Background
Policy and Charging Control (PCC) architecture of the third Generation Partnership Project (3rd Generation Partnership Project, 3GPP for short) is a functional framework that can be applied to multiple access technologies. For example, the present invention is applied to a Terrestrial Radio Access Network (UMTS) of a Universal Mobile Telecommunications System (UMTS), UTRAN for short, a Global System for Mobile Communication (GSM)/GSM Data Enhanced Evolution (EDGE) Radio Access Network (EDGE for short), an interworking wireless local area Network (I-WLAN), and an Evolved packet System (EPS for short) and the like.
Fig. 1 is a schematic diagram of a Rel-8 PCC non-roaming architecture in the related art, and various logical functional entities and interface functions thereof in the PCC architecture are described below with reference to fig. 1:
an Application Function entity (AF) provides access points for service applications, and network resources used by the service applications need to be dynamically policy-controlled. When the service plane carries out parameter negotiation, the AF transmits relevant service information to a policy and Charging Rules Function entity (PCRF for short), and if the service information is consistent with the policy of the PCRF, the PCRF accepts the negotiation; otherwise, the PCRF refuses the negotiation and simultaneously gives out the service parameters acceptable by the PCRF in the feedback. The AF may then return these parameters to the User Equipment (UE for short). Wherein, the interface between the AF and the PCRF is an Rx interface.
The PCRF is the core of the PCC and is responsible for policy decision and charging rule making. The PCRF provides network Control rules based on traffic data flows, which include monitoring, Gating (Gating Control), Quality of Service (QoS) Control of the traffic data flows, and charging rules based on the traffic data flows. The PCRF sends the Policy and Charging rules formulated by the PCRF to a Policy and Charging Enforcement Function (Policy and Charging Enforcement Function, abbreviated as PCEF) for execution, and meanwhile, the PCRF needs to ensure that the rules are consistent with subscription information of the user. The basis for the PCRF to formulate the policy and charging rules comprises the following steps: acquiring information related to the service from the AF; acquiring user policy charging control Subscription information from a Subscription database (Subscription Profile Repository, abbreviated as SPR); information of a bearer-related network is acquired from a PCEF.
And the PCEF is used for executing the policy and charging rules formulated by the PCRF on the bearing surface. The PCEF monitors the service data flows according to the service data flow filters in the rules sent by the PCRF, and then executes the policy and charging rules formulated by the PCRF on the service data flows. When the load is established, the PCEF carries out QoS authorization according to the rule sent by the PCRF, and carries out gating control according to the execution of the AF. According to the charging rules sent by the PCRF, the PCEF performs a corresponding service data flow charging operation, and the charging may be either online charging or offline charging. In case of Online Charging, the PCEF needs to perform credit management together with an Online Charging System (OCS). During Offline Charging, relevant Charging information is exchanged between the PCEF and an Offline Charging System (OFCS). The interface between the PCEF and the PCRF is a Gx interface, the interface between the PCEF and the OCS is a Gy interface, and the interface between the PCEF and the OFCS is a Gz interface. The PCEF is typically located within a Gateway (Gateway-Way, abbreviated GW) of the network, such as a GPRS Gateway Support Node (GGSN) in GPRS and a Packet Data Gateway (PDG) in I-WLAN.
Bearer Binding and Event reporting function entities (BBERF) include functions of Bearer Binding, verification of uplink Bearer Binding, and Event reporting. When UE is accessed through E-UTRAN and PMIPv6 protocol is adopted between S-GW and P-GW, BBERF is located at S-GW, when UE is accessed through trusted non-3 GPP access system, BBERF is located at trusted non-3 GPP access gateway, when UE is accessed through untrusted non-3 GPP access system, BBERF is located at Evolved Packet data gateway (ePDG for short). At this point, the PCEF no longer performs the bearer binding function.
The subscriber subscription database (SPR) stores subscriber policy charging control subscription information relating to policy control and charging. The interface between the SPR and the PCRF is an Sp interface.
And an Online Charging System (OCS) which controls and manages the user credit in an online charging mode together with the PCEF.
And the offline charging system (OFCS) and the PCEF together complete the charging operation in the offline charging mode.
The PCC architecture realizes policy charging control over an IP connectivity access Network (IP-CAN) session established by the UE for accessing a Packet Data Network (PDN) through each functional entity.
Currently, PCC architecture supports what are referred to as Sponsored data connectivity (Sponsored data connectivity). The sponsored data connectivity means consumption of usage by the service accessed by the user, and is not borne by the user himself, but by the service provider. At this time, when the user initiates the service access, the AF provides the sponsored data connectivity information, such as Sponsor identification (Sponsor Identity), identification service provider (Application service provider) and Application information, and a usage threshold (i.e., usage for which the user can freely access the service) for the service provider that may be provided to the PCRF to Sponsor access to the service, when providing the service information of the sponsored data connectivity to the PCRF.
To implement policy charging control for sponsored data connectivity, a sponsored data connectivity document, including sponsor identification and a list of application information for each application service provider, is maintained at the SPR. For the sponsored data connection, besides performing QoS authorization on service information, the PCRF also authorizes the sponsored data connection information provided by the AF according to the sponsored data connection document obtained from the SPR and whether the sponsored data connection is allowed to be performed or not.
However, the prior art does not address the following issues: when the UE is in a visited access scenario (as shown in fig. 2, the HPLMN in fig. 2 refers to a home public land mobile network), the UE accesses a sponsored data connectivity service provided by a visited network, and at this time, since the home network may not have corresponding subscription data, the home PCRF rejects authorization of the sponsored data connectivity service, so that the UE cannot access the sponsored data connectivity service when roaming.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method and a system for supporting sponsored data connection in a roaming scene, so that a user can access the sponsored data connection service in a visiting place access scene.
In order to solve the above problem, the present invention provides a method for supporting sponsored data connectivity in a visited access roaming scenario, comprising:
a visited place policy and charging rules function (V-PCRF) authorizes a sponsored data connectivity accessed by a roaming user, provided by an Application Function (AF) located in or having a subscription relationship with a visited network, according to a sponsored data connectivity document of the visited network, to enable the roaming user to access the sponsored data connectivity.
Further, the method further comprises:
and when the V-PCRF judges that the visited network can access the sponsored data connection without informing a home policy and charging rules function (H-PCRF) according to the local policy and/or roaming agreement, the V-PCRF locally processes the sponsored data connection.
Further, the V-PCRF locally processing the sponsored data connectivity includes:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
Further, the method further comprises:
when the V-PCRF judges that a visited network needs to inform the H-PCRF according to a local policy and/or a roaming agreement, after the V-PCRF successfully authorizes, the V-PCRF sends service information of the sponsored data connection to the H-PCRF;
after the H-PCRF authorizes the sponsored data connection, a PCC rule is formulated and sent to the V-PCRF;
and the V-PCRF sends the PCC rules to the PCEF.
Further, before the V-PCRF authorizes the sponsored data connectivity accessed by the roaming user according to the sponsored data connectivity document of the visited network, the V-PCRF further includes:
the V-PCRF sends the service information of the sponsored data connection to the H-PCRF, and after receiving the service information of the sponsored data connection, the H-PCRF formulates a PCC rule and issues the PCC rule to the V-PCRF;
and after the V-PCRF successfully authorizes, the V-PCRF also sends the PCC rules to the PCEF.
Further, the method further comprises:
if the AF provides a usage threshold value, the H-PCRF formulates a usage monitoring strategy, and the usage monitoring strategy is sent to the PCEF through the V-PCRF so as to execute usage monitoring;
or, if the AF provides a usage threshold, the V-PCRF formulates a usage monitoring policy, and sends the usage monitoring policy to the PCEF to perform usage monitoring.
Further, the formulating the usage monitoring strategy comprises: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
The invention also provides a system for supporting sponsored data connectivity in visited access roaming scenario, the system comprising a visited policy and charging rules function (V-PCRF), wherein:
the V-PCRF is used for: a sponsored data connectivity provided by an application function entity (AF) located at or in a subscription relationship with a visited network, for access by a roaming user, is authorized according to a sponsored data connectivity document of the visited network to enable access by the roaming user to the sponsored data connectivity.
Further, the V-PCRF is further configured to: locally processing the sponsored data connectivity upon determining, based on local policy and/or roaming agreements, that the visited network can access the sponsored data connectivity without notifying a home policy and charging rules function (H-PCRF).
Further, the V-PCRF locally processing the sponsored data connectivity includes:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
Further, the system further comprises an H-PCRF, wherein:
the V-PCRF is further configured to: when judging that the visited network needs to inform the H-PCRF according to a local policy and/or a roaming agreement, after the authorization is successful, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and sending the PCC rule to a PCEF;
the H-PCRF is used for: and after the sponsored data connection is authorized, establishing a PCC rule and sending the PCC rule to the V-PCRF.
Further, the system further comprises an H-PCRF, wherein:
the V-PCRF is further configured to: before authorizing the sponsored data connection accessed by the roaming user according to the sponsored data connection document of the visited network, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and after the authorization is successful, sending the PCC rule to the PCEF;
and the H-PCRF is used for formulating a PCC rule after receiving the service information of the sponsored data connection and issuing the PCC rule to the V-PCRF.
Further, the H-PCRF is further configured to, if the AF provides a usage threshold, formulate a usage monitoring policy, and send the usage monitoring policy to the PCEF through the V-PCRF to perform usage monitoring;
or, the V-PCRF is further configured to, if the AF provides the usage threshold, formulate a usage monitoring policy, and send the usage monitoring policy to the PCEF to perform usage monitoring.
Further, the H-PCRF or the V-PCRF is used for formulating a usage monitoring policy according to the following mode: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
The method provided by the invention authorizes the sponsored data connection provided by the AF which is positioned in the visiting network or has a contract relation with the visiting network by the V-PCRF, thereby realizing the access of the roaming user to the sponsored data connection.
Detailed Description
The invention provides a method for supporting sponsored data connection in a visited place access roaming scene, which comprises the following steps:
a visited place policy and charging rules function (V-PCRF) authorizes a sponsored data connectivity provided by an AF located at or in a subscription relationship with a visited network for access by a roaming user according to a sponsored data connectivity document of the visited network to enable access by the roaming user to the sponsored data connectivity.
Specifically, two cases are included:
A) and when the V-PCRF judges that the visited network can access the sponsored data connection without informing a home policy and charging rules function (H-PCRF) according to the local policy and/or roaming agreement, the V-PCRF locally processes the sponsored data connection.
Wherein the V-PCRF locally processing the sponsored data connectivity comprises:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
B) The V-PCRF judges that the visited network needs to inform the H-PCRF according to the local policy and/or the roaming agreement, and comprises two conditions:
B1) after the V-PCRF is successfully authorized, the service information of the sponsored data connection is sent to the H-PCRF;
after the H-PCRF authorizes the sponsored data connection, a PCC rule is formulated and sent to the V-PCRF;
and the V-PCRF sends the PCC rules to the PCEF.
Wherein: if the AF provides a usage threshold value, the H-PCRF formulates a usage monitoring strategy, and the usage monitoring strategy is sent to the PCEF through the V-PCRF so as to execute usage monitoring;
or, if the AF provides a usage threshold, the V-PCRF formulates a usage monitoring policy, and sends the usage monitoring policy to the PCEF to perform usage monitoring.
B2) Before the V-PCRF authorizes sponsored data connection accessed by a roaming user according to a sponsored data connection document of a visited network, the V-PCRF sends service information of the sponsored data connection to the H-PCRF, and after the H-PCRF receives the service information of the sponsored data connection, a PCC rule is formulated and issued to the V-PCRF;
and after the V-PCRF successfully authorizes, sending the PCC rule to the PCEF.
If the AF provides a usage threshold, the method further comprises the following steps: the H-PCRF formulates a usage monitoring policy and sends the usage monitoring policy to the PCEF through the V-PCRF so as to perform usage monitoring; or the V-PCRF formulates a usage monitoring policy and sends the usage monitoring policy to the PCEF so as to implement the usage monitoring.
Wherein, the formulation of the usage monitoring strategy comprises: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
For the convenience of describing the present invention, the following detailed description will be made with reference to the accompanying drawings and specific embodiments.
Fig. 3 is a flowchart according to embodiment 1 of the present invention, and as shown in fig. 3, the flowchart is described in detail as follows:
step S301, in the process of UE request for establishing IP-CAN session, a gateway with PCEF located receives an IP-CAN session establishment request message, and carries a user identifier and a PDN identifier of a PDN network requesting access in the IP-CAN session establishment request message;
step S302, the PCEF sends an IP-CAN session establishment indication message to the V-PCRF, and the IP-CAN session establishment indication message carries a user identifier, a PDN identifier and an IP Address (IP Address) allocated to the UE;
at this time, if the V-PCRF has not interacted with the SPR at the visited place yet and acquires the sponsored data connectivity document, then the V-PCRF needs to interact with the SPR to acquire the sponsored data connectivity document at this time.
Or the V-PCRF interacts with the SPR upon device boot-up to obtain the sponsored data connectivity document.
And step S303, the V-PCRF judges that the user is a roaming user according to the user identification. And if the PCRF does not establish an S9 session for the user, the V-PCRF sends a request message to the H-PCRF to establish an S9 session and also requests to establish an S9 sub-session, and the V-PCRF carries a user identifier, a PDN identifier, an IP address and the like in the S9 sub-session. If the PCRF has established an S9 session for the user, the V-PCRF sends a request message to the H-PCRF to modify the S9 session and also requests to establish an S9 sub-session, and the V-PCRF carries a user identifier, a PDN identifier, an IP address and the like in the S9 sub-session;
step S304, if the H-PCRF judges that the subscription data of the user does not exist according to the user identification, the H-PCRF sends a subscription document request to a home SPR (subscription repository), and the subscription document request carries the user identification and a PDN identification;
step S305, the home SPR returns the user subscription information (namely, subscription document response) according to the user identifier and the PDN identifier;
at this point, if the home SPR has not already provided the sponsored data connectivity document to the H-PCRF, then the home SPR will provide this information to the H-PCRF at this point.
Or the H-PCRF interacts with the home SPR upon device boot-up to obtain the sponsored data connectivity document.
Step S306, the H-PCRF makes a policy according to the user subscription information, the network policy, the access information of the UE and the like, wherein the policy comprises a PCC rule, an event trigger and the like, and the H-PCRF returns the made policy to the V-PCRF;
and step S307, the V-PCRF returns the formulated strategy to the PCEF through the IP-CAN session establishment confirmation message. The V-PCRF may modify the policy issued by the H-PCRF according to the visited network policy;
step S308, the PCEF installs and enforces policies, such as PCC rules, event triggers, etc. The gateway where the PCEF is located returns a response to establish an IP-CAN session, and the IP-CAN session carries the allocated IP address;
in step S309, the UE connects to a server of an Application Service Provider (ASP) of a third party through the IP-CAN session established in steps S301 to S308 and requests a Service, and the ASP server decides to provide a sponsored data connection for the user. The ASP server and the Sponsor server provide dynamic sponsored data connectivity service information to the AF, wherein the information includes sponsored data connectivity information specific to the sponsored data connectivity, such as Sponsor identification, information identifying the ASP and the application, in addition to the information identifying the sponsored user (such as IP Address), IP flow description information, media type, bandwidth, etc. of the sponsored service, and the sponsored data connectivity information may further include Usage Threshold (UT) so that the PCRF formulates a Usage monitoring policy for performing Usage monitoring by the PCEF, wherein the AF is located in the visited network or has a subscription relationship with the visited network;
step S310, the AF provides service information of sponsored data connection to the V-PCRF, wherein the service information comprises sponsor identification, information for identifying ASP and application, information for identifying sponsored user (such as IPAddress), IP flow description information, media type and bandwidth of sponsored service, and the like. A usage threshold may also be included;
step S311, V-PCRF authorizes the sponsored data connection provided by AF according to the sponsored data connection document obtained from visit place SPR, namely, judges whether the information of sponsor identification, identification ASP and application provided by AF has corresponding contract at visit place SPR, if yes, authorization is successful (namely, accepted); otherwise, authorization fails (i.e., denies);
if the strategy and/or roaming agreement configured on the V-PCRF is that the visited network can access the sponsored data connection without notifying the H-PCRF, the V-PCRF formulates a PCC rule according to the local strategy and the service information of the sponsored data connection, and if the AF provides the usage threshold, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so that the PCEF can perform the usage monitoring. The flow ends. The specific established usage monitoring strategy comprises the following steps: the V-PCRF constructs a Monitoring Key (Monitoring Key) according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF;
step S312, if the V-PCRF refuses authorization in S311, the V-PCRF returns a refusal message to the AF, and the process is ended; if the V-PCRF authorization is successful in S311, the V-PCRF provides the service information of the sponsored data connection to the H-PCRF and carries a pre-authorization indication. Wherein the pre-authorization indication indicates that the V-PCRF authorized the sponsored data connection.
And step S313, the H-PCRF makes a decision according to the pre-authorization indication. If the home network policy allows the user to access the sponsored data connection authorized by the visited network, the H-PCRF authorizes the sponsored data connection, which may also be understood as the H-PCRF confirming the pre-authorization by the V-PCRF. After the H-PCRF stores the service information, returning a confirmation message to the V-PCRF; otherwise, the H-PCRF refuses authorization (namely the H-PCRF refuses the pre-authorization made by the V-PCRF);
and step S314, the V-PCRF returns a confirmation message to the AF. If the H-PCRF refuses authorization in the step S313, the V-PCRF returns a refusal message to the AF, and the process is ended;
and step S315, the H-PCRF formulates PCC rules according to the service information, the user subscription, the network policy and the like and provides the PCC rules for the V-PCRF. If the AF provides the UT, the H-PCRF also provides the V-PCRF with a usage monitoring policy for monitoring usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: the H-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF;
step S316, the V-PCRF provides a PCC rule to the PCEF, and if the AF provides a usage threshold value, a usage monitoring strategy is also provided so that the PCEF can carry out usage monitoring;
step S317, after the PCEF installs and executes the strategy, a confirmation message is returned to the V-PCRF;
and step S318, the V-PCRF returns a confirmation message to the H-PCRF.
In other embodiments, in step S312, the sponsored data connectivity service information sent by the V-PCRF to the H-PCRF will not contain sponsor identification, information identifying the ASP and application, and possibly a usage threshold that the AF may provide to the PCRF, i.e., will not include sponsored data connectivity information. In step S313, after the H-PCRF saves the service information connected by the sponsorship data, a confirmation message is returned to the V-PCRF; step S315, the H-PCRF makes PCC rules according to the sponsored data connection service information, user signing, network strategies and the like and provides the PCC rules for the V-PCRF, and does not provide the usage monitoring strategy for the V-PCRF; step S316, the V-PCRF provides the PCC rules to the PCEF. If the AF provides the UT, the V-PCRF also formulates and provides a usage monitoring policy to the PCEF for monitoring usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: and the V-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold for the Monitoring Key according to the usage threshold provided by the AF. And other steps are consistent.
Fig. 4 is a flowchart according to embodiment 2 of the present invention, and as shown in fig. 4, the flowchart is described in detail as follows:
step S401 to step S410 coincide with step S301 to step S310;
step S411, the V-PCRFP forwards the service information of the sponsored data connection to the H-PCRF;
step S412, after the H-PCRF saves the service information connected with the sponsored data, a confirmation message is returned to the V-PCRF;
step S413, the V-PCRF returns a confirmation message to the AF;
in step S414, the H-PCRF determines that the sponsored data connectivity is not signed up with the home network according to the sponsored data connectivity document obtained from the home SPR, but determines that the sponsored data connectivity is accessed by the UE through the visited access according to the IP address of the user. Therefore, the H-PCRF formulates PCC rules according to the service information, the user subscription, the network policy and the like, provides the PCC rules for the V-PCRF, and carries unauthorized indication, sponsor identification, information for identifying ASP and application and the like. If the AF provides the UT, the H-PCRF also provides the V-PCRF with a usage monitoring policy for monitoring usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: the H-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF;
and step S415, the V-PCRF makes policy decision. The V-PCRF re-authorizes the sponsored data connection according to the sponsored data connection document obtained from the visited place SPR, namely authorizes according to the sponsor identification issued together with the PCC rule, the information for identifying ASP and application;
step S416, if the V-PCRF is successfully authorized in S415, the V-PCRF provides the PCC rules to the PCEF. And if the H-PCRF provides the usage monitoring strategy, the V-PCRF also provides the usage monitoring strategy for the PCEF, and the usage monitoring strategy is used for the PCEF to execute the usage monitoring. Otherwise, the V-PCRF returns an authorization rejection message to the H-PCRF, and the process is ended;
step S417, after the policy is installed and executed by the PCEF, a confirmation message is returned to the V-PCRF;
and step S418, the V-PCRF returns a confirmation message to the H-PCRF.
In other embodiments, in step S414, the H-PCRF does not provide the usage monitoring policy to the V-PCRF; in step S416, if the AF provides the UT, the V-PCRF further formulates a usage monitoring policy and sends the usage monitoring policy to the PCEF for monitoring the usage of the sponsored data connectivity. The specific established usage monitoring strategy comprises the following steps: and the V-PCRF constructs a Monitoring Key according to the sponsor identification, contains the Monitoring Key in the formulated PCC rule, and sets a usage threshold value for the Monitoring Key according to the UT provided by the AF. And other steps are consistent.
The present invention also provides a system for supporting sponsored data connectivity in visited access roaming scenario, wherein the system comprises a visited policy and charging rules function (V-PCRF), wherein:
the V-PCRF is used for: a sponsored data connectivity provided by an application function entity (AF) located at or in a subscription relationship with a visited network, for access by a roaming user, is authorized according to a sponsored data connectivity document of the visited network to enable access by the roaming user to the sponsored data connectivity.
Wherein the V-PCRF is further configured to: locally processing the sponsored data connectivity upon determining, based on local policy and/or roaming agreements, that the visited network can access the sponsored data connectivity without notifying a home policy and charging rules function (H-PCRF).
Wherein the V-PCRF locally processing the sponsored data connectivity comprises:
the V-PCRF formulates a Policy and Charging Control (PCC) rule and sends the PCC rule to a Policy and Charging Enforcement Function (PCEF);
and if the AF provides the usage threshold value, the V-PCRF also formulates a usage monitoring strategy and sends the usage monitoring strategy to the PCEF so as to execute usage monitoring.
Further, the system also comprises an H-PCRF,
the V-PCRF is further configured to: when judging that the visited network needs to inform the H-PCRF according to a local policy and/or a roaming agreement, after the authorization is successful, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and sending the PCC rule to a PCEF;
the H-PCRF is used for: after the sponsored data connection is authorized, a PCC rule is formulated and sent to the V-PCRF;
or,
the V-PCRF is further configured to: before authorizing the sponsored data connection accessed by the roaming user according to the sponsored data connection document of the visited network, sending the service information of the sponsored data connection to the H-PCRF, receiving a PCC rule sent by the H-PCRF, and after the authorization is successful, sending the PCC rule to the PCEF;
and the H-PCRF is used for formulating a PCC rule after receiving the service information of the sponsored data connection and issuing the PCC rule to the V-PCRF.
The H-PCRF is further used for formulating a usage monitoring policy if the AF provides a usage threshold value, and sending the usage monitoring policy to the PCEF through the V-PCRF to perform usage monitoring;
or, the V-PCRF is further configured to, if the AF provides the usage threshold, formulate a usage monitoring policy, and send the usage monitoring policy to the PCEF to perform usage monitoring.
The H-PCRF or the V-PCRF is used for formulating the usage monitoring strategy according to the following modes: and constructing a monitoring key according to the sponsor identification, and setting a usage threshold value for the monitoring key according to the usage threshold value provided by the AF.
The invention is also suitable for the scene with BBERF in IP-CAN conversation, only the V-PCRF makes the QoS rule according to the PCC rule and sends the QoS rule to BBERF.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.