WO2022142465A1 - 一种计费方法、装置和系统 - Google Patents
一种计费方法、装置和系统 Download PDFInfo
- Publication number
- WO2022142465A1 WO2022142465A1 PCT/CN2021/117836 CN2021117836W WO2022142465A1 WO 2022142465 A1 WO2022142465 A1 WO 2022142465A1 CN 2021117836 W CN2021117836 W CN 2021117836W WO 2022142465 A1 WO2022142465 A1 WO 2022142465A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- charging
- network element
- identification information
- type
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 231
- 230000006870 function Effects 0.000 claims description 114
- 238000004891 communication Methods 0.000 claims description 93
- 230000011664 signaling Effects 0.000 claims description 33
- 238000012545 processing Methods 0.000 claims description 28
- 230000001186 cumulative effect Effects 0.000 claims description 17
- 230000003993 interaction Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 abstract description 75
- 238000005516 engineering process Methods 0.000 description 61
- 238000007726 management method Methods 0.000 description 41
- 230000001413 cellular effect Effects 0.000 description 27
- 230000004927 fusion Effects 0.000 description 27
- 238000010586 diagram Methods 0.000 description 23
- 230000010354 integration Effects 0.000 description 23
- 230000005284 excitation Effects 0.000 description 20
- 238000004364 calculation method Methods 0.000 description 12
- 238000011144 upstream manufacturing Methods 0.000 description 12
- 230000004044 response Effects 0.000 description 11
- 230000009286 beneficial effect Effects 0.000 description 8
- 230000006399 behavior Effects 0.000 description 7
- 230000004048 modification Effects 0.000 description 7
- 238000012986 modification Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000003672 processing method Methods 0.000 description 6
- 238000013461 design Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 101100240462 Homo sapiens RASAL2 gene Proteins 0.000 description 1
- 102100035410 Ras GTPase-activating protein nGAP Human genes 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000009739 binding Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000005111 flow chemistry technique Methods 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
- H04L12/1407—Policy-and-charging control [PCC] architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/41—Billing record details, i.e. parameters, identifiers, structure of call data record [CDR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/44—Augmented, consolidated or itemized billing statement or bill presentation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/51—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for resellers, retailers or service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/58—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on statistics of usage or network monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/67—Transmitting arrangements for sending billing related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8016—Rating or billing plans; Tariff determination aspects based on quality of service [QoS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/82—Criteria or parameters used for performing billing operations
- H04M15/8207—Time based data metric aspects, e.g. VoIP or circuit switched packet data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/93—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP using near field or similar technologies
Definitions
- the present application relates to the field of communications, and in particular, to a charging method, device and system.
- Radio Frequency Identification technology
- RFID Radio Frequency Identification
- Passive Internet of Things Passive Internet of Things
- RFID tag will be simply referred to as a tag for description.
- the reader can read the data information in the tag, which can realize the purpose of identifying the target and exchanging data.
- the reader can also have the function of writing.
- RFID has the advantages of easy operation, convenient reading, high flexibility, and dynamic real-time. This technology is widely used in various fields, the most common application scenarios such as warehouse management, logistics transportation or fixed asset management. Taking logistics and transportation as an example, RFID technology can help managers to automatically collect product information. Managers can quickly query product information in the system to improve the speed and accuracy of goods handover. If there are abnormal situations such as lost goods, managers can also be the first. time to know and process. Businesses or services using RFID technology have the characteristics of small signaling traffic and services that do not occur continuously.
- RFID or passive IoT Due to the small amount of signaling traffic transmitted by RFID or passive IoT, it is not suitable for billing by statistical traffic; RFID or passive IoT services do not occur continuously, so it is not suitable for billing by statistical time, nor is it suitable for charging by statistical time. In addition, for RFID or passive IoT services, the number of request messages cannot reasonably quantify the network resources occupied by RFID or passive IoT services, so it is not possible to count the number of messages. Reasonable billing for RFID.
- the present application provides a charging method to implement reasonable charging under the network deployment architecture of RFID and cellular fusion, or to perform reasonable charging under the network deployment architecture of passive Internet of Things and cellular fusion.
- the embodiments of the present application adopt the following technical solutions:
- an embodiment of the present application provides a charging method.
- a first network element obtains charging information, and the charging information includes type information and first quantity information.
- the type information indicates the type of the first operation, and the first quantity information Indicates the first number of terminals on which the first operation is performed, and the first network element sends charging information.
- the first network element obtains the type information of the first operation and the information on the number of terminals that perform this type of operation, the charging information can reasonably reflect the resources occupied by the first operation, and the charging process is based on the charging information. Perform charging, so that the charging process is more compatible with the first operation, and the charging behavior is more reasonable.
- the first number here refers to the number of terminals that perform a certain operation without being repeatedly calculated. Quantity obtained after deduplication and integration of the double counted quantities.
- acquiring the charging information by the first network element includes: the first network element receives type information and second quantity information from the first access network device, where the second quantity information indicates that the first operation is performed by the first network element.
- the second number of terminals of the first set For example, the first quantity is equal to the second quantity. That is to say, the first access network device may perform deduplication and integration on the first set of terminals on which the first operation is performed, and report the first set of terminals on which the first operation is performed that have not been repeatedly calculated to the first network element.
- the number of terminals, that is, the second number whereby the first network element can directly determine the received second number information as charging information.
- the first network element directly obtains the quantity information, and the first network element does not need to deduplicate and integrate.
- acquiring the charging information by the first network element includes: the first network element receives type information and first identification information from the first access network device, where the first identification information is used to identify that the first identification information is executed. A terminal of the first set of operations; the first network element determines the first quantity information according to the first identification information.
- the first access network device may de-duplicate the identities of the terminals in the first set that are performing the first operation, and report to the first network element the identities of the terminals in the first set that are performing the first operation that have not been repeatedly calculated. Therefore, the first network element can determine the quantity information according to the received identification information of the terminals of the first set.
- the first network element does not need to be deduplicated, but only needs to be integrated.
- acquiring the charging information by the first network element includes: the first network element receives type information and first identification information from the first access network device, where the first identification information is used to identify that the first identification information is executed. A terminal of the first set of operations; the first network element receives type information and second identification information from the second access network device, and the second identification information is used to identify the terminals of the second set of the first operation; the first The network element determines the first quantity information according to the first identification information and the second identification information.
- the first access network device may de-duplicate the identities of the terminals in the first set that are performing the first operation, and report to the first network element the identities of the terminals in the first set that are performing the first operation that have not been repeatedly calculated.
- the second access network device can deduplicate the identifications of the terminals in the second set of terminals that are to perform the first operation, and report to the first network element the identifiers of the terminals of the second set of terminals that are subjected to the first operation that have not been repeatedly calculated. identification, thus, the first network element deduplicates the received identifications of the terminals in the first set and the terminals in the second set, and obtains the identification information of the terminals that are not repeatedly calculated to perform the first operation, and the first A network element may determine quantity information according to the identification information after deduplication.
- the first access network device and the second access network device perform deduplication, and each report the identification information of the terminal without redundancy to the first network element, which can reduce the complexity of deduplication of the first network element.
- acquiring the charging information by the first network element includes: the first network element receiving first information and second information, where the first information indicates the type of the first operation and the terminal on which the first operation is performed The second information indicates the type of the first operation and the identifier of the terminal on which the first operation is performed; the first network element determines the charging information according to the first information and the second information. For example, the first network element receives the first information and the second information from the first access network device; or the first network element receives the first information from the first access network device; the first network element receives the first information from the second access network device The device receives the second information. The first network element determines charging information according to the first information and the second information.
- the first network element performs deduplication according to the identifiers of the terminals in the received first information and the second information, and obtains the identifier information of the terminal performing the first operation that has not been repeatedly calculated.
- the first network element may The quantity information is determined according to the identification information after deduplication.
- the first network element supports a charging trigger function
- sending the charging information by the first network element includes: the first network element sends the charging information to the charging function network element. That is to say, the first network element supporting the charging trigger function directly exchanges charging information with the charging function network element responsible for charging.
- This embodiment does not forward charging information through other network elements, which reduces signaling overhead on the network side and reduces changes to other network elements.
- the sending of the charging information by the first network element includes: the first network element sending the charging information to the network element supporting the charging trigger function.
- the network elements supporting the charging trigger function include session management function network elements or access and mobility management function network elements. That is to say, no matter how the first network element is deployed, the first network element sends the acquired charging information to the network element supporting the charging trigger function, and the network element supporting the charging trigger function interacts with the network element supporting the charging function. billing.
- the first network element is co-located with the user plane function network element, and the first network element sends charging information to the session management function network element supporting the charging trigger function.
- the first network element (which may also be understood as a user plane functional network element) may interact with the access network device through a user plane channel.
- the first network element does not need to support the charging trigger function, and changes to the core network side due to the addition of the charging function are also reduced.
- the first network element is independently deployed as a control plane network element, and the first network element sends the acquired data to the session management function network element supporting the charging trigger function or the access and mobility management function network element supporting the charging trigger function. billing information.
- the first network element may interact with the session management function network element or the access and mobility management function network element through the serviced interface.
- the first network element does not need to support the charging trigger function, and changes to the core network side due to the addition of the charging function are also reduced.
- an embodiment of the present application provides a charging method, in which an access network device obtains type information and identification information, where the type information indicates the type of the first operation, and the identification information identifies the terminal on which the first operation is performed;
- the network device sends a first message to the first network element according to the type information and the identification information; wherein, the first message includes the above-mentioned type information and identification information, and the identification information is used to determine the number of terminals that perform the first operation; or , the first message includes the above-mentioned type information and quantity information determined according to the identification information, where the quantity information indicates the quantity of the terminals on which the first operation is performed.
- the first message reported by the access network device is used by the first network element to obtain the type information of the first operation and the information on the number of terminals that perform this type of operation, and the charging information can reasonably reflect the resources occupied by the first operation.
- the charging process performs charging according to the charging information, so that the charging process is more compatible with the first operation and the charging behavior is more reasonable.
- acquiring the type information and the identification information by the access network device includes: acquiring the first identification information and the second identification information by the access network device, where the first identification information indicates the first identification information on which the first operation is performed.
- the identification of the terminal of the set, the second identification information indicates the identification of the terminal of the second set of which the first operation is performed.
- the access network device determines the identification information according to the first identification information and the second identification information. That is, the access network device removes the repeatedly calculated identification information according to the obtained first identification information and the second identification information, determines the identification information that is not repeatedly calculated, and sends the first message accordingly.
- the first message reported by the access network device is used by the first network element to obtain the type information of the first operation and the number of terminals that perform this type of operation, and the first message reported by the access network device has no Redundant information to reduce signaling overhead.
- the access network device determines the quantity information according to the type information and the identification information, and sends a first message to the first network element, where the first message includes the type information and the quantity information. That is, the access network device performs deduplication according to the identification information, removes the repeatedly calculated identification information, and calculates the number of terminals according to the identification information that has not been repeatedly calculated to obtain the quantity information, and sends the first message accordingly.
- the first message reported by the access network device is used by the first network element to obtain the type information of the first operation and the information on the number of terminals that perform this type of operation, and the first message reported by the access network device is not redundant
- the first network element does not need to deduplicate and integrate the first message.
- an embodiment of the present application provides a charging method, wherein a policy control function network element receives a policy and charging control rule request message from a session management function network element, and sends a first operation message to the session management function network element.
- the policy and charging control rule includes a type parameter and a quantity parameter.
- the type parameter and quantity parameter are used to instruct the session management function network element to notify the user plane function network element to report the type of the first operation and the terminal that performs the first operation. quantity.
- the method is applicable to the implementation manner in which the first network element and the user plane function network element are co-located, and the session management function network element supports the charging trigger function. According to the above solution, the use of policies and charging control rules in the method can help reduce changes to core network side devices due to the addition of charging functions.
- an embodiment of the present application provides a charging method, wherein the session management function network element receives a policy and charging control rule from the policy control function network element, and the session management function network element sends the policy and charging control rule to the network element according to the policy and charging control rule.
- the user plane functional network element sends a usage reporting rule, and the usage reporting rule instructs the user plane functional network element to report the type of the first operation and the number of terminals on which the first operation is performed.
- the session management function network element generates an N4 rule according to the policy and charging control rule sent by the policy control function network element, where the N4 rule includes a usage reporting rule, wherein the usage reporting rule includes the type of the first operation and the first operation to be executed.
- the session management function network element sends the N4 rule to the user plane function network element, where the N4 rule instructs the user plane function network element to report the type of the first operation and the number of terminals that perform the first operation.
- the method is applicable to the implementation manner in which the first network element and the user plane function network element are co-located, and the session management function network element supports the charging trigger function.
- the first network element can report the usage reporting rule to the session management function network element, and the usage reporting rule includes the type of the first operation and the number of terminals that perform the first operation, thereby reducing billing due to increased billing. Changes to core network side devices due to functions.
- the first network element in the above aspects may be a middleware device
- the access network device may be a RAN device
- the terminal may be a label.
- an embodiment of the present application provides a charging method, the method may include: the first device obtains charging information; the charging information is used to indicate the identification information of the terminal on which the first operation is performed, Information on the number of operated terminals, information on the operation type corresponding to the first operation, the cumulative number of operations, the cumulative number of operations corresponding to the first operation, the frequency of performing operations, the frequency of performing the first operation, and the information exchanged during the first operation.
- the first device sends the charging information.
- the information related to the passive or semi-active Internet of Things is obtained for charging, for example, according to the operation type information, the number of terminals that are operated (the number after repeated calculation or deduplication), Identification information of the terminal on which the operation is performed (identification information that can be repeated or deduplicated), the number of signaling exchanged during the operation, operation frequency information, accumulated operation times information, and operation requester information (used to identify which operation The operation requested by the requesting party) is charged, and the charging information is more comprehensive and specific, making the charging more reasonable and accurate.
- acquiring the charging information by the first device includes: acquiring the charging information by the first device according to a charging rule.
- the charging rule is used to instruct the acquisition of charging information; or, the charging rule is used to instruct the acquisition of one or more of the following information: the identification information of the terminal on which the first operation is performed, the Information on the number of terminals for the first operation, the accumulated number of operations, the accumulated number of operations corresponding to the first operation, the information of the operation requester, the information of the operation type, the number of signaling exchanged during the operation, the frequency of performing the operation, and the first operation. the frequency and the acquisition time of the billing information.
- the charging information is obtained based on the charging rules, and the charging is standardized.
- the identification information of the terminal on which the first operation is performed includes the terminal identification information obtained by deduplicating the terminal on which the first operation is repeatedly performed; or, the identification information of the terminal that is not deduplicated;
- the information on the number of terminals in an operation includes information on the number of terminals obtained by deduplicating the terminals repeatedly performed the first operation; or, information on the number of terminals that have not been deduplicated.
- acquiring the charging information by the first device includes: the first device receiving charging-related information from at least one second device; and the first device determining the charging-related information according to the charging-related information of the at least one second device. fee information.
- the first device determines the charging information according to the charging related information of the at least one second device, including: in the charging related information of the at least one second device by the first device, the identification information of the terminal repeatedly performing the first operation and/or Or the quantity information is deduplicated, and the deduplicated charging-related information of at least one second device is used as the charging information, that is, the first device deduplicates the charging-related information reported by the second device to obtain the final required accounting information. Charge information, avoid repeated calculations for terminals that are repeatedly performed operations, remove redundant information, and avoid repeated charging.
- the charging-related information of the second device is obtained according to the charging rules, or is obtained according to the charging-related information received by the second device from at least one third device, which is flexible and effective. Get billing related information.
- the second device is a reader or a home device.
- the third device is a reader. That is to flexibly design the device for implementing the present application, and expand the applicable scenarios of the charging method described in the present application.
- the first device supports a charging trigger function
- sending the charging information by the first device includes: the first device sending the charging information to the charging function device.
- the first device sends charging information to the charging function device through a device supporting the charging trigger function, and the device supporting the charging trigger function includes an access network device, a control plane device, or a user plane device.
- the first device is a terminal, an access network device, a control plane device or a user plane device.
- the first device is a reader, or a mobile management device, or a user plane device or a session management device. That is, a device for executing the charging method described in this application is flexibly designed to expand the applicable scenarios of the charging method described in this application.
- an embodiment of the present application provides a communication device, including a processor, where the processor is configured to read and run a program from a memory, so as to implement the method ( For example, when the communication apparatus is a first network element), or, to implement the method in the second aspect or any of the possible implementation manners (for example, when the communication apparatus is an access network device), or, to implement The method of the third aspect above (for example, when the communication device is a policy control function network element), or, to implement the method of the fourth aspect above (for example, when the communication device is a session management function network element), or, To realize the fifth aspect or any possible implementation manner of the fifth aspect (for example, when the communication apparatus is the first device).
- an embodiment of the present application provides a communication system, including a first network element and an access network device, where the first network element can execute the method of the first aspect or any possible implementation manner, the connection The network access device may execute the method of the second aspect or any possible implementation manner.
- an embodiment of the present application provides a communication system, including a policy control function network element and a session management function network element, the policy control function network element can execute the method of the third aspect, and the session management function network element can The method of the fourth aspect is performed.
- embodiments of the present application provide a computer program product comprising instructions, which, when run on a computer, cause the computer to execute the method of the first aspect or any possible implementation, or the second aspect Or the method of any possible embodiment, or the method of the embodiment of the third aspect, or the method of the embodiment of the fourth aspect, or the fifth aspect or any possible embodiment of the fifth aspect.
- the embodiments of the present application provide a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the computer-readable storage medium runs on a computer, the processor causes the processor to perform the first aspect or any one of the possible or the method of the second aspect or any possible embodiment, or the method of the embodiment of the third aspect, or the method of the embodiment of the fourth aspect, or the method of the fifth aspect or the fifth aspect any possible implementation.
- Fig. 1 is the structure diagram of RFID communication system
- Fig. 2 is the flow chart of the inventory operation of tags in RFID communication
- Fig. 3 is the flow chart of the read-write operation of the tag in RFID communication
- FIG. 4 is a schematic diagram of an RFID transceiver and separation architecture
- FIG. 5 is a schematic diagram of the architecture of a 5G communication system to which the embodiments of the present application are applicable;
- FIG. 6 is a schematic diagram of a network architecture of RFID and cellular fusion applicable to an embodiment of the present application
- FIG. 7 is a schematic diagram of another network architecture of RFID and cellular fusion applicable to an embodiment of the present application.
- FIG. 8 is a schematic diagram of another network architecture of RFID and cellular fusion applicable to the embodiment of the application.
- FIG. 9 is a schematic diagram of another network architecture of RFID and cellular fusion applicable to the embodiment of the application.
- FIG. 10 is a schematic flowchart of RFID charging provided according to an embodiment of the present application.
- FIG. 11 is another schematic flowchart of RFID charging provided according to an embodiment of the present application.
- FIG. 12 is another schematic flowchart of RFID charging provided according to an embodiment of the present application.
- FIG. 13 is another schematic flowchart of RFID charging provided according to an embodiment of the present application.
- FIG. 15 is a schematic flowchart of RFID charging provided according to an embodiment of the present application.
- FIG. 16a is a schematic diagram 1 of a network architecture of IoT and cellular fusion provided by an embodiment of the present application;
- FIG. 16b is a second schematic diagram of a network architecture of IoT and cellular fusion provided by an embodiment of the present application:
- FIG. 16c is a schematic diagram 3 of a network architecture of IoT and cellular fusion provided by an embodiment of the present application;
- 17 is a flowchart 1 of a charging method provided by an embodiment of the present application.
- FIG. 18 is a second flowchart of a charging method provided by an embodiment of the present application.
- FIG. 19 is a third flowchart of a charging method provided by an embodiment of the present application.
- FIG. 20 is a schematic diagram of a communication apparatus provided according to an embodiment of the present application.
- FIG. 21 is a schematic diagram of another communication apparatus provided according to an embodiment of the present application.
- Radio frequency identification technology is an automatic identification technology in wireless communication.
- the middleware device is hereinafter referred to simply as middleware.
- the RFID system architecture includes a tag 101 , a reader 102 , a middleware 103 and a server 104 .
- the tag 101 is attached to the object to identify the target object, the information of the object is stored in the tag, and each tag has a globally unique Electronic Product Code (EPC), and the tags are divided into passive tags and active tags.
- EPC Electronic Product Code
- the reader 102 reads the information stored in the specified tag through the radio frequency signal according to the instruction issued by the server, and if it is a read operation, the reader reads the data in the storage area of the tag.
- the reader may also have the function of writing. In other words, the reader 102 may also be called a reader at this time. If it is a write operation, the reader will write the data into the storage area of the tag. For details, reference may also be made to the description in FIG. 5 , which will not be repeated.
- the middleware 103 is a functional piece that connects the reader and the server respectively, and has the functions of filtering information and collecting information. In addition, the middleware can also reduce the security risk when the server is attacked.
- the server 104 issues an RFID operation instruction according to requirements, and obtains the final result of the RFID tag execution, including but not limited to the type of tags read, the number of tags, and whether the read operation is successful.
- the server 104 may be located in a local network.
- the server 104 may also be referred to as an application system.
- middleware 103 and the server 104 may be co-located, or the middleware 103 may be deployed independently of the server 104, and these two deployment methods do not affect the respective functions of the middleware and the server. It should be understood that when the middleware 103 and the server 104 are co-located, reference may be made to the architecture of FIG. 20 in this application for details.
- the main application scenarios of RFID include warehouse management, inventory, logistics, etc.
- the processes related to RFID technology include inventory process and read-write process.
- the inventory process is used for tag management, and the inventory process of tags is to inventory the existing tags.
- Figure 2 shows the inventory process for tags.
- a reader (such as the reader 102 in FIG. 1) sends a selection command to a tag (such as the tag 101 in FIG. 1).
- the reader when the reader receives the inventory command sent by the server (or, the inventory command can be sent by the server to the reader through middleware), a selection command is generated, and the selection command carries the range of tags (such as EPC codes of certain specific ranges). ).
- the tag After receiving the selection command, the tag determines whether it belongs to the range of the tag indicated by the selection command. If the tag belongs to the range of the indicated tag, it will feedback information after receiving the query command subsequently. If the tag does not belong to the range of tags that should be judged, it is not necessary to feed back information after receiving the query command.
- step 202 the reader sends a query command to the tags within the specified range.
- step 203 when the tag finds that it belongs to the tag range in the selection command, it feeds back a random number to the reader.
- the tag can feed back a random number to the reader in a competitive manner, for example, the random number can be a 16-bit random number (RN16).
- the random number can be a 16-bit random number (RN16).
- step 204 after the reader receives the random number sent from the tag, it sends a response command to the tag, and the command contains the random number received in step 203.
- step 205 when the tag receives the response command sent by the reader and verifies that the random number is correct, it feeds back its EPC code to the reader.
- the above is the inventory process for a range of labels.
- FIG. 3 shows a process of reading and writing tags. Steps 301 to 305 in this process can refer to the description of steps 201 to 205 in FIG. 2 , which belong to the inventory operation process. The difference between step 302 and step 202 in FIG. 2 is that the label for receiving the query command in step 302 is the label of a specific EPC code.
- the read and write process includes the following steps:
- step 306 the reader sends a request random number command (Req_RN) to the tag, wherein the request random number command carries the random number received in step 303, such as RN16;
- step 307 the tag verifies that the random number is correct, and sends the handle to the reader.
- the handle is used to identify the identifiers of different readers.
- the read command or the write command carries the handle;
- the reader sends a read command or a write command to the tag, and the read command or write command carries a handle. If it is a write command, the write command also carries the data to be written into the tag storage area;
- step 309 if step 308 is a read command, the tag feeds back the data in its own storage area and carries the handle described in step 307 at the same time. If step 308 is a write command, this step may not be required.
- FIG. 4 shows an RFID transceiver separation architecture.
- the reader 102 in the RFID system shown in Figure 1 can be split into two components: a reader 401 and an excitation source 402.
- the excitation source 402 can be integrated in a user equipment (user equipment, UE).
- the reader 401 sends the downlink message of the tag to the excitation source 402 through the dedicated frequency spectrum, and then the excitation source 402 sends the message to the tag 403; the tag 403 uses the RFID
- the air interface directly sends the upstream message to the reader 401 .
- the farthest communication distance between the reader and the tag is only ten meters, and the architecture shown in FIG.
- the excitation source 402 separates transceivers, by increasing the distance between the reader 401 and the excitation source 402, the range of the covered tag is extended to 100 meters, It also reduces the interference between the uplink and downlink message links on the reader 401 side; and the excitation source 402 does not receive the uplink message compared with the reader that both receives the uplink message and sends the downlink message, which can further reduce the power consumption, so that the excitation source 402 does not receive the uplink message. 402 continuous working time is longer than usual readers.
- FIG. 5 is a schematic diagram of the network architecture of the 5G system, which includes user equipment (UE), access network (AN) equipment, core network elements, and data network (DN).
- UE user equipment
- AN access network
- DN data network
- the user equipment in this application is a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as airplanes, balloons, and satellites).
- the user equipment may also be referred to as a terminal, and may be a mobile phone (mobile phone), a tablet computer (pad), a computer with a wireless transceiver function, a virtual reality (virtual reality, VR) terminal, an augmented reality (augmented reality, AR) terminal , wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation security Wireless terminals in safety), wireless terminals in smart cities, wireless terminals in smart homes, and so on.
- the label in this application can exist in an independent form, can also be integrated in the above-mentioned terminal, can also be integrated in a sensor, etc.
- the form of the label is not limited in this application, and it can be any terminal form.
- the terminal When the terminal is a passive or semi-active terminal, it can receive or transmit data by acquiring energy.
- the way to obtain energy can be obtained by means of radio, solar energy, light energy, wind energy, water energy, thermal energy, kinetic energy, etc.
- the present application does not limit the manner in which the passive or semi-active terminal obtains energy.
- label can be interchanged with “terminal”, which does not affect the essential content of this application.
- the reader interacts with the tag through radio frequency signals or wireless signals.
- the reader obtains the information stored in the specified tag according to the instruction issued by the server. If it is an inventory operation (or may be called an inventory operation), the reader obtains the identification information of the tag; the identification information may be the unique identification of the tag, or the temporary identification of the tag. If it is a read operation, the reader will read the data in the tag storage area. Optionally, in some occasions where the information stored in the tag needs to be rewritten, the reader may also have a write function. If it is a write operation, the reader will write data into the storage area of the tag. In addition to this, the reader can also perform an invalidation operation on the tag.
- the tag is invalid and cannot be performed for operations such as inventory operations, read operations, or write operations.
- the reader may be a terminal device, or may be an access network device, a pole station, an eNodeB, a gNodeB, an integrated access and backhaul (IAB) node, etc.
- the form is not limited.
- the reader has the function of performing the operations described in this application (such as inventory operation, read operation, write operation or invalidation operation, etc.) on the terminal (such as a tag), and has the ability to obtain billing-related information and/or Or charging information, the function of sending charging information to CHF, etc.
- the access network device may also be a radio access network (radio access network, RAN) device.
- the main function of the RAN equipment is to control the user to access the mobile communication network through wireless.
- RAN is a part of a mobile communication system. It implements a wireless access technology. Conceptually, it resides between some device (such as a mobile phone, a computer, or any remote control machine) and provides a connection to its core network.
- RAN equipment includes but is not limited to: 5G (g nodeB, gNB), evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), Base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (BaseBand Unit, BBU), transmission point (transmitting and receiving point, TRP), transmitting point (transmitting point, TP), mobile switching center, etc., in addition, can also include wireless fidelity (wireless fidelity, wifi) access point (access point, AP) and the like.
- the RAN equipment may also be referred to as a RAN device, hereinafter referred to as RAN for short.
- the core network element may include at least one of the following network elements: a user plane function (UPF) network element, an access and mobility management function (AMF) network element, a session Management function (session management function, SMF) network element, policy control function (policy control function, PCF) network element and charging function (Charging Function, CHF) network element.
- UPF network element, SMF network element, AMF network element, CHF network element and PCF network element may also be referred to as UPF device, SMF device, AMF device, CHF device and PCF device, hereinafter referred to as UPF, SMF, AMF, CHF and PCF.
- Core network network elements can be divided into control plane network elements and user plane network elements.
- the user plane network element is the UPF, which is mainly responsible for packet data packet forwarding, quality of service (QoS) control, and charging information statistics. Charging information may also be referred to as charging data, charging message, charging content, etc., and is collectively referred to as charging information in this application.
- the network element of the control plane is mainly responsible for the interaction of the business process, the delivery of the data packet forwarding policy and the QoS control policy to the user plane.
- the control plane network elements involved in the embodiments of this application mainly include these network elements: AMF, SMF, PCF, and CHF. Among them, AMF is mainly responsible for user access and mobility management.
- the SMF is responsible for managing the creation and deletion of user protocol data unit (PDU) sessions, and maintaining the PDU session context and user plane forwarding pipe information.
- PCF is used to generate and manage users, sessions, and QoS flow processing policies.
- CHF is responsible for user billing, quota credit, etc. It also supports integrated online and offline billing.
- the Charging Trigger Function (CTF) is embedded in the charging-related network elements, such as SMF and AMF, and collects charging information about the UE's use of network resources in the charging-related network elements.
- network elements can be co-located.
- the access and mobility management network element may be co-located with the session management network element; the session management network element may be co-located with the user plane network element.
- the network architecture shown in FIG. 5 also indicates the communication interfaces between various network elements.
- the communication interfaces involved in the embodiments of the present application include: N2, the communication interface between the access network device and the AMF; N3, the access network device The communication interface with UPF is used to transmit user data; N4, the communication interface between SMF and UPF, is used for policy configuration of UPF, etc.; N6, the communication interface between DN and UPF.
- N2 the communication interface between the access network device and the AMF
- N3 the access network device
- the communication interface with UPF is used to transmit user data
- N4 the communication interface between SMF and UPF, is used for policy configuration of UPF, etc.
- N6 the communication interface between DN and UPF.
- the communication interface between each network element may also have other names, which are not limited in this application.
- network elements are independent physical devices, and this application does not limit the specific form of the above network elements, for example, they can be integrated in the same physical device. , or they can be different physical devices.
- network elements or devices can be co-located.
- the access and mobility management network element may be co-located with the session management network element; the session management network element may be co-located with the user plane network element.
- RFID technology or passive IoT technology can be integrated with the network architecture of 5G systems. If an enterprise uses traditional RFID technology or passive IoT technology, a dedicated network system should be deployed. Therefore, the integration of RFID technology and cellular network, or the integration of passive IoT technology and cellular network, can reduce the two systems. deployment and operation costs.
- the RFID billing is completed by the CHF. After the billing is triggered, the network element that supports the CTF sends the billing data to the billing function network element through the billing information. Sending, the charging function network element saves the charging information and creates a charging data record (CDR, Charging Data Record). After the charging is completed, the charging function network element sends a message corresponding to the charging information to the network element supporting the CTF.
- CDR Charging Data Record
- RFID or passive IoT Due to the small amount of signaling traffic transmitted by RFID or passive IoT, it is not suitable for billing by statistical traffic; RFID or passive IoT services do not occur continuously, so it is not suitable for billing by statistical time, nor is it suitable for charging by statistical time.
- the billing method is based on statistics of traffic and time; in addition, for RFID or passive IoT services, the number of request messages cannot reasonably quantify the network resources occupied by RFID or passive IoT services, so the billing method is based on the number of statistical messages There is also no reasonable billing for RFID.
- FIG. 6 is a schematic diagram of a network architecture of RFID and cellular fusion applicable to the embodiment of the present application.
- the middleware 605 is connected to the RAN and the server respectively, and the middleware is independent of the core network.
- the middleware 605 is connected to multiple RANs.
- the RAN integrates the functionality of the reader 603 (eg reader 102 in FIG. 1 or reader 401 in FIG. 4 ).
- the server 606 sends the downlink message to the middleware 605, then the middleware 605 sends the downlink message to the RAN (reader 603), and then the RAN (reader 603) sends the downlink message to the tag 601 (if When the incentive source 602 is deployed, the RAN first sends the downlink message to the incentive source 602, and then the incentive source 602 sends the downlink message to the tag 601).
- the tag 601 sends the upstream message to the RAN (reader 603 ), the RAN sends the upstream message to the middleware, and then the middleware 605 sends the upstream message to the server 606 .
- the core network does not participate in RFID communication.
- FIG. 7 is a schematic diagram of another network architecture of RFID or passive IoT and cellular fusion to which the embodiments of the present application are applicable.
- the middleware 704 is co-located with the UPF.
- the middleware 704 acts as a function of the UPF.
- the RFID data is transmitted through the user plane channel, and the data is transmitted between the server and the UPF through the N6 interface.
- the server 705 sends downlink messages to the UPF (that is, the co-located middleware 704 ) through the N6 interface, and then the UPF sends downlink messages to the RAN (reader 703 ), and finally the RAN (reader 703 ) Send the downlink message to the tag 701 (if the incentive source 702 is deployed, the RAN first sends the downlink message to the incentive source 702, and then the incentive source 702 sends the downlink message to the tag 701).
- the UPF that is, the co-located middleware 704
- the RAN sends downlink messages to the RAN (reader 703 )
- the RAN sends the downlink message to the tag 701 (if the incentive source 702 is deployed, the RAN first sends the downlink message to the incentive source 702, and then the incentive source 702 sends the downlink message to the tag 701).
- the uplink message is directly sent by the tag 701 to the reader 703, and then sent by the RAN (the reader 703) to the UPF (the middleware 704) through the user plane channel, and then sent by the UPF (the middleware 704) to the server through the N6 interface.
- FIG. 8 is a schematic diagram of another network architecture of RFID and cellular fusion applicable to the embodiment of the present application.
- the middleware 804 is deployed in the data network, that is, the UPF communicates with the middleware 804 through the N6 interface.
- the server 805 sends a downlink message to the middleware 804, the middleware 804 sends a downlink message to the UPF through the N6 interface, and then the UPF sends a downlink message to the RAN (reader 803), and finally the RAN (reader 803) 803) Send a downlink message to the tag 801 (if the excitation source 802 is deployed, the RAN first sends the downlink message to the excitation source 802, and then the excitation source 802 sends the downlink message to the tag 801).
- the tag 801 directly sends the uplink message to the RAN (reader 803), and then the RAN (reader 803) sends the uplink message to the UPF through the user plane channel, and then the UPF sends the uplink message to the middleware 804 through the N6 interface, Finally, the middleware 804 sends the upstream message to the server 805 .
- middleware and server can be co-located. When the middleware and the server are co-located, the interaction between the two devices provided by the embodiments of the present application becomes the internal operation of the co-located device or can be omitted.
- FIG. 9 is a schematic diagram of another network architecture of RFID and cellular fusion applicable to the embodiment of the present application.
- the middleware 904 is deployed as a network element in the core network and is independently deployed.
- the middleware 904 may be a control plane network element deployed in the core network.
- the downlink message is sent by the server 905 to the middleware 904, and then the middleware 904 sends the downlink message to the RAN (reader 903).
- the middleware 904 may first send the downlink message to the AMF, and then the AMF may send the downlink message to the RAN (reader 903).
- the middleware 904 may first send the downlink message to the SMF, then the SMF sends the downlink message to the AMF, and then the AMF sends the downlink message to the RAN (reader 903). Regardless of the above method, after the RAN receives the downlink message, the RAN (reader 903 ) sends the downlink message to the tag 901 . If the excitation source 902 is deployed, the RAN (reader 903 ) first sends the downlink message to the excitation source 902 , and then the excitation source 902 sends the downlink message to the tag 901 .
- the uplink message is directly sent by the tag 901 to the RAN (reader 903 ), and then the RAN (reader 903 ) sends the uplink message to the middleware 904 .
- the RAN (reader 903) may first send the upstream message to the AMF, and then the AMF may send the upstream message to the middleware 904; or, the RAN (reader 903) may first send the upstream message to the AMF, and then The AMF sends the upstream message to the SMF, and then the SMF sends the upstream message to the middleware 904 .
- the middleware 904 sends the upstream message to the server 905 .
- the network architecture described in the embodiments of the present invention is to more clearly describe the technical solutions of the embodiments of the present invention, and does not constitute a limitation on the technical solutions provided by the embodiments of the present invention. With the emergence of new business scenarios, the technical solutions provided by the embodiments of the present invention are also applicable to similar technical problems.
- the charging method is described below by taking RFID technology as an example, but the charging method in this application is not limited to RFID technology, and can also be applied to technologies such as passive Internet of Things.
- FIG. 10 shows a charging method under an RFID cellular fusion network architecture provided according to an embodiment of the present invention.
- the middleware obtains charging information
- the charging information includes type information and quantity information
- the type information indicates the operation type
- the quantity information indicates the number of tags that perform the operation of the operation type
- the middleware reports the accounting information to the CHF. fee information.
- the middleware supports CTF, and the middleware directly interacts with CHF to complete charging.
- FIG. 10 can be applied to the cellular fusion architecture of FIG. 6 , FIG. 8 or FIG. 9 .
- the method includes the following steps:
- the server sends an RFID operation instruction to the middleware.
- the operation instruction can be used to indicate the operation type of the RFID, for example, the operation type includes an inventory operation, a read operation, or a write operation, and the like.
- the operation instruction contains the identification of the tag on which the RFID operation should be performed.
- the tag identification can be a set of EPC codes, or a number or character string used to identify the tag. For example, if the tag identification set is 1-100, the tag identification of the tag to which the RFID operation is performed should belong to 1-100. For example, the tag identification is 1; then the tag identification of the tag that performs the RFID operation is 1.
- the tag identifier is an EPC code set
- the EPC code set may be urn:epc:id:sgtin:0614141.112345.400-urn:epc:id:sgtin:0614141.112345.600, where urn:epc:id is an EPC code
- sgtin means that the object identified by the label is a commodity
- 0614141 means the manufacturer that produced the label
- 112345 means a specific type of commodity, such as clothes
- 400 and 600 are both serial numbers, which are used to identify the label itself.
- the middleware parses the operation instruction, and sends the RFID operation instruction to the RAN corresponding to the tag identified by the tag identifier in step S1001.
- the middleware when the method is applied to the network architecture shown in Fig. 6, since the RAN is directly connected to the middleware, the middleware directly sends operation instructions to the RAN; when the method is applied to the network architecture shown in Fig. 8, the middleware The middleware forwards the operation instructions to the RAN through the UPF; when the method is applicable to the network architecture shown in Figure 9, and the middleware is used as the control plane network element of the core network, the middleware can send the operation instructions to the RAN through the AMF, or through the SMF and the AMF in turn. operating instructions.
- the RAN After receiving the operation instruction, the RAN executes the RFID operation.
- the RAN interacts with tags to complete an inventory operation, a read operation, or a write operation.
- tags to complete an inventory operation, a read operation, or a write operation.
- the operation of the RFID also involves the interaction of the RAN with the excitation source.
- the RAN sends the downlink message to the tag through the excitation source, and the tag directly sends the uplink message to the RAN. If the excitation source does not exist, the uplink and downlink messages are directly interacted with the tag by the RAN.
- the RAN receives the tag message.
- the tag message may be an uplink message sent by the tag to the RAN, and there may be one or more tags.
- tag messages include tag identification.
- the uplink message sent by the tag may further include the operation type performed by the tag.
- the tag may be operated periodically, in which case the RAN will receive the tag message periodically during the execution of the RFID operation.
- the RAN may receive the tag message from the tag during the RFID operation.
- the RAN sends the first message to the middleware.
- the RAN directly sends the first message to the middleware.
- the RAN sends the middleware through the UPF.
- Sending the first message when this embodiment is applicable to the network architecture shown in FIG. 9 , the RAN sends the first message to the middleware through the AMF, or through the AMF and the SMF in sequence.
- the RAN may also send the second message to the middleware.
- the middleware obtains charging information according to a message received from the RAN (for example, the first message, and optionally, the second message).
- the billing information includes type information indicating the operation type of the first operation and quantity information, the quantity information indicating the number of tags on which the first operation is performed.
- the quantity information in this application refers to the quantity information obtained by the tag that performs a specific operation without being repeatedly calculated, or, when the tag that performs a specific operation is reported multiple times, the Quantity information integrated after deduplication of double-counted quantities.
- the quantity indicated by the quantity information obtained by the middleware is processed in two steps: the first step is deduplication, and the second step is integration.
- the first step is deduplication
- the second step is integration.
- both can be performed by the RAN, or by the RAN and the middleware respectively, or both by the middleware.
- the above steps S1004 to S1006 can be implemented in the following three specific ways, which will be described in detail below. description of:
- both the steps of deduplication and integration are performed by the RAN.
- the RAN deduplicates and integrates the tag messages reported by the tags received, obtains the type information of the first operation and the quantity information indicating that the first operation is performed, and passes the first operation in step S1005.
- the message sends the type information and quantity information to the middleware. Therefore, in step S1006, the middleware can directly acquire the charging information according to the type information and quantity information contained in the first message.
- the above implementation manner may be applicable to a scenario where the middleware is connected to one RAN.
- the RAN may count the tags in a certain period of time during the inventory operation. Therefore, the RAN may obtain at least two pieces of information in the tag message in step S1004.
- the RAN receives two pieces of information through step S1004, wherein the first piece of information indicates that the tags to be counted include label 1, label 3 and label 4, and the second piece of information indicates that the labels to be counted include label 1, label 2 , Label 3 and Label 5.
- the RAN removes the double-counted tags 1 and 3 in the two pieces of information, and integrates the deduplicated tags 1, 2, 3, 4, and 5 to obtain the number of tags that have been counted as 5. Therefore, the type information reported by the RAN in step S1005 is used to indicate that the operation type is an inventory operation, and the quantity information is 5, thereby indicating that a total of 5 tags have been subjected to an inventory operation.
- integration can also be referred to as summarizing, statistic or counting, which is not limited in this application.
- the first message may further include a label identifier on which the first operation is performed, and the middleware further performs deduplication and integration according to the label identifier. That is to say, multiple RANs (for example, the first RAN and the second RAN) respectively send their respective first messages (or the first RANs) to the middleware through step S1005 according to the tag messages received from their respective ranges. The first message is sent, and the second RAN sends the second message).
- the first messages sent by multiple RANs all include the type information of the first operation reported by the tags in their respective ranges and the non-repetitive tag identifier indicating that the first operation is performed.
- the middleware further performs deduplication and integration according to the type information of the first operation obtained from the multiple RANs and the non-duplicated label identifier of the first operation to be performed, thereby obtaining charging information.
- the middleware removes the duplicated label 1 and label 3 in the two pieces of information, and integrates the deduplicated label 1, label 2, label 3, label 4 and label 5 to obtain the number of labels that are counted. is 5. Therefore, in step S1006, the middleware obtains the type information in the billing information indicating that the operation type is an inventory operation, and the quantity information is 5, thereby indicating that a total of 5 tags have been subjected to an inventory operation.
- the RAN performs the step of deduplication, and the middleware performs the step of integration.
- the RAN deduplicates the uplink message sent by the received tag, obtains the type information of the first operation and the tag identification information indicating that the first operation is performed, and sends the message to the middleman through the first message in step S1005. file to send the type information and identification information. Therefore, in step S1006, the middleware may determine the number of tags to which the first operation is performed according to the type information and identification information contained in the first message, so as to obtain charging information.
- the above implementation manner may be applicable to a scenario where the middleware is connected to one RAN.
- the RAN may inventory the tags at a certain time period during the inventory operation. Therefore, the RAN obtains at least two pieces of information from the tag message in step S1004.
- the RAN receives two pieces of information through step S1004, wherein the first piece of information indicates that the tags for performing the inventory operation include tag 1, tag 3 and tag 4, and the second copy of information indicates that the tags for performing the inventory operation include tag 1, tag 2, tag 4 3 and label 5.
- the RAN removes the repeatedly calculated tag 1 and tag 3 in the two pieces of information, and obtains the identifications of the tags to be counted as tag 1, tag 2, tag 3, tag 4, and tag 5.
- the type information reported by the RAN through step S1005 is used to indicate that the operation type is an inventory operation, and the identification information is label 1, label 2, label 3, label 4 and label 5, thereby indicating label 1, label 2, label 3, label 4 and tag 5 was performed an inventory operation.
- the middleware determines the quantity information according to the type information and identification information reported in step S1005, the type information in the charging information indicates that the operation type is an inventory operation, and the quantity information is 5, thereby indicating that a total of 5 tags have been subjected to the inventory operation.
- the middleware performs de-duplication and integration according to type information and identification information reported by multiple RANs (eg, the first RAN and the second RAN). That is to say, the first RAN and the second RAN both send first messages to the middleware through step S1005 according to the tag messages received from their respective ranges, where the first messages are the type information of the first operation and the indication of the respective The non-repeated tag identifier in the range where the first operation was performed.
- the label identifiers reported by multiple RANs may also be duplicated.
- step S1006 the middleware further performs deduplication and integration according to the type information of the first operation obtained from multiple RANs and the non-duplicated tag identifier indicating that the first operation is to be performed, thereby obtaining charging information.
- the middleware deduplication operation is similar to the RAN deduplication operation, and will not be repeated here.
- the middleware removes the duplicated label 1 and label 3 in the two pieces of information, and integrates the deduplicated label 1, label 2, label 3, label 4 and label 5 to obtain the number of labels that are counted. is 5. Therefore, in step S1006, the middleware determines that the type information in the charging information indicates that the operation type is an inventory operation, and the quantity information is 5, thereby indicating that a total of 5 tags have been subjected to an inventory operation.
- the steps of deduplication and integration are performed by middleware.
- the RAN sends the tag message received in step S1004 to the middleware directly through the first message in step S1005, where the first message includes type information of the first operation and tag identification information indicating that the first operation is performed.
- the RAN also sends the second message.
- the middleware acquires charging information according to the type information and identification information contained in the first message (optionally, the first message and the second message).
- the above implementation manner may be applicable to a scenario where the middleware is connected to one or more RANs.
- the middleware first acquires at least two pieces of information, wherein each piece of information includes type information of the first operation and identification information indicating the RFID tag on which the first operation is performed.
- the at least two pieces of information may be obtained from one message sent by one RAN (for example, the above-mentioned first message), or may be multiple messages sent by the same RAN (for example, the above-mentioned first message and second message) ), or it may be obtained from multiple messages sent by different RANs respectively, which is not limited in this application.
- the middleware deduplicates and integrates the two pieces of information. How to deduplicate and integrate middleware can refer to the previous description, and will not be repeated here.
- the RAN may count the tags in a certain period of time during the inventory operation. Therefore, the RAN obtains at least two pieces of information from the tag messages reported by the tags in step S1004.
- the RAN receives two pieces of information through step S1004, wherein the type information in the first piece of information indicates that the operation to be performed is an inventory operation, and the identification information indicates that the label identifiers of the inventory operation to be performed include label 1, label 3 and label 4.
- the type information in the secondary information indicates that the operation to be performed is an inventory operation, and the identification information indicates that the label identifiers for which the inventory operation is performed include label 1 , label 2 , label 3 and label 5 .
- the RAN sends the two pieces of information to the middleware in the first message through step S1005.
- the RAN sends the first piece of information to the middleware through the first message, and the RAN sends the second piece of information to the middleware through the second message. pieces.
- the middleware first deduplicates according to the type information and identification information reported in step S1005, the middleware removes the duplicated label 1 and label 3 in the two pieces of information, and deduplicates the label 1, label 2, label 3, Tag 4 and tag 5 are integrated, and the number of tags to be counted is 5.
- the type information in the charging information obtained by the final middleware indicates that the operation type is an inventory operation, and the quantity information is 5, thereby indicating that a total of 5 tags have been subjected to an inventory operation.
- the middleware performs de-duplication and integration according to type information and identification information reported by multiple RANs (eg, the first RAN and the second RAN). That is to say, the first RAN and the second RAN respectively send a first message to the middleware through step S1005 according to the tag messages received from their respective ranges, where the first messages are the type information of the first operation and indicate their respective ranges The tag within which the first operation was performed is identified.
- the label identifiers reported by multiple RANs may also be duplicated, and a certain label may be in the coverage of the first RAN and the second RAN at the same time. Therefore, in step S1006, the middleware further performs deduplication and integration according to the type information of the first operation obtained from multiple RANs and the non-duplicated tag identifier indicating that the first operation is to be performed, thereby obtaining charging information.
- the middleware removes the duplicated label 1 and label 3 in the two pieces of information, and integrates the deduplicated label 1, label 2, label 3, label 4 and label 5 to obtain the number of labels that are counted. is 5. Therefore, in step S1006, the middleware obtains the type information in the billing information indicating that the operation type is an inventory operation, and the quantity information is 5, thereby indicating that a total of 5 tags have been subjected to an inventory operation.
- deduplication can also be considered as a specific method of integration.
- step S1007 the middleware may also acquire charging information in other manners, which are not limited in this application. After that, the middleware executes step S1007.
- the middleware sends a charging data request to the CHF, where the charging data request carries the charging information in step S1006.
- the CHF receives the charging information and creates a CDR according to the charging information.
- the CHF sends a charging data response to the middleware, where the charging data response is used to notify the middleware of the result of whether the charging data request is completed or not.
- the middleware sends the RFID operation result to the server, where the operation result is used to respond to the RFID operation instruction issued by the server to the middleware in step S1001.
- the operation result of the RFID includes the operation type of the tag, and may also include at least one of the identification of the tag to perform the operation or the number of tags to perform the operation; optionally, if the operation type is a read operation, the operation result Also includes the data read from the tag storage area, which can be done after S1005.
- the middleware described in this embodiment can obtain the type information indicating the operation type of the first operation and the number of tags actually performed the first operation, and report the billing information to the CHF, so that the billing information matches the RFID service better , the billing behavior is more reasonable.
- the billing model based on event billing will characterize the number of times of service execution according to the number of RFID operation instructions issued by the server, and perform billing based on this, but the device supporting CTF does not know what the operation order is and cannot obtain it.
- the information of the operation type performed on the tag, and the quantity information of the tags that need to perform the operation cannot be obtained, so that the charging cannot be performed according to the actually used network resources.
- the server sends an instruction to perform an inventory operation and another instruction to perform a write operation, and each instruction charges 10 yuan. Therefore, the user will be charged a total of 20 yuan for the inventory operation. Yuan. Therefore, with the solution of the embodiment of the present application, since the acquisition of the operation type and the number of tags performed on the operation type can better reflect the actually used network resources, the charging method based on the present application is more reasonable.
- the middleware supporting CTF directly reports the charging information to the CHF, so that the charging information can not be forwarded through other network elements, which reduces the signaling overhead on the network side and reduces changes to other network elements.
- the embodiment shown in FIG. 10 is described by taking RFID as an example, and the solution shown in FIG. 10 is also applicable to other technologies such as passive Internet of Things technology.
- the middleware in this embodiment is the first network element in the passive IoT technology, and the tag may be a terminal in the passive IoT technology,
- the operation instruction may be an operation instruction in the passive Internet of Things technology.
- FIG. 11 and FIG. 12 in this application show a charging method under an RFID cellular fusion architecture provided according to an embodiment.
- the SMF supports CTF, and the SMF interacts with the CHF to implement the charging function, so that the middleware does not need to support CTF.
- the embodiment shown in FIG. 11 applies to the network architecture shown in FIG. 7 , that is, the scenario in which the middleware and UPF are co-located; while the embodiment shown in FIG. 12 applies to the network architecture shown in FIG. 9 , that is, the middleware is used as the core network
- the control plane NEs are deployed independently.
- the embodiment shown in Figure 11 includes the following steps:
- the RAN completes the tag registration process, and the reader also completes the registration process.
- the RAN can initiate a registration request message to the AMF on behalf of the tag to complete the tag registration process.
- the purpose of RAN generation label registration is to establish a channel with a control plane network element or a channel with a user plane network element for the label generation, and the channel is used for the transmission of the label's uplink message or downlink message.
- the RAN may complete a device-level registration process, that is, the RAN may establish a shared control plane channel or user plane channel for transmitting uplink or downlink data of tags within the coverage of the RAN.
- the incentive source if the incentive source is deployed in the system, the incentive source also completes the registration process as the user equipment.
- the RAN sends a session establishment request to the AMF.
- the RAN sends a PDU session establishment request to the AMF.
- the AMF sends a session context creation request to the SMF.
- the SMF feeds back a response message to the AMF.
- the SMF sends a policy and charging control (Policy and Charging Control, PCC) rule request message to the PCF.
- Policy and Charging Control, PCC Policy and Charging Control
- the PCC rule request message includes access type information, and the access type information is used to indicate the RFID type.
- the access type information is used to indicate the passive IoT type.
- the PCF identifies the RFID-related according to the access type information, and feeds back the RFID-related PCC rules to the SMF.
- the PCC rule includes a type parameter and a quantity parameter, where the type parameter and the quantity parameter are used to instruct the SMF to notify the UPF to report the type of RFID operation and the number of tags that perform the RFID operation.
- the SMF sends a usage reporting rule (URR) to the UPF.
- URR usage reporting rule
- the SMF generates an N4 rule according to the PCC rule sent by the PCF, where the N4 rule includes a URR, where the URR instructs the UPF to report the RFID operation type and the number of tags that perform the RFID operation.
- the URR includes the above-mentioned type parameter and the above-mentioned quantity parameter, thereby instructing the UPF to report the RFID operation type and the number of tags on which the RFID operation is performed.
- the SMF can deliver the N4 rule to the UPF through the N4 interface.
- S1107 , RAN, AMF, PCF, UDM, UPF, and SMF complete the session establishment process.
- the server sends an RFID operation instruction to the UPF.
- the operation instruction can be used to indicate the operation type of the RFID, for example, the operation type includes an inventory operation, a read operation, or a write operation.
- This instruction contains the identification of the tag on which the RFID operation should be performed.
- the tag identification may be a set of EPC codes.
- the UPF (the middleware is co-located with the UPF) sends an RFID operation instruction to the corresponding RAN.
- the RAN performs an RFID operation on the tags within the set range according to the RFID operation instruction. If the excitation source is not deployed in the system, the RAN directly performs the RFID operation on the tags within the set range. If the excitation source is deployed in the system, the RAN performs the RFID operation on the tags within the set range through the excitation source.
- the RAN receives a label message, where the label message is an uplink message sent by the label to the RAN.
- the RAN sends the first message to the middleware (which may also be understood as UPF).
- middleware which may also be understood as UPF.
- the RAN also sends the second message to the middleware (which may also be understood as UPF).
- middleware which may also be understood as UPF.
- the middleware (which may also be understood as UPF) acquires charging information according to the first message (optionally, the second message) received from the RAN.
- the billing information includes type information indicating the operation type of the first operation and quantity information, the quantity information indicating the number of RFID tags on which the first operation is performed.
- steps S1108 to S1113 reference may be made to the description of steps S1001 to S1006 in FIG. 10 , which will not be repeated here.
- the UPF reports the operation type of the first operation and the number of RFID tags that perform the first operation to the SMF.
- the SMF supporting the CTF sends a charging data request to the CHF, where the charging data request carries the operation type of the first operation and the number of RFID tags on which the first operation is performed.
- the CHF creates a CDR.
- step S1118 the middleware sends the operation result of the RFID to the server.
- step S1010 in FIG. 10 This step may be performed after step S1112.
- the middleware according to the embodiment shown in FIG. 11 can obtain the type information indicating the operation type of the first operation and the information on the number of tags actually performed the first operation, and report the charging information to the CHF, according to the operation performed by the tag
- the type and the number of tags actually executed are billed, so that the billing result is more accurate, matches the RFID service better, and the billing behavior is more reasonable.
- the middleware can use the channel between the UPF and the SMF (eg, the N4 interface) to report the URR to the SMF.
- the type parameter and quantity parameter are added to the PCC rule.
- the type parameter and quantity parameter are used to instruct the SMF to notify the UPF to report the operation type and the number of tags that are executed, thereby reducing the need for RFID or passive IoT, etc. Changes to the device on the core network side due to the function of service billing.
- the embodiment shown in Figure 12 includes the following steps:
- step S1201 the RAN completes the registration process of the tag, and the reader also completes the registration process.
- step S1101 in FIG. 11 reference may be made to the description of step S1101 in FIG. 11 , which will not be repeated here.
- the server sends an RFID operation instruction to the middleware deployed in the core network.
- the operation instruction may be used to indicate the operation type of the RFID, for example, the operation type is an inventory operation, a read operation, or a write operation.
- the instruction contains the tag identification for which the RFID operation should be performed; alternatively, the tag identification may be a set of EPC codes.
- the middleware as a control plane network element, sends the RFID operation instruction to the SMF and the AMF in sequence, and finally the AMF sends the RFID operation instruction to the corresponding RAN.
- the RAN performs an RFID operation on the tags within the set range according to the RFID operation instruction.
- the RAN receives the tag message, where the tag message is an uplink message sent by the tag to the RAN.
- the RAN sends the first message to the middleware through the AMF and the SMF in sequence through the control plane channel.
- the RAN also sends the second message to the middleware.
- the middleware acquires charging information according to the first message (optionally, the second message) received from the RAN.
- the billing information includes type information indicating the operation type of the first operation and quantity information, the quantity information indicating the number of RFID tags on which the first operation is performed.
- steps S1205 to S1207 reference may be made to the description of steps S1004 to S1006 in FIG. 10 , which will not be repeated here.
- the middleware reports the operation type of the first operation and the number of RFID tags on which the first operation is performed to the SMF.
- the SMF supporting the CTF sends a charging data request to the CHF, where the charging data request carries the operation type of the first operation and the number of RFID tags that perform the first operation.
- the CHF creates a CDR.
- the CHF After the CHF completes charging, it sends a charging data response to the SMF, where the charging data response is used to notify the SMF of the result of whether the charging data request is completed or not.
- the middleware sends the operation result of the RFID to the server.
- the middleware sends the operation result of the RFID to the server.
- This step may be performed after step S1206.
- the middleware can obtain the type information indicating the operation type of the first operation and the number of tags actually performed the first operation, and report the charging information to the CHF.
- the number of tags executed is billed, so that the billing result is more accurate, the billing information is more matched with the RFID service, and the billing behavior is more reasonable.
- the embodiment of the present application provides another charging method under the RFID cellular fusion architecture.
- the cellular fusion architecture of FIG. 9 is applied.
- the middleware reports the charging data to the AMF supporting CTF, and the AMF and the CHF interaction completes billing.
- the method includes the following steps:
- step S1301 the RAN completes the registration process of the tag, and the reader also completes the registration process.
- step S1101 in FIG. 11 reference may be made to the description of step S1101 in FIG. 11 , which will not be repeated here.
- the server sends an RFID operation instruction to the middleware deployed in the core network.
- the operation instruction can be used to indicate the operation type of the RFID, for example, the operation type includes an inventory operation, a read operation, or a write operation.
- This instruction contains a set of tag EPC codes that should be subjected to RFID operations.
- the middleware sends the RFID operation instruction to the AMF, and then the AMF sends the RFID operation instruction to the RAN.
- the RAN performs the RFID operation on the tags within the set range according to the RFID operation instruction.
- the RAN receives the tag message, where the tag message is an uplink message sent by the tag to the RAN.
- the RAN sends the first message to the middleware through the AMF.
- the RAN also sends the second message to the middleware through the AMF.
- the middleware acquires charging information according to the first message (optionally, the second message) received from the RAN.
- the billing information includes type information indicating the operation type of the first operation and quantity information, the quantity information indicating the number of RFID tags on which the first operation is performed.
- steps S1305 to S1307 reference may be made to the description of steps S1004 to S1006 in FIG. 10 , which will not be repeated here.
- the middleware reports the operation type of the first operation and the number of RFID tags on which the first operation is performed to the AMF.
- the AMF supporting the CTF sends a charging data request to the CHF, where the charging data request carries the operation type of the first operation and the number of RFID tags on which the first operation is performed.
- the CHF creates a CDR.
- the CHF After the CHF completes the charging, it sends a charging data response to the AMF, where the charging data response is used to notify the AMF of the result of whether the charging data request is completed or not.
- the middleware sends the operation result of the RFID to the server.
- the middleware sends the operation result of the RFID to the server.
- This step may be performed after step S1306.
- the middleware according to the embodiment shown in FIG. 13 can obtain the type information indicating the operation type of the first operation and the number of tags that actually perform the first operation, and report the charging information to the CHF, according to the operation performed by the tag.
- the type and the number of tags actually executed are billed, so that the billing result is more accurate, the billing information is more matched with the RFID service, and the billing behavior is more reasonable.
- the difference between this embodiment and the embodiment shown in FIG. 12 is that there is no SMF participation in the transmission over the control plane channel. In this embodiment, the middleware does not need to support CTF, and meanwhile, changes to the network elements of the core network are reduced.
- FIG. 14 shows a schematic flowchart of an embodiment of the present application. This schematic will be described in conjunction with FIGS. 10 to 13 .
- Figure 14 relates to the interaction between the terminal, the first network element and the access network equipment.
- the terminal is the label in FIGS. 10 to 13
- the first network element may be the middleware in FIGS. 10 to 13
- the access network device may be the RAN in FIGS. 10 to 13 .
- the method includes the following steps:
- Step S1401 The first network element acquires charging information, where the charging information includes type information and first quantity information.
- step S1006 in FIG. 10 For this step, reference may be made to the descriptions in step S1006 in FIG. 10 , step S1113 in FIG. 11 , step S1207 in FIG. 12 , and step S1307 in FIG. 13 .
- this step includes the following situations:
- the first network element receives the type information and the second quantity information from the access network device, and the second quantity information indicates the second quantity of the terminals of the first set of which the first operation is performed. quantity.
- the first number is equal to the second number.
- the first network element receives the type information and the first identification information from the access network device.
- the first network element determines the first quantity information according to the first identification information.
- the first network element receives the first information and the second information from the access network device (for example, the first information includes type information and first identification information, and the second information includes type information and second identification information) .
- the first network element determines the first quantity information according to the first information and the second information.
- the first network element receives the first information and the second information from at least two access network devices, and the first identification information in the first information is used to indicate the service of the first access network device.
- the identifiers of the terminals in the first set of the terminals where the first operation is performed, and the second identifier information in the second information is used to indicate the terminals where the first operation is performed among the terminals served by the second access network device.
- the first network element determines the first quantity information according to the first identification information and the second identification information. For this situation, reference may be made to the implementation of multiple access network devices in the implementation of step S1006 in FIG. 10 .
- Step S1402 the first network element sends the charging information.
- This step can include the following situations:
- the first network element that supports CTF sends the obtained charging information to the CHF.
- the description in step S1007 in FIG. 10 reference may be made to the description in step S1007 in FIG. 10 .
- the first network element sends the acquired charging information to the network element or device supporting CTF, and the network element or device supporting CTF sends the charging information to the CHF to complete the interaction.
- This situation includes the following situations:
- the first network element sends the acquired charging information to the SMF supporting CTF.
- the SMF supporting CTF For this step, reference may be made to the description of step S1114 in FIG. 11 and step S1208 in FIG. 12 .
- the first network element sends the acquired charging information to the AMF supporting CTF.
- the AMF supporting CTF For this step, reference may be made to the description of step S1308 in FIG. 13 .
- FIG. 15 shows a schematic flowchart of an embodiment of the present application. This schematic will be described in conjunction with FIGS. 10 to 13 .
- Figure 15 relates to the interaction between the terminal, the first network element and the access network equipment.
- the terminal is the label in FIGS. 10 to 13
- the first network element may be the middleware in FIGS. 10 to 13
- the access network device may be the RAN in FIGS. 10 to 13 .
- the method includes the following steps:
- Step S1501 the access network device acquires type information and identification information.
- step S1004 in FIG. 10 For this step, reference may be made to the description of step S1004 in FIG. 10 , step S1111 in FIG. 11 , step S1205 in FIG. 12 , and step S1305 in FIG. 13 .
- Step S1502 the access network device sends the first message to the first network element according to the type information and the identification information in step S1501.
- step S1005 in FIG. 10 For this step, reference may be made to the description of step S1005 in FIG. 10 , step S1112 in FIG. 11 , step S1206 in FIG. 12 , and step S1306 in FIG. 13 .
- the above steps S1501 and S1502 may include the following situations:
- the access network device obtains type information and identification information without deduplicating the tag message received from the tag, and at this time, the access network device sends the first message to the first network element,
- the first message includes the type information and identification information.
- the access network device sends a second message to the first network element.
- the third option in step S1006 in FIG. 10 way of implementation.
- the access network device deduplicates the tag message received from the tag, obtains the identification information of the tag without repeated calculation, and obtains the type information and identification information.
- the first network element sends a first message, where the first message includes the type information and identification information. For this situation, reference may be made to the second optional implementation manner of step S1006 in FIG. 10 .
- the access network device deduplicates and integrates the tag message received from the tag, obtains the identification information of the tag without repeated calculation, obtains the type information and identification information, and the access network device according to the The identification information determines the quantity information.
- the access network device sends a first message to the first network element, and the first message includes the type information and quantity information. For this situation, refer to step S1006 in FIG. 10 .
- the above embodiments illustrate the charging method by taking the RFID technology as an example.
- the charging method in this application is not limited to RFID technology, but can also be applied to other technologies such as IoT technologies, such as other passive internet of things (passive IoT) technologies, semi-active IoT technologies, or Active IoT technology and more.
- the charging information described in this application includes, but is not limited to, the type information of the operation type described in the above embodiment and the quantity information of the terminals (such as tags) that perform the first operation, and may also include other information so that the CHF can obtain the information. Get more and more comprehensive billing information to improve billing accuracy.
- the first device may acquire charging information, where the charging information may include/is used to indicate one or more of the following: identification information of the terminal on which the first operation is performed, information on the number of terminals on which the first operation is performed, The operation type information corresponding to the first operation, the cumulative number of operations, the cumulative number of operations corresponding to the first operation, the frequency of performing the operation, the frequency of performing the first operation, the number of signaling interactions during the first operation, and the first operation.
- the operation requester the first device sends the charging information, for example, the first device may send the charging information to the CHF through a network element supporting CTF.
- one or more pieces of information such as the number of terminals to be operated, the terminals to be operated, the frequency of operation to be performed, and which operation requester requested the operation can be indicated to the CHF, so that the billing information and the Internet of Things service are better. Matching, the billing information can better reflect the actual network resources used, the billing behavior is more reasonable, and the billing result is more accurate.
- the first device may include, but is not limited to, a terminal, an access network device, a reader, a control plane device, a user plane network element, or a server.
- the control plane device may include any one of a mobility management device (such as AMF), a session management device (such as SMF), and a network opening device (such as NEF).
- User plane equipment may include UPF.
- the control plane device may also be described as a control plane network element instead, and the user plane device may also be described as a user plane network element instead.
- FIG. 16a is a schematic diagram of a network architecture of an IoT technology and a cellular fusion provided by an embodiment of the present application.
- the reader can acquire charging information according to the charging rule, and send the charging information to the CHF with the acquired charging information.
- the reader (which may also be referred to as a main reader, a reader controller, or a reader manager, etc. in this application) receives billing-related information sent by one or more readers connected to it.
- the charging-related information sent by multiple readers obtains the charging information, and sends the charging information to the CHF or sends the charging information to the network element supporting CTF, and the network element supporting the CTF sends the charging information to the CHF.
- the main reader, reader controller, or reader manager described in this application may refer to a device that centrally manages one or more readers, and the device may also be understood as a centralized reader controller or a reader centralized manager etc. It should be understood that, for the network architecture shown in FIG. 16a, reference may also be made to the descriptions in FIG. 7 and FIG. 8, for example, the transmission of uplink and downlink messages, and the like.
- FIG. 16b is a schematic diagram of a network architecture of an Internet of Things technology and a cellular fusion provided by an embodiment of the present application.
- the UPF can obtain the charging information according to the charging rules, and send the charging information to the CHF.
- the UPF receives the billing-related information sent by one or more readers that it manages/services and sends it to the UPF, and the UPF obtains the billing information according to the received billing-related information sent by the one or more readers, and sends it to the CHF.
- the charging information is sent or the charging information is sent to the network element supporting the CTF, and the network element supporting the CTF sends the charging information to the CHF.
- the reader receives the charging-related information sent by one or more readers connected to it, and sends the charging-related information to the UPF.
- the reader receives billing-related information sent by one or more readers connected to it, and the reader processes the billing-related information (for example, integrates, deduplicates, or counts), Obtain the charging information or the charging-related information, and send the charging information or the charging-related information to the UPF.
- FIG. 16b may also refer to the descriptions in FIG. 7 and FIG. 8 , for example, the transmission of uplink and downlink messages, and the like.
- FIG. 16c is a schematic diagram of a network architecture of an IoT technology and a cellular fusion provided by an embodiment of the present application.
- the AMF can obtain the charging information according to the charging rules, send the charging information to the CHF, or send the charging information to the network element supporting CTF, and the network element supporting the CTF can send the charging information to the CHF. billing information.
- the AMF receives the accounting-related information sent from one or more readers it manages/services, and the AMF obtains the accounting information according to the received accounting-related information sent by the one or more readers, and sends the accounting information to the CHF. information or send charging information to a network element supporting CTF, and the network element supporting CTF sends charging information to CHF.
- the charging-related information may be used to obtain the charging information, and the charging-related information may be referred to as initial information or intermediate information used to obtain the charging information.
- the charging information described in the embodiments of the present application may refer to the information that is finally sent to the CHF and used for CHF charging. It should be understood that the charging information and the charging-related information described in this application may be the same or different. For example, if the first device obtains the charging-related information from the second device, the first device directly sends the obtained charging-related information to the CHF without any processing, then the charging-related information here is the same as the charging information of.
- the first device acquires the charging-related information from the second device
- the first device processes the acquired charging-related information (such as integration, deduplication, statistics, etc.) and sends it to the CHF
- the The fee-related information is different from the billing information.
- the billing-related information can be understood as the information used to obtain the billing information. It can be the original information that has not been integrated and processed, or has been partially integrated before acquiring the billing information. , the intermediate information generated by processing.
- the present application does not limit the naming of charging information and charging-related information.
- the charging information may also be named charging data, and the charging-related information may also be named charging-related data.
- the device that acquires billing information may be referred to as the first device, and the first device may be a reader, or a master reader, or a reader controller, or a reader manager, or a user plane device (such as UPF), or mobility management device (such as AMF) or session management device (such as SMF).
- the first device may also be a device such as NEF, PCF, server, etc., which is not limited.
- This application takes that the first device is a reader, or UPF, or AMF as an example for description, and the charging methods for other devices may refer to the description in this application.
- the first device acquires charging information according to a charging rule.
- the first device receives charging-related information from at least one second device, and the first device determines charging information according to the charging-related information of at least one second device. For example, the first device deduplicates the identification information and/or quantity information of the terminal that repeatedly performs the first operation in the charging related information of at least one second device, and deduplicates the deduplicated billing of the at least one second device. The related information is used as billing information.
- the charging-related information of the second device may be obtained by the second device according to a charging rule, or determined by the second device according to charging-related information received by the second device from at least one third device.
- the second device may be a reader, a user plane device (UPF), or a session management device (such as an SMF).
- the third device may be a reader.
- the first device may send charging information to the CHF through a device that supports CTF.
- the device supporting CTF may be the first device itself, or other devices, such as access network devices (such as RAN), control plane devices (such as AMF or SMF), or user plane devices (such as UPF), or are other or future CTF-enabled devices.
- the charging method provided by the embodiment of the present application is described below with reference to the communication systems shown in FIGS. 16a-16c, taking the integration of the Internet of Things technology and the 5G communication system as an example.
- the actions, terms, etc. involved in the following embodiments may refer to each other.
- the names of messages or parameter names in the messages exchanged between devices in each embodiment are just an example, and other names may also be used in the specific implementation. , without restriction.
- the terms “first” and “second” in the embodiments of the present application are used to distinguish different objects, rather than being used to describe the specific order of the objects.
- the properties of different objects represented by " are not limited.
- "acquiring” in this application can also be understood as generating, counting, calculating, receiving, and searching, and these words have equivalent concepts and can be used interchangeably.
- FIG. 17 is a flowchart of a charging method provided by an embodiment of the present application.
- a reader acquires charging information and sends the charging information to the CHF; or the reader acquires charging-related information and sends it to other devices Charging-related information, so that other devices can obtain the charging information according to the charging-related information, and send the obtained charging information to the CHF.
- the embodiment shown in Figure 17 can be adapted to the cellular fusion architecture of Figure 16a. As shown in Figure 17, the method includes the following steps:
- registration may refer to network registration
- session establishment may refer to establishing a user plane channel of the reader, such as establishing a connection between the reader and the RAN (it may be establishing an air interface resource or a wired connection), an N3 tunnel between the RAN and the UPF, N6 connection between UPF and data network.
- the reader receives an operation instruction from the server for instructing to perform a first operation on one or more terminals, and performs the first operation on the target terminal according to the operation instruction, and obtains an operation result.
- the reader may be the reader in FIG. 16a, and the reader may be deployed independently or in the RAN. If deployed in the RAN, the reader may be understood as the RAN in this embodiment. In a possible implementation manner, the reader may be a terminal, or a pole station, a micro base station, an integrated access and backhaul node (IAB node), etc., which are not limited in this application.
- IAB node integrated access and backhaul node
- the terminal may be the tag 101 shown in FIG. 1 or include the tag 101 shown in FIG. 1 .
- the tag 101 can be a passive tag, a semi-active tag or an active tag.
- the target terminal may be a terminal to be performed the first operation, for example, the target terminal may be one or more terminals indicated by the operation instruction sent by the server.
- the first operation may include one or more of an inventory operation (or called an inventory operation), a read operation, a write operation, and an invalidation operation, and the first operation here refers to one or more items. item specific operations.
- the first operation does not specifically refer to a specific operation, but refers to an operation under a certain application scenario/Internet of Things technology.
- the first operation may refer to passive IoT operations, semi-active IoT operations Network operation, IoT operation, passive IoT tag operation, semi-active IoT tag operation, IoT tag operation, etc.
- the reader receives the operation instruction from the server through the user plane channel of the reader.
- the user plane channel includes the connection between the reader and the RAN, the N3 tunnel between the RAN and the UPF, and the connection established between the UPF and the server.
- the reader receives the operation instruction from the server through a control plane (such as SMF, AMF).
- the operation instruction may include one or more of the following information: identification information of one or more terminals, information of the operation requester, operation type, and area information (or location information) where the operation is performed.
- the operation type is an inventory operation.
- the tag information may be "500” and "600", indicating that the tags with tag identifications of 500 and 600 are to be inventoried.
- the label information may also be "500-600", which means that the label identification to be inventoried is a label in the range of 500 to 600.
- the region information indicates the region range in which the count operation is performed.
- the area information may be specific latitude and longitude, coordinate values, cell identifiers, or other area information such as "Shanghai Pudong New Area” or "Building No. 3". If the area information is included, the reader located in the area information will only perform the operation according to the instruction.
- the operation result may include information of the operation requester and/or terminal data.
- the information of the operation requester is described below in S1704.
- the terminal data may include data obtained during the first operation on the target terminal, such as information on the terminal (such as a tag) that is checked after performing the inventory operation, data information obtained from the terminal (such as a tag) after performing a read operation, and The information of the terminal that is successfully read, the information of the terminal that is successfully written into the information after the write operation is performed, the information of the tag that is invalidated after the invalidation operation is performed, and so on. If the operation fails, the operation result indicates that the operation fails. Optionally, the operation result also carries/indicates the failure reason value.
- S1703 The reader sends the operation result to the server. Accordingly, the server receives the operation result.
- the reader may send the operation result to the server through the user plane channel.
- the reader sends the operation result to the server through the UPF, and correspondingly, the server receives the operation result through the UPF.
- the reader may send the operation result to the server through the control plane channel, for example, send the operation result to the server through the AMF, and correspondingly, the server receives the operation result through the AMF.
- the reader may acquire charging rules from other devices, and the other devices may include any of AMF, SMF, PCF, UPF, CHF, and server.
- the AMF may be pre-configured with charging rules, and the AMF may obtain the charging rules locally during the reader registration process or after the reader completes the registration process, and send the charging rules to the reader.
- the AMF may acquire the charging rules from other devices, and send the acquired charging rules to the reader during the reader registration process or after the reader completes the registration process.
- SMF can be pre-configured with charging rules
- SMF can obtain charging rules
- N2 processes such as (creating NGAP) during session establishment, after session establishment, during session modification, and after session modification
- the charging rules are sent to the reader in the UE-TNLA-bindings process).
- charging rules may be preconfigured on the reader, and the reader may obtain charging rules locally.
- the charging rule may be used to indicate which charging information to obtain, so that the CHF can perform more reasonable and accurate charging according to the charging information.
- the network or network operator can formulate charging rules according to one or more of the business requirements of the operation requester, the contract information between the operation requester and the operator, and authority control.
- the charging rules can be pre-configured on a certain device. For example, it is pre-configured on any one or more devices of the reader, AMF, SMF, PCF, UPF, CHF, and server; the charging rules can also be obtained through other devices.
- a charging rule can be a set of information or a set of related operations. It should be understood that this application does not limit the naming of the charging rule, and may also be named the first rule or other names.
- the charging rule may be used to instruct the acquisition of charging information, and/or the charging rule may be used to instruct the acquisition of the content specifically included in the charging information (that is, to indicate which to acquire), for example, the charging rule may be Used to instruct the acquisition of one or more of the following: identification information of the terminal on which the first operation is performed, information on the number of terminals on which the first operation is performed, the cumulative number of operations, the cumulative number of operations corresponding to the first operation, the operation requester information, operation type information, the amount of signaling exchanged during the operation, the frequency of executing the operation, the frequency of executing the first operation, and the acquisition time of the billing information.
- the charging rule when the first operation includes one or more of an inventory operation (or called an inventory operation), a read operation, a write operation, and an invalidation operation, the charging rule is configured with the operation type as the granularity.
- the charging rule corresponds to one or more specific operation types, and the charging rule may be different for different operation types, which can be understood as not a general charging rule.
- the first operation refers to a passive IoT operation, a semi-active IoT operation, an IoT operation, a passive IoT tag operation, a semi-active IoT tag operation, and an IoT tag operation. , RFID operations, etc., when it does not specifically refer to a certain operation type, the billing rules are not configured based on the operation type. Different operation types under the specific Internet of Things technology can be the same, which can be understood as general charging rules.
- the application scenarios/IoT technologies described in this application may include but are not limited to passive IoT, semi-active IoT, active IoT, passive IoT tags, semi-active IoT tags, IoT Tags, active IoT tags, RFID, and more.
- there can be multiple types of operations such as the following one or more types of operations: inventory operations (or called inventory operations), read operations, write operations, and invalidation operations.
- the charging rule is further used to instruct not to perform repeated calculation on the same terminal or to instruct to perform repeated calculation on the same terminal.
- not performing repeated calculations on the same terminal may be referred to as deduplication.
- deduplication when the charging rule corresponds to a specific operation type, deduplication can be understood as when the same terminal performs the same operation repeatedly, relative to the operation, the number of terminals that perform the operation. It is counted as 1, and/or the number of times the operation is performed is counted as 1, and/or the identification information of the terminal on which the operation is performed appears once in the charging information and does not appear repeatedly; or deduplication can also be understood as when the same When the same operation is repeatedly performed on a terminal within a certain period of time (the operation here may refer to an inventory operation, a read operation, a write operation or an invalidation operation), relative to the operation, the number of terminals that have been performed the operation within the period of time It is counted as 1, and/or the number of times the operation is performed within the time period is counted as 1, and/or the identification information of the terminal that is performed the operation appears once in the charging information and does not appear repeatedly.
- the operation here may refer to an inventory operation, a read operation, a write operation or an
- the certain period of time may be understood as the time required to perform an operation indicated by an instruction or may be a specific period of time. This application does not limit the definition of the time period. For example, in the IoT scenario, if tag 1 is repeatedly counted 3 times and tag 1 is read twice, the number of tags 1 that have been counted is counted as 1 during deduplication, and the number of tags 1 that have been read The number of tag 1's that operate is counted as 1.
- deduplication can be understood as when the same terminal is repeatedly performed operations (same or different operations) under the same application scenario/Internet of Things technology, regardless of the terminal If the same and/or different operations are repeatedly performed several times, for the terminal, the number of terminals that are operated under this application scenario/Internet of Things technology is counted as 1, and/or, under this application scenario/IoT technology The number of times the operation is performed is counted as 1, and/or the identification information of the terminal whose operation is performed under the application scenario/Internet of Things technology appears once in the billing information and does not appear repeatedly; or de-duplication can also be understood as when the same terminal is When operations under the same application scenario/IoT technology (same or different operations) are repeatedly performed within a period of time, the number of terminals that are operated under the application scenario/IoT technology within that period is counted as 1, and/or , the number of times the operation is performed within the time period is counted as 1, and/or the
- the certain period of time may be understood as the time required to perform an operation indicated by an instruction or may be a specific period of time. This application does not limit the definition of the time period. For example, in the IoT scenario, if tag 1 is repeatedly counted for 3 times and tag 1 is repeatedly read for 2 times, assuming that the first operation refers to an IoT operation, even if tag 1 is operated 5 times, In terms of 1, in the deduplication scenario, the number of tags 1 that are subjected to IoT operations (counted and read) is counted as 1.
- the repeated calculation of the same terminal may be referred to as non-duplication; in a possible implementation manner, the repeated calculation of the same terminal may be understood as when the same terminal is repeatedly performed the same operation (the operation here may refer to Inventory operation, read operation, write operation or invalidation operation), the number of terminals to be executed is equal to the number of repetitions, and/or, the number of executions of the operation is equal to the number of repetitions, and/or the identification information of the terminal to be executed is in It appears repeatedly in the billing information, and the number of repetitions is equal to the number of repetitions.
- the operation here may refer to Inventory operation, read operation, write operation or invalidation operation
- the number of terminals to be executed is equal to the number of repetitions
- the number of executions of the operation is equal to the number of repetitions
- the identification information of the terminal to be executed is in It appears repeatedly in the billing information, and the number of repetitions is equal to the number of repetitions.
- the repeated calculation of the same terminal can be understood as when the same terminal is repeatedly performed operations under the same application scenario/Internet of Things technology (same operation or different operations), the number of terminals performed operations is equal to The number of repetitions, and/or, the number of times the operation is performed under the application scenario/Internet of Things technology is equal to the number of repetitions, and/or the identification information of the terminal performing the operation under the application scenario/Internet of Things technology is repeated in the billing information occurs, and the number of repetitions is equal to the number of repetitions.
- the terminal may refer to the label 101 in FIG. 1
- the identification information of the terminal may be used to identify the terminal
- the identification information of the terminal may be understood as the identification information of the label
- the identification information may be permanent identification information, globally unique Identification information, temporary identification information, and non-globally unique identification information.
- the identification information of the label may include the EPC of the label
- the identification information of the terminal can also be understood as the terminal where the label is located (or the terminal where the label is located or the terminal corresponding to the label).
- the identification information of the terminal may include a user permanent identifier (subscription permanent identifier, SUPI), a user concealed identifier (subscription concealed identifier, SUCI), a 5G globally unique temporary identifier (5G globally unique temporary identity, 5G-GUTI), general public Subscription identifier (generic public subscription identifier, GPSI), 5G temporary mobile station identity (5G temporary mobile subscriber identity, 5G-TMSI), temporary mobile station identity (temporary mobile subscriber identity, TMSI), international mobile subscriber identity (international mobile subscriber identity) subscriber identity, IMSI) or international mobile equipment identity (international mobile equipment identity, IMEI), permanent equipment identity (permanent equipment identifier, PEI).
- the information on the number of terminals on which the first operation is performed may be understood as the number of terminals on which the first operation is performed.
- the number of terminals can be obtained according to the number of times the terminal is performed the first operation. For example, during deduplication, the number of terminals is counted as 1 even if the terminal is repeatedly performed operations for many times. When not deduplicated/deduplicated, the number of terminals is equal to the number of times the operation is repeated.
- the cumulative number of operations may be understood as the number of operations performed within a period of time.
- the cumulative number of operations corresponding to the first operation can be understood as the number of times the first operation is performed within a period of time.
- the operation type information may be used to indicate an operation type/operation
- the operation type/operation in this application may include one of an inventory operation (or called an inventory operation), a read operation, a write operation, and an invalidation operation or multiple.
- an inventory operation or called an inventory operation
- the operation types introduced in the embodiments of the present application are for the purpose of illustrating the technical solutions of the embodiments of the present application more clearly, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application, except for the operation types described in the present application. , and can also include other action types.
- those of ordinary skill in the art know that with the evolution of the network architecture and the emergence of new service scenarios, the technical solutions provided in the embodiments of the present application are also applicable to other new operation types.
- the frequency of performing operations may refer to the number of times of performing operations within a period of time, or the ratio of the number of times of performing operations within a period of time to the total duration of the period of time.
- the frequency of performing the first operation may refer to the number of times the first operation is performed within a period of time, or a ratio of the number of times the first operation is performed within a period of time to the total duration of the period of time.
- the acquisition time of the charging information may be represented by the start time of acquiring the charging information and the end time of acquiring the charging information, or by the start time and duration of acquiring the charging information, or by the duration and Get the end time representation of billing information.
- the acquisition time of the charging information may be represented by a certain time.
- the preset time period after the time is the acquisition time of the charging information; or, the preset time period before the time is the acquisition time of the charging information.
- the present application does not limit the representation of the acquisition time of the charging information.
- the acquisition time of the billing information may be ⁇ start time 9:00, end time 10:00 ⁇ , ⁇ start time 9:00, duration 1 hour ⁇ , or ⁇ end time 10:00, Duration 1 hour ⁇ .
- the operation requesting party may be referred to as a requesting party.
- the operation requester can be understood as a device that sends an operation command, for example, the operation requester can be a server (such as an Internet of Things server) or an application function (application function, AF) or other device that sends an operation command.
- the operation requester may correspond to a certain type of user, and this type of user may include an enterprise, a tenant, a third party, or a company, which is not limited. If the operation requester corresponds to a certain type of user, it can be understood that the operation requester belongs to this type of user and is managed by this type of user.
- the information of the operation requester may be used to indicate the operation requester and/or the terminal corresponding to the operation requester.
- the terminal corresponding to the operation requester may be understood as a terminal that the operation requester allows to operate or a terminal that allows the operation instructed by the operation requester to be performed.
- the information of the operation requester may include: the name information of the operation requester (such as the name of the server or application function, or the name of a company/enterprise/third party, etc.), the identification information of the operation requester (such as the server or application The identifier of the function, which can also be the company/enterprise/third-party code, code, etc.), the data network name (DNN) information corresponding to the operation requester, and the slice information corresponding to the operation requester (such as network slice selection auxiliary information).
- the name information of the operation requester such as the name of the server or application function, or the name of a company/enterprise/third party, etc.
- the identification information of the operation requester such as the server or application
- the identifier of the function which can also be the company/enterprise/third-party code, code, etc.
- the data network name (DNN) information corresponding to the operation requester
- slice information corresponding to the operation requester such as network slice selection auxiliary information
- network slice selection assistance information NSSAI
- single network slice selection assistance information S-NSSAI
- the address information of the operation requester such as the address information of the server or application function
- the operation requester port information such as the port information of the server or application function, the port information may include port ID and/or port status information, etc.
- the identification information of the terminal corresponding to the operation requester such as the identification information of the terminal that the server or application function allows to operate ).
- the data network name information can be used to indicate the data network (DN) corresponding to the operation requester.
- the address information of the operation requester may include, but is not limited to, an internet protocol (internet protocol, IP) address or a media access control (media access control, MAC) address.
- IP internet protocol
- MAC media access control
- the terminal corresponding to the operation requester may include a terminal belonging to the operation requester or a terminal managed by the operation requester, or a terminal that allows the operation requester to request to perform an operation.
- the reader can obtain the charging information according to the charging rules, and send the charging information to the CHF through the device supporting CTF, that is, it can be understood that the reader can directly follow the charging rules. Obtain the information finally used for CHF billing. Or as shown in S1707-S1709 below, the reader obtains the charging-related information according to the charging rules, and sends the charging-related information to the device that has the ability to obtain the charging information or has the ability to deduplicate and integrate.
- the device obtains the charging information according to the charging related information sent by the reader, and sends the charging information to the CHF or sends the charging information to the CHF through the device supporting CTF, That is, it can be understood that the reader obtains the intermediate information (or called initial information) for acquiring/obtaining the charging information according to the charging rule.
- the charging information and charging-related information described in this application may be the same or different.
- the charging-related information can be understood as being used to obtain The information of the charging information, which can be the original information that has not been integrated and processed, or the intermediate information generated by partial integration and processing before acquiring the charging information.
- the present application does not limit the naming of charging information and charging-related information.
- the charging information may also be named charging data, and the charging-related information may also be named charging-related data.
- S1705 The reader obtains billing information.
- the charging information may include/is used to indicate the identification information of the terminal on which the first operation is performed, the number of terminals on which the first operation is performed, the operation type information corresponding to the first operation, the accumulated number of operations, and the corresponding number of the first operation.
- the charging information may be directed to a specific operation type.
- the first operation is the above-mentioned Internet of Things operation, that is, regardless of the specific operation type, the charging information does not correspond to the operation type, and the charging information is used for the related information of the terminal that has been operated.
- the reader may acquire charging information according to the charging rule.
- the acquisition of charging information according to charging rules described in this application may refer to acquiring parameters or data indicated by charging rules, and/or acquiring parameters or data related to parameters indicated by charging rules.
- the charging rule instructs to obtain the identification information of the tag for which the inventory operation is performed
- the charging information obtained according to the charging rule may include tags ⁇ tag 1, tag 2 ⁇ of the parameters for which the inventory operation is performed and/or the inventory operation is performed.
- the number of labels is 2.
- acquiring the charging information by the reader according to the charging rule may include: when the charging rule instructs to acquire the identification information of the terminal to be executed the first operation, the reader acquires the identification of the terminal to be executed the first operation according to the operation result. information. Further, if the charging rule also indicates de-duplication, the identification information of the terminal to be executed the first operation is de-duplicated, so that the acquired charging information does not include the identification information of repeated/multiple identical terminals; or,
- the reader uses the information on the number of terminals on which the first operation is performed according to the operation result. Further, if the charging rule also indicates deduplication, the terminal that performs the first operation will be deduplicated, and the same terminal that has been repeatedly performed multiple times will not be counted multiple times according to the number of operations, but will be counted as 1. or,
- the reader counts the total number of operations performed within a period of time according to the operation result to obtain the cumulative number of operations; or,
- the reader When the charging rule instructs to obtain the accumulated number of operations corresponding to the first operation, the reader counts the total number of times the first operation is performed within a period of time according to the operation result, and obtains the accumulated number of operations corresponding to the first operation; or,
- the reader counts the operation type according to the operation result, or,
- the reader When the charging rule instructs to obtain the information of the operation requester, the reader will count the information of the operation requester according to the operation result, for example, obtain the information of the operation requester from the operation result, or,
- the reader obtains the number of signaling exchanged during the operation according to the number of signaling that needs to be sent and/or received during the operation indicated by the operation instruction sent by the server. .
- the number of signaling exchanged during the operation may be equal to the number of signaling sent, may also be equal to the number of signaling received, or may be equal to the sum of the number of signaling sent and the number of signaling received.
- the operation instruction instructs to perform an inventory operation on tags 1 to 50. To complete this process, 10 signalings need to be sent and 5 signalings are received.
- the number of signaling interacted during the operation is counted as 10, or 5, or 15, depending on The number of signaling is the number of signaling sent, the number of signaling received, or the number of signaling sent and received. or,
- the reader When the charging rule instructs to obtain the frequency of performing the operation, the reader counts the frequency of performing the operation according to the operation result. When the charging rule indicates to obtain the frequency of executing the first operation, the reader counts the frequency of executing the first operation according to the operation result, or,
- the reader acquires the acquisition time of the charging information according to the information such as the start time and the end time when it starts to acquire the charging information.
- the reader can count the tags in a certain period of time during the inventory operation, and obtain two copies of the operation results, operation result 1 ⁇ count operation, tag 1, tag 3, tag 4 ⁇ , operation result 2 ⁇ inventory operation , label 1, label 2, label 3, label 5 ⁇ .
- the charging rule indicates not to deduplicate, the charging information includes ⁇ counting operation, identification information of the terminal on which the counting operation is performed ⁇ label 1, label 3, label 4, label 1, label 2, label 3, label 5 ⁇ , The information on the number of terminals on which the inventory operation is performed is 7 ⁇ .
- the reader removes the double-counted tag 1 and tag 3 in the two operation results, and the billing information includes ⁇ counting operation, identification information of the terminal performing the counting operation ⁇ tag1, tag 2.
- the reader sends charging information to the CHF through the device supporting the CTF.
- the reader supports CTF, and the reader can be regarded as a device supporting CTF at this time, and the reader can directly send billing information to CHF.
- the reader can send accounting information to the AMF, and the AMF sends the accounting information to the CHF.
- S1707 The reader acquires charging-related information, and sends the charging-related information to the first device.
- the first device receives the charging related information.
- the reader may acquire charging-related information according to the charging rule.
- the charging related information may refer to the information used to obtain/calculate the charging information.
- the charging-related information may include/is used to indicate the identification information of the terminal on which the first operation is performed, the number of terminals on which the first operation is performed, the operation type information corresponding to the first operation, the accumulated number of operations, and the number of terminals corresponding to the first operation.
- the identification information of the terminal on which the first operation is performed and indicated by the charging-related information may be the identification information of the terminal after deduplication, or the identification information of the terminal that has not been deduplicated.
- the information on the number of terminals that are performed the first operation indicated by the charging related information may be information on the number of terminals after deduplication, or may be information on the number of terminals without deduplication.
- one or more readers described in this application can obtain charging-related information according to the charging rules, and one or more readers can send the charging-related information acquired by themselves to the first device corresponding to them,
- the first device may receive billing-related information sent by one or more readers managed/served by the first device.
- the first device is an AMF
- the reader sends charging related information to the AMF at this time.
- the AMF acquires charging information according to the received charging related information.
- the charging-related information received by the AMF is the charging-related information sent by one or more readers.
- the AMF acquiring the charging information according to the received charging-related information may include: in the charging-related information sent by the AMF to one or more readers, the identification information and/or the number of terminals that repeatedly perform the first operation.
- the information is deduplicated, and the deduplicated information is used as charging information.
- the identification information of the terminal performing the first operation indicated by the charging-related information may be the identification information of the terminal after deduplication, and the number information of the terminals performing the first operation indicated by the charging-related information. It can be the number of terminals after deduplication.
- AMF deduplicates the identification information and quantity information of the terminals that are repeatedly calculated in the charging-related information sent by one or more readers. , and integrate the deduplicated billing-related information together as billing information.
- N is an integer greater than or equal to 2
- the N-1 identification information will be removed, and the information on the number of terminals that will perform the first operation will be removed at the same time.
- Subtract (N-1) is an integer greater than or equal to 2
- Tag 1 and Tag 3 exist in the coverage area of the first reader and the second reader at the same time.
- AMF removes the double-counted label 1 and label 3 in the two billing-related information, and integrates the deduplicated label 1, label 2, label 3, label 4 and label 5 to obtain the label that has been counted.
- the quantity information of is 5, and the charging information is obtained as ⁇ counting operation, tag 1, tag 2, tag 3, tag 4, tag 5, and the quantity information of the terminal is 5 ⁇ .
- the identification information of the terminal that is to perform the first operation indicated by the charging-related information is the identification information of the terminal that has not been deduplicated, and the number of terminals that are subjected to the first operation indicated by the charging-related information
- the information is information on the number of terminals without deduplication.
- the AMF deduplicates the identification information and quantity information of the terminals that are repeatedly calculated in the charging related information sent by one or more readers. Further, if there is still overlapping/identical information in the deduplicated charging related information corresponding to one or more readers, the AMF can also deduplicate the deduplicated charging related information corresponding to one or more readers.
- the deduplicated charging related information is integrated together as charging information.
- the AMF may not deduplicate the identification information and quantity information of the terminals that are repeatedly calculated in the deduplicated charging-related information corresponding to one or more readers.
- a piece of billing-related information sent by the first reader indicates ⁇ count operation, tag 1, tag 3, tag 4, tag 3, the number of terminals is 4 ⁇
- a copy of billing-related information sent by the second reader The information indicates ⁇ inventory operation, label 1, label 2, label 3, label 5, label 1, label 3, the number of terminals information is 6 ⁇ .
- AMF deduplicates the charging-related information sent by the first reader to obtain ⁇ count operation, tag 1, tag 3, tag 4, and the number of terminals is 3 ⁇ , and deduplicates the charging-related information sent by the second reader.
- Re-obtain ⁇ inventory operation label 1, label 2, label 3, label 5, the terminal quantity information is 4 ⁇ .
- Label 1 and label 3 still exist in the two pieces of deduplicated billing-related information.
- AMF removes the double-calculated label 1 and label 3 in the two pieces of deduplicated billing-related information, and obtains the billing information as: ⁇ Inventory operation, label 1, label 2, label 3, label 4, label 5, the terminal quantity information is 5 ⁇ .
- the AMF sends charging information to the CHF through the device supporting the CTF.
- the CHF receives the charging information through the device supporting the CTF.
- AMF supports CTF
- AMF can be regarded as a device supporting CTF at this time, and AMF can directly send charging information to CHF.
- the AMF can send the charging information to the SMF, and the SMF sends the charging information to the CHF.
- the CHF may create a CDR according to the charging information.
- the Internet of Things-related information is obtained through the reader or AMF for charging, for example, according to the operation type information, the number of terminals performed the operation (the number after repeated calculation or deduplication), the operation performed
- the identification information of the terminal identification information that can be repeated or deduplicated
- the number of signaling interacted during the operation the operation frequency information
- the accumulated operation times information the operation requester information (used to identify which operation requester requests
- the billing information is more comprehensive and specific, making the billing more reasonable and accurate.
- a deduplication operation is also performed on the charging-related information to avoid repeated charging.
- FIG. 17 describes the process of acquiring charging information in the scenario shown in FIG. 16a.
- the user plane device such as the UPF
- the user plane device may also acquire the charging information and send the charging information to the CHF.
- the method can be described with reference to the following FIG. 18 .
- Fig. 18 is another charging method provided by this embodiment of the present application. This method is applicable to the scenario shown in Fig. 16b, and the UPF can obtain the charging information according to the charging rules or the UPF can obtain the charging information from the reader according to the charging information. The information obtains the charging information finally used for CHF charging.
- the method can include:
- registration may refer to network registration
- session establishment may refer to establishing a user plane channel of the reader, such as establishing a connection between the reader and RAN (for example, establishing an air interface resource or wired connection), an N3 tunnel between RAN and UPF, and UPF Establish an N6 connection with the data network.
- S1802 The reader performs the first operation on the target terminal according to the operation instruction issued by the server.
- S1802 is the same as S1702, and will not be repeated here.
- the reader sends the operation result to the server through the user plane channel.
- the reader sends the operation result to the server through the UPF, and correspondingly, the server receives the operation result through the UPF.
- S1803 is the same as S1703, and will not be repeated here.
- the UPF acquires the charging related information from the reader, deduplicates and integrates the acquired charging related information to obtain the charging information, and sends the charging information to the CHF.
- the UPF obtains the billing-related information from the reader, and sends it to other devices for deduplication and integration of the billing-related information, so that other devices can deduplicate and integrate the billing-related information.
- the fee information is sent to CHF.
- the UPF acquires the charging information; in a possible implementation manner, the UPF acquires the charging information according to the charging rule.
- charging rules and charging related information refer to the description in the embodiment shown in FIG. 17 .
- For the method for the UPF to acquire charging-related information according to the charging rule refer to the process of the reader acquiring the charging information according to the charging rule in the embodiment shown in FIG. 17 , and details are not repeated here.
- charging rules may be pre-configured on the UPF.
- the UPF can obtain charging rules from other devices, such as a reader, a control plane device (AMF, or SMF or NEF or CHF), or UPF or server or RAN.
- AMF control plane device
- SMF SMF
- NEF NEF
- CHF control plane device
- the UPF when the UPF has CTF (or the UPF supports CTF), the UPF sends charging information to the CHF.
- the SMF has a CTF (or the SMF supports the CTF), and the UPF sends the charging information to the CHF through the SMF.
- S1806 The reader acquires charging-related information according to the charging rule, and the reader sends the charging-related information to the UPF. Accordingly, the UPF receives the charging related information.
- the UPF may manage/service one or more readers, and the UPF may receive billing-related information sent by the one or more readers managed/serviced by the UPF.
- UPF obtains the charging-related information sent by one or more readers, it can have different processing methods, which are the processing methods of S1807-S1808 (such as S1808a or S1808b) or the processing methods of S1809-S1811:
- S1807 The UPF obtains charging information according to the received charging related information.
- the UPF can deduplicate the charging-related information sent from one or more readers to avoid double-counting (for example, the charging rule indicates that the same tag or the same terminal should not be double-counted, or Do not double-count the same label or the same terminal during the operation indicated by the same instruction).
- the tag may be checked by multiple readers at the same time. Therefore, there may be two or more readers that have obtained the identification information of the tag.
- the UPF After the UPF receives the charging-related information that is sent by the one or more readers and carries the identification information of the same tag, the UPF can deduplicate the identification information of the tag.
- the UPF has a CTF or the UFP supports the CTF, and the UPF sends charging information to the CHF.
- the SMF has a CTF or the SMF supports the CTF, and the UPF sends the charging information to the CHF through the SMF.
- the UPF sends charging related information to the SMF.
- the SMF receives the charging related information.
- the UPF shown in FIG. 18 sending the charging-related information to the SMF is an exemplary illustration, and the UPF may also send the charging-related information to other devices capable of acquiring the charging information, such as sending the charging-related information to the NEF, CHF, server, etc. Charge-related information, so that these devices perform de-duplication and integration of charging-related information to obtain charging information.
- the SMF acquires charging information according to the charging-related information sent by the UPF.
- the SMF can also deduplicate charging information sent from one or more UPFs.
- a tag or a terminal may be within the coverage of two readers (that is, the coverage of the two readers overlaps), and the UPFs serving the two readers are different UPFs, so there may be It appears that the charging-related information sent by the two UPFs to the SMF contains the identification information of the same label. After receiving the charging-related information that carries the identification information of the same label sent by the one or more UPFs, the SMF can The identification information is deduplicated.
- the SMF sends charging information to the CHF. Accordingly, the CHF receives the charging information.
- the CHF can also deduplicate the charging information sent from one or more other devices, so as to avoid repeated charging or inaccurate charging caused by the existence of duplicate information.
- a tag or a terminal may be within the coverage of two readers (that is, the coverage of the two readers overlaps), and the AMFs serving the two readers are different AMFs, so there may be It appears that the charging information sent by the two AMFs to the CHF contains the label information of the same label. The CHF can deduplicate the charging information.
- the CHF may create a CDR according to the charging information.
- the information related to the Internet of Things is obtained through UPF or SMF for charging, for example, according to the operation type information, the number of Identification information of the terminal (identification information that can be repeated or deduplicated), the number of signaling exchanged during the operation, operation frequency information, accumulated operation times information, and operation requester information (used to identify which operation requester requested operation), etc. for billing, since the billing information is more comprehensive and specific, the billing is more reasonable and accurate. Further optionally, a deduplication operation is also performed on the charging-related information to avoid repeated charging.
- FIG. 17 describes the process of acquiring charging information in the scenario shown in FIG. 16a.
- FIG. 18 describes the process of acquiring charging information in the scenario shown in FIG. 16b.
- a control plane device such as an AMF may also acquire the charging information and send the charging information to the CHF.
- the method can be described with reference to the following FIG. 19 .
- Fig. 19 is yet another charging method provided by this embodiment of the present application. This method is applicable to the scenario described in Fig. 16c, and the AMF can acquire charging information according to the charging rules or the AMF can acquire the charging information from the reader according to the charging information. The information obtains the charging information finally used for CHF charging.
- the method can include:
- S1901 The reader completes registration and session establishment.
- registration may refer to network registration
- session establishment may refer to establishing a user plane channel of the reader, such as establishing a connection between the reader and RAN (such as establishing air interface resources or wired connection), N3 tunnel between RAN and UPF, UPF connection to the data network.
- S1902 The reader performs the first operation on the terminal according to the operation instruction issued by the server.
- S1902 is the same as S1702, and will not be repeated here.
- the reader sends the operation result to the server through the user plane channel.
- the reader sends the operation result to the server through the AMF, and correspondingly, the server receives the operation result through the AMF.
- S1903 is the same as S1703, and details are not repeated here.
- the AMF obtains the charging information and sends the charging information to the CHF
- the process 2c: S1906-S1908 (such as S1908a or S1908b)
- the AMF acquires the charging related information from the reader, deduplicates and integrates the acquired charging related information to obtain the charging information, and sends the charging information to the CHF.
- the AMF obtains the billing-related information from the reader, and sends it to other devices for deduplication and integration of the billing-related information, so that other devices can deduplicate and integrate the billing-related information.
- the fee information is sent to CHF.
- the AMF acquires the charging information; in a possible implementation manner, the AMF acquires the charging information according to the charging rule.
- charging rules and charging related information refer to the description in the embodiment shown in FIG. 17 .
- AMF AMF to acquire charging-related information according to the charging rule
- the reader to acquire the charging information according to the charging rule in the embodiment shown in FIG. 17 , and details are not repeated here.
- charging rules may be pre-configured on the AMF.
- the AMF can obtain charging rules from other devices, such as a reader, a control plane device (SMF or NEF or CHF), or UPF or server or RAN.
- SMF control plane device
- NEF control plane device
- UPF User Plane Function
- S1905 The AMF sends charging information to the CHF.
- the AMF has CTF or the AMF supports CTF, and the AMF sends charging information to the CHF.
- the SMF has a CTF or the SMF supports the CTF, and the AMF sends the charging information to the CHF through the SMF.
- the reader can acquire charging-related information according to the charging rule, and the reader sends the charging-related information to the AMF. Correspondingly, the AMF receives the charging related information.
- the AMF may manage/service one or more readers, and the AMF may receive charging-related information sent by the one or more readers managed/serviced by the AMF.
- the AMF obtains the charging-related information sent by one or more readers, it can have different processing methods, which are the processing methods of S1907-S1908 or the processing methods of S1909-S1911 as follows:
- S1907 The AMF obtains charging information according to the received charging related information.
- the AMF can deduplicate the charging-related information sent from one or more readers to avoid double-counting (for example, the charging rules indicate that the same tag should not be double-counted, or do not The same label is counted repeatedly during the operation indicated by an instruction).
- a tag or a terminal may be located within the coverage of multiple readers (that is, at the intersection of the coverage of two or more readers), then the tag or the terminal may be simultaneously used by multiple readers. Inventory to. Therefore, there may be two or more readers that have acquired the identification information of the tag or the terminal. After the AMF receives the charging-related information that is sent by the one or more readers and carries the identification information of the same tag or the same terminal, it can deduplicate the identification information of the tag.
- S1908 The AMF sends charging information to the CHF.
- the AMF has CTF or the AMF supports CTF, and the AMF sends charging information to the CHF.
- the SMF has a CTF or the SMF supports the CTF, and the AMF sends the charging information to the CHF through the SMF.
- the AMF sends charging related information to the SMF.
- the SMF receives the charging related information.
- the sending of the charging-related information by the AMF to the SMF shown in FIG. 19 is an exemplary illustration, and the AMF may also send the charging-related information to other devices capable of acquiring the charging information, such as sending the charging-related information to the NEF, CHF, server, etc. Charge-related information, so that these devices perform de-duplication and integration of charging-related information to obtain charging information.
- the SMF acquires charging information according to the charging-related information sent by the AMF.
- the SMF can also deduplicate charging information sent from one or more AMFs.
- a tag or a terminal may be within the coverage area of two readers (that is, the coverage areas of the two readers are overlapping), and the AMFs serving the two readers are different AMFs, so there may be It appears that the charging-related information sent by the two AMFs to the SMF contains the identification information of the same label or the same terminal, and the SMF receives the charging-related information sent by the one or more AMFs that carry the identification information of the same label or the same terminal After that, the tag or the identification information of the terminal can be deduplicated.
- S1911 The SMF sends charging information to the CHF.
- the CHF can also deduplicate the charging information sent from one or more other devices, so as to avoid repeated charging or inaccurate charging caused by the existence of duplicate information.
- a tag or a terminal may be within the coverage of two readers (that is, the coverage of the two readers overlaps), and the AMFs serving the two readers are different AMFs, so there may be It appears that the charging information sent by the two AMFs to the CHF both contain the same label or the identification information of the same terminal.
- the CHF can deduplicate the charging information.
- the CHF may create a CDR according to the charging information.
- the AMF or SMF is used to obtain the information related to the Internet of Things for charging, for example, according to the operation type information, the number of terminals performed the operation (the number after repeated calculation or deduplication), the terminals performed the operation identification information (identification information that can be repeated or deduplicated), the number of signaling interacted during the operation, operation frequency information, accumulated operation times information, operation requester information (used to identify which operation requester requested the operation ), etc. for billing, because billing information is more comprehensive and specific, making billing more reasonable and accurate. Further optionally, a deduplication operation is also performed on the charging-related information to avoid repeated charging.
- an embodiment of the present application further provides a communication device, and the communication device may be the middleware in the above method embodiments, or a device including the function of the above middleware, or a component that can be used for the middleware; or, the communication device It may be the RAN in the foregoing method embodiments, or a device including the foregoing RAN function, or a component usable in the RAN. It can be understood that, in order to realize the above-mentioned functions, the communication apparatus includes corresponding hardware structures and/or software modules for executing each function.
- FIG. 20 is a schematic diagram of a communication apparatus provided according to an embodiment of the present application.
- the communication device includes a processing module 1601 , a receiving module 1602 and a sending module 1603 .
- the processing module 1601 is used to implement data processing by the communication device.
- the receiving module 1602 is used to receive the content of the communication device and other units or network elements, and the sending module 1603 is used to receive the content of the communication device and other units or network elements.
- the processing module 1601 in this embodiment of the present application may be implemented by a processor or a processor-related circuit component (or referred to as a processing circuit), and the receiving module 1602 may be implemented by a receiver or a receiver-related circuit component.
- the sending module 1603 may be implemented by a transmitter or a transmitter-related circuit component.
- the communication device may be a communication device device, or a chip applied in the communication device device or other combined devices, components, etc. having the functions of the above-mentioned communication device device.
- the communication apparatus may be the middleware or the first network element in any of FIG. 10 to FIG. 15 , may also be the RAN or access network device in any of FIG. 10 to FIG. 15 , or may be the The SMF in FIG. 12 may also be the PCF in FIG. 11 or FIG. 13 .
- the processing module 1601 is configured to obtain charging information through the type information and identification information received by the receiving module 1602 (for example, step S1006 in FIG. 10 , step S1113 in FIG. 11 , Step S1207 in FIG. 12 , step S1307 in FIG. 13 and step S1401 in FIG. 14 ), the charging information includes type information and first quantity information, the type information indicates the type of the first operation, the first A number information indicates a first number of terminals on which the first operation is performed.
- the sending module 1603 is configured to send the charging information (eg, step S1007 in FIG. 10 , step S1114 in FIG. 11 , step S1208 in FIG. 12 , step S1308 in FIG. 13 and step S1402 in FIG. 14 ).
- the processing module 1601 is configured to receive, through the receiving module 1602, identification information including/used to indicate the terminal on which the first operation is performed, information on the number of terminals on which the first operation is performed, The operation type information corresponding to the first operation, the cumulative number of operations, the cumulative number of operations corresponding to the first operation, the frequency of performing the operation, the frequency of performing the first operation, and the interaction during the execution of the first operation.
- One or more charging information of the number of signaling and the operation requester performing the first operation for example, steps S1705 and S1708 in FIG. 17 , steps S1804 , S1807 , and S1810 in FIG. steps S1904, S1907, S1910).
- the sending module 1603 is configured to send the charging information (eg, steps S1706, S1709 in FIG. 17, steps S1805, S1808, and S1811 in FIG. 18, and steps S1905, S1908, and S1911 in FIG. 19).
- the processing module 1601 is configured to obtain the type information and identification information through the type information and identification information received by the receiving module 1602 (for example, step S1004 in FIG. 10 , step S1111 in FIG. 11 ) , step S1205 in FIG. 12 , step S1305 in FIG. 13 and step S1501 in FIG. 15 ), the type information indicates the type of the first operation, and the identification information identifies the identification of the terminal performing the first operation .
- the sending module 1603 is configured to send the first message to the first network element according to the type information and the identification information (for example, step S1005 in FIG. 10 , step S1112 in FIG. 11 , step S1206 in FIG. 12 , and step S1206 in FIG. 13 . in step S1306 and step S1502 in FIG. 15 ).
- the receiving module 1602 is configured to receive the PCC rule request message from the SMF (eg, step S1104 in FIG. 11 ); the sending module 1603 is configured to deliver the PCC rules related to the first operation to the SMF (eg, FIG. 11 ). Step S1105 in 11).
- the various modules described above may also be used to support other processes of the techniques described herein. For the beneficial effects, reference may be made to the foregoing description, which will not be repeated here.
- the receiving module 1602 is configured to receive PCC rules from PCF (eg, step S1105 in FIG. 11 ); the sending module 1603 is configured to send URR to UPF according to the PCC rules (eg, step S1106 in FIG. 11 ).
- the various modules described above may also be used to support other processes of the techniques described herein. For the beneficial effects, reference may be made to the foregoing description, which will not be repeated here.
- FIG. 21 is a schematic diagram of another communication apparatus provided according to an embodiment of the present application.
- the communication apparatus includes: a processor 1701 , a communication interface 1702 , and a memory 1703 .
- the processor 1701, the communication interface 1702 and the memory 1703 can be connected to each other through a bus 1704; the bus 1704 can be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus etc.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the above-mentioned bus 1704 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one line is shown in Figure 21, but it does not mean that there is only one bus or one type of bus.
- the processor 1701 may be a central processing unit (CPU), a network processor (NP), or a combination of CPU and NP.
- the processor may further include a hardware chip.
- the above-mentioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
- the above-mentioned PLD can be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a general-purpose array logic (Generic Array Logic, GAL) or any combination thereof.
- Memory 1703 may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
- the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- Volatile memory may be random access memory (RAM), which acts as an external cache.
- the communication apparatus may be the middleware or the first network element in any of FIG. 10 to FIG. 15 , may also be the RAN or access network device in any of FIG. 10 to FIG. 15 , or may be the The SMF in FIG. 12 may also be the PCF in FIG. 11 or FIG. 13 .
- the processor 1701 is used for implementing data processing operations of the communication device, and the communication interface 1702 is used for implementing receiving operations and sending operations of the communication device.
- the processor 1701 is configured to acquire charging information (for example, step S1006 in FIG. 10 , step S1113 in FIG. 11 , step S1207 in FIG. 12 , and step S1207 in FIG. Step S1307 and step S1401 in FIG. 14 ), the charging information includes type information and first quantity information, the type information indicates the type of the first operation, and the first quantity information indicates that the first operation is performed The first number of terminals.
- the communication interface 1702 is used for sending the charging information (eg step S1007 in FIG. 10 , step S1114 in FIG. 11 , step S1208 in FIG. 12 , step S1308 in FIG. 13 and step S1402 in FIG. 14 ).
- the various modules described above may also be used to support other processes of the techniques described herein. For the beneficial effects, reference may be made to the foregoing description, which will not be repeated here.
- the processor 1701 is configured to acquire type information and identification information (eg step S1004 in FIG. 10 , step S1111 in FIG. 11 , step S1205 in FIG. 12 , and step S1205 in FIG. In step S1305 and step S1501 in FIG. 15 ), the type information indicates the type of the first operation, and the identification information identifies the identification of the terminal on which the first operation is performed.
- the communication interface 1702 is configured to send a first message to the first network element according to the type information and the identification information (for example, step S1005 in FIG. 10 , step S1112 in FIG. 11 , step S1206 in FIG. 12 , and Step S1306 in 13 and step S1502 in FIG. 15 ).
- the communication interface 1702 When the communication device is a PCF, the communication interface 1702 is used to receive a PCC rule request message from the SMF (for example, step S1104 in FIG. 11 ); the communication interface 1702 is used to issue the PCC rule related to the first operation to the SMF (for example, in FIG. 11 ). Step S1105 in 11).
- the various modules described above may also be used to support other processes of the techniques described herein. For the beneficial effects, reference may be made to the foregoing description, which will not be repeated here.
- the communication interface 1702 is used for receiving PCC rules from the PCF (eg, step S1105 in FIG. 11 ); the communication interface 1702 is used for sending URR to the UPF according to the PCC rules (eg, step S1106 in FIG. 11 ).
- the various modules described above may also be used to support other processes of the techniques described herein. For the beneficial effects, reference may be made to the foregoing description, which will not be repeated here.
- An embodiment of the present application provides a communication system, which includes the aforementioned first network element (for example, middleware) and an access network device (for example, a RAN), wherein the first network element executes any of FIG. 10 , FIG. 12 to FIG. 15 .
- the access network device executes the method executed by the RAN in any of the embodiments shown in FIG. 10 and FIG. 12 to FIG. 15 .
- An embodiment of the present application further provides a communication system including the aforementioned PCF and SMF, wherein the PCF performs the method performed by the PCF in the embodiment shown in FIG. 11 , and the SMF performs the method performed by the SMF in the embodiment shown in FIG. 11 .
- Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium.
- the computer can implement FIGS. 10 to 15 provided by the foregoing method embodiments.
- the process related to the middleware or the first network element in any of the embodiments shown in the above, or the computer may implement the process related to the RAN in any of the embodiments shown in FIG. 10 to FIG. 15 provided by the above method embodiments. or a process related to an access network device, or the computer can implement the process related to SMF in the embodiment shown in FIG. 11 or FIG. 12 provided by the above method embodiment, or the computer can implement the above method embodiment.
- the PCF-related flow in the embodiment shown in FIG. 11 or FIG. 13 is provided.
- Embodiments of the present application further provide a computer program product, where the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement any one of FIGS. 10 to 15 provided by the foregoing method embodiments.
- the process related to the middleware or the first network element, or the computer may implement the RAN or access in any of the embodiments shown in FIG. 10 to FIG. 15 provided by the above method embodiment.
- network device-related processes, or the computer may implement the SMF-related processes in the embodiment shown in FIG. 11 or FIG. 12 provided by the foregoing method embodiments, or the computer may implement the diagrams provided by the foregoing method embodiments. 11 or the PCF-related flow in the embodiment shown in FIG. 13 .
- the present application also provides a chip including a processor.
- the processor is configured to read and run the computer program stored in the memory to execute corresponding operations and/or processes in the middleware, RAN, SMF or PCF in the charging method provided by the present application.
- the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the processor is used for reading and executing the computer program in the memory.
- the chip further includes a communication interface, and the processor is connected to the communication interface.
- the communication interface is used to receive processed data and/or information, and the processor acquires the data and/or information from the communication interface and processes the data and/or information.
- the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit on the chip, and the like.
- the processor may also be embodied as a processing circuit or a logic circuit.
- the above-mentioned chip can also be replaced by a chip system, which will not be repeated here.
- the disclosed system, apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual conditions to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
- the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
- the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (43)
- 一种计费方法,其特征在于,所述方法包括:第一网元获取计费信息,所述计费信息包括类型信息和第一数量信息,所述类型信息指示第一操作的类型,所述第一数量信息指示被执行所述第一操作的终端的第一数量;所述第一网元发送所述计费信息。
- 根据权利要求1所述的方法,其特征在于,所述第一网元支持计费触发功能,所述第一网元发送所述计费信息,包括:所述第一网元向计费功能网元发送所述计费信息。
- 根据权利要求1所述的方法,其特征在于,所述第一网元发送所述计费信息,包括:所述第一网元向支持计费触发功能的网元发送所述计费信息。
- 根据权利要求3所述的方法,其特征在于,所述支持计费触发功能的网元包括会话管理功能网元或接入与移动性管理功能网元。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一网元获取计费信息,包括:所述第一网元从第一接入网设备接收所述类型信息和第二数量信息,所述第二数量信息指示被执行所述第一操作的第一集合的终端的第二数量。
- 根据权利要求5所述的方法,其特征在于,所述第二数量等于所述第一数量。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一网元获取计费信息,包括:所述第一网元从所述第一接入网设备接收所述类型信息和第一标识信息,所述第一标识信息用于标识被执行所述第一操作的第一集合的终端;所述第一网元根据所述第一标识信息确定所述第一数量信息。
- 根据权利要求7所述的方法,其特征在于,所述第一网元获取计费信息,还包括:所述第一网元从第二接入网设备接收所述类型信息和第二标识信息,所述第二标识信息用于标识被执行所述第一操作的第二集合的终端;其中,所述第一网元根据所述第一标识信息确定所述第一数量信息,包括:所述第一网元根据所述第一标识信息和所述第二标识信息,确定所述第一数量信息。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述第一网元获取计费信息,包括:所述第一网元接收第一信息和第二信息,所述第一信息指示所述第一操作的操作类型,以及被执行所述第一操作的终端的标识;所述第二信息指示所述第一操作的操作类型,以及被执行所述第一操作的终端的标识;所述第一网元根据所述第一信息和所述第二信息,确定所述计费信息。
- 根据权利要求9所述的方法,其特征在于,所述第一网元接收第一信息和第二信息,包括:所述第一网元从第一接入网设备接收所述第一信息和所述第二信息;或者,所述第一网元从第一接入网设备接收所述第一信息;所述第一网元从第二接入网设备接收所述第二信息。
- 一种计费方法,其特征在于,所述方法包括:接入网设备获取类型信息和标识信息,所述类型信息指示第一操作的类型,所述标识信息标识被执行所述第一操作的终端的标识;所述接入网设备根据所述类型信息和所述标识信息,向第一网元发送第一消息;其中,所述第一消息包括所述类型信息和所述标识信息,所述标识信息用于确定被执行所述第一操作的终端的数量;或者,所述第一消息包括所述类型信息和根据所述标识信息确定的数量信息,所述数量信息指示被执行所述第一操作的终端的数量。
- 根据权利要求11所述的方法,其特征在于,所述接入网设备获取类型信息和标识信息,包括:所述接入网设备获取第一标识信息和第二标识信息,所述第一标识信息标识被执行所述第一操作的第一集合的终端,所述第二标识信息标识被执行所述第一操作的第二集合的终端;所述接入网设备根据所述第一标识信息和所述第二标识信息,确定所述标识信息。
- 根据权利要求12所述的方法,其特征在于,所述方法还包括:所述接入网设备根据所述类型信息和所述标识信息,确定所述数量信息,所述第一消息包括所述类型信息和所述数量信息。
- 根据权利要求11至13中任一项所述的方法,其特征在于,所述第一网元为中间件装置。
- 根据权利要求11至13中任一项所述的方法,其特征在于,所述终端为无线射频识别RFID标签。
- 一种通信装置,其特征在于,所述通信装置包括:处理模块,用于获取计费信息,所述计费信息包括类型信息和第一数量信息,所述类型信息指示第一操作的类型,所述第一数量信息指示被执行所述第一操作的终端的第一数量;发送模块,用于发送所述计费信息。
- 根据权利要求16所述的通信装置,其特征在于,所述通信装置支持计费触发功能,所述发送模块用于向计费功能网元发送所述计费信息。
- 根据权利要求17所述的通信装置,其特征在于,所述发送模块用于向支持计费触发功能的网元发送所述计费信息。
- 根据权利要求16至18中任一项所述的通信装置,其特征在于,还包括:接收模块;所述处理模块用于通过所述接收模块从第一接入网设备接收所述类型信息和第二数量信息,所述第二数量信息指示被执行所述第一操作的第一集合的终端的第二数量。
- 根据权利要求16至18中任一项所述的通信装置,其特征在于,还包括:接收模块;所述处理模块用于通过所述接收模块从所述第一接入网设备接收所述类型信息和 第一标识信息,所述第一标识信息用于标识被执行所述第一操作的第一集合的终端;所述处理模块根据所述第一标识信息确定所述第一数量信息。
- 根据权利要求20所述的通信装置,其特征在于,所述处理模块用于通过所述接收模块从第二接入网设备接收所述类型信息和第二标识信息,所述第二标识信息用于标识被执行所述第一操作的第二集合的终端;其中,所述处理模块用于根据所述第一标识信息和所述第二标识信息,确定所述第一数量信息。
- 根据权利要求16至18中任一项所述的通信装置,其特征在于,还包括:接收模块;所述处理模块用于通过所述接收模块接收第一信息和第二信息,所述第一信息指示所述第一操作的操作类型,以及被执行所述第一操作的终端的标识;所述第二信息指示所述第一操作的操作类型,以及被执行所述第一操作的终端的标识;所述处理模块根据所述第一信息和所述第二信息,确定所述计费信息。
- 根据权利要求22所述的通信装置,其特征在于,所述接收模块用于从第一接入网设备接收所述第一信息和所述第二信息;或者,所述接收模块用于从第一接入网设备接收所述第一信息;所述接收模块用于从第二接入网设备接收所述第二信息。
- 一种通信装置,其特征在于,所述通信装置包括:处理模块,用于获取类型信息和标识信息,所述类型信息指示第一操作的类型,所述标识信息标识被执行所述第一操作的终端的标识;发送模块,用于根据所述类型信息和所述标识信息,向第一网元发送第一消息;其中,所述第一消息包括所述类型信息和所述标识信息,所述标识信息用于确定被执行所述第一操作的终端的数量;或者,所述第一消息包括所述类型信息和根据所述标识信息确定的数量信息,所述数量信息指示被执行所述第一操作的终端的数量。
- 根据权利要求24所述的通信装置,其特征在于,还包括:接收模块;所述处理模块用于通过所述接收模块获取第一标识信息和第二标识信息,所述第一标识信息标识被执行所述第一操作的第一集合的终端,所述第二标识信息标识被执行所述第一操作的第二集合的终端;所述处理模块用于根据所述第一标识信息和所述第二标识信息,确定所述标识信息。
- 根据权利要求25所述的通信装置,其特征在于,所述处理模块用于根据所述类型信息和所述标识信息,确定所述数量信息,所述第一消息包括所述类型信息和所述数量信息。
- 一种计费方法,其特征在于,所述方法包括:第一设备获取计费信息;所述计费信息用于指示被执行第一操作的终端的标识信息、被执行所述第一操作的终端的数量信息、所述第一操作对应的操作类型信息、累计操作次数、所述第一操作对应的累计操作次数、执行操作的频率、执行所述第一操作的频率、执行所述第一操作过程中交互的信令数量、执行所述第一操作的操作请求方中的一项或多项;所述第一设备发送所述计费信息。
- 根据权利要求27所述的方法,其特征在于,所述第一设备获取计费信息,包括:所述第一设备根据计费规则获取所述计费信息。
- 根据权利要求28所述的方法,其特征在于,所述计费规则用于指示获取所述计费信息;或者,所述计费规则用于指示获取下述一项或者多项信息:被执行所述第一操作的终端的标识信息、被执行所述第一操作的终端的数量信息、累计操作次数、所述第一操作对应的累计操作次数、操作请求方的信息、操作类型信息、操作过程中交互的信令数量、执行操作的频率、执行所述第一操作的频率、计费信息的获取时间。
- 根据权利要求27-29任一项所述的方法,其特征在于,被执行所述第一操作的终端的标识信息包括对被重复执行所述第一操作的终端去重后得到的终端标识信息;或者,未去重的终端标识信息;被执行所述第一操作的终端的数量信息包括对被重复执行所述第一操作的终端去重后得到的终端数量信息;或者,未去重的终端数量信息。
- 根据权利要求27所述的方法,其特征在于,所述第一设备获取计费信息,包括:所述第一设备接收来自至少一个第二设备的计费相关信息;所述第一设备根据所述至少一个第二设备的计费相关信息确定所述计费信息。
- 根据权利要求31所述的方法,其特征在于,所述第一设备根据所述至少一个第二设备的计费相关信息确定所述计费信息,包括:所述第一设备对所述至少一个第二设备的计费相关信息中,被重复执行所述第一操作的终端的标识信息和/或数量信息进行去重,将去重后的所述至少一个第二设备的计费相关信息作为所述计费信息。
- 根据权利要求31或32所述的方法,其特征在于,所述第二设备的计费相关信息是根据计费规则获取,或者是根据所述第二设备接收到的来自至少一个第三设备的计费相关信息获取。
- 根据权利要求33所述的方法,其特征在于,所述第三设备为阅读器。
- 根据权利要求31-34任一项所述的方法,其特征在于,所述第二设备包括阅读器、或者用户面设备。
- 根据权利要求27-35任一项所述的方法,其特征在于,所述第一设备支持计费触发功能,所述第一设备发送所述计费信息,包括:所述第一设备向计费功能设备发送所述计费信息。
- 根据权利要求27-35任一项所述的方法,其特征在于,所述第一设备发送所述计费信息,包括:所述第一设备通过支持计费触发功能的设备向计费功能设备发送所述计费信息,所述支持计费触发功能的设备包括接入网设备、控制面设备或者用户面设备。
- 根据权利要求27-37任一项所述的方法,其特征在于,所述第一设备为阅读器、或者移动管理设备、或者用户面设备或者会话管理设备。
- 一种通信装置,其特征在于,包括处理器;所述处理器用于从存储器中读取并运行程序,以实现如权利要求1至10中任一项所述的方法。
- 一种通信装置,其特征在于,包括处理器;所述处理器用于从存储器中读取并运行程序,以实现如权利要求11至15中任一项所述的方法。
- 一种通信装置,其特征在于,包括处理器;所述处理器用于从存储器中读取并运行程序,以实现如权利要求27至38中任一项所述的方法。
- 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行如权利要求1至15中任一项所述的方法或者如权利要求27至38中任一项所述的方法。
- 一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得处理器执行如权利要求1至15中任一项所述的方法或者如权利要求27至38中任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202180087053.XA CN116648883A (zh) | 2020-12-31 | 2021-09-10 | 一种计费方法、装置和系统 |
EP21913212.3A EP4258604A4 (en) | 2020-12-31 | 2021-09-10 | CHARGING METHOD, APPARATUS AND SYSTEM |
KR1020237025837A KR20230122158A (ko) | 2020-12-31 | 2021-09-10 | 과금 방법, 장치 및 시스템 |
US18/344,051 US20230345212A1 (en) | 2020-12-31 | 2023-06-29 | Charging method, apparatus, and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNPCT/CN2020/142373 | 2020-12-31 | ||
PCT/CN2020/142373 WO2022141498A1 (zh) | 2020-12-31 | 2020-12-31 | 一种计费方法、装置和系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/344,051 Continuation US20230345212A1 (en) | 2020-12-31 | 2023-06-29 | Charging method, apparatus, and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022142465A1 true WO2022142465A1 (zh) | 2022-07-07 |
Family
ID=82258991
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/142373 WO2022141498A1 (zh) | 2020-12-31 | 2020-12-31 | 一种计费方法、装置和系统 |
PCT/CN2021/117836 WO2022142465A1 (zh) | 2020-12-31 | 2021-09-10 | 一种计费方法、装置和系统 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/142373 WO2022141498A1 (zh) | 2020-12-31 | 2020-12-31 | 一种计费方法、装置和系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230345212A1 (zh) |
EP (1) | EP4258604A4 (zh) |
KR (1) | KR20230122158A (zh) |
CN (1) | CN116648883A (zh) |
WO (2) | WO2022141498A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116801208A (zh) * | 2022-03-17 | 2023-09-22 | 华为技术有限公司 | 一种计费的方法和通信装置 |
CN117560640A (zh) * | 2022-08-04 | 2024-02-13 | 华为技术有限公司 | 一种盘点方法及装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017014688A1 (en) * | 2015-07-17 | 2017-01-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Management of a set of identifiers for lte-wlan interworking |
CN109919676A (zh) * | 2019-03-05 | 2019-06-21 | 苏州卡海尔思信息技术有限公司 | 一种智能环保袋计费管理方法及系统 |
CN111641944A (zh) * | 2019-03-01 | 2020-09-08 | 华为技术有限公司 | 一种通信方法及设备 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8264354B2 (en) * | 2009-10-14 | 2012-09-11 | Attend Systems, Llc | Data center equipment location and monitoring system |
CN102521768A (zh) * | 2011-12-14 | 2012-06-27 | 岳洋有限公司 | 自动侦测商品数量和计算费用的系统 |
CN103188082B (zh) * | 2011-12-30 | 2016-12-07 | 中国移动通信集团公司 | 一种物联网终端计费管理方法及系统 |
KR102112132B1 (ko) * | 2013-07-24 | 2020-05-18 | 콘비다 와이어리스, 엘엘씨 | 서비스 도메인 과금 시스템 및 방법 |
CN107170060A (zh) * | 2017-04-07 | 2017-09-15 | 北京易华录信息技术股份有限公司 | 一种基于汽车电子标识的拥堵费支付系统、方法及装置 |
-
2020
- 2020-12-31 WO PCT/CN2020/142373 patent/WO2022141498A1/zh active Application Filing
-
2021
- 2021-09-10 CN CN202180087053.XA patent/CN116648883A/zh active Pending
- 2021-09-10 EP EP21913212.3A patent/EP4258604A4/en active Pending
- 2021-09-10 WO PCT/CN2021/117836 patent/WO2022142465A1/zh active Application Filing
- 2021-09-10 KR KR1020237025837A patent/KR20230122158A/ko active Search and Examination
-
2023
- 2023-06-29 US US18/344,051 patent/US20230345212A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017014688A1 (en) * | 2015-07-17 | 2017-01-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Management of a set of identifiers for lte-wlan interworking |
CN111641944A (zh) * | 2019-03-01 | 2020-09-08 | 华为技术有限公司 | 一种通信方法及设备 |
CN109919676A (zh) * | 2019-03-05 | 2019-06-21 | 苏州卡海尔思信息技术有限公司 | 一种智能环保袋计费管理方法及系统 |
Non-Patent Citations (2)
Title |
---|
JI HAIJIN, CHEN FUBING;HUA CHENJIANG: "The Accounting System Design based on RFID", INTELLIGENT COMPUTER AND APPLICATIONS, vol. 1, no. 4, 1 December 2011 (2011-12-01), pages 68 - 69, XP055947000, ISSN: 2095-2163 * |
See also references of EP4258604A4 |
Also Published As
Publication number | Publication date |
---|---|
EP4258604A4 (en) | 2024-03-27 |
CN116648883A (zh) | 2023-08-25 |
WO2022141498A1 (zh) | 2022-07-07 |
KR20230122158A (ko) | 2023-08-22 |
EP4258604A1 (en) | 2023-10-11 |
US20230345212A1 (en) | 2023-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102486370B1 (ko) | 통신 방법 및 장치 | |
WO2022142465A1 (zh) | 一种计费方法、装置和系统 | |
WO2019158057A1 (zh) | 一种通信方法及装置 | |
US10645565B2 (en) | Systems and methods for external group identification in wireless networks | |
CN102204317A (zh) | 为e-utran中的小区业务追踪提供用户身份 | |
CN102710965B (zh) | 视频监控数据获取方法和系统,以及承载专用网络 | |
Uras et al. | PmA: a solution for people mobility monitoring and analysis based on WiFi probes | |
EP4109939A1 (en) | Message forwarding method and apparatus | |
CN103916444A (zh) | 一种云模式的号码信息显示方法 | |
WO2021135470A1 (zh) | 通信方法及装置 | |
US11202177B2 (en) | Systems and methods for caching and managing multicast content | |
CN102932823A (zh) | 关联报告的方法及装置 | |
CN107343271A (zh) | 基站控制方法、装置及终端、基站、服务器 | |
US11411755B2 (en) | Notifying off-line charging systems of user equipment events in presence reporting areas | |
CN102647691A (zh) | 短信的发送方法、装置及系统 | |
CN106063367B (zh) | 一种集群通信方法、装置和系统 | |
CN112584336B (zh) | 一种网络切片的计费方法及装置 | |
KR102526348B1 (ko) | 네트워크장치 및 네트워크장치의 동작 방법 | |
CN107148005B (zh) | 一种基于动态分组的对讲方法 | |
CN109196903A (zh) | 用于将区域代码自动指配给无线电接入网络(ran)节点的系统和方法 | |
WO2022042553A1 (zh) | 一种定位业务计费方法及装置 | |
EP4161020A1 (en) | Apparatus, methods, and computer programs | |
WO2023116735A1 (zh) | 一种终端管理方法及装置 | |
CN112583613B (zh) | 一种创建pm任务的方法及装置 | |
US20240147199A1 (en) | Systems and methods for network usage monitoring |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21913212 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180087053.X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317043799 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2021913212 Country of ref document: EP Effective date: 20230704 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112023013206 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20237025837 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112023013206 Country of ref document: BR Kind code of ref document: A2 Effective date: 20230630 |