Movatterモバイル変換


[0]ホーム

URL:


CN102480718B - Method for supporting sponsored data connectivity at roaming scene and system thereof - Google Patents

Method for supporting sponsored data connectivity at roaming scene and system thereof
Download PDF

Info

Publication number
CN102480718B
CN102480718BCN201010564213.9ACN201010564213ACN102480718BCN 102480718 BCN102480718 BCN 102480718BCN 201010564213 ACN201010564213 ACN 201010564213ACN 102480718 BCN102480718 BCN 102480718B
Authority
CN
China
Prior art keywords
pcrf
policy
sponsored data
data connection
usage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010564213.9A
Other languages
Chinese (zh)
Other versions
CN102480718A (en
Inventor
周晓云
宗在峰
李振东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE CorpfiledCriticalZTE Corp
Priority to CN201010564213.9ApriorityCriticalpatent/CN102480718B/en
Priority to PCT/CN2011/080974prioritypatent/WO2012071956A1/en
Publication of CN102480718ApublicationCriticalpatent/CN102480718A/en
Application grantedgrantedCritical
Publication of CN102480718BpublicationCriticalpatent/CN102480718B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention provides a method for supporting sponsored data connectivity at a visitor location access roaming scene. According to a sponsored data connectivity document of a visit network, a visitor location strategy and charging rule function entity (V-PCRF) carries out authorization on sponsored data connectivity provided by an application function entity (AF) which is at the visit network or has a subscription relation with the visit network so as to realize access of the sponsored data connectivity by a roaming subscriber. The invention provides a system for supporting sponsored data connectivity at the visitor location access roaming scene. According to the method and the system in the invention, the V-PCRF carries out authorization on the sponsored data connectivity provided by the AF which is at the visit network or has the subscription relation with the visit network so as to realize access of the sponsored data connectivity by the roaming subscriber.

Description

Method and system for supporting sponsored data connectivity in roaming scenarios
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a system for supporting sponsored data connectivity in a visited access roaming scenario.
Background
Policy and Charging Control (PCC) architecture of the third Generation Partnership Project (3rd Generation Partnership Project, 3GPP for short) is a functional framework that can be applied to multiple access technologies. For example, the present invention is applied to a Terrestrial Radio Access Network (UMTS) of a Universal Mobile Telecommunications System (UMTS), UTRAN for short, a Global System for Mobile Communication (GSM)/GSM Data Enhanced Evolution (EDGE) Radio Access Network (EDGE for short), an interworking wireless local area Network (I-WLAN), and an Evolved packet System (EPS for short) and the like.
Fig. 1 is a schematic diagram of a Rel-8 PCC non-roaming architecture in the related art, and various logical functional entities and interface functions thereof in the PCC architecture are described below with reference to fig. 1:
an Application Function entity (AF) provides access points for service applications, and network resources used by the service applications need to be dynamically policy-controlled. When the service plane carries out parameter negotiation, the AF transmits relevant service information to a policy and Charging Rules Function entity (PCRF for short), and if the service information is consistent with the policy of the PCRF, the PCRF accepts the negotiation; otherwise, the PCRF refuses the negotiation and simultaneously gives out the service parameters acceptable by the PCRF in the feedback. The AF may then return these parameters to the User Equipment (UE for short). Wherein, the interface between the AF and the PCRF is an Rx interface.
The PCRF is the core of the PCC and is responsible for policy decision and charging rule making. The PCRF provides network Control rules based on traffic data flows, which include monitoring, Gating (Gating Control), Quality of Service (QoS) Control of the traffic data flows, and charging rules based on the traffic data flows. The PCRF sends the Policy and Charging rules formulated by the PCRF to a Policy and Charging Enforcement Function (Policy and Charging Enforcement Function, abbreviated as PCEF) for execution, and meanwhile, the PCRF needs to ensure that the rules are consistent with subscription information of the user. The basis for the PCRF to formulate the policy and charging rules comprises the following steps: acquiring information related to the service from the AF; acquiring user policy charging control Subscription information from a Subscription database (Subscription Profile Repository, abbreviated as SPR); information of a bearer-related network is acquired from a PCEF.
And the PCEF is used for executing the policy and charging rules formulated by the PCRF on the bearing surface. The PCEF monitors the service data flows according to the service data flow filters in the rules sent by the PCRF, and then executes the policy and charging rules formulated by the PCRF on the service data flows. When the load is established, the PCEF carries out QoS authorization according to the rule sent by the PCRF, and carries out gating control according to the execution of the AF. According to the charging rules sent by the PCRF, the PCEF performs a corresponding service data flow charging operation, and the charging may be either online charging or offline charging. In case of Online Charging, the PCEF needs to perform credit management together with an Online Charging System (OCS). During Offline Charging, relevant Charging information is exchanged between the PCEF and an Offline Charging System (OFCS). The interface between the PCEF and the PCRF is a Gx interface, the interface between the PCEF and the OCS is a Gy interface, and the interface between the PCEF and the OFCS is a Gz interface. The PCEF is typically located within a Gateway (Gateway-Way, abbreviated GW) of the network, such as a GPRS Gateway Support Node (GGSN) in GPRS and a Packet Data Gateway (PDG) in I-WLAN.
Bearer Binding and Event reporting function entities (BBERF) include functions of Bearer Binding, verification of uplink Bearer Binding, and Event reporting. When UE is accessed through E-UTRAN and PMIPv6 protocol is adopted between S-GW and P-GW, BBERF is located at S-GW, when UE is accessed through trusted non-3 GPP access system, BBERF is located at trusted non-3 GPP access gateway, when UE is accessed through untrusted non-3 GPP access system, BBERF is located at Evolved Packet data gateway (ePDG for short). At this point, the PCEF no longer performs the bearer binding function.
The subscriber subscription database (SPR) stores subscriber policy charging control subscription information relating to policy control and charging. The interface between the SPR and the PCRF is an Sp interface.
And an Online Charging System (OCS) which controls and manages the user credit in an online charging mode together with the PCEF.
And the offline charging system (OFCS) and the PCEF together complete the charging operation in the offline charging mode.
The PCC architecture realizes policy charging control over an IP connectivity access Network (IP-CAN) session established by the UE for accessing a Packet Data Network (PDN) through each functional entity.
Currently, PCC architecture supports what are referred to as Sponsored data connectivity (Sponsored data connectivity). The sponsored data connectivity means consumption of usage by the service accessed by the user, and is not borne by the user himself, but by the service provider. At this time, when the user initiates the service access, the AF provides the sponsored data connectivity information, such as Sponsor identification (Sponsor Identity), identification service provider (Application service provider) and Application information, and a usage threshold (i.e., usage for which the user can freely access the service) for the service provider that may be provided to the PCRF to Sponsor access to the service, when providing the service information of the sponsored data connectivity to the PCRF.
To implement policy charging control for sponsored data connectivity, a sponsored data connectivity document, including sponsor identification and a list of application information for each application service provider, is maintained at the SPR. For the sponsored data connection, besides performing QoS authorization on service information, the PCRF also authorizes the sponsored data connection information provided by the AF according to the sponsored data connection document obtained from the SPR and whether the sponsored data connection is allowed to be performed or not.
However, the prior art does not address the following issues: when the UE is in a visited access scenario (as shown in fig. 2, the HPLMN in fig. 2 refers to a home public land mobile network), the UE accesses a sponsored data connectivity service provided by a visited network, and at this time, since the home network may not have corresponding subscription data, the home PCRF rejects authorization of the sponsored data connectivity service, so that the UE cannot access the sponsored data connectivity service when roaming.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method and a system for supporting sponsored data connection in a roaming scene, so that a user can access the sponsored data connection service in a visiting place access scene.
In order to solve the above problem, the present invention provides a method for supporting sponsored data connectivity in a visited access roaming scenario, comprising:
a visited place policy and charging rules function (V-PCRF) authorizes a sponsored data connectivity accessed by a roaming user, provided by an Application Function (AF) located in or having a subscription relationship with a visited network, according to a sponsored data connectivity document of the visited network, to enable the roaming user to access the sponsored data connectivity.
Further, the method further comprises:
and when the V-PCRF judges that the visited network can access the sponsored data connection without informing a home policy and charging rules function (H-PCRF) according to the local policy and/or roaming agreement, the V-PCRF locally processes the sponsored data connection.
Further, the V-PCRF locally processing the sponsored data connectivity includes:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
Further, the method further comprises:
when the V-PCRF judges that a visited network needs to inform the H-PCRF according to a local policy and/or a roaming agreement, after the V-PCRF successfully authorizes, the V-PCRF sends service information of the sponsored data connection to the H-PCRF;
after the H-PCRF authorizes the sponsored data connection, a PCC rule is formulated and sent to the V-PCRF;
and the V-PCRF sends the PCC rules to the PCEF.
Further, before the V-PCRF authorizes the sponsored data connectivity accessed by the roaming user according to the sponsored data connectivity document of the visited network, the V-PCRF further includes:
the V-PCRF sends the service information of the sponsored data connection to the H-PCRF, and after receiving the service information of the sponsored data connection, the H-PCRF formulates a PCC rule and issues the PCC rule to the V-PCRF;
and after the V-PCRF successfully authorizes, the V-PCRF also sends the PCC rules to the PCEF.
Further, the method further comprises:
if the AF provides a usage threshold value, the H-PCRF formulates a usage monitoring strategy, and the usage monitoring strategy is sent to the PCEF through the V-PCRF so as to execute usage monitoring;
or, if the AF provides a usage threshold, the V-PCRF formulates a usage monitoring policy, and sends the usage monitoring policy to the PCEF to perform usage monitoring.
Further, the formulating the usage monitoring strategy comprises: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
The invention also provides a system for supporting sponsored data connectivity in visited access roaming scenario, the system comprising a visited policy and charging rules function (V-PCRF), wherein:
the V-PCRF is used for: a sponsored data connectivity provided by an application function entity (AF) located at or in a subscription relationship with a visited network, for access by a roaming user, is authorized according to a sponsored data connectivity document of the visited network to enable access by the roaming user to the sponsored data connectivity.
Further, the V-PCRF is further configured to: locally processing the sponsored data connectivity upon determining, based on local policy and/or roaming agreements, that the visited network can access the sponsored data connectivity without notifying a home policy and charging rules function (H-PCRF).
Further, the V-PCRF locally processing the sponsored data connectivity includes:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
Further, the system further comprises an H-PCRF, wherein:
the V-PCRF is further configured to: when judging that the visited network needs to inform the H-PCRF according to a local policy and/or a roaming agreement, after the authorization is successful, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and sending the PCC rule to a PCEF;
the H-PCRF is used for: and after the sponsored data connection is authorized, establishing a PCC rule and sending the PCC rule to the V-PCRF.
Further, the system further comprises an H-PCRF, wherein:
the V-PCRF is further configured to: before authorizing the sponsored data connection accessed by the roaming user according to the sponsored data connection document of the visited network, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and after the authorization is successful, sending the PCC rule to the PCEF;
and the H-PCRF is used for formulating a PCC rule after receiving the service information of the sponsored data connection and issuing the PCC rule to the V-PCRF.
Further, the H-PCRF is further configured to, if the AF provides a usage threshold, formulate a usage monitoring policy, and send the usage monitoring policy to the PCEF through the V-PCRF to perform usage monitoring;
or, the V-PCRF is further configured to, if the AF provides the usage threshold, formulate a usage monitoring policy, and send the usage monitoring policy to the PCEF to perform usage monitoring.
Further, the H-PCRF or the V-PCRF is used for formulating a usage monitoring policy according to the following mode: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
The method provided by the invention authorizes the sponsored data connection provided by the AF which is positioned in the visiting network or has a contract relation with the visiting network by the V-PCRF, thereby realizing the access of the roaming user to the sponsored data connection.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of a Rel-8 PCC non-roaming architecture in accordance with the related art;
fig. 2 is a schematic diagram of a Rel-8 PCC visited access roaming architecture according to the related art;
FIG. 3 is a flow chart according to an embodiment of the present invention;
FIG. 4 is a flow chart according to an embodiment of the present invention.
Detailed Description
The invention provides a method for supporting sponsored data connection in a visited place access roaming scene, which comprises the following steps:
a visited place policy and charging rules function (V-PCRF) authorizes a sponsored data connectivity provided by an AF located at or in a subscription relationship with a visited network for access by a roaming user according to a sponsored data connectivity document of the visited network to enable access by the roaming user to the sponsored data connectivity.
Specifically, two cases are included:
A) and when the V-PCRF judges that the visited network can access the sponsored data connection without informing a home policy and charging rules function (H-PCRF) according to the local policy and/or roaming agreement, the V-PCRF locally processes the sponsored data connection.
Wherein the V-PCRF locally processing the sponsored data connectivity comprises:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
B) The V-PCRF judges that the visited network needs to inform the H-PCRF according to the local policy and/or the roaming agreement, and comprises two conditions:
B1) after the V-PCRF is successfully authorized, the service information of the sponsored data connection is sent to the H-PCRF;
after the H-PCRF authorizes the sponsored data connection, a PCC rule is formulated and sent to the V-PCRF;
and the V-PCRF sends the PCC rules to the PCEF.
Wherein: if the AF provides a usage threshold value, the H-PCRF formulates a usage monitoring strategy, and the usage monitoring strategy is sent to the PCEF through the V-PCRF so as to execute usage monitoring;
or, if the AF provides a usage threshold, the V-PCRF formulates a usage monitoring policy, and sends the usage monitoring policy to the PCEF to perform usage monitoring.
B2) Before the V-PCRF authorizes sponsored data connection accessed by a roaming user according to a sponsored data connection document of a visited network, the V-PCRF sends service information of the sponsored data connection to the H-PCRF, and after the H-PCRF receives the service information of the sponsored data connection, a PCC rule is formulated and issued to the V-PCRF;
and after the V-PCRF successfully authorizes, sending the PCC rule to the PCEF.
If the AF provides a usage threshold, the method further comprises the following steps: the H-PCRF formulates a usage monitoring policy and sends the usage monitoring policy to the PCEF through the V-PCRF so as to perform usage monitoring; or the V-PCRF formulates a usage monitoring policy and sends the usage monitoring policy to the PCEF so as to implement the usage monitoring.
Wherein, the formulation of the usage monitoring strategy comprises: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
For the convenience of describing the present invention, the following detailed description will be made with reference to the accompanying drawings and specific embodiments.
Fig. 3 is a flowchart according to embodiment 1 of the present invention, and as shown in fig. 3, the flowchart is described in detail as follows:
step S301, in the process of UE request for establishing IP-CAN session, a gateway with PCEF located receives an IP-CAN session establishment request message, and carries a user identifier and a PDN identifier of a PDN network requesting access in the IP-CAN session establishment request message;
step S302, the PCEF sends an IP-CAN session establishment indication message to the V-PCRF, and the IP-CAN session establishment indication message carries a user identifier, a PDN identifier and an IP Address (IP Address) allocated to the UE;
at this time, if the V-PCRF has not interacted with the SPR at the visited place yet and acquires the sponsored data connectivity document, then the V-PCRF needs to interact with the SPR to acquire the sponsored data connectivity document at this time.
Or the V-PCRF interacts with the SPR upon device boot-up to obtain the sponsored data connectivity document.
And step S303, the V-PCRF judges that the user is a roaming user according to the user identification. And if the PCRF does not establish an S9 session for the user, the V-PCRF sends a request message to the H-PCRF to establish an S9 session and also requests to establish an S9 sub-session, and the V-PCRF carries a user identifier, a PDN identifier, an IP address and the like in the S9 sub-session. If the PCRF has established an S9 session for the user, the V-PCRF sends a request message to the H-PCRF to modify the S9 session and also requests to establish an S9 sub-session, and the V-PCRF carries a user identifier, a PDN identifier, an IP address and the like in the S9 sub-session;
step S304, if the H-PCRF judges that the subscription data of the user does not exist according to the user identification, the H-PCRF sends a subscription document request to a home SPR (subscription repository), and the subscription document request carries the user identification and a PDN identification;
step S305, the home SPR returns the user subscription information (namely, subscription document response) according to the user identifier and the PDN identifier;
at this point, if the home SPR has not already provided the sponsored data connectivity document to the H-PCRF, then the home SPR will provide this information to the H-PCRF at this point.
Or the H-PCRF interacts with the home SPR upon device boot-up to obtain the sponsored data connectivity document.
Step S306, the H-PCRF makes a policy according to the user subscription information, the network policy, the access information of the UE and the like, wherein the policy comprises a PCC rule, an event trigger and the like, and the H-PCRF returns the made policy to the V-PCRF;
and step S307, the V-PCRF returns the formulated strategy to the PCEF through the IP-CAN session establishment confirmation message. The V-PCRF may modify the policy issued by the H-PCRF according to the visited network policy;
step S308, the PCEF installs and enforces policies, such as PCC rules, event triggers, etc. The gateway where the PCEF is located returns a response to establish an IP-CAN session, and the IP-CAN session carries the allocated IP address;
in step S309, the UE connects to a server of an Application Service Provider (ASP) of a third party through the IP-CAN session established in steps S301 to S308 and requests a Service, and the ASP server decides to provide a sponsored data connection for the user. The ASP server and the Sponsor server provide dynamic sponsored data connectivity service information to the AF, wherein the information includes sponsored data connectivity information specific to the sponsored data connectivity, such as Sponsor identification, information identifying the ASP and the application, in addition to the information identifying the sponsored user (such as IP Address), IP flow description information, media type, bandwidth, etc. of the sponsored service, and the sponsored data connectivity information may further include Usage Threshold (UT) so that the PCRF formulates a Usage monitoring policy for performing Usage monitoring by the PCEF, wherein the AF is located in the visited network or has a subscription relationship with the visited network;
step S310, the AF provides service information of sponsored data connection to the V-PCRF, wherein the service information comprises sponsor identification, information for identifying ASP and application, information for identifying sponsored user (such as IPAddress), IP flow description information, media type and bandwidth of sponsored service, and the like. A usage threshold may also be included;
step S311, V-PCRF authorizes the sponsored data connection provided by AF according to the sponsored data connection document obtained from visit place SPR, namely, judges whether the information of sponsor identification, identification ASP and application provided by AF has corresponding contract at visit place SPR, if yes, authorization is successful (namely, accepted); otherwise, authorization fails (i.e., denies);
if the strategy and/or roaming agreement configured on the V-PCRF is that the visited network can access the sponsored data connection without notifying the H-PCRF, the V-PCRF formulates a PCC rule according to the local strategy and the service information of the sponsored data connection, and if the AF provides the usage threshold, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so that the PCEF can perform the usage monitoring. The flow ends. The specific established usage monitoring strategy comprises the following steps: the V-PCRF constructs a Monitoring Key (Monitoring Key) according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF;
step S312, if the V-PCRF refuses authorization in S311, the V-PCRF returns a refusal message to the AF, and the process is ended; if the V-PCRF authorization is successful in S311, the V-PCRF provides the service information of the sponsored data connection to the H-PCRF and carries a pre-authorization indication. Wherein the pre-authorization indication indicates that the V-PCRF authorized the sponsored data connection.
And step S313, the H-PCRF makes a decision according to the pre-authorization indication. If the home network policy allows the user to access the sponsored data connection authorized by the visited network, the H-PCRF authorizes the sponsored data connection, which may also be understood as the H-PCRF confirming the pre-authorization by the V-PCRF. After the H-PCRF stores the service information, returning a confirmation message to the V-PCRF; otherwise, the H-PCRF refuses authorization (namely the H-PCRF refuses the pre-authorization made by the V-PCRF);
and step S314, the V-PCRF returns a confirmation message to the AF. If the H-PCRF refuses authorization in the step S313, the V-PCRF returns a refusal message to the AF, and the process is ended;
and step S315, the H-PCRF formulates PCC rules according to the service information, the user subscription, the network policy and the like and provides the PCC rules for the V-PCRF. If the AF provides the UT, the H-PCRF also provides the V-PCRF with a usage monitoring policy for monitoring usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: the H-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF;
step S316, the V-PCRF provides a PCC rule to the PCEF, and if the AF provides a usage threshold value, a usage monitoring strategy is also provided so that the PCEF can carry out usage monitoring;
step S317, after the PCEF installs and executes the strategy, a confirmation message is returned to the V-PCRF;
and step S318, the V-PCRF returns a confirmation message to the H-PCRF.
In other embodiments, in step S312, the sponsored data connectivity service information sent by the V-PCRF to the H-PCRF will not contain sponsor identification, information identifying the ASP and application, and possibly a usage threshold that the AF may provide to the PCRF, i.e., will not include sponsored data connectivity information. In step S313, after the H-PCRF saves the service information connected by the sponsorship data, a confirmation message is returned to the V-PCRF; step S315, the H-PCRF makes PCC rules according to the sponsored data connection service information, user signing, network strategies and the like and provides the PCC rules for the V-PCRF, and does not provide the usage monitoring strategy for the V-PCRF; step S316, the V-PCRF provides the PCC rules to the PCEF. If the AF provides the UT, the V-PCRF also formulates and provides a usage monitoring policy to the PCEF for monitoring usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: and the V-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold for the Monitoring Key according to the usage threshold provided by the AF. And other steps are consistent.
Fig. 4 is a flowchart according to embodiment 2 of the present invention, and as shown in fig. 4, the flowchart is described in detail as follows:
step S401 to step S410 coincide with step S301 to step S310;
step S411, the V-PCRFP forwards the service information of the sponsored data connection to the H-PCRF;
step S412, after the H-PCRF saves the service information connected with the sponsored data, a confirmation message is returned to the V-PCRF;
step S413, the V-PCRF returns a confirmation message to the AF;
in step S414, the H-PCRF determines that the sponsored data connectivity is not signed up with the home network according to the sponsored data connectivity document obtained from the home SPR, but determines that the sponsored data connectivity is accessed by the UE through the visited access according to the IP address of the user. Therefore, the H-PCRF formulates PCC rules according to the service information, the user subscription, the network policy and the like, provides the PCC rules for the V-PCRF, and carries unauthorized indication, sponsor identification, information for identifying ASP and application and the like. If the AF provides the UT, the H-PCRF also provides the V-PCRF with a usage monitoring policy for monitoring usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: the H-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF;
and step S415, the V-PCRF makes policy decision. The V-PCRF re-authorizes the sponsored data connection according to the sponsored data connection document obtained from the visited place SPR, namely authorizes according to the sponsor identification issued together with the PCC rule, the information for identifying ASP and application;
step S416, if the V-PCRF is successfully authorized in S415, the V-PCRF provides the PCC rules to the PCEF. And if the H-PCRF provides the usage monitoring strategy, the V-PCRF also provides the usage monitoring strategy for the PCEF, and the usage monitoring strategy is used for the PCEF to execute the usage monitoring. Otherwise, the V-PCRF returns an authorization rejection message to the H-PCRF, and the process is ended;
step S417, after the policy is installed and executed by the PCEF, a confirmation message is returned to the V-PCRF;
and step S418, the V-PCRF returns a confirmation message to the H-PCRF.
In other embodiments, in step S414, the H-PCRF does not provide the usage monitoring policy to the V-PCRF; in step S416, if the AF provides the UT, the V-PCRF further formulates a usage monitoring policy and sends the usage monitoring policy to the PCEF for monitoring the usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: and the V-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF. And other steps are consistent.
The present invention also provides a system for supporting sponsored data connectivity in visited access roaming scenario, wherein the system comprises a visited policy and charging rules function (V-PCRF), wherein:
the V-PCRF is used for: a sponsored data connectivity provided by an application function entity (AF) located at or in a subscription relationship with a visited network, for access by a roaming user, is authorized according to a sponsored data connectivity document of the visited network to enable access by the roaming user to the sponsored data connectivity.
Wherein the V-PCRF is further configured to: locally processing the sponsored data connectivity upon determining, based on local policy and/or roaming agreements, that the visited network can access the sponsored data connectivity without notifying a home policy and charging rules function (H-PCRF).
Wherein the V-PCRF locally processing the sponsored data connectivity comprises:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
Further, the system also comprises an H-PCRF,
the V-PCRF is further configured to: when judging that the visited network needs to inform the H-PCRF according to a local policy and/or a roaming agreement, after the authorization is successful, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and sending the PCC rule to a PCEF;
the H-PCRF is used for: after the sponsored data connection is authorized, a PCC rule is formulated and sent to the V-PCRF;
or,
the V-PCRF is further configured to: before authorizing the sponsored data connection accessed by the roaming user according to the sponsored data connection document of the visited network, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and after the authorization is successful, sending the PCC rule to the PCEF;
and the H-PCRF is used for formulating a PCC rule after receiving the service information of the sponsored data connection and issuing the PCC rule to the V-PCRF.
The H-PCRF is further used for formulating a usage monitoring policy if the AF provides a usage threshold value, and sending the usage monitoring policy to the PCEF through the V-PCRF to perform usage monitoring;
or, the V-PCRF is further configured to, if the AF provides the usage threshold, formulate a usage monitoring policy, and send the usage monitoring policy to the PCEF to perform usage monitoring.
The H-PCRF or the V-PCRF is used for formulating the usage monitoring strategy according to the following modes: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
The invention is also suitable for the scene with BBERF in IP-CAN conversation, only the V-PCRF makes the QoS rule according to the PCC rule and sends the QoS rule to BBERF.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.

Claims (14)

CN201010564213.9A2010-11-292010-11-29Method for supporting sponsored data connectivity at roaming scene and system thereofActiveCN102480718B (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN201010564213.9ACN102480718B (en)2010-11-292010-11-29Method for supporting sponsored data connectivity at roaming scene and system thereof
PCT/CN2011/080974WO2012071956A1 (en)2010-11-292011-10-19Method, system and apparatus for supporting sponsored data connectivity in roaming scenarios

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201010564213.9ACN102480718B (en)2010-11-292010-11-29Method for supporting sponsored data connectivity at roaming scene and system thereof

Publications (2)

Publication NumberPublication Date
CN102480718A CN102480718A (en)2012-05-30
CN102480718Btrue CN102480718B (en)2015-04-01

Family

ID=46093165

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201010564213.9AActiveCN102480718B (en)2010-11-292010-11-29Method for supporting sponsored data connectivity at roaming scene and system thereof

Country Status (2)

CountryLink
CN (1)CN102480718B (en)
WO (1)WO2012071956A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10057429B2 (en)2016-11-022018-08-21Ibasis, Inc.Pre-paid voice calling using sponsored data roaming

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103841539B (en)*2012-11-222018-05-04中兴通讯股份有限公司One kind roaming local service function realizing method and system
CN103929725B (en)*2013-01-102018-04-27中兴通讯股份有限公司Roam online charging method, H-OCS and the V-OCS of local service
CN105100037B (en)*2014-11-242018-01-30沈阳林科信息技术有限公司A kind of backward traffic management and control system
CN105933883B (en)*2016-06-302019-07-19华为技术有限公司 Flow monitoring processing method and related device and system
CN107707366A (en)*2016-08-082018-02-16中国电信股份有限公司A kind of backward flow method for processing business, system and business voucher management platform

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN100515131C (en)*2006-01-102009-07-15华为技术有限公司Mobile communication system and method for using access network application function service
CN101060413B (en)*2006-04-172011-01-05华为技术有限公司Roaming policy and charging control method and system
CN101047988B (en)*2006-05-302010-12-01华为技术有限公司 A Policy and Charging Control Method in User Roaming State
US8116728B2 (en)*2008-04-222012-02-14Alcatel LucentCharging in LTE/EPC communication networks
CN101572854A (en)*2008-04-282009-11-04华为技术有限公司Method, system and equipment for strategy authorization
CN101267319B (en)*2008-04-302011-07-13中兴通讯股份有限公司A method for distributing control rule of policy billing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10057429B2 (en)2016-11-022018-08-21Ibasis, Inc.Pre-paid voice calling using sponsored data roaming

Also Published As

Publication numberPublication date
CN102480718A (en)2012-05-30
WO2012071956A1 (en)2012-06-07

Similar Documents

PublicationPublication DateTitle
EP2827623B1 (en)Policy and charging control method, and v-pcrf apparatus
CN102547640B (en)A kind ofly consume the signing of limit service and manner of execution and system
US8532125B2 (en)Method, system and apparatus for session association
CN101552682B (en)Method and system for controlling policy and charging control information
US8661145B2 (en)Method and system for transmitting a bearer control mode in roaming scenarios
CN106304195B (en)Policy control method for third party application, SCEF (policy and charging enforcement function) and PCRF (policy and charging rules function)
CN102480718B (en)Method for supporting sponsored data connectivity at roaming scene and system thereof
CN111866778B (en) Authentication method, device and system based on roaming scene
CN102547854B (en)Policy control method and device
WO2011026385A1 (en)Online charging method and system in local breakout roaming scenarios
CN104955013A (en)Usage monitoring method, apparatus and system
CN104581670A (en) Application access control method and application function entity device
CN102111740B (en)Multi-access supported policy charging controlling method and system
CN102056117B (en)Based on strategy and the charging method of charging control architecture and system
CN102711086B (en) Sponsored Data Connection Processing Method and Policy and Charging Rules Functional Entity
CN103888926A (en)Charging strategy method and apparatus of roaming local services
CN102098647B (en)Method and system for realizing online charging in roaming architecture
EP2294755B1 (en)Improved credit authorization in a core network
CN103227981B (en)A kind of recognition methods of application detection control function pattern and system
CN101730045B (en)Method and system for realizing policy and charging control
WO2014079323A1 (en)Method, device and system for realizing roaming local service function
CN102123370B (en)System and method for redirecting access of user
CN102421081A (en)Usage monitoring method and system

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp