element in the above steps S1101 to S1116 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control method shown in FIG. 11 may be executed first to enable the terminal to access the VPLMN1 network, and then in the case where the AMF network element reselection occurs in VPLMN1, the execution shown in FIG. 10 is performed. Policy control method; further, when the terminal leaves VPLMN1 where the AMF1 network element is located, the policy control method shown in FIG. 6, FIG. 7, FIG. 8 or FIG. 9 is executed, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element or the policy control network element includes a hardware structure and / or a software module corresponding to each function.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the first mobile management network element or the policy control network element may be divided into functional modules according to the foregoing method example.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated.
  • a processing module In a processing module.
  • the above integrated modules may be implemented in the form of hardware or software functional modules. It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • FIG. 12 shows a schematic structural diagram of a first mobility management network element 120.
  • the first mobility management network element 120 is a mobility management network element of the first visited network, and includes: a processing module 1201 and a transceiver module 1202.
  • the processing module 1201 is configured to determine that the terminal leaves the first visited network;
  • the transceiver module 1202 is configured to send instruction information to the policy control network element of the first visited network, and the instruction information is used to instruct the policy control network element to delete the first visit The policy of the terminal stored in the unified database network element of the local network.
  • the processing module 1201 is specifically configured to: receive a first context transmission request message from a second mobility management network element of the second visited network, and the first context transmission request message is used to request the context of the terminal.
  • the processing module 1201 is specifically configured to receive a second context transmission request message from a third mobility management network element of the terminal's home network, and the second context transmission request message is used to request to obtain the context of the terminal.
  • the processing module 1201 is specifically configured to receive a deregistration request from the terminal, and the deregistration request is used to request the deregistration of the terminal to be performed.
  • the processing module 1201 is specifically configured to receive a deregistration notification from the data management network element, and the deregistration notification is used to notify the first mobile management network element to perform deregistration of the terminal.
  • the transceiver module 1202 is further configured to receive a registration request from a terminal.
  • the transceiver module 1202 is further configured to send a third context transmission request message to a fourth mobility management network element in the first visited network, where the third context transmission request message is used to request the context of the terminal.
  • the transceiver module 1202 is further configured to receive a context transmission response from the fourth mobility management network element, where the context transmission response includes an identifier of a unified database network element.
  • the transceiver module 1202 is further configured to send the identity of the unified database network element to the policy control network element, and the identity of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the transceiver module 1202 is further configured to receive a registration request from a terminal.
  • the transceiver module 1202 is further configured to send a policy association creation request message to the policy control network element.
  • the transceiver module 1202 is further configured to receive the identity of the unified database network element from the policy control network element.
  • the transceiver module 1202 is further configured to receive a fourth context transmission request message from a fifth mobility management network element in the first visited network, and the fourth context transmission request message is used to request the context of the terminal.
  • the transceiver module 1202 is further configured to send a context transmission response to the fifth mobility management network element, where the context transmission response includes an identifier of the unified database network element, and the identifier of the unified database network element is used to obtain a policy of the terminal from the unified database network element.
  • the first mobility management network element 120 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the first mobility management network element 120 may adopt the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may cause a first mobile management network element 120 to execute the policy control method in the foregoing method embodiment by calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the transceiver module 1202 and the processing module 1201 in FIG. 12 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1201 in FIG. 12 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation process of the transceiver module 1202 in FIG. 12 may be performed through the graph. 5 to implement the communication interface 504.
  • the first mobility management network element 120 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a first mobility management network element to implement the foregoing policy control method, such as determining that a terminal leaves.
  • the first visited network In one possible design, the device further includes a memory.
  • the memory is used to store program instructions and data necessary for the first mobility management network element. Of course, the memory may not be in the device.
  • the device is a chip system, the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • FIG. 13 shows a schematic structural diagram of a policy control network element 130.
  • the policy control network element 130 is a policy control network element of the first visited network, and includes a receiving module 1301 and a sending module 1302.
  • a receiving module 1301 is configured to receive instruction information from a first mobile management network element of a first visited network, where the instruction information is used to instruct a policy control network element 130 to delete a terminal stored in a unified database network element of the first visited network.
  • the sending module 1302 is configured to send a delete request message to the unified database network element according to the instruction information, and the delete request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the policy control network element 130 further includes a processing module 1303.
  • the receiving module 1301 is further configured to receive an identifier of a unified database network element from the first mobility management network element.
  • the processing module 1303 is configured to obtain a policy of the terminal from the unified database network element corresponding to the identifier of the unified database network element.
  • the receiving module 1301 is further configured to receive a policy association creation request message from the first mobility management network element.
  • the processing module 1303 is further configured to select a unified database network element storage strategy for the terminal.
  • the sending module 1302 is further configured to send the identifier of the unified database network element to the first mobility management network element.
  • the policy control network element 130 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the policy control network element 130 may take the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may cause the policy control network element 130 to execute the policy control method in the foregoing method embodiment by calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the receiving module 1301, the sending module 1302, and the processing module 1303 in FIG. 13 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1303 in FIG. 13 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation of the receiving module 1301 and the sending module 1302 in FIG. 13
  • the process may be implemented through the communication interface 504 in FIG. 5.
  • the policy control network element 130 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a policy control network element to implement the foregoing policy control method, for example, selecting a unified database network element. Save the policy of the terminal.
  • the device further includes a memory. This memory is used to store program instructions and data necessary for the policy control network element. Of course, the memory may not be in the device.
  • the device is a chip system, the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • FIG. 14 shows a schematic structural diagram of a first mobility management network element 140.
  • the first mobility management network element 140 is a mobility management network element of the first visited network, and includes a receiving module 1401 and a sending module 1402.
  • the receiving module 1401 is configured to receive a registration request from a terminal.
  • the sending module 1402 is configured to send a first context transmission request to a second mobility management network element in the first visited network, and the first context transmission request message is used to request to obtain the context of the terminal.
  • the receiving module 1401 is further configured to receive a context transmission response from the second mobility management network element, where the context transmission response includes an identifier of a unified database network element of the first visited network.
  • the sending module 1402 is further configured to send the identity of the unified database network element to the policy control network element of the first visited network, and the identity of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the first mobility management network element 140 further includes: a processing module 1403.
  • the processing module 1403 is configured to determine that the terminal leaves the first visited network.
  • the sending module 1402 is configured to send instruction information to the policy control network element, where the instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element.
  • the processing module 1403 is specifically configured to: receive a second context transmission request message from a third mobility management network element of the second visited network, and the second context transmission request message is used to request the context of the terminal.
  • the processing module 1403 is specifically configured to: receive a third context transmission request message from a fourth mobility management network element of the terminal's home network, and the third context transmission request message is used to request the context of the terminal.
  • the processing module 1403 is specifically configured to: receive a deregistration request from the terminal, and the deregistration request is used to request the deregistration of the terminal to be performed.
  • the processing module 1403 is specifically configured to receive a deregistration notification from the data management network element, and the deregistration notification is used to notify the first mobile management network element to perform deregistration of the terminal.
  • the first mobility management network element 140 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the first mobility management network element 140 may adopt the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may cause the first mobility management network element 140 to execute the policy control method in the foregoing method embodiment by calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the receiving module 1401, the sending module 1402, and the processing module 1403 in FIG. 14 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1403 in FIG. 14 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation of the receiving module 1401 and the sending module 1402 in FIG. 14
  • the process may be implemented through the communication interface 504 in FIG. 5.
  • the first mobility management network element 140 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a first mobility management network element to implement the foregoing policy control method, such as determining that a terminal leaves The first visited network.
  • the device further includes a memory.
  • the memory is used to store program instructions and data necessary for the first mobility management network element.
  • the memory may not be in the device.
  • the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • FIG. 15 shows a schematic structural diagram of a policy control network element 150.
  • the policy control network element 150 is a policy control network element of the first visited network, and includes a transceiver module 1502 and a processing module 1501.
  • the transceiver module 1502 is configured to receive a policy association creation request message from a first mobile management network element of the first visited network, where the policy association creation request message includes an identifier of a unified database network element of the first visited network.
  • the processing module 1501 is configured to obtain a policy of the terminal from the unified database network element corresponding to the identifier of the unified database network element.
  • the transceiver module 1502 is further configured to receive instruction information from the first mobility management network element, where the instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element.
  • the transceiver module 1502 is further configured to send a delete request message to the unified database network element according to the instruction information, and the delete request message is used to request a policy for deleting the terminal stored in the unified database network element.
  • the policy control network element 150 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the policy control network element 150 may adopt the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may invoke a computer execution instruction stored in the memory 503 to cause the policy control network element 150 to execute the policy control method in the foregoing method embodiment.
  • the function / implementation process of the transceiver module 1502 and the processing module 1501 in FIG. 15 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1501 in FIG. 15 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation process of the transceiver module 1502 in FIG. 15 may be performed through the graph. 5 to implement the communication interface 504.
  • the policy control network element 150 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a policy control network element to implement the policy control method, for example, from a unified database network element The strategy of obtaining the terminal by the unified database network element corresponding to the identification of the.
  • the device further includes a memory. This memory is used to store program instructions and data necessary for the policy control network element. Of course, the memory may not be in the device.
  • the device is a chip system, the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, a computer, a server, or a data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, and the like that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供策略控制方法、设备及系统,使得可以节省V-UDR网元的存储资源。该策略控制方法包括:第一拜访地网络的第一移动管理网元确定该终端离开该第一拜访地网络;该第一移动管理网元向该第一拜访地网络的策略控制网元发送指示信息,该指示信息用于指示该策略控制网元删除该第一拜访地网络的统一数据库网元中保存的该终端的策略。

Description

策略控制方法、设备及系统
本申请要求于2018年8月13日提交中国国家知识产权局、申请号为201810916262.0、发明名称为“策略控制方法、设备及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及策略控制方法、设备及系统。
背景技术
目前,第三代合作伙伴计划(3rd generation partnership project,3GPP)标准组讨论的第五代(5th generation,5G)网络中,接入和移动性管理功能(access and mobility management function,AMF)网元和策略控制功能(policy control function,PCF)网元可以交互,以便获取终端的策略以及接入和移动性管理策略等。
比如,在家乡路由或本地疏导两种漫游场景下,漫游用户的终端在注册到一个拜访地公共陆地移动网络(visited public land mobile network,VPLMN)的过程中,位于终端拜访地的AMF网元通过终端拜访地的PCF(visited-PCF,V-PCF)网元与终端归属地的PCF(home-PCF,H-PCF)网元进行交互,以使得位于终端拜访地的AMF网元可以获得该终端的策略以及接入和移动性管理策略等。其中,该终端的策略可以是由V-PCF网元为该终端制定的,并且,V-PCF网元可以将该V-PCF网元制定的该终端的策略保存在拜访地统一数据库(visited-unified data repository,V-UDR)中。
然而,当漫游用户的终端从当前AMF网元所在的VPLMN离开时,由于原来的(old)AMF网元和新的(new)AMF网元不在同一个VPLMN中,即该终端已经离开了原来的VPLMN,而是否将来还会接入到该VPLMN也是未知的。因此,如何处理可以节省V-UDR网元的存储资源是目前亟待解决的问题。
发明内容
本申请实施例提供策略控制方法、设备及系统,使得可以节省V-UDR网元的存储资源。
为达到上述目的,本申请的实施例采用如下技术方案:
第一方面,提供了一种策略控制方法,该策略控制方法包括:第一拜访地网络的第一移动管理网元确定该终端离开该第一拜访地网络;该第一移动管理网元向该第一拜访地网络的策略控制网元发送指示信息,该指示信息用于指示该策略控制网元删除该第一拜访地网络的统一数据库网元中保存的该终端的策略。基于本申请实施例提供的策略控制方法,由于第一移动管理网元可以在确定终端离开第一拜访地网络之后,可以及时指示策略控制网元删除第一拜访地网络的统一数据库网元中保存的终端的策略,因此可以节省第一拜访地网络的统一数据库网元中的存储资源。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自第二拜访地网络的第二移动管理网元的第一上下文传输 请求消息,该第一上下文传输请求消息用于请求获取该终端的上下文。也就是说,本申请实施例中,终端可以从一个拜访地网络移动到另外一个拜访地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自该终端的归属网络的第三移动管理网元的第二上下文传输请求消息,该第二上下文传输请求消息用于请求获取该终端的上下文。也就是说,本申请实施例中,终端可以从拜访地网络移动到终端的归属地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自该终端的去注册请求,该去注册请求用于请求执行该终端的去注册。也就是说,本申请实施例中,终端可以发起终端的去注册,使得终端离开当前所在的第一拜访地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自数据管理网元的去注册通知,该去注册通知用于通知该第一移动管理网元执行该终端的去注册。也就是说,本申请实施例中,网络侧可以发起终端的去注册,使得终端离开当前所在的第一拜访地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,在该第一移动管理网元确定该终端离开该第一拜访地网络之前,该策略控制方法还包括:该第一移动管理网元接收来自该终端的注册请求;该第一移动管理网元向该第一拜访地网络中的第四移动管理网元发送第三上下文传输请求消息,该第三上下文传输请求消息用于请求获取该终端的上下文;该第一移动管理网元接收来自该第四移动管理网元的上下文传输响应,该上下文传输响应包括该统一数据库网元的标识;该第一移动管理网元向该策略控制网元发送该统一数据库网元的标识,该统一数据库网元的标识用于从该统一数据库网元获取该终端的策略。基于本申请实施例提供的策略控制方法,由于第一拜访地网络的第一移动管理网元在接收来自终端的注册请求之后,可以从第一拜访地网络的第四移动管理网元中获取第一拜访地网络的统一数据库网元的标识,并在创建策略关联时将该统一数据库网元的标识发送给策略控制网元,使得策略控制网元可以从该统一数据库网元的标识对应的统一数据库网元获取终端的策略。因此基于该方案,可以使得终端在同一个拜访地网络的不同移动管理网元之间移动时,保证不同的策略控制网元可以找到同一个统一数据库网元,进而可以从该统一数据库网元中获取该终端的策略。
在一种可能的设计中,在该第一移动管理网元确定该终端离开该第一拜访地网络之前,该策略控制方法还包括:该第一移动管理网元接收来自该终端的注册请求;该第一移动管理网元向该策略控制网元发送策略关联创建请求消息;该第一移动管理网元接收来自该策略控制网元的该统一数据库网元的标识。也就是说,本申请实施例中,终端在注册到第一拜访地网络时,终端最初接入的第一移动管理网元可以获取终端最初接入该第一拜访地网络时所选择的策略控制网元选择的统一数据库网元的标识。
在一种可能的设计中,该策略控制方法还包括:该第一移动管理网元接收来自该第一拜访地网络中的第五移动管理网元的第四上下文传输请求消息,该第四上下文传输请求消息用于请求获取该终端的上下文;该第一移动管理网元向该第五移动管理网元发送上下文 传输响应,该上下文传输响应包括该统一数据库网元的标识,该统一数据库网元的标识用于从该统一数据库网元获取该终端的策略。基于本申请实施例提供的策略控制方法,由于终端在注册到第一拜访地网络时,终端最初接入的第一移动管理网元可以获取终端最初接入该第一拜访地网络时所选择的策略控制网元选择的统一数据库网元的标识,使得后续终端在第一拜访地网络内发生移动管理网元的重选时,可以将该统一数据库网元的标识提供给最新的移动管理网元,由最新的移动管理网元提供给最新的第一拜访地网络的策略控制网元,进而最新的第一拜访地网络的策略控制网元可以从该统一数据库网元的标识对应的统一数据库网元获取终端的策略。因此基于该方案,可以使得终端在同一个拜访地网络的不同移动管理网元之间移动时,保证不同的策略控制网元可以找到同一个统一数据库网元,进而可以从该统一数据库网元中获取该终端的策略。
第二方面,提供了一种策略控制方法,该策略控制方法包括:第一拜访地网络的策略控制网元接收来自该第一拜访地网络的第一移动管理网元的指示信息,该指示信息用于指示该策略控制网元删除该第一拜访地网络的统一数据库网元中保存的终端的策略;该策略控制网元根据该指示信息,向该统一数据库网元发送删除请求消息,该删除请求消息用于请求删除该统一数据库网元中保存的该终端的策略。基于本申请实施例提供的策略控制方法,由于第一移动管理网元可以在确定终端离开第一拜访地网络之后,可以及时指示策略控制网元删除第一拜访地网络的统一数据库网元中保存的终端的策略,因此可以节省第一拜访地网络的统一数据库网元中的存储资源。
在一种可能的设计中,在该策略控制网元接收来自该第一拜访地网络的第一移动管理网元的指示信息之前,该策略控制方法还包括:该策略控制网元接收来自该第一移动管理网元的该统一数据库网元的标识;该策略控制网元从该统一数据库网元的标识对应的该统一数据库网元获取该终端的策略。基于本申请实施例提供的策略控制方法,由于第一拜访地网络的第一移动管理网元可以在创建策略关联时将第一拜访地网络的统一数据库网元的标识发送给策略控制网元,使得策略控制网元可以从该统一数据库网元的标识对应的统一数据库网元获取终端的策略。因此基于该方案,可以使得终端在同一个拜访地网络的不同移动管理网元之间移动时,保证不同的策略控制网元可以找到同一个统一数据库网元,进而可以从该统一数据库网元中获取该终端的策略。
在一种可能的设计中,在该策略控制网元接收来自该第一拜访地网络的第一移动管理网元的指示信息之前,该策略控制方法还包括:该策略控制网元接收来自该第一移动管理网元的策略关联创建请求消息;该策略控制网元选择该统一数据库网元保存该终端的策略;该策略控制网元向该第一移动管理网元发送该统一数据库网元的标识。基于本申请实施例提供的策略控制方法,第一移动管理网元可以在创建策略关联时,获取统一数据库网元的标识。
第三方面,提供了一种策略控制方法,该策略控制方法包括:第一拜访地网络的第一移动管理网元接收来自终端的注册请求;该第一移动管理网元向该第一拜访地网络中的第二移动管理网元发送第一上下文传输请求,该第一上下文传输请求消息用于请求获取该终端的上下文;该第一移动管理网元接收来自该第二移动管理网元的上下文传输响应,该上下文传输响应包括该第一拜访地网络的统一数据库网元的标识;该第一移动管理网元向该 第一拜访地网络的策略控制网元发送该统一数据库网元的标识,该统一数据库网元的标识用于从该统一数据库网元获取该终端的策略。基于本申请实施例提供的策略控制方法,由于第一拜访地网络的第一移动管理网元在接收来自终端的注册请求之后,可以从第一拜访地网络的第二移动管理网元中获取第一拜访地网络的统一数据库网元的标识,并可以将该统一数据库网元的标识发送给策略控制网元,使得策略控制网元可以从该统一数据库网元的标识对应的统一数据库网元获取终端的策略,因此基于该方案,可以使得终端在同一个拜访地网络的不同移动管理网元之间移动时,保证不同的策略控制网元可以找到同一个统一数据库网元,进而可以从该统一数据库网元中获取该终端的策略。
在一种可能的设计中,该策略控制方法还包括:该第一移动管理网元确定该终端离开该第一拜访地网络;该第一移动管理网元向该策略控制网元发送指示信息,该指示信息用于指示该策略控制网元删除统一数据库网元中保存的该终端的策略。基于本申请实施例提供的策略控制方法,由于第一移动管理网元可以在确定终端离开第一拜访地网络之后,可以及时指示策略控制网元删除第一拜访地网络的统一数据库网元中保存的终端的策略,因此可以节省第一拜访地网络的统一数据库网元中的存储资源。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自第二拜访地网络的第二移动管理网元的第一上下文传输请求消息,该第一上下文传输请求消息用于请求获取该终端的上下文。也就是说,本申请实施例中,终端可以从一个拜访地网络移动到另外一个拜访地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自该终端的归属网络的第三移动管理网元的第二上下文传输请求消息,该第二上下文传输请求消息用于请求获取该终端的上下文。也就是说,本申请实施例中,终端可以从拜访地网络移动到终端的归属地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自该终端的去注册请求,该去注册请求用于请求执行该终端的去注册。也就是说,本申请实施例中,终端可以发起终端的去注册,使得终端离开当前所在的第一拜访地网络,本申请实施例对此不作具体限定。
在一种可能的设计中,该第一移动管理网元确定该终端离开该第一拜访地网络,具体为:该第一移动管理网元接收来自数据管理网元的去注册通知,该去注册通知用于通知该第一移动管理网元执行该终端的去注册。也就是说,本申请实施例中,网络侧可以发起终端的去注册,使得终端离开当前所在的第一拜访地网络,本申请实施例对此不作具体限定。
第四方面,提供了让一种策略控制方法,该策略控制方法包括:第一拜访地网络的策略控制网元接收来自该第一拜访地网络的第一移动管理网元的该第一拜访地网络的统一数据库网元的标识;该策略控制网元从该统一数据库网元的标识对应的该统一数据库网元获取该终端的策略。基于本申请实施例提供的策略控制方法,由于第一拜访地网络的第一移动管理网元可以将第一拜访地网络的统一数据库网元的标识发送给策略控制网元,使得策略控制网元可以从该统一数据库网元的标识对应的统一数据库网元获取终端的策略。因 此基于该方案,可以使得终端在同一个拜访地网络的不同移动管理网元之间移动时,保证不同的策略控制网元可以找到同一个统一数据库网元,进而可以从该统一数据库网元中获取该终端的策略。
在一种可能的设计中,该策略控制方法包括:该策略控制网元接收来自该第一移动管理网元的指示信息,该指示信息用于指示该策略控制网元删除该统一数据库网元中保存的终端的策略;该策略控制网元根据该指示信息,向该统一数据库网元发送删除请求消息,该删除请求消息用于请求删除该统一数据库网元中保存的该终端的策略。基于本申请实施例提供的策略控制方法,由于第一移动管理网元可以在确定终端离开第一拜访地网络之后,可以及时指示策略控制网元删除第一拜访地网络的统一数据库网元中保存的终端的策略,因此可以节省第一拜访地网络的统一数据库网元中的存储资源。
第五方面,提供了一种第一移动管理网元,该第一移动管理网元具有实现上述第一方面或第三方面所述的方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第六方面,提供了一种第一移动管理网元,包括:处理器和存储器;该存储器用于存储计算机执行指令,当该第一移动管理网元运行时,该处理器执行该存储器存储的该计算机执行指令,以使该第一移动管理网元执行如上述第一方面或第三方面中任一项所述的策略控制方法。
第七方面,提供了一种第一移动管理网元,包括:处理器;所述处理器用于与存储器耦合,并读取存储器中的指令之后,根据所述指令执行如上述第一方面或第三方面中任一项所述的策略控制方法。
第八方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第一方面或第三方面中任一项所述的策略控制方法。
第九方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第一方面或第三方面中任一项所述的策略控制方法。
第十方面,提供了一种装置(例如,该装置可以是芯片系统),该装置包括处理器,用于支持第一移动管理网元实现上述第一方面或第三方面中所涉及的功能,例如确定该终端离开第一拜访地网络。在一种可能的设计中,该装置还包括存储器,该存储器,用于保存第一移动管理网元必要的程序指令和数据。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件。
其中,第五方面至第十方面中任一种设计方式所带来的技术效果可参见第一方面或第三方面中不同设计方式所带来的技术效果,此处不再赘述。
第十一方面,提供了一种策略控制网元,该策略控制网元具有实现上述第二方面或第四方面所述的方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第十二方面,提供了一种策略控制网元,包括:处理器和存储器;该存储器用于存储计算机执行指令,当该策略控制网元运行时,该处理器执行该存储器存储的该计算机执行指令,以使该策略控制网元执行如上述第二方面或第四方面中任一项所述的策略控制方法。
第十三方面,提供了一种策略控制网元,包括:处理器;所述处理器用于与存储器耦合,并读取存储器中的指令之后,根据所述指令执行如上述第二方面或第四方面中任一项所述的策略控制方法。
第十四方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第二方面或第四方面中任一项所述的策略控制方法。
第十五方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第二方面或第四方面中任一项所述的策略控制方法。
第十六方面,提供了一种装置(例如,该装置可以是芯片系统),该装置包括处理器,用于支持策略控制网元实现上述第二方面或第四方面中所涉及的功能,例如从统一数据库网元的标识对应的统一数据库网元获取该终端的策略。在一种可能的设计中,该装置还包括存储器,该存储器,用于保存策略控制网元必要的程序指令和数据。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件。
其中,第十一方面至第十六方面中任一种设计方式所带来的技术效果可参见第二方面或第四方面中不同设计方式所带来的技术效果,此处不再赘述。
第十七方面,提供了一种策略控制系统,该策略控制系统包括:第一拜访地网络的第一移动管理网元和该第一拜访地网络的策略控制网元;该第一移动管理网元,用于确定该终端离开该第一拜访地网络;该第一移动管理网元,还用于向该第一拜访地网络的策略控制网元发送指示信息,该指示信息用于指示该策略控制网元删除该第一拜访地网络的统一数据库网元中保存的该终端的策略;该策略控制网元,用于接收来自该第一移动管理网元的该指示信息,并根据该指示信息,向该统一数据库网元发送删除请求消息,该删除请求消息用于请求删除该统一数据库网元中保存的该终端的策略。
在一种可能的设计中,该策略控制系统还包括该统一数据库网元;该统一数据库网元,用于根据该删除请求消息,删除该统一数据库网元中保存的该终端的策略。
在一种可能的设计中,该统一数据库网元用于根据该删除请求消息,删除该统一数据库网元中保存的该终端的策略,具体为:用于根据该删除请求消息,在预设时间内未接收到该终端的策略请求或者策略更新请求的情况下,删除该统一数据库网元中保存的该终端的策略。
在一种可能的设计中,该第一移动管理网元,还用于接收来自该终端的注册请求;该第一移动管理网元,还用于向该第一拜访地网络中的第四移动管理网元发送第三上下文传输请求,该第三上下文传输请求消息用于请求获取该终端的上下文;该第一移动管理网元,还用于接收来自该第四移动管理网元的上下文传输响应,该上下文传输响应包括该统一数据库网元的标识;该第一移动管理网元,还用于向该策略控制网元发送该统一数据库网元的标识;该策略控制网元,还用于接收来自该第一移动管理网元的该统一数据库网元的标识,并从该统一数据库网元的标识对应的该统一数据库网元获取该终端的策略。
在一种可能的设计中,该第一移动管理网元,还用于接收来自该终端的注册请求;该第一移动管理网元,还用于向该策略控制网元发送策略关联创建请求消息;该策略控制网元,还用于接收来自该第一移动管理网元的该策略关联创建请求消息,并选择该统一数据 库网元保存该终端的策略;该策略控制网元,还用于向该第一移动管理网元发送该统一数据库网元的标识;该第一移动管理网元,还用于接收来自该策略控制网元的该统一数据库网元的标识。
其中,第十七方面中任一种设计方式所带来的技术效果可参见上述第一方面或第二方面中不同设计方式所带来的技术效果,此处不再赘述。
第十八方面,提供了一种策略控制系统,该策略控制系统包括:第一拜访地网络的第一移动管理网元、第一拜访地网络的第二移动管理网元、以及第一拜访地网络的策略控制网元;第一移动管理网元,用于接收来自终端的注册请求,并向第二移动管理网元发送第一上下文传输请求,该第一上下文传输请求消息用于请求获取该终端的上下文;第二移动管理网元,用于接收来自第一移动管理网元的第一上下文传输请求,并向第一移动管理网元发送上下文传输响应,该上下文传输响应包括该第一拜访地网络的统一数据库网元的标识;该第一移动管理网元,还用于接收来自该第二移动管理网元的上下文传输响应,并向策略控制网元发送该统一数据库网元的标识;该策略控制网元,用于接收来自该第一移动管理网元的该统一数据库网元的标识,并从该统一数据库网元的标识对应的该统一数据库网元获取该终端的策略。
在一种可能的设计中,该第一移动管理网元,还用于确定该终端离开该第一拜访地网络;该第一移动管理网元,还用于向该策略控制网元发送指示信息,该指示信息用于指示该策略控制网元删除统一数据库网元中保存的该终端的策略;该策略控制网元,还用于接收来自该第一移动管理网元的该指示信息,并根据该指示信息,向该统一数据库网元发送删除请求消息,该删除请求消息用于请求删除该统一数据库网元中保存的该终端的策略。
在一种可能的设计中,该策略控制系统还包括上述统一数据库网元;该统一数据库网元,用于根据该删除请求消息,删除该统一数据库网元中保存的该终端的策略。
在一种可能的设计中,该统一数据库网元根据该删除请求消息,删除该统一数据库网元中保存的该终端的策略,具体为:该统一数据库网元根据该删除请求消息,在预设时间内未接收到该终端的策略请求或者策略更新请求的情况下,删除该统一数据库网元中保存的该终端的策略。
其中,第十八方面中任一种设计方式所带来的技术效果可参见上述第三方面或第四方面中不同设计方式所带来的技术效果,此处不再赘述。
本申请的这些方面或其他方面在以下实施例的描述中会更加简明易懂。
附图说明
图1为现有的家乡路由漫游场景下的5G网络架构示意图;
图2为现有的本地疏导漫游场景下的5G网络架构示意图;
图3为本申请实施例提供的策略控制系统的架构示意图一;
图4为本申请实施例提供的策略控制系统的架构示意图二;
图5为本申请实施例提供的通信设备的硬件结构示意图;
图6为本申请实施例提供的策略控制方法的流程示意图一;
图7为本申请实施例提供的策略控制方法的流程示意图二;
图8为本申请实施例提供的策略控制方法的流程示意图三;
图9为本申请实施例提供的策略控制方法的流程示意图四;
图10为本申请实施例提供的策略控制方法的流程示意图五;
图11为本申请实施例提供的策略控制方法的流程示意图六;
图12为本申请实施例提供的第一移动管理网元的结构示意图一;
图13为本申请实施例提供的策略控制网元的结构示意图一;
图14为本申请实施例提供的第一移动管理网元的结构示意图二;
图15为本申请实施例提供的策略控制网元的结构示意图二。
具体实施方式
为了方便理解本申请实施例的技术方案,首先给出本申请相关技术的简要介绍如下。
如图1所示,为现有的家乡路由漫游场景下的5G网络架构示意图。该网络架构包括终端的VPLMN和终端的归属地公共陆地移动网络(home public land mobile network,HPLMN)。其中,终端当前位于终端的VPLMN中,该终端的VPLMN中包括接入设备、用户面功能(user plane function,UPF)1网元、AMF网元、拜访地的会话管理功能网元(visited-session management function,SMF)网元、V-PCF网元、或者V-UDR网元等;该终端的HPLMN中包括UPF2网元、归属地的SMF(home-SMF,H-SMF)网元、H-PCF网元、归属地的UDR(home-UDR,H-UDR)网元、统一数据管理(unified data management,UDM)网元或者应用功能(application function,AF)网元等。
其中,终端通过接入设备接入5G网络,终端通过下一代网络(next generation,N)接口1(简称N1)与AMF网元通信;接入设备通过N2接口(简称N2)与AMF网元通信,通过N3接口(简称N3)与UPF1网元通信;AMF网元通过N11接口(简称N11)与V-SMF网元通信,通过N15接口(简称N15)与V-PCF网元通信,通过N8接口(简称N8)与UDM网元通信;V-SMF网元通过N16接口(简称N16)与H-SMF网元通信,通过N7接口(简称N7)与V-PCF网元通信,通过N4接口(简称N4)与UPF1网元通信;UPF1网元通过N9接口(简称N9)与UPF2网元通信;H-SMF网元通过N7接口(简称N7)与H-PCF网元通信,通过N10接口(简称N10)与UDM网元通信;V-PCF网元通过N24接口(简称N24)与H-PCF网元通信;V-UDR网元与V-PCF网元通信;H-UDR网元与H-PCF网元通信;H-PCF网元通过N5接口(简称N5)与AF网元通信;UPF2网元通过N6接口(简称N6)接入数据网络。
需要说明的是,图1所示的5G网络中的AMF网元、V-SMF网元、H-SMF网元、V-PCF网元、H-PCF网元或者UDM网元等控制面网元也可以采用服务化接口进行交互。比如,AMF网元对外提供的服务化接口可以为Namf;V-SMF网元对外提供的服务化接口可以为Nvsmf;H-SMF网元对外提供的服务化接口可以为Nhsmf;H-PCF网元对外提供的服务化接口可以为Nhpcf;V-PCF网元对外提供的服务化接口可以为Nvpcf;UDM网元对外提供的服务化接口可以为Nudm,等。相关描述可以参考23501标准中的5G系统架构(5G system architecture)图,在此不予赘述。
如图2所示,为现有的本地疏导漫游场景下的5G网络架构示意图。该网络架构包括终端的VPLMN和终端的HPLMN。其中,终端当前位于终端的VPLMN中,该终端的VPLMN中 包括接入设备、UPF网元、AMF网元、SMF网元、V-PCF网元、V-UDR网元、或者AF网元等;该终端的HPLMN中包括H-PCF网元、UDM网元或者H-UDR网元等。
其中,终端通过接入设备接入5G网络,终端通过N1与AMF网元通信;接入设备通过N2与AMF网元通信,通过N3与UPF网元通信;AMF网元通过N11与SMF网元通信,通过N15与V-PCF网元通信,通过N8与UDM网元通信;SMF网元通过N7与V-PCF网元通信,通过N4与UPF网元通信,通过N10与UDM网元通信;UPF网元通过N6接口(简称N6)接入数据网络;V-PCF网元通过N24与H-PCF网元通信,通过N5与AF网元通信;V-UDR网元与V-PCF网元通信;H-UDR网元与H-PCF网元通信。
需要说明的是,图1或图2所示的5G网络中的AMF网元、V-SMF网元、H-SMF网元、SMF网元、V-PCF网元、H-PCF网元或者UDM网元等控制面网元也可以采用服务化接口进行交互。比如,AMF网元对外提供的服务化接口可以为Namf;SMF网元对外提供的服务化接口可以为Nsmf;V-SMF网元对外提供的服务化接口可以为Nvsmf;H-SMF网元对外提供的服务化接口可以为Nhsmf;H-PCF网元对外提供的服务化接口可以为Nhpcf;V-PCF网元对外提供的服务化接口可以为Nvpcf;UDM网元对外提供的服务化接口可以为Nudm,等。相关描述可以参考23501标准中的5G系统架构(5G system architecture)图,在此不予赘述。
需要说明的是,图1或图2所示的5G网络架构中的网元或者各接口的名字仅是一个示例,具体实现中可以是其他名字,本申请实施例对此不作具体限定。
需要说明的是,图1或者图2所示的5G网络架构中仅是示例性的给出了一个VPLMN,当然,终端还可能从一个VPLMN移动到另外一个VPLMN,不同场景下VPLMN中的网元以及连接方式可参考图1或者图2所示的5G网络架构中的VPLMN中的网元以及连接方式,在此不再一一赘述。
需要说明的是,图1或者图2所示的5G网络架构中仅是示例性的以一个VPLMN中包括一个AMF网元、V-SMF网元、V-PCF网元或者V-UDR网元等为例进行说明。当然,一个VPLMN中可以包括多个AMF网元、多个V-SMF网元、多个V-PCF网元或者多个V-UDR网元,不同AMF网元之间可以通过N14接口(简称N14)通信;不同的V-PCF网元之间可以通过N24通信,等等,具体可参考现有的5G网络架构描述,在此不予赘述。
需要说明的是,图1或者图2所示的5G网络架构中仅是示例性的以HPLMN中包括一个H-PCF网元或者H-UDR网元等为例进行说明。当然,HPLMN中可以包括多个H-PCF网元或者H-UDR网元,不同的H-PCF网元之间可以通过N24通信,等等,具体可参考现有的5G网络架构描述,在此不予赘述。
可选的,本申请实施例中所涉及到的终端(terminal)可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备;还可以包括用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication,MTC)终端、用户设备(user equipment, UE),移动台(mobile station,MS),终端设备(terminal device)或者中继用户设备等。其中,中继用户设备例如可以是5G家庭网关(residential gateway,RG)。为方便描述,本申请中,上面提到的设备统称为终端。
可选的,本申请实施例中所涉及的接入设备指的是接入核心网的设备,例如可以是基站,宽带网络业务网关(broadband network gateway,BNG),汇聚交换机,非第三代合作伙伴计划(3rd generation partnership project,3GPP)接入设备等。基站可以包括各种形式的基站,例如:宏基站,微基站(也称为小站),中继站,接入点等。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
如图3所示,为本申请实施例提供的一种策略控制系统30,该策略控制系统30包括第一拜访地网络的第一移动管理网元301和第一拜访地网络的策略控制网元302。
其中,第一移动管理网元301,用于确定终端离开第一拜访地网络之后,向策略控制网元302发送指示信息,该指示信息用于指示策略控制网元302删除第一拜访地网络的统一数据库网元中保存的终端的策略。
策略控制网元302,用于接收来自第一移动管理网元301的指示信息,并根据指示信息,向统一数据库网元发送删除请求消息,该删除请求消息用于请求删除统一数据库网元中保存的终端的策略。
可选的,本申请实施例中,第一移动管理网元301和策略控制网元302之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
现有的策略控制方法中,当漫游用户的终端从当前移动管理网元所在的拜访地网络离开,比如终端的去注册或者终端进行跨网络的移动管理网元重选时,原来的统一数据库网元中仍保存该终端的策略。然而,当漫游用户的终端从当前移动管理网元所在的拜访地网络离开时,由于原来的移动管理网元和新选择的移动管理网元不在同一个网络中,即该终端已经离开了原来的拜访地网络,而是否将来还会接入到该拜访地网络也是未知的,因此 原来的统一数据库网元中保存的这些漫游用户的终端的策略可能将来不会被使用,或很长时间后才会被使用,即使使用也有可能是过期的,从而将浪费该统一数据库网元的存储资源。基于本申请实施例提供的策略控制系统,由于第一移动管理网元可以在确定终端离开第一拜访地网络之后,可以及时指示策略控制网元删除第一拜访地网络的统一数据库网元中保存的终端的策略,因此可以节省第一拜访地网络的统一数据库网元中的存储资源。
可选的,如图3所示,本申请实施例提供的策略控制系统30还可以包括统一数据库网元303。其中,统一数据库网元303,用于根据删除请求消息,删除统一数据库网元中保存的终端的策略,本申请实施例对此不作具体限定。
或者,可选的,如图4所示,为本申请实施例提供的一种策略控制系统40,该策略控制系统40包括第一拜访地网络的第一移动管理网元401、第一拜访地网络的第二移动管理网元402、以及第一拜访地网络的策略控制网元403。
其中,第一移动管理网元401,用于接收来自终端的注册请求,并向第二移动管理网元402发送第一上下文传输请求,该第一上下文传输请求消息用于请求获取终端的上下文(context)。
第一移动管理网元401,还用于接收来自第二移动管理网元402的上下文传输响应,该上下文传输响应包括第一拜访地网络的统一数据库网元的标识。
第一移动管理网元401,还用于向策略控制网元403发送统一数据库网元的标识。
策略控制网元403,用于接收来自第一移动管理网元401的统一数据库网元的标识,并从统一数据库网元的标识对应的统一数据库网元获取终端的策略。
可选的,本申请实施例中,第一移动管理网元401和策略控制网元403之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
可选的,本申请实施例中,第一移动管理网元401和第二移动管理网元402之间可以直接通信,也可以通过其他设备的转发进行通信,本申请实施例对此不作具体限定。
基于本申请实施例提供的策略控制系统,由于第一拜访地网络的第一移动管理网元在接收来自终端的注册请求之后,可以从第一拜访地网络的第二移动管理网元中获取第一拜访地网络的统一数据库网元的标识,并将该统一数据库网元的标识发送给策略控制网元,使得策略控制网元可以从该统一数据库网元的标识对应的统一数据库网元获取终端的策略,因此基于该方案,可以使得终端在同一个拜访地网络的不同移动管理网元之间移动时,保证不同的策略控制网元可以找到同一个统一数据库网元,进而可以从该统一数据库网元中获取该终端的策略。
可选的,图3或图4所示的策略控制系统可以应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景下的5G网络架构中,还可以应用于未来的其他漫游网络架构中,本申请实施例对此不作具体限定。
示例性的,若图3或图4所示的策略控制系统应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景下的5G网络架构中,则图3中的第一移动管理网元301、图4中的第一移动管理网元401或第二移动管理网元402所对应的网元或者实体可以为上述5G网络架构中的VPLMN中的AMF网元;图3中的策略控制网元302或者图4中的策略控制网元403所对应的网元或者实体可以为上述5G网络架构中的VPLMN 中的V-PCF网元,本申请实施例对此不作具体限定。
可选的,本申请实施例图3中的第一移动管理网元301或者策略控制网元302,或者图4中的第一移动管理网元401或者策略控制网元403可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。
例如,本申请实施例图3中的第一移动管理网元301或者策略控制网元302,或者图4中的第一移动管理网元401或者策略控制网元403以通过图5中的通信设备来实现。图5所示为本申请实施例提供的通信设备的硬件结构示意图。该通信设备500包括处理器501,通信线路502,存储器503以及至少一个通信接口(图5中仅是示例性以通信接口504为例进行说明)。
处理器501可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信线路502可包括一通路,在上述组件之间传送信息。
通信接口504,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。
存储器503可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路502与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器503用于存储执行本申请方案的计算机执行指令,并由处理器501来控制执行。处理器501用于执行存储器503中存储的计算机执行指令,从而实现本申请下述实施例提供的策略控制方法。
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,处理器501可以包括一个或多个CPU,例如图5中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信设备500可以包括多个处理器,例如图5中的处理器501和处理器508。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
在具体实现中,作为一种实施例,通信设备500还可以包括输出设备505和输入设备506。输出设备505和处理器501通信,可以以多种方式来显示信息。例如,输出设备505可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备506和处理器501通信,可以以多种方式接收用户的输入。例如,输入设备506可以是鼠标、键盘、触摸屏设备或传感设备等。
上述的通信设备500可以是一个通用设备或者是一个专用设备。在具体实现中,通信设备500可以是台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、嵌入式设备或有图5中类似结构的设备。本申请实施例不限定通信设备500的类型。
下面将结合图1至图5对本申请实施例提供的策略控制方法进行具体阐述。
需要说明的是,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。
可选的,以图3所示的策略控制系统应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景为例,假设终端的HPLMN中包括UDM网元、H-PCF1网元、H-PCF2网元和H-UDR网元,终端从AMF1网元、V-PCF1网元、以及V-UDR1网元等所在的VPLMN1离开,进入AMF2网元、V-PCF2网元、以及V-UDR2网元等所在的VPLMN2,则如图6所示,为本申请实施例提供的一种策略控制方法,包括如下步骤:
S601、终端发生移动,通过VPLMN2中的接入设备向AMF2网元发送注册请求(registration request)消息,以使得AMF2网元接收来自终端的注册请求消息。
S602、AMF2网元向AMF1网元发送上下文传输请求(context transfer request)消息,以使得AMF1网元接收来自AMF2网元的上下文传输请求消息,该上下文传输请求消息用于请求获取终端的上下文。
其中,本申请实施例中,AMF1网元接收来自AMF2网元的上下文传输请求消息之后,可以获知终端离开AMF1网元所在的VPLMN1,在此统一说明,以下不再赘述。
S603、AMF1网元向AMF2网元发送上下文传输响应(context transfer response)消息,以使得AMF2网元接收来自AMF1网元的上下文传输响应消息。其中,该上下文传输响应消息包括终端的上下文。
其中,本申请实施例中,由于AMF1网元和AMF2网元不在同一个VPLMN中,因此AMF1网元发送给AMF2网元的终端的上下文中不包括VPLMN1中的V-PCF1网元的标识。
S604、AMF2网元向UDM网元注册,并获取终端的签约数据。
S605、AMF2网元向AMF1网元发送注册完成通知(registration complete notify),以使得AMF1网元接收来自AMF2网元的注册完成通知。该去注册完成通知用于通知AMF1网元在AMF2网元的注册完成。
其中,本申请实施例中,AMF2网元向UDM网元注册后,还可能订阅签约数据修改通知,具体可参考现有的实现方式,在此不予赘述。
S606、UDM网元向AMF1网元发送去注册通知请求(deregistration notification request),以使得AMF1网元接收来自UDM网元的去注册通知请求。其中,该去注册通知 请求用于AMF1网元删除终端的上下文。
S607、AMF1网元向UDM网元发送去注册通知响应(deregistration notification response),以使得UDM网元接收来自AMF1网元的去注册通知响应。
当然,AMF1网元在接收来自UDM网元的去注册通知请求之后,还可能取消订阅签约数据修改通知,具体可参考现有的实现方式,在此不予赘述。
S608、由于AMF2网元未接收到V-PCF1网元的标识,因此AMF2网元重新选择V-PCF网元和H-PCF网元,假设分别为V-PCF2网元和H-PCF2网元,则AMF2网元向V-PCF2网元发送策略关联创建请求1,以使得V-PCF2网元接收来自AMF2网元的策略关联创建请求消息1,该策略关联创建请求消息1用于请求创建策略关联。
其中,这里的策略关联指的是,AMF2网元和V-PCF2网元之间的一个关联,这个关联用于AMF2网元向V-PCF2网元传递终端当前的接入相关的参数、以及V-PCF2网元向AMF2网元提供终端的策略等,相关描述可参考现有的策略关联的定义,在此不再赘述。
示例性的,本申请实施例中的策略关联创建请求消息1例如可以为策略控制创建请求(policy control create request)消息1,本申请实施例对此不作具体限定。
可选的,本申请实施例中,策略关联创建请求消息1中还可以包括指示信息1,该指示信息1用于指示终端从其他跨公共陆地移动网络(public land mobile network,PLMN)移动到V-PCF2网元所在的VPLMN2,本申请实施例对此不作具体限定。
S609、V-PCF2网元向AMF2网元发送策略关联创建响应消息1,以使得AMF2网元接收来自V-PCF2网元的策略关联创建响应消息1。
其中,本申请实施例中的策略关联创建响应消息1例如可以为策略控制创建响应(policy control create response)消息1,本申请实施例对此不作具体限定。
S610、可选的,V-PCF2网元向V-UDR2网元发送查询请求(query request)1,以使得V-UDR2网元接收来自V-PCF2网元的查询请求1。该查询请求1用于请求获取保存在V-UDR2网元中的终端的策略。
S611、可选的,V-UDR2网元向V-PCF2网元发送查询响应(query response)1,以使得V-PCF2网元接收来自V-UDR2网元的查询响应1。
其中,若V-UDR2网元中保存了终端的策略,则查询响应1中包括保存在V-UDR2网元中的终端的策略;否则,查询响应1中不包括终端的策略。
需要说明的是,在步骤S608中的策略关联创建请求1包括指示信息1的情况下,本申请实施例可以不执行步骤S609-S610,在此统一说明,以下不再赘述。
S612、V-PCF2网元向H-PCF2网元发送策略关联创建请求消息2,以使得H-PCF2网元接收来V-PCF2网元的策略关联创建请求消息2,该策略关联创建请求消息2用于请求创建策略关联。
其中,这里的策略关联指的是,V-PCF2网元和H-PCF2网元之间的一个关联,这个关联用于H-PCF2网元向V-PCF2网元提供终端的策略等,相关描述可参考现有的策略关联的定义,在此不再赘述。
其中,本申请实施例中的策略关联创建请求消息2例如可以为策略控制创建请求消息2,本申请实施例对此不作具体限定。
S613、H-PCF2网元向H-UDR网元发送查询请求2,以使得H-UDR网元接收来自H-PCF2网元的查询请求2。该查询请求2用于请求获取保存在H-UDR网元中的终端的策略。
S614、H-UDR网元向H-PCF2网元发送查询响应2,以使得H-PCF2网元接收来自H-UDR网元的查询响应2。
其中,若H-UDR网元中保存了终端的策略,则查询响应2中包括保存在H-UDR网元中的终端的策略;否则,查询响应2中不包括终端的策略。
S615、H-PCF2网元向V-PCF2网元发送策略关联创建响应消息2,以使得V-PCF2网元接收来自H-PCF2网元的策略关联创建响应消息2。
其中,若H-UDR网元中保存了终端的策略且H-PCF2网元确定更新终端的策略,则策略关联创建响应消息2包括H-PCF2网元更新后的终端的策略,本申请实施例对此不作具体限定。
可选的,本申请实施例中,更新后的终端的策略也可以称之为为终端制定的终端的策略,在此统一说明,以下不再赘述。
其中,本申请实施例中的策略关联创建响应消息2例如可以为策略控制创建响应消息2,本申请实施例对此不作具体限定。
S616、可选的,若V-PCF2网元为终端制定终端的策略,或者H-PCF2网元更新终端的策略,则V-PCF2网元向AMF2网元发送N1N2消息传输请求(N1N2 message transfer request),以使得AMF2网元接收来自V-PCF2网元的N1N2消息传输请求。
可选的,本申请实施例中,若V-PCF2网元为终端制定终端的策略,则该N1N2消息传输请求中包括V-PCF2网元为终端制定的终端的策略。
可选的,本申请实施例中,若H-PCF2网元更新终端的策略,则该N1N2消息传输请求中包括H-PCF2网元更新后的终端的策略,本申请实施例对此不作具体限定。
需要说明的是,本申请实施例中,若V-PCF2网元在查询响应1中未接收到终端的策略,或者,V-PCF2网元2虽然接收到终端的策略,但是V-PCF2网元需要更新该终端的策略,则此时V-PCF2网元为终端制定终端的策略,在此统一说明,以下不再赘述。
示例性的,本申请实施例中的策略关联创建响应消息1例如可以为策略控制创建响应消息1,本申请实施例对此不作具体限定。
S617、AMF1网元向V-PCF1网元发送策略关联删除请求1,以使得V-PCF1网元接收来自AMF1网元的策略关联删除请求1。其中,该策略关联删除请求1用于请求V-PCF1网元删除之前AMF1网元与V-PCF1网元创建的策略关联。此外,该策略关联删除请求1中包括指示信息2,该指示信息2用于指示V-PCF1网元删除V-UDR1网元中保存的终端的策略。
示例性的,本申请实施例中的策略关联删除请求1例如可以为策略控制删除请求(policy control delete request)消息1,本申请实施例对此不作具体限定。
S618、V-PCF1网元向V-UDR1网元发送删除请求(delete request),以使得V-UDR1网元接收来自V-PCF1网元的删除请求。其中,该删除请求用于请求删除V-UDR1网元中保存的该终端的策略。
可选的,本申请实施例中,V-UDR1网元在接收来自V-PCF1网元的删除请求之后,可以直接删除V-UDR1网元中保存的该终端的策略。
或者,本申请实施例中,V-UDR1网元在接收来自V-PCF1网元的删除请求之后,可以在预设时间内未接收到其他V-PCF网元发送的该终端的策略请求或者策略更新请求的情况下,删除V-UDR1网元中保存的该终端的策略。比如,V-UDR1网元在接收来自V-PCF1网元的删除请求之后,可能会启动定时器,若在定时器超时之前,V-UDR1网元未接收到其他V-PCF网元发送的该终端的策略请求或者策略更新请求,则V-UDR1网元可以删除V-UDR1网元中保存的该终端的策略。其中,本申请实施例不限定定时器时间的确定方式。
S619、V-UDR1网元向V-PCF1网元发送删除响应,以使得V-PCF1网元接收来自V-UDR1网元的删除响应。该删除响应用于指示V-UDR1网元已经删除保存的该终端的策略。
S620、V-PCF1网元向AMF1网元发送策略关联删除响应1,以使得AMF1网元接收来自V-PCF1网元的策略关联删除响应1。其中,该策略关联删除响应1用于指示V-PCF1网元已经删除之前AMF1网元与V-PCF1网元创建的策略关联。
示例性的,本申请实施例中的策略关联删除响应1例如可以为策略控制删除响应(policy control delete response)消息1,本申请实施例对此不作具体限定。
S621、V-PCF1网元向H-PCF1网元发送策略关联删除请求2。其中,该策略关联删除请求2用于请求H-PCF1网元删除之前H-PCF1网元与H-PCF1网元创建的策略关联。
示例性的,本申请实施例中的策略关联删除请求2例如可以为策略控制删除请求消息2,本申请实施例对此不作具体限定。
S622、H-PCF1网元向H-UDR网元发送更新请求(update request)1,以使得H-UDR网元接收来自H-PCF1网元的更新请求1。其中,该更新请求1用于将H-PCF1网元维持的终端的策略保存的H-UDR网元。
S623、H-UDR网元向H-PCF1网元发送更新响应(update response)1,以使得H-PCF1网元接收来自H-UDR网元的更新响应1。
S624、H-PCF1网元向V-PCF1网元发送策略关联删除响应2。其中,该策略关联删除响应2用于指示H-PCF1网元已经删除之前H-PCF1网元与H-PCF1网元创建的策略关联。
示例性的,本申请实施例中的策略关联删除响应2例如可以为策略控制删除请求响应2,本申请实施例对此不作具体限定。
S625、AMF2网元通过接入设备向终端发送注册接受(registration accept)消息,以使得终端接收来自AMF2网元的注册接受消息。
基于本申请实施例提供的策略控制方法,由于AMF1网元接收来自AMF2网元的上下文传输请求消息之后可以获知终端离开VPLMN1,进而可以及时指示V-PCF1网元删除VPLMN1中的-UDR1网元中保存的终端的策略,因此可以节省V-UDR1网元中的存储资源。
其中,上述步骤S601至S625中的AMF1网元或者V-PCF1网元的动作可以由图5所示的通信设备500中的处理器501调用存储器503中存储的应用程序代码来执行,本申请实施例对此不作任何限制。
或者,可选的,以图3所示的策略控制系统应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景为例,假设终端从AMF1网元、V-PCF1网元、以及V-UDR1网元等所在的VPLMN1离开,进入AMF3网元、H-PCF1网元、UDM网元以及H-UDR网元等所在的HPLMN,则如图7所示,为本申请实施例提供的一种策略控制方法, 包括如下步骤:
S701、终端发生移动,通过HPLMN中的接入设备向AMF3网元发送注册请求消息,以使得AMF3网元接收来自终端的注册请求消息。
S702-S707、与图6中的步骤S602-S607类似,区别比如在于将步骤S602-S607中的VPLMN2中的AMF2网元替换为本申请实施例中的HPLMN中的AMF3网元,其余相关描述可参考图6所示的实施例,在此不再赘述。
S708、由于AMF3网元未接收到V-PCF1网元的标识,因此AMF3网元重新选择H-PCF网元,假设为H-PCF2网元,则AMF3网元向H-PCF2网元发送策略关联创建请求消息,以使得H-PCF2网元接收来自AMF3网元的策略关联创建请求,该策略关联创建请求消息用于请求创建策略关联。
示例性的,本申请实施例中的策略关联创建请求消息例如可以为策略控制创建请求消息,本申请实施例对此不作具体限定。
S709、H-PCF2网元向AMF3网元发送策略关联创建响应消息,以使得AMF3网元接收来自H-PCF2网元的策略关联创建响应消息。
示例性的,本申请实施例中的策略关联创建响应消息例如可以为策略控制创建响应消息,本申请实施例对此不作具体限定。
S710、H-PCF2网元向H-UDR网元发送查询请求,以使得H-UDR网元接收来自H-PCF2网元的查询请求。该查询请求用于请求获取保存在H-UDR网元中的终端的策略。
S711、H-UDR网元向H-PCF2网元发送查询响应,以使得H-PCF2网元接收来自H-UDR网元的查询响应2。
其中,若H-UDR网元中保存了终端的策略,则查询响应中包括保存在H-UDR网元中的终端的策略;否则,查询响应中不包括终端的策略。
S712、可选的,若H-PCF2网元确定更新终端的策略,H-PCF2网元向AMF3网元发送N1N2消息传输请求,以使得AMF3网元接收来自H-PCF2网元的N1N2消息传输请求。其中,该N1N2消息传输请求包括H-PCF2网元更新后的终端的策略,本申请实施例对此不作具体限定。
示例性的,本申请实施例中的策略关联创建响应消息例如可以为策略控制创建响应消息,本申请实施例对此不作具体限定。
S713-S720、同图6中的步骤S617-S624,相关描述可参考图6所示的实施例,在此不再赘述。
S721、AMF3网元通过接入设备向终端发送注册接受消息,以使得终端接收来自AMF3网元的注册接受消息。
基于本申请实施例提供的策略控制方法,由于AMF1网元接收来自AMF3网元的上下文传输请求消息之后可以获知终端离开VPLMN1,进而可以及时指示V-PCF1网元删除V-UDR1网元中保存的终端的策略,因此可以节省V-UDR1网元中的存储资源。
其中,上述步骤S701至S721中的AMF1网元或者V-PCF1网元的动作可以由图5所示的通信设备500中的处理器501调用存储器503中存储的应用程序代码来执行,本申请实施例对此不作任何限制。
可选的,以图3所示的策略控制系统应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景为例,假设终端的HPLMN中包括H-PCF1网元和H-UDR网元,终端在AMF1网元、V-PCF1网元、以及V-UDR1网元等所在的VPLMN1发起去注册(de-registration)流程,则如图8所示,为本申请实施例提供的一种策略控制方法,包括如下步骤:
S801、终端通过VPLMN1中的接入设备向AMF1网元发送去注册请求(de-registration request)消息,以使得AMF1网元接收来自终端的去注册请求消息。其中,该去注册请求消息用于请求执行终端的去注册。
其中,本申请实施例中,AMF1网元接收来自终端的去注册请求消息之后,可以获知终端离开AMF1网元所在的VPLMN1,在此统一说明,以下不再赘述。
S802-S809、同图6中的步骤S617-S624,相关描述可参考图6所示的实施例,在此不再赘述。
S810、AMF1网元通过接入设备向终端发送去注册接受(de-registration accept)消息,以使得终端接收来自AMF1网元的去注册接受消息。
S811、释放终端、接入设备和AMF1网元之间的连接,相关描述可参考现有去注册流程中的实现方式,在此不再赘述。
基于本申请实施例提供的策略控制方法,由于AMF1网元接收来自终端的去注册请求消息之后可以获知终端离开VPLMN1之后,进而可以及时指示V-PCF1网元删除V-UDR1网元中保存的终端的策略,因此可以节省V-UDR1网元中的存储资源。
其中,上述步骤S801至S811中的AMF1网元或者V-PCF1网元的动作可以由图5所示的通信设备500中的处理器501调用存储器503中存储的应用程序代码来执行,本申请实施例对此不作任何限制。
可选的,以图3所示的策略控制系统应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景为例,假设终端的HPLMN中包括UDM网元、H-PCF1网元和H-UDR网元,AMF1网元、V-PCF1网元、以及V-UDR1网元等所在的VPLMN1侧发起终端的去注册(de-registration)流程,则如图9所示,为本申请实施例提供的一种策略控制方法,包括如下步骤:
S901、UDM网元向AMF1网元发送去注册通知(de-registration notification),以使得AMF1网元接收来自UDM网元的去注册通知。该去注册通知用于通知AMF1网元执行终端的去注册。
其中,本申请实施例中,AMF1网元接收来自UDM网元的去注册通知之后,可以获知终端离开AMF1网元所在的VPLMN1,在此统一说明,以下不再赘述。
S902、AMF1网元向UDM网元发送去注册应答(de-registration acknowledgement),以使得UDM网元接收来自AMF1网元的去注册应答。
S903、可选的,终端通过VPLMN1中的接入设备向AMF1网元发送去注册请求(de-registration request)消息,以使得AMF1网元接收来自终端的去注册请求消息。其中,该去注册请求消息用于请求执行终端的去注册。
当然,本申请实施例中,也可以不需要执行步骤S903,而是AMF1网元执行隐式去注 册,本申请实施例对此不作具体限定。
S904-S911、同图6中的步骤S617-S624,相关描述可参考图6所示的实施例,在此不再赘述。
S912、可选的,若执行上述步骤S903,则AMF1网元通过接入设备向终端发送去注册接受(de-registration accept)消息,以使得终端接收来自AMF1网元的去注册接受消息。
S913、释放终端、接入设备和AMF1网元之间的连接,相关描述可参考现有去注册流程中的实现方式,在此不再赘述。
基于本申请实施例提供的策略控制方法,由于AMF1网元接收来自UDM网元的去注册通知之后可以获知终端离开VPLMN1之后,进而可以及时指示V-PCF1网元删除V-UDR1网元中保存的终端的策略,因此可以节省V-UDR1网元中的存储资源。
其中,上述步骤S901至S913中的AMF1网元或者V-PCF1网元的动作可以由图5所示的通信设备500中的处理器501调用存储器503中存储的应用程序代码来执行,本申请实施例对此不作任何限制。
可选的,以图4所示的策略控制系统应用于图1所示的家乡路由漫游场景下的5G网络架构中或者图2所示的本地疏导漫游场景为例,假设终端的HPLMN中包括UDM网元、H-PCF1网元、H-PCF2网元和H-UDR网元,终端在VPLMN1内执行AMF网元的重选(relocation),从VPLMN1中源区域的AMF4网元重选到VPLMN1中目标区域的AMF1网元,VPLMN1中的源区域中还包括V-PCF4网元和V-UDR1网元,VPLMN1中的目标区域中还包括V-PCF1网元和V-UDR1网元,则如图10所示,为本申请实施例提供的一种策略控制方法,包括如下步骤:
S1001、终端发生移动,通过VPLMN1中的接入设备向AMF1网元发送注册请求消息,以使得AMF1网元接收来自终端的注册请求消息。
S1002、AMF1网元向AMF4网元发送上下文传输请求消息,以使得AMF4网元接收来自AMF1网元的上下文传输请求消息,该上下文传输请求消息用于请求获取终端的上下文。
其中,本申请实施例中,AMF4网元接收来自AMF1网元的上下文传输请求消息之后,可以获知终端在VPLMN1内发生了AMF网元的重选,在此统一说明,以下不再赘述。
S1003、AMF4网元向AMF1网元发送上下文传输响应消息,以使得AMF1网元接收来自AMF4网元的上下文传输响应消息。其中,该上下文传输响应消息包括终端的上下文。
其中,本申请实施例中,由于AMF1网元和AMF4网元在同一个VPLMN中,因此AMF4网元发送给AMF1网元的终端的上下文中包括源区域中的V-PCF4网元的标识。
此外,本申请实施例中,该上下文传输响应消息中还包括VPLMN1中保存终端的策略的V-UDR1网元的标识。其中,该V-UDR1网元是由终端最初接入该VPLMN1时所选择的V-PCF网元选择的V-UDR网元,该最初选择的V-PCF网元将V-UDR1网元的标识发送给终端最初接入该VPLMN1时选择的AMF网元。该最初的AMF网元在终端执行VPLMN1内的AMF网元重选时,将该V-UDR1网元的标识提供给最新的AMF网元,本申请实施例以目前AMF4网元中保存V-UDR1网元的标识为例进行说明,该AMF4网元可以是终端最初接入该VPLMN1时选择的AMF网元,也可以是在发生本次AMF网元的重选之前,当前最新的AMF网元,本申请 实施例对此不作具体限定。
S1004-S1007、与图6中的步骤S604-S607类似,区别比如在于将步骤S604-S607中的VPLMN2中的AMF2网元替换为本申请实施例中的VPLMN1中的AMF1网元,将步骤S604-S607中的VPLMN1中的AMF1网元替换为本申请实施例中的VPLMN1中的AMF4网元,其余相关描述可参考图6所示的实施例,在此不再赘述。
S1008、虽然AMF1网元接收到V-PCF4网元的标识,但是AMF1网元仍然重新选择V-PCF网元和H-PCF网元,假设分别为V-PCF1网元和H-PCF2网元,则AMF1网元向V-PCF1网元发送策略关联创建请求消息1,以使得V-PCF1网元接收来自AMF1网元的策略关联创建请求消息1,该策略关联创建请求消息1用于请求创建策略关联。此外,该策略关联创建请求消息1中还包括步骤S1003中获得的V-UDR1网元的标识。
示例性的,本申请实施例中的策略关联创建请求消息1例如可以为策略控制创建请求消息1,本申请实施例对此不作具体限定。
S1009、V-PCF1网元向AMF1网元发送策略关联创建响应消息1,以使得AMF1网元接收来自V-PCF1网元的策略关联创建响应消息1。
示例性的,本申请实施例中的策略关联创建响应消息1例如可以为策略控制创建响应消息1,本申请实施例对此不作具体限定。
S1010、V-PCF1网元向该V-UDR1网元的标识对应的V-UDR1网元发送查询请求1,以使得V-UDR1网元接收来自V-PCF1网元的查询请求1。该查询请求1用于请求获取保存在V-UDR1网元中的终端的策略。
S1011、V-UDR1网元向V-PCF1网元发送查询响应1,以使得V-PCF1网元接收来自V-UDR1网元的查询响应1。
其中,本申请实施例中,若V-UDR1网元中保存了终端的策略,则查询响应1中包括保存在V-UDR1网元中的终端的策略;否则,查询响应1中不包括终端的策略。
S1012-S1015、与图6中的步骤S612-S615类似,区别比如在于将步骤S612-S615中的V-PCF2网元替换为本申请实施例中的V-PCF1网元,其余相关描述可参考图6所示的实施例,在此不再赘述。
S1016、可选的,若V-UDR1网元中保存了终端的策略且V-PCF1网元确定更新终端的策略,或者,若H-UDR网元中保存了终端的策略且H-PCF2网元确定更新终端的策略,则V-PCF1网元向AMF1网元发送N1N2消息传输请求,以使得AMF1网元接收来自V-PCF1网元的N1N2消息传输请求。
可选的,本申请实施例中,若V-UDR1网元中保存了终端的策略且V-PCF1网元确定更新终端的策略,则该N1N2消息传输请求中包括V-PCF1网元更新后的终端的策略。
可选的,本申请实施例中,若H-UDR网元中保存了终端的策略且H-PCF2网元确定更新终端的策略,则该N1N2消息传输请求中包括H-PCF2网元更新后的终端的策略,本申请实施例对此不作具体限定。
示例性的,本申请实施例中的策略关联创建响应消息1例如可以为策略控制创建响应消息1,本申请实施例对此不作具体限定。
S1017、AMF4网元向V-PCF4网元发送策略关联删除请求1,以使得V-PCF4网元接收 来自AMF4网元的策略关联删除请求1。其中,该策略关联删除请求1用于请求V-PCF4网元删除之前AMF4网元与V-PCF4网元创建的策略关联。
示例性的,本申请实施例中的策略关联删除请求1例如可以为策略控制删除请求消息1,本申请实施例对此不作具体限定。
S1018、V-PCF4网元向AMF4网元发送策略关联删除响应1,以使得AMF4网元接收来自V-PCF4网元的策略关联删除响应1。其中,该策略关联删除响应1用于指示V-PCF4网元已经删除之前AMF4网元与V-PCF4网元创建的策略关联。
示例性的,本申请实施例中的策略关联删除响应1例如可以为策略控制删除响应消息1,本申请实施例对此不作具体限定。
S1019-S1022、与图6中的步骤S621-S624类似,区别比如在于将步骤S621-S624中的V-PCF1网元替换为本申请实施例中的V-PCF4网元,其余相关描述可参考图6所示的实施例,在此不再赘述。
S1023、AMF1网元通过接入设备向终端发送注册接受消息,以使得终端接收来自AMF1网元的注册接受消息。
基于本申请实施例提供的策略控制方法,由于VPLMN1中的AMF1网元在接收来自终端的注册请求之后,可以从VPLMN1中的AMF4网元中获取VPLMN1中的V-UDR1网元的标识,并在创建策略关联时将该V-UDR1网元的标识发送给新选择的V-PCF1网元,使得V-PCF1网元可以从该V-UDR1网元的标识对应的V-UDR1网元获取终端的策略,因此基于该方案,可以使得终端在VPLMN1中的不同AMF网元之间移动时,保证不同的V-PCF可以找到同一个V-UDR1网元,进而可以从该V-UDR1中获取该终端的策略。
其中,上述步骤S1001至S1023中的AMF1网元或者V-PCF1网元的动作可以由图5所示的通信设备500中的处理器501调用存储器503中存储的应用程序代码来执行,本申请实施例对此不作任何限制。
下面将结合上述步骤S1003,以终端的HPLMN中包括图10中的UDM网元、H-PCF1网元和H-UDR网元,终端最初接入图10所示的VPLMN1时选择的AMF网元为AMF4网元为例,给出本申请实施例提供的一种策略控制方法,如图11所示,包括如下步骤:
S1101、终端通过VPLMN1中的接入设备向AMF4网元发送注册请求消息,以使得AMF4网元接收来自终端的注册请求消息。
S1102、AMF4网元向UDM网元注册,并获取终端的签约数据。
其中,本申请实施例中,AMF4网元向UDM网元注册后,还可能订阅签约数据修改通知,具体可参考现有的实现方式,在此不予赘述。
S1103、AMF4网元选择V-PCF网元和H-PCF网元,假设分别为V-PCF4网元和H-PCF1网元,则AMF4网元向V-PCF4网元发送策略关联创建请求1,以使得V-PCF4网元接收来自AMF4网元的策略关联创建请求消息1,该策略关联创建请求消息1用于请求创建策略关联。
示例性的,本申请实施例中的策略关联创建请求消息1例如可以为策略控制创建请求消息1,本申请实施例对此不作具体限定。
可选的,本申请实施例中,策略关联创建请求消息1中还可以包括指示信息1,该指 示信息1用于指示终端注册到V-PCF4网元所在的VPLMN1,本申请实施例对此不作具体限定。
S1104-S1111、与图6中的步骤S609-S616类似,区别比如在于将步骤S609-S616中的V-PCF2网元替换为本申请实施例中的V-PCF4网元,将步骤S609-S616中的AMF2网元替换为本申请实施例中的AMF4网元,将步骤S609-S616中的V-UDR2网元替换为本申请实施例中的V-UDR1网元,将步骤S609-S616中的H-PCF2网元替换为本申请实施例中的H-PCF1网元,其余相关描述可参考图6所示的实施例,在此不再赘述。
此外,本申请实施例中的步骤S1104中的策略关联创建响应消息1中还可以包括V-UDR1网元的标识,以使得AMF4网元存储V-UDR1网元的标识,本申请实施例对此不作具体限定。
可选的,本申请实施例中,V-PCF4网元也可以通过一个新定义的消息向AMF4网元发送V-UDR1网元的标识,本申请实施例对此不作具体限定。
需要说明的是,在步骤S1103中的策略关联创建请求1包括指示信息1的情况下,本申请实施例可以不执行步骤S1105-S1106,在此统一说明,以下不再赘述。
S1112、AMF4网元通过接入设备向终端发送注册接受消息,以使得终端接收来自AMF4网元的注册接受消息。
S1113、若终端处于空闲态并且在3GPP接入可达,则AMF4网元发起寻呼,终端发起服务请求流程进入连接态,相关描述可参考现有的实现方式,在此不再赘述。
S1114、当终端处于连接态时,AMF4网元向终端提供接收到的终端的策略。
S1115、终端更新终端的策略,并向AMF4网元返回终端的策略更新的结果。
S1116、AMF4网元向V-PCF4网元发送N1消息通知,以使得V-PCF4网元接收来自AMF4网元的N1消息通知。其中,该N1消息通知用于指示终端的策略更新的结果。
基于本申请实施例提供的策略控制方法,由于终端在注册到VPLMN1时,终端最初接入的AMF4网元可以获取终端最初接入该VPLMN1时所选择的V-PCF4网元选择的V-UDR1网元的标识,使得后续终端在VPLMN1内发生AMF网元的重选时,可以将该V-UDR1网元的标识提供给最新的AMF网元,由最新的AMF网元提供给最新的V-PCF网元,进而最新的V-PCF网元可以从该V-UDR1网元的标识对应的V-UDR1网元获取终端的策略,因此基于该方案,可以使得终端在VPLMN1中的不同AMF网元之间移动时,保证不同的V-PCF可以找到同一个V-UDR1网元,进而可以从该V-UDR1中获取该终端的策略。
其中,上述步骤S1101至S1116中的AMF4网元或者V-PCF4网元的动作可以由图5所示的通信设备500中的处理器501调用存储器503中存储的应用程序代码来执行,本申请实施例对此不作任何限制。
可选的,本申请实施例中,可以先执行图11所示的策略控制方法使得终端接入到VPLMN1网络,进而在VPLMN1中发生AMF网元的重选的情况下,执行图10所示的策略控制方法;进而,在终端离开AMF1网元所在的VPLMN1的情况下,执行图6、图7、图8或图9所示的策略控制方法,本申请实施例对此不作具体限定。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,上述第一移动管理网元或者策略控制网元为了实现上述功能,其包含了执行各个 功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对第一移动管理网元或者策略控制网元进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
比如,以采用集成的方式划分各个功能模块的情况下,图12示出了一种第一移动管理网元120的结构示意图。该第一移动管理网元120为第一拜访地网络的移动管理网元,包括:处理模块1201和收发模块1202。处理模块1201,用于确定终端离开第一拜访地网络;收发模块1202,用于向第一拜访地网络的策略控制网元发送指示信息,该指示信息用于指示策略控制网元删除第一拜访地网络的统一数据库网元中保存的终端的策略。
可选的,处理模块1201具体用于:接收来自第二拜访地网络的第二移动管理网元的第一上下文传输请求消息,第一上下文传输请求消息用于请求获取终端的上下文。
或者,可选的,处理模块1201具体用于:接收来自终端的归属网络的第三移动管理网元的第二上下文传输请求消息,第二上下文传输请求消息用于请求获取终端的上下文。
或者,可选的,处理模块1201具体用于:接收来自终端的去注册请求,去注册请求用于请求执行终端的去注册。
或者,可选的,处理模块1201具体用于:接收来自数据管理网元的去注册通知,去注册通知用于通知第一移动管理网元执行终端的去注册。
可选的,收发模块1202,还用于接收来自终端的注册请求。收发模块1202,还用于向第一拜访地网络中的第四移动管理网元发送第三上下文传输请求消息该,第三上下文传输请求消息用于请求获取终端的上下文。收发模块1202,还用于接收来自第四移动管理网元的上下文传输响应,该上下文传输响应包括统一数据库网元的标识。收发模块1202,还用于向策略控制网元发送统一数据库网元的标识,统一数据库网元的标识用于从统一数据库网元获取终端的策略。
可选的,收发模块1202,还用于接收来自终端的注册请求。收发模块1202,还用于向策略控制网元发送策略关联创建请求消息。收发模块1202,还用于接收来自策略控制网元的统一数据库网元的标识。
可选的,收发模块1202,还用于接收来自第一拜访地网络中的第五移动管理网元的第四上下文传输请求消息,第四上下文传输请求消息用于请求获取终端的上下文。收发模块1202,还用于向第五移动管理网元发送上下文传输响应,上下文传输响应包括统一数据库网元的标识,统一数据库网元的标识用于从统一数据库网元获取终端的策略。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本实施例中,该第一移动管理网元120以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该第一移动管理网元120可以采用图5所示的形式。
比如,图5中的处理器501可以通过调用存储器503中存储的计算机执行指令,使得第一移动管理网元120执行上述方法实施例中的策略控制方法。
具体的,图12中的收发模块1202和处理模块1201的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现。或者,图12中的处理模块1201的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现,图12中的收发模块1202的功能/实现过程可以通过图5中的通信接口504来实现。
由于本实施例提供的第一移动管理网元120可执行上述的策略控制方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
可选的,本申请实施例还提供了一种装置(例如,该装置可以是芯片系统),该装置包括处理器,用于支持第一移动管理网元实现上述策略控制方法,例如确定终端离开第一拜访地网络。在一种可能的设计中,该装置还包括存储器。该存储器,用于保存第一移动管理网元必要的程序指令和数据。当然,存储器也可以不在该装置中。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件,本申请实施例对此不作具体限定。
或者,比如,以采用集成的方式划分各个功能模块的情况下,图13示出了一种策略控制网元130的结构示意图。该策略控制网元130为第一拜访地网络的策略控制网元,包括接收模块1301和发送模块1302。接收模块1301,用于接收来自第一拜访地网络的第一移动管理网元的指示信息,该指示信息用于指示策略控制网元130删除第一拜访地网络的统一数据库网元中保存的终端的策略。发送模块1302,用于根据指示信息,向统一数据库网元发送删除请求消息,删除请求消息用于请求删除统一数据库网元中保存的终端的策略。
可选的,如图13所示,该策略控制网元130还包括:处理模块1303。接收模块1301,还用于接收来自第一移动管理网元的统一数据库网元的标识。处理模块1303,用于从统一数据库网元的标识对应的统一数据库网元获取终端的策略。
可选的,接收模块1301,还用于接收来自第一移动管理网元的策略关联创建请求消息。处理模块1303,还用于选择统一数据库网元保存终端的策略。发送模块1302,还用于向第一移动管理网元发送统一数据库网元的标识。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本实施例中,该策略控制网元130以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该策略控制网元130可以采用图5所示的形式。
比如,图5中的处理器501可以通过调用存储器503中存储的计算机执行指令,使得 策略控制网元130执行上述方法实施例中的策略控制方法。
具体的,图13中的接收模块1301、发送模块1302和处理模块1303的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现。或者,图13中的处理模块1303的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现,图13中的接收模块1301和发送模块1302的功能/实现过程可以通过图5中的通信接口504来实现。
由于本实施例提供的策略控制网元130可执行上述的策略控制方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
可选的,本申请实施例还提供了一种装置(例如,该装置可以是芯片系统),该装置包括处理器,用于支持策略控制网元实现上述策略控制方法,例如选择统一数据库网元保存终端的策略。在一种可能的设计中,该装置还包括存储器。该存储器,用于保存策略控制网元必要的程序指令和数据。当然,存储器也可以不在该装置中。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件,本申请实施例对此不作具体限定。
或者,比如,以采用集成的方式划分各个功能模块的情况下,图14示出了一种第一移动管理网元140的结构示意图。该第一移动管理网元140为第一拜访地网络的移动管理网元,包括接收模块1401和发送模块1402。接收模块1401,用于接收来自终端的注册请求。发送模块1402,用于向第一拜访地网络中的第二移动管理网元发送第一上下文传输请求,第一上下文传输请求消息用于请求获取终端的上下文。接收模块1401,还用于接收来自第二移动管理网元的上下文传输响应,该上下文传输响应包括第一拜访地网络的统一数据库网元的标识。发送模块1402,还用于向第一拜访地网络的策略控制网元发送统一数据库网元的标识,统一数据库网元的标识用于从统一数据库网元获取终端的策略。
可选的,如图14所示,第一移动管理网元140还包括:处理模块1403。处理模块1403,用于确定终端离开第一拜访地网络。发送模块1402,用于向策略控制网元发送指示信息,该指示信息用于指示策略控制网元删除统一数据库网元中保存的终端的策略。
可选的,处理模块1403具体用于:接收来自第二拜访地网络的第三移动管理网元的第二上下文传输请求消息,第二上下文传输请求消息用于请求获取终端的上下文。
或者,可选的,处理模块1403具体用于:接收来自终端的归属网络的第四移动管理网元的第三上下文传输请求消息,第三上下文传输请求消息用于请求获取终端的上下文。
或者,可选的,处理模块1403具体用于:接收来自终端的去注册请求,去注册请求用于请求执行终端的去注册。
或者,可选的,处理模块1403具体用于:接收来自数据管理网元的去注册通知,去注册通知用于通知第一移动管理网元执行终端的去注册。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本实施例中,该第一移动管理网元140以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该第一移动管理网元140可以采用图5所示的形式。
比如,图5中的处理器501可以通过调用存储器503中存储的计算机执行指令,使得第一移动管理网元140执行上述方法实施例中的策略控制方法。
具体的,图14中的接收模块1401、发送模块1402和处理模块1403的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现。或者,图14中的处理模块1403的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现,图14中的接收模块1401和发送模块1402的功能/实现过程可以通过图5中的通信接口504来实现。
由于本实施例提供的第一移动管理网元140可执行上述的策略控制方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
可选的,本申请实施例还提供了一种装置(例如,该装置可以是芯片系统),该装置包括处理器,用于支持第一移动管理网元实现上述策略控制方法,例如确定终端离开第一拜访地网络。在一种可能的设计中,该装置还包括存储器。该存储器,用于保存第一移动管理网元必要的程序指令和数据。当然,存储器也可以不在该装置中。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件,本申请实施例对此不作具体限定。
或者,比如,以采用集成的方式划分各个功能模块的情况下,图15示出了一种策略控制网元150的结构示意图。该策略控制网元150为第一拜访地网络的策略控制网元,包括:收发模块1502和处理模块1501。收发模块1502,用于接收来自第一拜访地网络的第一移动管理网元的策略关联创建请求消息,该策略关联创建请求消息包括第一拜访地网络的统一数据库网元的标识。处理模块1501,用于从统一数据库网元的标识对应的统一数据库网元获取终端的策略。
可选的,收发模块1502,还用于接收来自第一移动管理网元的指示信息,该指示信息用于指示策略控制网元删除统一数据库网元中保存的终端的策略。收发模块1502,还用于根据指示信息,向统一数据库网元发送删除请求消息,删除请求消息用于请求删除统一数据库网元中保存的终端的策略。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本实施例中,该策略控制网元150以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该策略控制网元150可以采用图5所示的形式。
比如,图5中的处理器501可以通过调用存储器503中存储的计算机执行指令,使得策略控制网元150执行上述方法实施例中的策略控制方法。
具体的,图15中的收发模块1502和处理模块1501的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现。或者,图15中的处理模块1501的功能/实现过程可以通过图5中的处理器501调用存储器503中存储的计算机执行指令来实现,图15中的收发模块1502的功能/实现过程可以通过图5中的通信接口504来实现。
由于本实施例提供的策略控制网元150可执行上述的策略控制方法,因此其所能获得 的技术效果可参考上述方法实施例,在此不再赘述。
可选的,本申请实施例还提供了一种装置(例如,该装置可以是芯片系统),该装置包括处理器,用于支持策略控制网元实现上述策略控制方法,例如从统一数据库网元的标识对应的统一数据库网元获取终端的策略。在一种可能的设计中,该装置还包括存储器。该存储器,用于保存策略控制网元必要的程序指令和数据。当然,存储器也可以不在该装置中。该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件,本申请实施例对此不作具体限定。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (27)

  1. 一种策略控制方法,其特征在于,所述策略控制方法包括:
    第一拜访地网络的第一移动管理网元确定所述终端离开所述第一拜访地网络;
    所述第一移动管理网元向所述第一拜访地网络的策略控制网元发送指示信息,所述指示信息用于指示所述策略控制网元删除所述第一拜访地网络的统一数据库网元中保存的所述终端的策略。
  2. 根据权利要求1所述的策略控制方法,其特征在于,所述第一移动管理网元确定所述终端离开所述第一拜访地网络,具体为:
    所述第一移动管理网元接收来自第二拜访地网络的第二移动管理网元的第一上下文传输请求消息,所述第一上下文传输请求消息用于请求获取所述终端的上下文;
    或者,所述第一移动管理网元接收来自所述终端的归属网络的第三移动管理网元的第二上下文传输请求消息,所述第二上下文传输请求消息用于请求获取所述终端的上下文;
    或者,所述第一移动管理网元接收来自所述终端的去注册请求,所述去注册请求用于请求执行所述终端的去注册;
    或者,所述第一移动管理网元接收来自数据管理网元的去注册通知,所述去注册通知用于通知所述第一移动管理网元执行所述终端的去注册。
  3. 根据权利要求1或2所述的策略控制方法,其特征在于,在所述第一移动管理网元确定所述终端离开所述第一拜访地网络之前,所述策略控制方法还包括:
    所述第一移动管理网元接收来自所述终端的注册请求;
    所述第一移动管理网元向所述第一拜访地网络中的第四移动管理网元发送第三上下文传输请求消息,所述第三上下文传输请求消息用于请求获取所述终端的上下文;
    所述第一移动管理网元接收来自所述第四移动管理网元的上下文传输响应,所述上下文传输响应包括所述统一数据库网元的标识;
    所述第一移动管理网元向所述策略控制网元发送所述统一数据库网元的标识,所述统一数据库网元的标识用于从所述统一数据库网元获取所述终端的策略。
  4. 根据权利要求1或2所述的策略控制方法,其特征在于,在所述第一移动管理网元确定所述终端离开所述第一拜访地网络之前,所述策略控制方法还包括:
    所述第一移动管理网元接收来自所述终端的注册请求;
    所述第一移动管理网元向所述策略控制网元发送策略关联创建请求消息;
    所述第一移动管理网元接收来自所述策略控制网元的所述统一数据库网元的标识。
  5. 根据权利要求4所述的策略控制方法,其特征在于,所述策略控制方法还包括:
    所述第一移动管理网元接收来自所述第一拜访地网络中的第五移动管理网元的第四上下文传输请求消息,所述第四上下文传输请求消息用于请求获取所述终端的上下文;
    所述第一移动管理网元向所述第五移动管理网元发送上下文传输响应,所述上下文传输响应包括所述统一数据库网元的标识,所述统一数据库网元的标识用于从所述统一数据库网元获取所述终端的策略。
  6. 一种策略控制方法,其特征在于,所述策略控制方法包括:
    第一拜访地网络的策略控制网元接收来自所述第一拜访地网络的第一移动管理网元的指示信息,所述指示信息用于指示所述策略控制网元删除所述第一拜访地网络的统一数据库网元中保存的终端的策略;
    所述策略控制网元根据所述指示信息,向所述统一数据库网元发送删除请求消息,所述删除请求消息用于请求删除所述统一数据库网元中保存的所述终端的策略。
  7. 根据权利要求6所述的策略控制方法,其特征在于,在所述策略控制网元接收来自所述第一拜访地网络的第一移动管理网元的指示信息之前,所述策略控制方法还包括:
    所述策略控制网元接收来自所述第一移动管理网元的所述统一数据库网元的标识;
    所述策略控制网元从所述统一数据库网元的标识对应的所述统一数据库网元获取所述终端的策略。
  8. 根据权利要求6所述的策略控制方法,其特征在于,在所述策略控制网元接收来自所述第一拜访地网络的第一移动管理网元的指示信息之前,所述策略控制方法还包括:
    所述策略控制网元接收来自所述第一移动管理网元的策略关联创建请求消息;
    所述策略控制网元选择所述统一数据库网元保存所述终端的策略;
    所述策略控制网元向所述第一移动管理网元发送所述统一数据库网元的标识。
  9. 一种第一移动管理网元,所述第一移动管理网元为第一拜访地网络的移动管理网元,其特征在于,所述第一移动管理网元包括:处理模块和收发模块;
    所述处理模块,用于确定所述终端离开所述第一拜访地网络;
    所述收发模块,用于向所述第一拜访地网络的策略控制网元发送指示信息,所述指示信息用于指示所述策略控制网元删除所述第一拜访地网络的统一数据库网元中保存的所述终端的策略。
  10. 根据权利要求9所述的第一移动管理网元,其特征在于,所述处理模块具体用于:
    接收来自第二拜访地网络的第二移动管理网元的第一上下文传输请求消息,所述第一上下文传输请求消息用于请求获取所述终端的上下文;
    或者,接收来自所述终端的归属网络的第三移动管理网元的第二上下文传输请求消息,所述第二上下文传输请求消息用于请求获取所述终端的上下文;
    或者,接收来自所述终端的去注册请求,所述去注册请求用于请求执行所述终端的去注册;
    或者,接收来自数据管理网元的去注册通知,所述去注册通知用于通知所述第一移动管理网元执行所述终端的去注册。
  11. 根据权利要求9或10所述的第一移动管理网元,其特征在于,
    所述收发模块,还用于接收来自所述终端的注册请求;
    所述收发模块,还用于向所述第一拜访地网络中的第四移动管理网元发送第三上下文传输请求消息,所述第三上下文传输请求消息用于请求获取所述终端的上下文;
    所述收发模块,还用于接收来自所述第四移动管理网元的上下文传输响应,所述上下文传输响应包括所述统一数据库网元的标识;
    所述收发模块,还用于向所述策略控制网元发送所述统一数据库网元的标识,所述统一数据库网元的标识用于从所述统一数据库网元获取所述终端的策略。
  12. 根据权利要求9或10所述的第一移动管理网元,其特征在于,
    所述收发模块,还用于接收来自所述终端的注册请求;
    所述收发模块,还用于向所述策略控制网元发送策略关联创建请求消息;
    所述收发模块,还用于接收来自所述策略控制网元的所述统一数据库网元的标识。
  13. 根据权利要求12所述的第一移动管理网元,其特征在于,
    所述收发模块,还用于接收来自所述第一拜访地网络中的第五移动管理网元的第四上下文传输请求消息,所述第四上下文传输请求消息用于请求获取所述终端的上下文;
    所述收发模块,还用于向所述第五移动管理网元发送上下文传输响应,所述上下文传输响应包括所述统一数据库网元的标识,所述统一数据库网元的标识用于从所述统一数据库网元获取所述终端的策略。
  14. 一种策略控制网元,所述策略控制网元为第一拜访地网络的策略控制网元,其特征在于,所述策略控制网元包括:接收模块和发送模块;
    所述接收模块,用于接收来自所述第一拜访地网络的第一移动管理网元的指示信息,所述指示信息用于指示所述策略控制网元删除所述第一拜访地网络的统一数据库网元中保存的终端的策略;
    所述发送模块,用于根据所述指示信息,向所述统一数据库网元发送删除请求消息,所述删除请求消息用于请求删除所述统一数据库网元中保存的所述终端的策略。
  15. 根据权利要求14所述的策略控制网元,其特征在于,所述策略控制网元还包括:处理模块;
    所述接收模块,还用于接收来自所述第一移动管理网元的所述统一数据库网元的标识;
    所述处理模块,用于从所述统一数据库网元的标识对应的所述统一数据库网元获取所述终端的策略。
  16. 根据权利要求14所述的策略控制网元,其特征在于,
    所述接收模块,还用于接收来自所述第一移动管理网元的策略关联创建请求消息;
    所述处理模块,还用于选择所述统一数据库网元保存所述终端的策略;
    所述发送模块,还用于向所述第一移动管理网元发送所述统一数据库网元的标识。
  17. 一种策略控制系统,其特征在于,所述策略控制系统包括:第一拜访地网络的第一移动管理网元和所述第一拜访地网络的策略控制网元;
    所述第一移动管理网元,用于确定所述终端离开所述第一拜访地网络;
    所述第一移动管理网元,还用于向所述第一拜访地网络的策略控制网元发送指示信息,所述指示信息用于指示所述策略控制网元删除所述第一拜访地网络的统一数据库网元中保存的所述终端的策略;
    所述策略控制网元,用于接收来自所述第一移动管理网元的所述指示信息,并根据所述指示信息,向所述统一数据库网元发送删除请求消息,所述删除请求消息用于请求删除所述统一数据库网元中保存的所述终端的策略。
  18. 根据权利要求17所述的策略控制系统,其特征在于,所述策略控制系统还包括所述统一数据库网元;
    所述统一数据库网元,用于根据所述删除请求消息,删除所述统一数据库网元中保存 的所述终端的策略。
  19. 根据权利要求18所述的策略控制系统,其特征在于,所述统一数据库网元用于根据所述删除请求消息,删除所述统一数据库网元中保存的所述终端的策略,具体为:
    用于根据所述删除请求消息,在预设时间内未接收到所述终端的策略请求或者策略更新请求的情况下,删除所述统一数据库网元中保存的所述终端的策略。
  20. 一种第一移动管理网元,所述第一移动管理网元为第一拜访地网络的移动管理网元,其特征在于,包括:处理器和通信接口,
    所述通信接口,用于接收代码指令并传输至所述处理器,所述处理器用于运行所述代码指令以执行权利要求1-5任一所述的策略控制方法。
  21. 一种策略控制网元,所述策略控制网元为第一拜访地网络的策略控制网元,其特征在于,包括:处理器和通信接口,
    所述通信接口,用于接收代码指令并传输至所述处理器,所述处理器用于运行所述代码指令以执行权利要求6-8任一所述的策略控制方法。
  22. 一种处理器,其特征在于,用于执行如权利要求1-5任一项,或权利要求6-8任一所述的策略控制方法。
  23. 一种芯片系统,其特征在于,包括:
    存储器,用于存储计算机程序;
    处理器,用于从所述存储器调用并运行所述计算机程序,使得安装有所述芯片系统的设备执行如权利要求1-5任一项,或权利要求6-8任一所述的策略控制方法。
  24. 一种计算机可读存储介质,包括计算机程序,当其在计算机上运行时,使得所述计算机执行如权利要求1-5任一项,或权利要求6-8任一所述的策略控制方法。
  25. 一种计算机程序产品,所述计算机程序产品包括计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行如权利要求1-5任一项,或权利要求6-8任一所述的策略控制方法。
  26. 一种用来执行权利要求1-5任一所述的策略控制方法的装置。
  27. 一种用来执行权利要求6-8任一所述的策略控制方法的装置。
PCT/CN2019/097541 2018-08-13 2019-07-24 策略控制方法、设备及系统 WO2020034817A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810916262.0 2018-08-13
CN201810916262.0A CN110831088B (zh) 2018-08-13 2018-08-13 策略控制方法、设备及系统

Publications (1)

Publication Number Publication Date
WO2020034817A1 true WO2020034817A1 (zh) 2020-02-20

Family

ID=69525117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/097541 WO2020034817A1 (zh) 2018-08-13 2019-07-24 策略控制方法、设备及系统

Country Status (2)

Country Link
CN (1) CN110831088B (zh)
WO (1) WO2020034817A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449657A (zh) * 2020-11-06 2022-05-06 维沃移动通信有限公司 策略关联的建立方法及装置、终端及网络侧设备
CN115915289A (zh) * 2021-08-10 2023-04-04 维沃移动通信有限公司 计算任务的策略确定或资源分配方法、装置、网元及介质
CN116567768A (zh) * 2022-01-30 2023-08-08 华为技术有限公司 一种确定用户设备路由选择策略的方法和装置
CN116744433A (zh) * 2022-03-04 2023-09-12 维沃移动通信有限公司 信息处理方法、装置、通信设备及可读存储介质
CN115426698A (zh) * 2022-08-30 2022-12-02 中国联合网络通信集团有限公司 路由选择策略的配置方法、装置以及计算机可读存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239771A1 (en) * 2009-11-30 2012-09-20 Nokia Siemens Networks Oy Method and network device establishing a binding between a plurality of separate sessions in a network
CN102984684A (zh) * 2011-09-06 2013-03-20 华为技术有限公司 一种上报终端信息的方法和终端
WO2018038497A1 (ko) * 2016-08-23 2018-03-01 엘지전자 주식회사 5g 이동통신에서 음성 통화를 위해 4g로 폴백하는 방법 및 사용자 장치

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730150B (zh) * 2009-01-19 2013-08-07 中兴通讯股份有限公司 业务流迁移时对网络资源进行控制的方法
US20190021064A1 (en) * 2016-07-04 2019-01-17 Lg Electronics Inc. Method for managing registration in wireless communication system and device for same
US10736072B2 (en) * 2016-11-27 2020-08-04 Lg Electronics Inc. De-registration method in wireless communication system and apparatus therefor
US10849186B2 (en) * 2017-01-09 2020-11-24 Huawei Technologies Co., Ltd. System and methods for session management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239771A1 (en) * 2009-11-30 2012-09-20 Nokia Siemens Networks Oy Method and network device establishing a binding between a plurality of separate sessions in a network
CN102984684A (zh) * 2011-09-06 2013-03-20 华为技术有限公司 一种上报终端信息的方法和终端
WO2018038497A1 (ko) * 2016-08-23 2018-03-01 엘지전자 주식회사 5g 이동통신에서 음성 통화를 위해 4g로 폴백하는 방법 및 사용자 장치

Also Published As

Publication number Publication date
CN110831088A (zh) 2020-02-21
CN110831088B (zh) 2021-05-04

Similar Documents

Publication Publication Date Title
WO2020034817A1 (zh) 策略控制方法、设备及系统
WO2019085753A1 (zh) 会话建立方法、设备及系统
EP3790315B1 (en) Handover methods, apparatuses,communication system and computer-readable storage medium
JP6768976B2 (ja) サブスクリプション更新方法、装置、及びシステム
WO2020119460A1 (zh) 网络切片选择的方法、设备及系统
JP7139522B2 (ja) ローカルエリアネットワーク通信方法、装置、およびシステム
JP7184922B2 (ja) Ueのためにポリシーを構成するための方法、装置、及びシステム
CN111565385B (zh) 一种策略提供方法、装置和系统
JP2020537466A (ja) セッション確立方法およびシステム、ならびにデバイス
WO2020063397A1 (zh) 订阅更新方法、设备及系统
WO2020164290A1 (zh) 策略控制方法、装置及系统
CN110324152B (zh) 策略和计费控制规则获取方法、装置及系统
WO2019218847A1 (zh) 一种策略控制方法、装置及系统
WO2019218762A1 (zh) 一种策略控制方法、装置及系统
KR102268412B1 (ko) 핸드오버 방법, 디바이스 및 시스템
WO2022062889A1 (zh) 一种切片管理方法、装置及通信设备
WO2019091174A1 (zh) 一种短消息发送方法及装置
WO2021115464A1 (zh) 一种网络切片选择方法及相关装置
WO2020164562A1 (zh) 一种策略提供方法、装置和系统
WO2023010995A1 (zh) 一种选择跟踪区域的方法、设备及系统
WO2023010979A1 (zh) 一种通信方法及装置
WO2019015627A1 (zh) 切换方法、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19849877

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19849877

Country of ref document: EP

Kind code of ref document: A1