Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing usage monitoring control

A usage monitoring and user technology, applied in transmission systems, digital transmission systems, network traffic/resource management, etc., can solve problems such as policy charging control conflicts, and achieve the effect of avoiding control conflicts

Inactive Publication Date: 2013-12-04
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the existing usage monitoring and control method is used to implement usage monitoring and control for multiple user equipments sharing subscription information, policy charging control conflicts will inevitably occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing usage monitoring control
  • Method and system for implementing usage monitoring control
  • Method and system for implementing usage monitoring control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] figure 2 The flow chart of the method that realizes consumption monitoring control for the present invention, as figure 2 shown, including:

[0059] Step 200: The total allowed usage is pre-stored in the SPR, and the allowed usage threshold is set and issued according to the request of the PCRF.

[0060] In this step, assuming that the total allowable usage of the IP-CAN session or service data flow shared by multiple users is TAU, the SPR allocates the allowable usage respectively for the users who initiate the request and share the total allowed usage of the IP-CAN session or service data flow Threshold AUTi, wherein, AUT1

[0061] Step 201: PCRF sets a usage monitoring policy according to the obtained allowed usage threshold. The usage monitoring policy includes the usage threshold assigned by the PCRF to the users corresponding to the IP-CAN sessions or service data flows sharing the total allowed usage.

[0062] In this ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure discloses a method for implementing usage monitoring control, a total allowanced usage is prestored in a Subscription Profile Repository (SPR), the SPR sets an allowanced usage threshold according to a request from a Policy and Charging Rules Function (PCRF) and distributes the set allowanced usage threshold to the PCRF; the PCRF makes a usage monitoring policy according to the obtained allowanced usage threshold; after receiving a usage report of the PCRF, the SPR deducts a consumed usage from the total allowanced usage shared by multiple users. The present disclosure also provides a system for implementing usage monitoring control. Through the solution of the present disclosure, when multiple users share a total allowanced usage, PCRF simultaneously monitors the usage on the multiple users according to the total allowanced usage, thereby avoiding conflicts in policy and charging controls.

Description

technical field [0001] The invention relates to policy and billing technology, in particular to a method and system for realizing consumption monitoring and control. Background technique [0002] Since the 3rd Generation Partnership Project Phase 7 (3GPP Release7) standard system, policy and charging functions are implemented by a policy and charging control (PCC, Policy and Charging Control) framework. The PCC architecture is a functional framework that can be applied to multiple access technologies. For example, the PCC architecture can be applied to the Terrestrial Radio Access Network (UTRAN, UMTS Terrestrial Radio Access Network) of the Universal Mobile Telecommunications System (UMTS, Universal Mobile Telecommunications System). ), Global System for Mobile Communication (GSM, Global system for Mobile Communication) / GSM Data Enhanced Evolution (EDGE) wireless access network, Interworking Wireless Local Area Network (I-WLAN), and Evolved Packet System (EPS, Evolved Packe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/24H04W24/10H04W28/18
CPCH04M15/835H04W4/24H04L12/1407H04M15/765H04M15/852H04M15/85H04L41/5064H04M15/88H04M15/66H04M15/70H04M15/83H04M15/84H04W28/16H04M15/7652H04M15/853
Inventor 周晓云宗在峰吴锦花
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products