WO2021018021A1 - Procédé et système de facturation ainsi que dispositif de communication - Google Patents

Procédé et système de facturation ainsi que dispositif de communication Download PDF

Info

Publication number
WO2021018021A1
WO2021018021A1 PCT/CN2020/104053 CN2020104053W WO2021018021A1 WO 2021018021 A1 WO2021018021 A1 WO 2021018021A1 CN 2020104053 W CN2020104053 W CN 2020104053W WO 2021018021 A1 WO2021018021 A1 WO 2021018021A1
Authority
WO
WIPO (PCT)
Prior art keywords
charging
network element
function network
session
user
Prior art date
Application number
PCT/CN2020/104053
Other languages
English (en)
Chinese (zh)
Inventor
丁辉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021018021A1 publication Critical patent/WO2021018021A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/66Policy and charging system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1403Architecture for metering, charging or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1403Architecture for metering, charging or billing
    • H04L12/1407Policy-and-charging control [PCC] architecture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/41Billing record details, i.e. parameters, identifiers, structure of call data record [CDR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/44Augmented, consolidated or itemized billing statement or bill presentation

Definitions

  • This application relates to the field of communications, and more specifically, to a charging method, a charging system, and a communication device.
  • the core network needs to support granular charging for actual users instead of granular charging for terminal devices.
  • This application provides a charging method, a charging system, and a communication device, which can realize user-granular charging.
  • a charging method including: a session management function network element obtains a subscription permanent identification and a user identification, and the user corresponding to the user identification accesses the network through the equipment corresponding to the subscription permanent identification; the session management function The network element sends a policy association request message to the policy control function network element.
  • the policy association request message includes the subscription permanent identification and the user identification; the session management function network element receives the subscription permanent identification and the subscription permanent identification sent by the policy control function network element.
  • a charging rule corresponding to the user ID, and the charging rule includes a charging key value corresponding to the user ID; the session management function network element executes the charging rule.
  • the subscription permanent identifier may be a user permanent identifier (subscription permanent identifier, SUPI), or a public subscription identifier (generic public subscription identifier, GPSI), or information after the SUPI is renamed as the protocol evolves.
  • the user identification may be defined and managed by a third party, or may also be defined and managed by an operator.
  • the policy association request message may be a policy association establishment request message or a policy association update request message.
  • the session management function network element after the session management function network element obtains the charging key value corresponding to the user identifier from the policy control function network element, it can provide the charging function network element with the usage information corresponding to the charging key value, thereby achieving User ID or user ID corresponding to the granular billing of the user.
  • the session management function network element acquiring a user identity includes: the session management function network element receiving an authentication response message sent by a data network (DN), The authentication response message includes the user identification.
  • DN data network
  • the session management function network element acquiring a user identity includes: the session management function network element receiving a session establishment request message sent by a terminal device, and the session establishment request message includes The user identification; or, the session management function network element receives a session modification request message sent by the terminal device, and the session modification request message includes the user identification.
  • the session management function network element can obtain the user identity.
  • the "session” described in this application may be a protocol data unit (PDU) session, but this application does not limit this.
  • PDU protocol data unit
  • the session management function network element may obtain the session management request from the session establishment request message or the session modification request message or the session management request sent by the access and mobility management function network element Get the permanent sign of the contract in the message.
  • the session management function network element executes charging rules, including: the session management function network element obtains charging information from the charging function network element, and the charging information Including one or more of authorized business quotas, reporting thresholds, and trigger events; the session management function network element generates packet detection rules (PDR) and usage reports based on charging information, charging rules, and local configuration Rule (usage reporting rule, URR); the session management function network element sends the PDR and URR to the user plane function network element, and the PDR and URR are used by the user plane function network element to report usage information obtained according to the PDR and URR; The session management function network element receives the usage information reported by the user plane function network element and obtained according to the PDR and URR.
  • PDR packet detection rules
  • URR local configuration Rule
  • the method may further include: the session management function network element generates a usage report according to the usage information, and according to charging information and/or local configuration.
  • the method further includes: the session management function network element generates a usage report, the usage report including the billing key, the subscription permanent identifier, and usage information, the The usage information is the usage information corresponding to the billing key value and the contract permanent identifier; the session management function network element sends the usage report to the charging function network element, and the usage report is used for the charging function network element to generate the user Identifies the corresponding CDR information.
  • the usage report is generated by the session management function network element according to the usage information and according to charging information and/or local configuration.
  • the session management function network element executing the charging rule includes: the session management function network element sends a charging request message to the charging function network element, and the accounting
  • the charge request message includes the subscription permanent identification and the charging key value;
  • the session management function network element receives the charge corresponding to the subscription permanent identification and the charging key value corresponding to the user identification sent by the charging function network element Information,
  • the charging information includes one or more of authorized service quota, reporting threshold, and trigger event, wherein the usage report is generated based on the charging information.
  • a charging method which includes: a session management function network element receives a session establishment request message or a session modification request message, the session establishment request message is used to establish a session with a device corresponding to a subscription permanent identification, and the session modification The request message is used to modify the session of the device corresponding to the subscription permanent identification; the session management function network element obtains the user identification and the charging rules for the session, and the user corresponding to the user identification accesses the network through the device corresponding to the subscription permanent identification; session The management function network element executes the charging rules of the session to generate a usage report corresponding to the user ID; the session management function network element sends the usage report to the charging function network element, and the usage report includes the user ID and the usage report The network element for the charging function generates the call bill information corresponding to the user identifier.
  • the subscription permanent identifier may be the user permanent identifier (subscription permanent identifier, SUPI), or the public subscription identifier (generic public subscription identifier, GPSI), or the information after the SUPI is renamed as the protocol evolves.
  • the user identification may be defined and managed by a third party, or may also be defined and managed by an operator.
  • the session management function network element can obtain the user ID corresponding to the current session, and by sending the usage information corresponding to the user ID to the charging function network element, the charging function network element can generate the corresponding user ID Call bill information to achieve user identification granularity charging.
  • the session management function network element acquiring the user identity includes: the session management function network element receiving an authentication response message sent by the DN, the authentication response message including the User ID; or,
  • the session management function network element receives a session establishment request message sent by a terminal device, where the session establishment request message includes the user identifier; or,
  • the session management function network element receives a session modification request message sent by a terminal device, and the session modification request message includes the user identifier.
  • the session management function network element can obtain the user identification.
  • the session management function network element acquiring the charging rules of the session includes: the session management function network element sends a policy association request message to the policy control function network element,
  • the policy association request message includes the subscription permanent identification and the user identification, and the policy association request message is used to request the charging rule corresponding to the user identification;
  • the session management function network element receives the session information sent by the policy control function network element Charging rule, the charging rule of the session is the charging rule corresponding to the user ID.
  • the charging rule corresponding to the user ID includes a charging key value
  • the charging key value is a charging key value corresponding to the user ID. Therefore, the session management function network element can count the usage information corresponding to the charging key value corresponding to the user identifier.
  • the session management function network element executes the charging rules for the session, including: the session management function network element sends a charging request message to the charging function network element ,
  • the charging request message includes the user ID, and the charging request message is used to request charging information corresponding to the user ID;
  • the session management function network element receives the charging corresponding to the user ID sent by the charging function network element Information, the charging information includes one or more of authorized service quota, reporting threshold, and trigger event, wherein the usage report is generated based on the charging information.
  • the session management function network element executes the charging rules for the session: including: the session management function network element sends a usage reporting rule to the user plane function network element, the The usage reporting rule includes the user ID; receiving usage information corresponding to the user ID sent by the user plane function network element; and generating the usage report according to the usage information and the billing information.
  • a charging system which includes: a session management function network element and a policy control function network element; the session management function network element is used to obtain a subscription permanent identity and a user identity, and the user corresponding to the user identity The device corresponding to the subscription permanent identification is connected to the network; a policy association request message is sent to the policy control function network element, and the policy association request message includes the subscription permanent identification and the user identification; the policy control function network element is used to The session management function network element sends the charging rule corresponding to the contract permanent identity and the user identity, and the charging rule includes the charging key value corresponding to the user identity; the session management function network element is also used to perform the charging rule.
  • the charging system further includes a charging function network element; and, the session management function network element is used to execute the charging rule, including: the session management function
  • the network element sends a charging request message to the charging function network element, the charging request message includes the subscription permanent identification and the charging key value; receiving the subscription permanent identification sent by the charging function network element corresponds to the user identification
  • the charging information that corresponds to the charging key value of, the charging information includes one or more of authorized service quota, reporting threshold and trigger event.
  • the charging system can implement the first aspect or the method in any possible implementation manner of the first aspect.
  • a charging system including: a network element including a session management function and a network element with a charging function;
  • the session management function network element is used to receive a session establishment request message or a session modification request message, the session establishment request message is used to establish a session of the device corresponding to the subscription permanent identification, and the session modification request message is used to modify the subscription permanent identification.
  • the session of the device obtain the user ID and the charging rule of the session, the user corresponding to the user ID accesses the network through the device corresponding to the subscription permanent ID; execute the charging rule of the session to generate the usage amount corresponding to the user ID Report; send the usage report to the charging function network element; the charging function network element is used to generate the call bill information corresponding to the user ID according to the usage report.
  • the charging system further includes a policy control function network element for: receiving a policy association request message sent by the session management function network element, the policy association request message Including the subscription permanent identification and the user identification, the policy association request message is used to request the charging rule corresponding to the user identification; the charging rule of the session is sent to the session management function network element, and the charging rule of the session is the The charging rule corresponding to the user ID.
  • the system further includes a user plane function network element for: receiving a usage reporting rule sent by the session management function network element, where the usage reporting rule includes the user identification ; Send usage information corresponding to the user identifier to the session management function network element; and, the session management function network element is also used to: generate the usage report based on the usage information and the charging information.
  • the charging system can implement the second aspect or the method in any possible implementation manner of the second aspect.
  • a communication device may be a session management function network element or a chip.
  • the device has the function of realizing the network element of the session management function in any one of the foregoing first aspect to the second aspect or any possible implementation manner of any one of the aspects.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
  • the communication device may also be a policy control function network element, a charging function network element, or a user plane function network element, and the communication device may be used to implement any one or any of the first to second aspects above.
  • the function of the corresponding network element in any possible implementation manner.
  • an apparatus which includes a processor, a memory, and a transceiver.
  • the processor is connected to the memory and the transceiver.
  • the memory is used to store instructions
  • the processor is used to execute the instructions
  • the transceiver is used to communicate with other network elements under the control of the processor.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory and the processor may be provided separately.
  • the memory can be a non-transitory (non-transitory) memory, such as a read only memory (ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the embodiment of the application does not limit the type of memory and the setting mode of the memory and the processor
  • an apparatus which includes a processor and a transceiver.
  • the processor is connected to the transceiver.
  • the processor is used to execute instructions, and the transceiver is used to communicate with other network elements under the control of the processor.
  • the processor executes the instruction, the execution causes the device to execute the session management function network element method in any of the foregoing aspects or any possible implementation manner in any aspect.
  • a computer-readable medium stores a computer program (also called code, or instruction) when it runs on a computer, so that the computer executes the first to second aspects above.
  • a computer program also called code, or instruction
  • a communication chip in which instructions are stored, which when running on a computer device, cause the communication chip to execute any of the above-mentioned first to second aspects in any possible implementation manner Methods.
  • a computer program product containing instructions is provided.
  • the instructions When the instructions are run on a computer, the computer executes any one of the first aspect and the second aspect or any possible implementation method.
  • Figure 1 is a schematic diagram of a system architecture to which an embodiment of the present application is applied;
  • Figure 2 is a schematic diagram of another system architecture to which an embodiment of the present application is applied;
  • Figure 3 is a schematic diagram of the architecture of a 5G system to which this application is applied;
  • Figure 4 is a diagram of a local roaming architecture applying an embodiment of this application.
  • Figure 5 is an architecture diagram of home routing roaming using an embodiment of this application.
  • Figure 6 is a schematic diagram of a service-oriented architecture of a 5G system to which this application is applied;
  • Fig. 7 is a schematic block diagram of a computer device to which an embodiment of the present application is applied;
  • FIG. 8 is a schematic flowchart of a charging method according to an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another charging method according to an embodiment of the present application.
  • Fig. 10 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 1 is a schematic diagram of a charging system provided by this application.
  • the system 100 includes a session management function network element 110 and a policy control function network element 120.
  • the system 100 may further include a charging function network element 130.
  • the system 100 may be used to implement a charging method in the embodiment of the present application.
  • the session management function network element 110 is used to: obtain the subscription permanent identification and the user identification, the user corresponding to the user identification accesses the network through the device corresponding to the subscription permanent identification; and send a policy association request message to the policy control function network element 120, a policy association request
  • the message includes the subscription permanent identification and the user identification.
  • the policy association request message is used to request the charging rule corresponding to the subscription permanent identification and the user identification; the charging rule sent by the policy control function network element 120 is received, and the charging rule includes the user identification. Corresponding charging key value; execute the charging rule.
  • the policy control function network element 120 is used to: receive the policy association request message sent by the session management function network element 110; and send to the session management function network element 110 the subscription permanent identification and user requested by the policy association request message Identifies a common corresponding charging rule, and the charging rule includes a charging key corresponding to the user ID.
  • the policy association request message may be a policy association establishment request message or a policy association modification request message.
  • the session management function network element 110 is used to obtain a user identity, including: the session management function network element 110 is used to receive an authentication response message sent by a data network (DN), and the authentication The response message includes the user identification.
  • DN data network
  • the session management function network element 110 is configured to obtain a user identity, including: the session management function network element receives a session establishment request message sent by a terminal device, and the session establishment request message includes the user identity.
  • the "session” described here and in the following may be a protocol data unit (protocol data unit, PDU) session, but this application does not limit this.
  • PDU protocol data unit
  • the session management network element 110 is configured to obtain a user identification, including: the session management network element receives a session modification request message sent by a terminal, and the session modification request message includes the user identification.
  • the session management function network element 110 is further used to generate a usage report, and send the usage report to the charging function network element 130.
  • the usage report includes the billing key value, the subscription permanent identifier, and usage information.
  • the usage report is used for the charging function network element 130 to generate call bill information corresponding to the user identification.
  • the charging function network element 130 is also used to receive the usage report, and generate call bill information corresponding to the user identifier according to the usage report.
  • the session management function network element 110 is configured to execute the charging rule, and further includes: the session management function network element 110 is configured to send a charging request message to the charging function network element 130, the charging request message Including the subscription permanent identification and the charging key value, the charging request message is used to request the charging information corresponding to the charging key value of the subscription permanent identification and the user identification, and the charging information includes authorized service quota One or more of the reporting threshold and the trigger event; the session management function network element 110 receives the charging information sent by the charging function network element 130.
  • that the session management function network element 110 is configured to generate a usage report includes: the session management function network element 110 is configured to generate a usage report according to the charging information.
  • the charging function network element 130 is also used to send the charging information to the session management function network element 110.
  • FIG. 2 is a schematic diagram of another charging system to which an embodiment of the present application is applied.
  • the system 200 includes: a session management function network element 210 and a charging function network element 220.
  • the system 200 may further include a policy control function network element 230.
  • the system 200 can be used to execute another charging method in the embodiment of the present application.
  • the session management function network element 210 is used to receive a session establishment request message or a session modification request message, the session establishment request is used to establish a session of the device corresponding to the subscription permanent identification, and the session modification request message is used to modify the device corresponding to the subscription permanent identification
  • the session obtain the user ID and the charging rules for the session, the user corresponding to the user ID accesses the network through the device corresponding to the subscription permanent ID; execute the charging rules for the session to generate a usage report corresponding to the user ID ; Send the usage report to the charging function network element 220, the usage report including the user ID, and the usage report is used for the charging function network element 220 to generate call bill information corresponding to the user ID.
  • the charging function network element 220 is used to receive the usage report, and according to the usage report, generate call bill information corresponding to the user ID.
  • the session management function network element 210 is used to obtain a user identity, including: the session management function network element 210 is used to receive an authentication response message sent by a data network (DN), and the authentication The response message includes the user identification.
  • DN data network
  • the session management function network element 210 is configured to obtain a user identity, including: the session management function network element 210 receives a session establishment request message sent by a terminal device, and the session establishment request message includes the user identity.
  • the session management network element 210 is configured to obtain a user identification, including: the session management function network element 210 receives a session modification request message sent by a terminal device, and the session modification request message includes the user identification.
  • the session management function network element 210 is used to obtain the charging rules of the session, including: the session management function network element 210 is used to send a policy association request message to the policy control function network element 230, and the policy The association request message includes the permanent subscription ID and the user ID; the charging rule of the session sent by the policy control function network element 230 is received, and the charging rule of the session is the charging rule corresponding to the user ID.
  • the policy control function network element 230 is configured to receive the policy association request message, and send the charging rule of the session to the session management function network element 210.
  • the session management function network element 210 is used to obtain the charging rules of the session, including: the session management function network element 210 is used to send a policy association update request message to the policy control function network element 230,
  • the policy association update request message includes the subscription permanent identification and the user identification; the charging rule of the session sent by the policy control function network element 230 is received, and the charging rule of the session is the charging rule corresponding to the user identification.
  • the policy control function network element 230 is configured to receive the policy association update request message, and send the charging rule of the session to the session management function network element 210.
  • the session management function network element 210 is used to execute the charging rule, including: the session management function network element 210 is used to send a charging request message to the charging function network element 220, and the calculation
  • the charge request message includes the user ID
  • the charging request message is used to request the charging information corresponding to the user ID
  • the charging information includes one or more of authorized service quota, reporting threshold, and trigger event; receiving charging
  • the usage report is generated based on the charging information.
  • the charging function network element 220 is configured to receive the charging request message and send the charging information to the session management function network element 210.
  • the policy control function network element, session management function network element, and charging function network element involved in this article are only a name, and the name does not constitute a limitation on the device itself.
  • the policy control function network element, the session management function network element, and the charging function network element may also have other names, which are not specifically limited in the embodiment of the present application.
  • the policy control function network element may also be replaced with a policy control function (PCF) or PCF entity
  • the session management function network element may be replaced with a session management function (SMF) or SMF entity.
  • the charging function network element can be replaced with a charging function (CHF) or CHF entity.
  • the functions of the above-mentioned policy control function network element, session management function network element, and charging function network element may be implemented by a single device, or integrated on one or two devices, or may be implemented by one or more devices.
  • This function module is implemented, which is not specifically limited in the embodiment of the present application.
  • the above-mentioned functions implemented by each network element can be implemented by network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on platforms (for example, cloud platforms).
  • FIG. 1 and FIG. 2 may also include other network elements that interact or communicate with the network elements in the figures, which is not limited.
  • the terminal (terminal) equipment in the embodiments of the present application may refer to user equipment (UE), access terminal, terminal in V2X communication, user unit, user station, mobile station, mobile station, remote station, remote terminal, Mobile equipment, user terminal, terminal equipment, wireless communication equipment, user agent or user device.
  • UE user equipment
  • access terminal terminal in V2X communication
  • user unit user station
  • mobile station mobile station
  • remote station remote terminal
  • Mobile equipment user terminal
  • terminal equipment wireless communication equipment
  • user agent or user device may refer to user agent or user device.
  • the terminal can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), and a wireless communication function Handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the future 5G network or terminals in the future evolution of the public land mobile network (PLMN) Devices, etc., are not limited in the embodiments of the present application.
  • the terminal may also include a V2X device, such as a vehicle or an onboard unit (OBU) in the vehicle.
  • V2X device such as a vehicle or an onboard unit (OBU) in the vehicle.
  • the terminal device in the embodiment of the present application is connected to a radio access network (radio access network, RAN) device in a wireless manner, and the radio access network device is connected to a core network device in a wireless or wired manner.
  • the core network device and the wireless access network device can be separate and different physical devices, or they can integrate the functions of the core network device and the logical function of the wireless access network device on the same physical device, or it can be a physical device It integrates the functions of part of the core network equipment and part of the wireless access network equipment.
  • the terminal can be a fixed location, or it can be movable.
  • Radio access network equipment is the access equipment that terminal equipment accesses to the mobile communication system through wireless means, which can be base station NodeB, evolved base station eNodeB, base station (gNodeB, gNB) in 5G mobile communication system, and future mobile communication
  • the base station in the system or the access node in the wireless fidelity (wireless fidelity, WiFi) system, etc. can also be the wireless controller in the cloud radio access network (CRAN) scenario, or the access network
  • the device may be a relay station, an access point, a vehicle-mounted device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, etc.
  • the embodiments of the present application adopt specific wireless access network devices.
  • the technology and specific equipment form are not limited.
  • the core network equipment includes, for example, a broadcast multicast service center (BMSC), etc., or may also include corresponding functional entities in the 5G system, such as a core network control plane (CP) or user plane (user plan, UP) Network functions, such as SMF, access and mobility management function (AMF), etc.
  • CP core network control plane
  • UP user plane
  • SMF access and mobility management function
  • the core network control plane can also be understood as a core network control plane function (CPF) entity.
  • CPF core network control plane function
  • system 100 shown in FIG. 1 or the system 200 shown in FIG. 2 may be applied to a 5G network and other possible networks in the future, which is not specifically limited in the embodiment of the present application.
  • the above-mentioned session management function network element may be the SMF in 5G
  • the policy control function network element may be the PCF in 5G
  • the fee function network element may be CHF in the 5G system.
  • the above-mentioned session management function network element may be the SMF of the visited place in 5G
  • the policy control function network element may be the visited place policy control function in 5G (visited-policy control function, V-PCF).
  • the above-mentioned session management function network element may be the home session management function (H-SMF) in 5G, and the policy control function network
  • H-SMF home session management function
  • H-PCF home-policy control function
  • FIG. 3 shows a schematic diagram of a basic 5G system 300 architecture.
  • the system 300 includes: access and mobility management function (AMF), session management function (session management function, SMF), radio access network (RAN), Unified data management (UDM), policy control function (PCF), data network (DN), user plane function (UPF), UE, application function (application function, AF), unified data storage (unified data repository, UDR) and charging function (charging function, CHF).
  • Figure 3 may also include the following functions (not shown in Figure 3): network slice selection function (NSSF), authentication server function (authentication server function, AUSF), capability opening function (network slice selection function, NSSF) exposure function, NEF), network storage function (NF repository function, NRF).
  • each network element the main functions of each network element are described as follows:
  • the AF It can be understood as the naming of application function network elements in the 5G architecture. Among them, the application function network element mainly conveys the requirements of the application side on the network side, for example, quality of service (QoS) requirements.
  • QoS quality of service
  • the AF may be a third-party functional entity, or an application service deployed by an operator, such as an IP Multimedia Subsystem (IMS) voice call service.
  • IMS IP Multimedia Subsystem
  • UDM It can be understood as the naming of unified data management network elements in the 5G architecture.
  • the unified data management network element mainly includes the following functions: unified data management, support for authentication credential processing in 3GPP authentication and key agreement mechanism, user identity processing, access authorization, registration and mobility management, contract management, short message Management etc.
  • UDR It can be understood as the naming of unified data storage network elements in the 5G architecture.
  • the unified data storage network element mainly includes the following functions: access functions for type data such as subscription data, policy data, and application data.
  • PCF It can be understood as the naming of policy control function network elements in the 5G architecture. Among them, the policy control function network element is mainly responsible for the policy control functions such as charging for the session and service flow level, quality of service (QoS) bandwidth guarantee and mobility management, and UE policy decision-making.
  • the PCF connected to the AMF and SMF is the access and mobility control PCF (PCF for access and mobility control, AM PCF) and the session management PCF (PCF for session management, SM PCF).
  • the AM PCF It may not be the same PCF entity as SM PCF.
  • SMF It can be understood as the naming of the session management network element in the 5G architecture. Among them, the session management network element mainly performs functions such as session management, the execution of the control policy issued by the PCF, the selection of the UPF, and the UE IP address allocation.
  • AMF It can be understood as the naming of mobility management network elements in the 5G architecture.
  • the mobility management network element mainly includes the following functions: connection management, mobility management, registration management, access authentication and authorization, reachability management, security context management and other access and mobility-related functions.
  • UPF It can be understood as the naming of user plane function network elements in the 5G architecture.
  • the user plane function network element mainly includes the following functions: data packet routing and transmission, packet inspection, service usage reporting, QoS processing, lawful monitoring, upstream packet inspection, downstream data packet storage and other user-related functions.
  • (R)AN (wireless) access network, corresponding to different access networks in 5G, such as wired access and wireless base station access.
  • DN Data network, used to identify the name of the operator's network access point.
  • the DN may also include authentication, authorization, and accounting (authentication, authorization, accounting, AAA) server functions, which are responsible for performing secondary authentication for users.
  • authentication, authorization, and accounting authentication, authorization, accounting, AAA
  • CHF Charging function. Responsible for reporting charging status information to PCF, and interacting with SMF to achieve quota management and charging control.
  • N7 The interface between PCF and SMF, used to issue PDU session granularity and service data flow granularity control strategy.
  • N15 The interface between PCF and AMF, used to issue UE policies and access control related policies.
  • N5 The interface between AF and PCF, used for application service request issuance and network event reporting.
  • N4 The interface between SMF and UPF, used to transfer information between the control plane and the user plane, including controlling the issuance of user-oriented forwarding rules, QoS control rules, traffic statistics rules, etc., and user-plane information reporting.
  • N11 The interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, and transfer radio resource control information sent to RAN.
  • N2 An interface between AMF and RAN, used to transfer radio bearer control information from the core network side to the RAN.
  • N1 The interface between the AMF and the UE, which has nothing to do with access, and is used to transfer QoS control rules to the UE.
  • N8 The interface between AMF and UDM, used for AMF to obtain access and mobility management related subscription data and authentication data from UDM, and AMF to register UE current mobility management related information with UDM, etc.
  • N10 The interface between SMF and UDM, used for SMF to obtain session management related subscription data from UDM, and SMF to register UE current session related information with UDM, etc.
  • N35 The interface between UDM and UDR, used for UDM to obtain user subscription data information from UDR.
  • N36 The interface between the PCF and the UDR, used for the PCF to obtain policy-related contract data and application data related information from the UDR.
  • N3 The interface between RAN and UPF, used to transfer user plane data between RAN and UPF.
  • N6 The interface between UPF and DN, used to transfer user plane data between UPF and DN.
  • N9 The interface between UPF and UPF, such as the interface between the visited-policy control function (V-PCF) and the home-policy control function (H-PCF), or with The interface between the UPF connected to the DN and the UPF connected to the RAN is used to transfer user plane data between UPFs.
  • V-PCF visited-policy control function
  • H-PCF home-policy control function
  • N28 The interface between the PCF and the CHF, used for the PCF to subscribe to the UDR for policy counter information, such as user balance status, remaining traffic status, etc.
  • N40 The interface between SMF and CHF, used for SMF to report charging data to CHF, and to obtain credit threshold from CHF.
  • the 3rd generation partner project (the 3rd generation partner project, 3GPP) standard defines two roaming methods for users to access in the visited area, namely local breakout roaming and home access roaming. Routed roaming) two ways, respectively corresponding to the system shown in Figure 4 and Figure 5.
  • FIG. 4 shows a schematic diagram of the architecture of a 5G system 400 for local access roaming.
  • the system 400 includes: AMF, SMF, (R)AN, UDM, visited-policy control function (V-PCF), home-policy control function (home-policy control function, H-PCF), DN, UPF, UE, AF, CHF and UDR.
  • the interface between V-PCF and H-PCF is N24.
  • the other network elements are all located in the visited public land mobile communications network.
  • both AMF and SMF are located in the visited place, and the session management function is executed by the SMF functional entity in the visited place at this time.
  • the V-PCF connected to the AMF and the V-PCF connected to the SMF correspond to AM PCF and SM PCF respectively, and AM PCF and SM PCF may not be the same PCF entity in actual scenarios.
  • the charging rules involved in this application are provided by the V-PCF in the architecture to the SMF.
  • FIG. 5 shows a schematic diagram of the architecture of a 5G system 500 with access roaming in the home (or "hometown").
  • the difference between FIG. 5 and FIG. 4 is that the system 500 adds a home user plane function (H-UPF) and a home session management function (H-SMF). That is, both the V-PLMN side and the H-PLMN side include UPF and SMF.
  • H-UPF home user plane function
  • H-SMF home session management function
  • the UPF on the V-PLMN side is connected to the UPF on the H-PLMN side through the N9 interface, and the UPF on the H-PLMN side is connected to the DN through the N9 interface;
  • V-SMF on the V-PLMN side and H-SMF on the H-PLMN side Connect through the N11 interface, H-SMF connects with the UPF on the H-PLMN side through the N4 interface, and H-SMF connects with the UDM through the N10 interface.
  • H-PCF is connected to AF through N5 interface.
  • the AMF is located in the visited place, and the session management function is performed by the H-SMF.
  • the H-PCF connected to the V-PCF and the H-PCF connected to the H-SMF correspond to the AM PCF and SM PCF in this application, respectively.
  • AM PCF and SM PCF may not be the same PCF entity in actual scenarios. It may be the same PCF entity.
  • the charging rules involved in this application can be provided to the H-SMF by the H-PCF in the architecture.
  • the SM PCF is a policy control function entity connected to the SMF and is responsible for executing the session management policy rule decision function.
  • AM PCF is a policy control function entity directly connected to AMF, which is responsible for executing the access control policy and the policy rule decision function of the UE policy.
  • each network element such as V-PCF, H-PCF, AMF, etc.
  • FIG. 3, FIG. 4, or FIG. 5 is only a name, and the name does not limit the function of the network element itself.
  • the aforementioned network elements may also have other names, which are not specifically limited in the embodiment of the present application.
  • some or all of the above-mentioned network elements may use the terminology in 5G, or may be named in other ways, etc., which will be uniformly explained here and will not be repeated here.
  • FIGS. 3 to 5 are only described as examples. In practice, the 5G system may also include other network elements that interact with the network elements illustrated in the figures, which will not be repeated here.
  • the communication between the various network elements of the control plane function in FIG. 3 to FIG. 5 is described using a non-service interface as an example, but it does not limit the protection scope of the embodiments of the present application.
  • the various network elements of the control plane functions in Figures 3 to 5 can also communicate through service-oriented interfaces.
  • the service-oriented interface provided by AMF can be Namf
  • the service-oriented interface provided by SMF can be Nsmf
  • the service-oriented interface provided by UDM can be Nudm
  • the service-oriented interface provided by AF can be Naf
  • the service-oriented interface provided by PCF can be Npcf and so on.
  • FIGS. 3 to 5 show a schematic diagram of the architecture based on the service interface.
  • the per-architecture 600 includes: NSSF, AUSF, UDM, NEF, NRF, PCF, AF, AMF, SMF, UE, RAN, UPF, DN, and CHF.
  • the servicing interface provided by NSSF can be Nnssf
  • the servicing interface provided by NEF can be Nnef
  • the servicing interface provided by NRF can be Nnrf
  • the servicing interface provided by AMF can be Namf
  • SMF The servicing interface provided by UDM can be Nsmf
  • the servicing interface provided by UDM can be Nudm
  • the servicing interface provided by AF can be Naf
  • the servicing interface provided by PCF can be Npcf
  • the servicing interface provided by AUSF can be Nausf
  • the servicing interface provided by CHF to the outside world can be Nchf
  • the interface between the control plane function and RAN and UPF is a non-serving interface.
  • the UE is connected to the AMF through the N1 interface, the UE is connected to the RAN through the radio resource control (Radio Resource Control, RRC) protocol; the RAN is connected to the AMF through the N2 interface, and the RAN is connected to the UPF through the N3 interface; the UPF is connected to the DN through the N6 interface.
  • RRC Radio Resource Control
  • UPF connects with SMF through N4 interface.
  • 5G system architecture 5G system architecture
  • the connection relationship of the architecture 600 is not described here.
  • FIG. 7 shows a schematic block diagram of a computer device 700 to which an embodiment of the present application is applied.
  • the above-mentioned session management function network element, policy control function network element, and charging function network element can all be implemented by the computer device in FIG. 7.
  • the computer device may be a physical device, or a component of the physical device (for example, an integrated circuit, a chip, etc.), or a functional module in the physical device.
  • the computer device includes: one or more processors 701.
  • the processor 701 may store execution instructions for executing the method in the embodiments of the present application.
  • an interface may be called in the processor 701 to implement receiving and sending functions.
  • the interface may be a logical interface or a physical interface, which is not limited.
  • the interface can be a transceiver circuit or an interface circuit.
  • the transceiver circuits or interface circuits used to implement the receiving and transmitting functions may be separate or integrated.
  • the foregoing transceiver circuit or interface circuit can be used for code/data reading and writing, or the foregoing transceiver circuit or interface circuit can be used for signal transmission or transmission.
  • the interface can be implemented by a transceiver.
  • the computer device 700 may further include a transceiver 703.
  • the transceiver 703 may be referred to as a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., for implementing the transceiver function.
  • the computer device may further include a memory 702.
  • the embodiment of the present application does not specifically limit the specific deployment location of the memory 702.
  • the memory may be integrated in the processor or independent of the processor.
  • the computer device only needs to have processing functions, and the memory can be deployed in other locations (for example, a cloud system).
  • the processor 701, the memory 702, and the transceiver 703 communicate with each other through an internal connection path to transfer control and/or data signals.
  • the computer equipment 700 may also include other devices, such as an input device, an output device, a battery, and so on.
  • the memory 702 may store execution instructions for executing the methods in the embodiments of the present application.
  • the processor 701 may execute instructions stored in the memory 702 in combination with other hardware (for example, the transceiver 703) to complete the steps executed by the method shown below.
  • other hardware for example, the transceiver 703
  • the method disclosed in the embodiment of the present application may be applied to the processor 703 or implemented by the processor 703.
  • the processor 703 may be an integrated circuit chip with signal processing capabilities.
  • each step of the method can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory (RAM), flash memory, read-only memory (read-only memory, ROM), programmable read-only memory, or electrically erasable programmable memory, registers, etc. mature in the field Storage medium.
  • the storage medium is located in the memory, and the processor reads the instructions in the memory and completes the steps of the above method in combination with its hardware.
  • the memory 702 may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory ROM, programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory RAM, which acts as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • serial link DRAM SLDRAM
  • direct rambus RAM direct rambus RAM
  • the aforementioned computer device 700 may be a general-purpose computer device or a special-purpose computer device.
  • the computer device 700 may be a desktop computer, a portable computer, a network server, a palmtop computer (personal digital assistant, PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device, an embedded device, or an embedded device as shown in Figure 7. Similar structure equipment.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the computer device 700.
  • the method provided in this application is applied to a 5G system as an example to describe the charging method provided in this application. It should be understood that this method can also be applied to other systems, and correspondingly, the network elements should also be replaced with network elements with the same or similar functions in the system. It should also be noted that the signaling involved in the interaction between the network elements described in this article uses the corresponding signaling in the prior art or existing protocol. In practice, these signaling can also be replaced. For other names, as long as the corresponding functions can be realized. In addition, the following uses the "session" in this application as an example to describe each method. In practice, the PDU session can also be replaced with other sessions.
  • Fig. 8 shows a schematic flowchart of a charging method 800 according to an embodiment of the present application.
  • the charging method 800 will be described in detail below in conjunction with each step.
  • S801 The SMF obtains the contract permanent identification and the user identification.
  • SMF can obtain the permanent subscription ID and user ID corresponding to the PDU session, that is, SMF can obtain the user ID and permanent subscription ID corresponding to the PDU session currently requested to be established or modified .
  • the user corresponding to the user ID accesses the network through the device corresponding to the contract permanent ID, or in other words, the contract permanent ID refers to the ID of the device requesting the establishment or modification of the PDU session, and the user ID refers to the actual request for establishment or modification
  • the service flow corresponding to the PDU session established by the PDU session establishment request message is the service flow under the user identifier.
  • the subscription permanent identifier may be a user permanent identifier (subscription permanent identifier, SUPI), or a public subscription identifier (generic public subscription identifier, GPSI), or information after the SUPI is renamed as the protocol evolves.
  • the user identification may be defined and managed by a third party, or may also be defined and managed by an operator.
  • the user identification may be an Apple ID, WeChat ID, or WeChat ID managed/assigned by a third party, or a Telecom Tianyi account, China Mobile And, and account managed/assigned by an operator.
  • the user identifier may be a data network specific identifier (DN-SpecificIdentify), or may also be information representing a user in a specific context defined in the current protocol (information representing a user in a specific context).
  • Scenario 1 Multiple users access the network through the same UE in time sharing
  • the permanent subscription identifier can be the permanent subscription identifier (such as SUPI) that the UE subscribes in the operator network.
  • the user identifier is the account identifier (identifier, ID) of the corresponding user who accesses the corresponding time at that time. For example, different users access game services through the same game client on the terminal with their own account IDs.
  • Scenario 2 Multiple applications on the same UE or multiple users behind the same UE access the network through the UE
  • the contracted permanent identity can be the signed permanent identity of the UE in the operator network
  • the user identity can be the application ID of different applications, or the user ID corresponding to different users, such as the child system account in parent protection. ID.
  • Scenario 3 Multiple terminal devices access the network through UE (for example, Residential Gateway).
  • UE for example, Residential Gateway.
  • the contract permanent identification is the contract permanent identification of the home gateway contracted in the operator network
  • the account IDs allocated by the third party to the multiple terminal devices can be used as a user identification.
  • the user identification may be the device ID corresponding to the terminal device, or the Apple account ID that is logged in.
  • the SMF may obtain the user identity from the PDU session establishment request message or the PDU session modification request message sent by the UE.
  • the user identifier may be carried in the PDU session establishment or modification request message sent to the SMF. Therefore, the SMF can obtain the user identity from the PDU session establishment or modification request message sent by the UE.
  • the session configuration action package may include: (1) Determine session configuration parameters, such as session and service continuity (session and service continuity, SSC) mode (mode), contract quality of service (QoS) parameters, etc.; (2) ) Determine whether the user ID carried by the UE is credible by interacting with UDM/AUSF, for example, by sending an authentication request message containing the user ID and the permanent contract ID to UDM/AUSF to determine whether the UE is allowed to initiate PDUs with the user ID Conversation. If the user ID is credible, SMF can then execute S802.
  • session configuration parameters such as session and service continuity (session and service continuity, SSC) mode (mode), contract quality of service (QoS) parameters, etc.
  • SSC session and service continuity
  • mode mode
  • QoS contract quality of service
  • the SMF may obtain the user identity from the authentication response message sent by the DN. That is, the authentication response message sent by the DN to the SMF includes the user identity.
  • the DN may be an AAA server in a data network deployed by a third party, or a common authentication server, which is not limited in this application.
  • the DN can also perform secondary authentication on the user during the PDU session establishment process. If the UE is authenticated by the DN, the DN ends the authentication process by sending an authentication response message to the SMF.
  • the authentication response message can carry the user identity, so that the SMF can obtain the user identity from the authentication response message. After that, the SMF can continue to perform S802.
  • the authentication response message may also carry the DN authorization profile index (Authorization profile index) and authorized session AMBR (Authorized Session-AMBR) parameters, where AMBR is the aggregate maximum bit rate (aggregated maximum bit rate).
  • DN Authorization profile index is used to index to specific policy rules in the policy data, such as user policy signing rules of a specific level
  • Authorized Session-AMBR is used to describe the upper limit of aggregate bandwidth allowed for the session, which corresponds to all The upper limit of bandwidth that can be reached by non-guaranteed bandwidth (Non-GBR, non-Guaranteed Bitrate) services.
  • the secondary authentication process may be that a third-party service needs to authenticate whether the user is allowed to access the current service, such as a specific website, a VPN server, or a game server to control user access.
  • a third-party service needs to authenticate whether the user is allowed to access the current service, such as a specific website, a VPN server, or a game server to control user access.
  • the SMF may obtain the permanent subscription identifier from the PDU session establishment request message or the PDU session modification request message or the session management request message sent by the AMF.
  • the PDU session establishment request message or the PDU session modification request message may carry the subscription permanent identification
  • the session management request message sent by the AMF may also carry the subscription permanent identification.
  • S802 The SMF sends a policy association request message to the PCF.
  • the PCF receives the policy association request message sent by the SMF.
  • the SMF received a PDU session establishment request, and the policy association request message sent by the SMF was a policy association establishment request message; if the SMF received a PDU session modification request, the SMF sent a policy association update request.
  • the policy association request message includes the subscription permanent identification and the user identification, and the policy association request message is used to request the charging rules corresponding to the subscription permanent identification and the user identification, or the policy association request message is used to request The charging rule corresponding to the user ID under the contract permanent ID.
  • the contract permanent identification and the user identification will be used as input information for the PCF to execute policy decisions.
  • the policy association establishment request message may also include single network slice selection assistance information (single network slice selection assistance information, S). -NSSAI), data network name (DNN).
  • S single network slice selection assistance information
  • DNN data network name
  • the policy association update request message may also include the quality of service (QoS) parameters requested by the UE.
  • QoS quality of service
  • the service flow description information is used by the SMF to request the PCF for the charging rules corresponding to the service flow description information.
  • the PCF sends a charging rule to the SMF.
  • the SMF receives the charging rules sent by the PCF.
  • the charging rule includes the charging key value corresponding to the user identifier.
  • the PCF after the PCF receives the policy association request message sent by the SMF, it can execute the policy decision according to the user policy subscription information stored in the UDR, the locally stored operator configuration information, and the input information of the policy decision provided by the SMF, and Generate charging rules.
  • the charging rule includes the charging key value corresponding to the user identification.
  • the charging key value corresponding to the user ID can have two meanings: (1) A charging key value generated according to the user ID and the charging key corresponding to the service requested by the PDU session; (2) Assigning the user ID In this sense, when the same service is accessed through different user IDs, the corresponding charging key may be different.
  • the charging key is used by the CHF to determine the corresponding charging rate based on the key, which is equivalent to the concept of a rating group.
  • the charging key is mainly described in this article.
  • the charging rule may also include the following content:
  • Charging method charging method, that is, online or offline charging
  • Measurement method Statistics method, corresponding to statistics based on duration, traffic statistics, or duration + traffic methods, or event-triggered statistics, such as triggering based on UE location area change events, access mode change events, etc.;
  • Charging address Charging function address information. This cell can only be carried to SMF in the PDU session policy control information, that is, the charging bills generated in the entire PDU session must be reported to the same CHF. SMF may also obtain the CHF billing address through other means, such as performing network element discovery through NRF and selecting an available CHF.
  • S804 The SMF executes the charging rule.
  • SMF After SMF receives the charging rule, it can execute the charging rule or perform charging control according to the charging rule.
  • core networks such as SMF, PCF, etc.
  • SMF can realize user identity perception
  • SMF can implement user identity granular charging according to the charging rules of the user identity granularity.
  • the SMF charging rules can include:
  • SMF sends a charging request message to CHF.
  • CHF receives the charging request message sent by the SMF.
  • the charging request message includes the charging key value corresponding to the user ID and the subscription permanent ID.
  • the charging request message is used to request the charging information corresponding to the subscription permanent identifier and the charging key value corresponding to the user identifier.
  • the charging information includes one or more of an authorized service quota (Granted Service Unit), a reporting threshold (threshold), and triggers (triggers).
  • Authorized business quota mainly used to characterize the available quota provided by CHF to SMF. This parameter can be carried to the SMF at the same time as the reporting threshold parameter of the CHF decision.
  • the authorized service quota (Granted Service Unit) can also be called the authorized usage GU (Granted Unit).
  • Reporting threshold that is, CHF provided to SMF or SMF provided to UPF to indicate the timing of when UPF triggers usage reporting, that is, UPF judges that the usage statistics reach the reporting threshold and reports usage information to SMF.
  • the reporting threshold is less than or equal to the authorized service quota.
  • CHF sends the charging information to SMF. Accordingly, the SMF receives the charging information.
  • the SMF sends a packet detection rule (PDR) and a usage reporting rule (URR) to the UPF.
  • PDR packet detection rule
  • URR usage reporting rule
  • UPF performs usage statistics and sends usage information to SMF under certain conditions.
  • SMF generates a PDR corresponding to the user ID (or corresponding to the charging key value corresponding to the user ID) based on the charging rules received from the PCF, the charging information received from the CHF, and the local configuration information. And URR, and provide PDR and URR to UPF.
  • PDR mainly includes PDR ID, packet inspection information (quintuple, port number, tunnel information, etc.), URR ID (used to indicate the charging defined in URR corresponding to URR ID corresponding to the service flow that meets packet inspection information) Control) and so on.
  • URR indicates what kind of charging control is adopted for these service flows, such as statistics by time/flow, reporting threshold, available quota, trigger event, etc.
  • the UPF After the UPF receives the PDR and URR, it will match the service flow in the PDU session according to the priority of the received PDR. If the specific service flow matches the flow description information in the current PDR, it will be based on the PDR contained URR ID finds the corresponding URR, and performs usage statistics based on the URR. When the usage statistics reach the reporting threshold (the reporting threshold here is determined by SMF based on the reporting threshold provided by CHF and/or authorized service quota and provided to UPF, it can be less than or equal to the reporting threshold provided by CHF to SMF) or SMF When the requested trigger event occurs, UPF will report the current usage information to SMF.
  • the usage information may include the charging key value corresponding to the user ID, time stamp information, and used unit. Optionally, the usage information may also include trigger event information and other content.
  • the SMF charging rules can include:
  • SMF sends an offline charging request message to CHF.
  • the CHF receives the offline charging request message.
  • the offline charging request message includes the subscription permanent identification and the charging key value corresponding to the user identification.
  • the offline charging request message is used to request a trigger event corresponding to the subscription permanent identification and the charging key value corresponding to the user identification.
  • CHF sends the trigger event to SMF. Accordingly, SMF receives the trigger event.
  • SMF sends PDR and URR to UPF.
  • UPF performs usage statistics and sends usage information to SMF under certain conditions.
  • the SMF is based on the charging rules provided by the PCF, the trigger event provided by the CHF, and the PDR and URR generated by the local configuration.
  • SMF After SMF generates PDR and URR, it provides PDR and URR to UPF.
  • the UPF After the UPF receives the PDR and URR, it will match the service flow in the PDU session according to the priority of the received PDR. If the specific service flow matches the flow description information in the current PDR, it will be based on the PDR contained URR ID finds the corresponding URR, and performs usage statistics based on the URR.
  • the reporting threshold here is determined by SMF based on the local pre-configured authorized business quota and/or the local pre-configured reporting threshold and provided to the UPF, it can be less than or equal to the local pre-configured reporting threshold of the SMF ) Or when a trigger event requested by SMF occurs, UPF will report the current usage information to SMF.
  • the usage information may include the charging key value corresponding to the user ID, time stamp information, and used unit.
  • the usage information may also include trigger event information and other content.
  • the UPF actually counts the establishment or modification triggered by the PDU session modification request message The amount corresponding to one or more QoS flows.
  • the method may further include: S805 to S807.
  • SMF generates a usage report.
  • S806 The SMF sends the usage report to the CHF.
  • SMF can count the usage information corresponding to the charging key value corresponding to the user ID reported by the UPF, and the usage corresponding to the charging key value corresponding to the user ID reaches the authorized service quota or reaches the reporting threshold Or when the event corresponding to the trigger event occurs, the SMF will generate a usage report, and the SMF will send the usage report to the CHF.
  • the usage report includes the charging key value corresponding to the user ID, the subscription permanent ID, and the usage information generated by the user corresponding to the user ID corresponding to the charging key value, or in other words, the usage amount in the usage report
  • the information is usage information corresponding to the user ID or the charging key value and the contract permanent ID.
  • SMF can count the usage information corresponding to the charging key value corresponding to the user ID reported by the UPF, and the usage corresponding to the charging key value corresponding to the user ID reaches the local pre-configured authorized service quota Or when the local pre-configured reporting threshold is reached or the event corresponding to the trigger event occurs, a usage report is generated, and the SMF sends the usage report to the CHF.
  • the usage report includes the charging key value corresponding to the user ID, the subscription permanent ID, and usage information generated by the user corresponding to the user ID corresponding to the charging key value.
  • the CHF generates bill information corresponding to the user ID according to the usage report.
  • the action of the CHF to generate the bill information may include sorting according to the usage report reported by the SMF and saving it to the subscription permanent identification or the bill file corresponding to the third-party application, where the bill file contains the user identification , And generate the corresponding billing system based on the bill file.
  • the bill file is saved to the bill file corresponding to the contracted permanent ID or the bill file corresponding to the third-party application depends on the actual billing entity, that is, whether the device or account corresponding to the contracted permanent ID is paid or the third-party application is paid . If the current device pays, the bill file is saved to the bill file corresponding to the contract permanent identification, and if the third-party application pays, the bill file is saved to the bill file corresponding to the third-party application.
  • CHF sorting the bill file to the corresponding account system may also involve interaction with other charging nodes, such as the CHF reporting the bill file to the billing domain (Billing Domain)/charging gateway ( Charging Gateway) to sort the bills to the corresponding device account or third-party application account.
  • billing domain Billing Domain
  • Charging Gateway Charging Gateway
  • the SMF after the SMF obtains the charging key value corresponding to the user ID from the PCF, it can provide the CHF with the usage information corresponding to the charging key value, so that the user ID or the user corresponding to the user ID can be realized
  • the granularity of billing after the SMF obtains the charging key value corresponding to the user ID from the PCF, it can provide the CHF with the usage information corresponding to the charging key value, so that the user ID or the user corresponding to the user ID can be realized The granularity of billing.
  • FIG. 9 shows a schematic flowchart of a charging method 900 according to an embodiment of the present application.
  • the charging method 900 will be described in detail below in conjunction with the steps.
  • the SMF receives a PDU session establishment request message or a PDU session modification request message sent by the UE.
  • the PDU session establishment request message is used to establish a session of the device corresponding to the subscription permanent identification.
  • the PDU session modification request message is used to modify the session of the device corresponding to the subscription permanent identifier.
  • S902 The SMF obtains the user identifier and the charging rule of the PDU session.
  • the service flow corresponding to the PDU session established by the PDU session establishment request message is the service flow under the user identity.
  • the service flow corresponding to the PDU session modified by the PDU session modification request message is the service flow under the user ID.
  • the SMF can obtain the user identity through the three methods described above. For details, refer to the above description, which will not be described in detail here.
  • the SMF can request the PCF to provide charging rules for the PDU session by sending a policy association request message to the PCF. After the PCF receives the policy association request message sent by the SMF, it determines the charging rule for the PDU session and sends it to the SMF.
  • the content carried in the policy association request message can refer to the existing technology, for example, it can include parameters such as the permanent sign of the contract, the DN policy index, DNN, and S-NSSAI.
  • the charging rule of the PDU session includes the charging key value corresponding to the service corresponding to the PDU session.
  • the SMF may also carry the user identifier in the policy association request message sent to the PCF.
  • the charging rule for the PDU session determined by the PCF can be considered as the charging rule corresponding to the user identity.
  • the charging key value included in the charging rule of the PDU session may be the charging key value corresponding to the user identifier.
  • S903 The SMF executes the charging rules of the PDU session to generate a usage report corresponding to the user ID.
  • the SMF charging rules can include:
  • SMF sends a charging request message to CHF.
  • the CHF receives the charging request message sent by the SMF.
  • the charging request message includes the user identification.
  • the charging request message is used to request the charging information corresponding to the user identifier.
  • the charging information includes one or more of an authorized service quota (Granted Service Unit), a reporting threshold (threshold), and triggers (triggers).
  • the authorized service quota (Granted Service Unit) can also be called the authorized usage GU (Granted Unit).
  • the CHF sends the charging information requested by the SMF to the SMF. Accordingly, the SMF receives the charging information.
  • SMF sends PDR and URR to UPF.
  • UPF performs usage statistics, and under certain conditions, sends usage information to SMF.
  • the SMF charging rules can include:
  • SMF sends an offline charging request message to CHF.
  • the CHF receives the offline charging request message.
  • the offline charging request message includes the user identification.
  • the offline charging request message is used to request the trigger event corresponding to the user identifier.
  • CHF sends the trigger event to SMF. Accordingly, SMF receives the trigger event.
  • SMF sends PDR and URR to UPF.
  • UPF performs usage statistics, and under certain conditions, sends usage information to SMF.
  • steps d3 and d4 can refer to the prior art, and will not be repeated here.
  • the URR sent by the SMF to the UPF may also include the user ID, so that in the case that the user ID is obtained from the PDU session modification request message, the UPF can count the triggers of the PDU session modification request message
  • S905 The CHF generates bill information corresponding to the user ID according to the usage report.
  • the usage report may include user identification and usage information.
  • the usage report may also include a contract permanent identification.
  • the usage information may also include the charging key value corresponding to the service corresponding to the currently established PDU session.
  • SMF can count the usage information corresponding to the charging key value corresponding to the service corresponding to the current PDU session reported by UPF, and determine in SMF that the usage corresponding to the charging key value reaches the reporting threshold or the authorized service quota is exhausted Or when the event corresponding to the trigger event occurs, a usage report is generated, and the SMF sends the usage report to the CHF.
  • SMF can count the usage information corresponding to the charging key value corresponding to the service corresponding to the current PDU session reported by the UPF, and the usage corresponding to the charging key value reaches the locally pre-configured reporting threshold or triggered by the event. When the corresponding event occurs, a usage report is generated, and SMF sends the usage report to CHF.
  • the SMF can obtain the user ID corresponding to the current PDU session, and by sending the usage information corresponding to the user ID to the CHF, the CHF can generate the bill information corresponding to the user ID, thereby realizing the user ID Granular billing.
  • the charging method according to the embodiment of the present application is described above, and the device according to the embodiment of the present application will be described below. It should be understood that the technical features described in the method embodiments are also applicable to the following device embodiments.
  • FIG. 10 shows a schematic block diagram of a communication device 1000 according to an embodiment of the present application.
  • the specific form of the communication device 1000 may be a general-purpose computer device or a chip in a general-purpose computer device, which is not limited in the embodiment of the present application.
  • the communication device 1000 includes a transceiver unit 1010 and a processing unit 1020.
  • the communication device 1000 may be any network element involved in this application, and may implement the functions that the network element can implement. It should be understood that the communication apparatus 1000 may be a physical device, or a component of the physical device (for example, an integrated circuit, a chip, etc.), or a functional module in the physical device.
  • the communication device 1000 may be used to implement the function of the session management function network element (such as SMF) in this application.
  • the processing unit 1010 is configured to obtain a subscription permanent identification and a user identification, and the user corresponding to the user identification accesses the network through a device corresponding to the subscription permanent identification;
  • the transceiving unit 1020 is configured to communicate to the policy control function network Element sends a policy association request message, where the policy association request message includes the subscription permanent identification and the user identification;
  • the transceiver unit 1020 is further configured to receive the subscription permanent identification and the subscription permanent identification sent by the policy control function network element
  • a charging rule corresponding to the user ID where the charging rule includes a charging key value corresponding to the user ID;
  • the processing unit 1010 is further configured to execute the charging rule.
  • the device 1000 may correspond to the SMF in the foregoing method embodiment, and the foregoing and other management operations and/or functions of each module in the communication device 1000 are to implement the method 800 shown in FIG. 8 respectively.
  • the corresponding steps in the SMF can also achieve the beneficial effects in the foregoing method embodiments. For brevity, details are not described here.
  • the communication device 1000 may be used to implement the function of the session management function network element (such as SMF) in this application.
  • the transceiver unit 1020 is configured to receive a protocol data unit PDU session establishment request message or a PDU session modification request message.
  • the PDU session establishment request message is used to establish a PDU session of the device corresponding to the subscription permanent identification.
  • the PDU session The modification request message is used to modify the PDU session of the device corresponding to the subscription permanent identification; the processing unit 1010 is used to obtain the user identification and the charging rules of the PDU session, and the user corresponding to the user identification corresponds to the device through the subscription permanent identification
  • the processing unit 1010 is further configured to execute the charging rules of the PDU session to generate a usage report corresponding to the user identification; the transceiving unit 1020 is also configured to send the charging function network
  • the unit sends the usage report, the usage report includes the user identification, and the usage report is used by the charging function network element to generate call bill information corresponding to the user identification.
  • the device 1000 may correspond to the SMF in the foregoing method embodiment, and the foregoing and other management operations and/or functions of each module in the communication device 1000 are to implement the method 900 shown in FIG. 9 respectively.
  • the corresponding steps in the SMF can also achieve the beneficial effects in the foregoing method embodiments. For brevity, details are not described here.
  • the apparatus 1000 may also be used to implement the functions of the PCF, UPF, SMF, UE and other network elements in the foregoing method embodiments, where the transceiver unit 1020 may be used to implement operations related to receiving and sending, and the processing unit 1010 may It is used to implement operations other than receiving and sending.
  • the transceiver unit 1020 may be used to implement operations related to receiving and sending
  • the processing unit 1010 may It is used to implement operations other than receiving and sending.
  • the communication device 1000 is presented in the form of a functional module.
  • the “module” here may refer to application-specific integrated circuits ASIC, circuits, processors and memories that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above-mentioned functions.
  • the processing unit 1010 may be implemented by the processor 701 shown in FIG. 7.
  • the processing unit 1010 may be implemented by the processor 701 and the memory 702.
  • the transceiver unit 1020 may be implemented by the transceiver 703 shown in FIG. 7.
  • the transceiver 703 includes a receiving function and a sending function.
  • the processor is implemented by executing a computer program stored in the memory.
  • the function and/or implementation process of the transceiver unit 1020 can also be implemented through pins or circuits.
  • the memory may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit in the computer device located outside the chip, as shown in FIG.
  • the memory 702, or, may also be a storage unit deployed in other systems or devices, and is not in the computer device.
  • Computer-readable media may include, but are not limited to: magnetic storage devices (for example, hard disks, floppy disks, or tapes, etc.), optical disks (for example, compact discs (CD), digital versatile discs (digital versatile disc, DVD)) Etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • magnetic storage devices for example, hard disks, floppy disks, or tapes, etc.
  • optical disks for example, compact discs (CD), digital versatile discs (digital versatile disc, DVD)
  • smart cards and flash memory devices for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.
  • various storage media described herein may represent one or more devices and/or other machine-readable media for storing information.
  • the term "machine-readable medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
  • the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the function of any of the foregoing method embodiments is realized.
  • This application also provides a computer program product, which, when executed by a computer, realizes the functions of any of the foregoing method embodiments.
  • it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk, SSD)) etc.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk, SSD
  • system and “network” in this article are often used interchangeably in this article.
  • network in this article is only an association relationship describing associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations.
  • At least one of or “at least one of” herein means all or any combination of the listed items, for example, “at least one of A, B and C", It can mean: A alone exists, B alone exists, C exists alone, A and B exist at the same time, B and C exist at the same time, and there are six situations of A, B and C at the same time.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B according to A does not mean that B is determined only according to A, and B can also be determined according to A and/or other information.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Meter Arrangements (AREA)

Abstract

La présente invention concerne un procédé et un système de facturation ainsi qu'un dispositif de communication, permettant la mise en œuvre d'une facturation de granularité d'utilisateur. Plus particulièrement, un élément de réseau à fonction de gestion de session acquiert un identifiant permanent d'abonnement et un identifiant d'utilisateur, un utilisateur correspondant à l'identifiant d'utilisateur accédant à un réseau par l'intermédiaire d'un dispositif correspondant à l'identifiant permanent d'abonnement ; puis, demande à un élément de réseau à fonction de commande de politique une règle de facturation à laquelle l'identifiant permanent d'abonnement et l'identifiant d'utilisateur correspondent conjointement, la règle de facturation comprenant une valeur clé de facturation correspondant à l'identifiant d'utilisateur ; puis exécute la règle de facturation.
PCT/CN2020/104053 2019-07-31 2020-07-24 Procédé et système de facturation ainsi que dispositif de communication WO2021018021A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910702418.X 2019-07-31
CN201910702418.XA CN112312339B (zh) 2019-07-31 2019-07-31 计费方法、计费系统和通信装置

Publications (1)

Publication Number Publication Date
WO2021018021A1 true WO2021018021A1 (fr) 2021-02-04

Family

ID=74229337

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/104053 WO2021018021A1 (fr) 2019-07-31 2020-07-24 Procédé et système de facturation ainsi que dispositif de communication

Country Status (2)

Country Link
CN (1) CN112312339B (fr)
WO (1) WO2021018021A1 (fr)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114554538A (zh) * 2022-03-22 2022-05-27 中国电信股份有限公司 流量统计方法、装置、电子设备及存储介质
CN114630292A (zh) * 2021-09-29 2022-06-14 亚信科技(中国)有限公司 一种消息转发的方法、装置、设备及存储介质
CN114697861A (zh) * 2022-03-30 2022-07-01 中国联合网络通信集团有限公司 基于用户位置的免流方法、设备及可读存储介质
CN115086943A (zh) * 2021-03-16 2022-09-20 中国移动通信集团江苏有限公司 一种开通5g功能的方法及装置
CN115529566A (zh) * 2022-10-27 2022-12-27 广州爱浦路网络技术有限公司 基于预定义Urr的计费控制方法、系统、计算机装置及存储介质
CN115802303A (zh) * 2022-11-21 2023-03-14 广州爱浦路网络技术有限公司 一种5g漫游场景下的边缘计算计费方法、核心网和介质
CN115915044A (zh) * 2022-11-03 2023-04-04 广州爱浦路网络技术有限公司 一种用量信息传输方法、装置及网元
WO2023179332A1 (fr) * 2022-03-23 2023-09-28 华为技术有限公司 Procédé et appareil de communication
WO2024008157A1 (fr) * 2022-07-06 2024-01-11 中国电信股份有限公司 Procédé et appareil de transmission d'informations, dispositif de réseau et système de communication
WO2024031354A1 (fr) * 2022-08-09 2024-02-15 北京小米移动软件有限公司 Procédé et appareil de correction de facturation, et dispositif de communication et support de stockage
CN114554538B (zh) * 2022-03-22 2024-05-14 中国电信股份有限公司 流量统计方法、装置、电子设备及存储介质

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112969194B (zh) * 2021-02-19 2023-04-07 浪潮软件科技有限公司 一种基于反向包处理的urr统计方法
CN113543056B (zh) * 2021-07-14 2022-04-19 中国电信股份有限公司 一种归属地路由场景的5g计费方法和装置
CN115707065A (zh) * 2021-08-06 2023-02-17 华为技术有限公司 一种通信方法及装置
CN114338930B (zh) * 2021-12-30 2022-10-11 广州爱浦路网络技术有限公司 话单信息处理方法、计算机装置和存储介质
CN114466347B (zh) * 2022-01-10 2023-11-24 海能达通信股份有限公司 数据报文处理方法及装置
CN116801208A (zh) * 2022-03-17 2023-09-22 华为技术有限公司 一种计费的方法和通信装置
WO2023237035A1 (fr) * 2022-06-10 2023-12-14 Telefonaktiebolaget Lm Ericsson (Publ) Optimisation répétitive de données dans une interface n40

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019005067A1 (fr) * 2017-06-29 2019-01-03 Nokia Solutions And Networks Oy Sélection de tranche de réseau sur la base de règles de facturation
CN109218032A (zh) * 2017-06-30 2019-01-15 华为技术有限公司 一种计费方法及设备
CN109309907A (zh) * 2017-07-27 2019-02-05 中兴通讯股份有限公司 用于流量计费的方法、装置及其相关设备

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301881B (zh) * 2014-10-22 2018-09-25 中国联合网络通信集团有限公司 一种计费的方法和计费装置
US10911603B2 (en) * 2015-04-22 2021-02-02 Huawei Technologies Co., Ltd. Service allocation method and apparatus
US10797894B2 (en) * 2017-12-28 2020-10-06 Ofinno, Llc Service type and device type-based policy and charging control

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019005067A1 (fr) * 2017-06-29 2019-01-03 Nokia Solutions And Networks Oy Sélection de tranche de réseau sur la base de règles de facturation
CN109218032A (zh) * 2017-06-30 2019-01-15 华为技术有限公司 一种计费方法及设备
CN109309907A (zh) * 2017-07-27 2019-02-05 中兴通讯股份有限公司 用于流量计费的方法、装置及其相关设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ERICSSON; HUAWEI: "Charging requirements and functional description", 3GPP DRAFT; S2-1904118_WAS03290_23, vol. SA WG2, 11 April 2019 (2019-04-11), Xi’An, China, pages 1 - 9, XP051703630 *
ERICSSON; NOKIA; NOKIA SHANGHAI BELL: "Support of Generic Public Subscription Identifier", 3GPP DRAFT; C3-176204, vol. CT WG3, 4 December 2017 (2017-12-04), Reno, USA, pages 1 - 10, XP051367998 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115086943A (zh) * 2021-03-16 2022-09-20 中国移动通信集团江苏有限公司 一种开通5g功能的方法及装置
CN114630292A (zh) * 2021-09-29 2022-06-14 亚信科技(中国)有限公司 一种消息转发的方法、装置、设备及存储介质
CN114554538A (zh) * 2022-03-22 2022-05-27 中国电信股份有限公司 流量统计方法、装置、电子设备及存储介质
CN114554538B (zh) * 2022-03-22 2024-05-14 中国电信股份有限公司 流量统计方法、装置、电子设备及存储介质
WO2023179332A1 (fr) * 2022-03-23 2023-09-28 华为技术有限公司 Procédé et appareil de communication
CN114697861A (zh) * 2022-03-30 2022-07-01 中国联合网络通信集团有限公司 基于用户位置的免流方法、设备及可读存储介质
WO2024008157A1 (fr) * 2022-07-06 2024-01-11 中国电信股份有限公司 Procédé et appareil de transmission d'informations, dispositif de réseau et système de communication
WO2024031354A1 (fr) * 2022-08-09 2024-02-15 北京小米移动软件有限公司 Procédé et appareil de correction de facturation, et dispositif de communication et support de stockage
CN115529566B (zh) * 2022-10-27 2023-10-31 广州爱浦路网络技术有限公司 基于预定义Urr的计费控制方法、装置及存储介质
CN115529566A (zh) * 2022-10-27 2022-12-27 广州爱浦路网络技术有限公司 基于预定义Urr的计费控制方法、系统、计算机装置及存储介质
CN115915044B (zh) * 2022-11-03 2023-10-24 广州爱浦路网络技术有限公司 一种用量信息传输方法、装置及网元
CN115915044A (zh) * 2022-11-03 2023-04-04 广州爱浦路网络技术有限公司 一种用量信息传输方法、装置及网元
CN115802303A (zh) * 2022-11-21 2023-03-14 广州爱浦路网络技术有限公司 一种5g漫游场景下的边缘计算计费方法、核心网和介质

Also Published As

Publication number Publication date
CN112312339B (zh) 2021-11-19
CN112312339A (zh) 2021-02-02

Similar Documents

Publication Publication Date Title
WO2021018021A1 (fr) Procédé et système de facturation ainsi que dispositif de communication
US11005765B2 (en) System and method for managing and distributing packet flow descriptions in a telecommunications network
WO2017193427A1 (fr) Procédé et terminal de reconnaissance de service de commutation de paquets
CN107105457B (zh) 一种实现接入点带宽限制的方法和装置
US9894560B2 (en) Method and device for controlling QOS and/or policy and charging control of a guest user
US9445259B2 (en) Service provider certified device policy management
US20120195196A1 (en) SYSTEM AND METHOD FOR QoS CONTROL OF IP FLOWS IN MOBILE NETWORKS
US8903974B2 (en) Methods, systems, and computer readable media for user controlled policy sharing
EP2898653B1 (fr) Procédé et noeud pour controler des ressources pour un service multimédia, ainsi que système et programme informatique correspondants
WO2020253701A1 (fr) Procédé, dispositif et système pour gérer des politiques de transfert de données d'arrière-plan
US20160073328A1 (en) Method and apparatus for determining pcrf
WO2021136132A1 (fr) Procédé et appareil de traitement de paquets
KR20130034553A (ko) 이동 통신망에서 과금 시행 처리 장치 및 과금 정책 규칙 설정 방법
KR101206874B1 (ko) 통신 시스템
US8787382B2 (en) Per-peer request delivery timeouts
CN110870256B (zh) 用于操作电信网络的方法、系统和计算机可读介质
US20230362604A1 (en) Charging function fallback
CN113747479A (zh) 获取网络资源的方法、设备及系统
US8442480B2 (en) Priority communications in a shared access telecommunications network
JP2016537853A (ja) データ接続のためのオンデマンドQoS
US10959095B2 (en) Method, system and apparatus for policy based authorization and authentication of data traffic bypassing mobile network
WO2021068265A1 (fr) Procédé de configuration de politique, appareil de communication et système de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20847047

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20847047

Country of ref document: EP

Kind code of ref document: A1