Method and apparatus for selecting policy and charging rules function

A technology of rules and policies, applied in the field of policy control

Inactive Publication Date: 2016-04-20
ZTE CORP
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in some application scenarios, when an operator needs to launch a new service (such as red envelope service) or the operator deploys a new data intelligent network on the existing service network and PCC architecture, how does the operator Business development without changing the existing business network and PCC architecture still needs to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for selecting policy and charging rules function
  • Method and apparatus for selecting policy and charging rules function
  • Method and apparatus for selecting policy and charging rules function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] This embodiment describes that UE accesses from E-UTRAN (EvolvedUniversalTerrestrialRadioAccessNetwork, Evolved Unified Terrestrial Radio Access Network) and uses PMIPv6 protocol between S-GW (Serving Gateway) and P-GW (Packet Data Gateway), or from When a trusted non-3GPP network or an untrustworthy non-3GPP network accesses the 3GPP system and the PMIPv6 protocol is used between A-GW (Security Gateway) / ePDG (Evolved Packet Data Gateway) and P-GW, the process of establishing an IP-CAN session and PCRF selection process. DRA is RedirectAgent (redirect agent). image 3 It is a flowchart of Embodiment 1 of the selection method of PCRF of the present invention, such as image 3 As shown, it specifically includes the following steps:

[0072] Step 201: UE accesses through E-UTRAN or accesses from a trusted non-3GPP network and requests to establish an IP-CAN session. The UE initiates an attach request to the access network. During this process, for E-UTRAN access, the mo...

Embodiment 2

[0089] This embodiment describes when the UE accesses from E-UTRAN in a non-roaming scenario and the GTP (GPRS Tunnel Protocol, General Packet Radio Service Technology Tunneling Protocol) protocol is used between the S-GW and P-GW, or from a trusted When a 3GPP network or an untrusted non-3GPP network accesses the 3GPP system, when the GTP protocol is used between the A-GW / ePDG and the P-GW, the process of establishing an IP-CAN session and the selection process of PCRF. DRA is RedirectAgent. Figure 4 It is a flow chart of Embodiment 2 of the PCRF selection method of the present invention, which specifically includes the following steps:

[0090] Step 301: UE accesses through E-UTRAN or accesses from a trusted non-3GPP network and requests to establish an IP-CAN session. The UE initiates an attach request to the access network. During this process, for E-UTRAN access, the MME interacts with the HSS to obtain the subscription information of the UE, wherein the subscription in...

Embodiment 3

[0101] This embodiment describes that the user accesses from E-UTRAN and uses the PMIPv6 protocol between S-GW and P-GW, or accesses from a trusted non-3GPP network or accesses the 3GPP system from an untrusted non-3GPP network and A-GW When ePDG and P-GW adopt PMIPv6 protocol before, establish IP-CAN session process and PCRF selection process. DRA is (proxy server agent) ProxyAgent. Image 6 It is a flowchart of an embodiment of the PCRF selection method of the present invention, which specifically includes the following steps:

[0102] Step 401: UE accesses through E-UTRAN or accesses from a trusted non-3GPP network and requests to establish an IP-CAN session. The UE initiates an attach request to the access network. In this process, for E-UTRAN access, the MME interacts with the HSS to obtain the subscription information of the UE, wherein the subscription information carries the identification information of a specific service, and the MME sends it to the S-GW The sessio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and apparatus for selecting a policy and charging rules function. The method comprises the steps of acquiring, by a bearer binding and event report function (BBERF) in a gateway control session establishment process, or a policy and charging enforcement function (PCEF) in an IP connectivity access network (IP-CAN) session establishment process, identification information of a specific business subscribed by a user in a home subscriber server (HSS) and providing the identification information to a diameter routing agent (DRA); selecting, by the DRA, a policy and charging rules function (PCRF) supporting the specific business for user equipment (UE) or an IP-CAN session according to the identification information of the specific business. The invention can support selection of different PCRFs for different businesses.

Description

technical field [0001] The present invention relates to a strategy control method in a wireless communication system, in particular to a method and device for selecting a strategy and charging rule function. Background technique [0002] figure 1 It is a schematic diagram of a policy and charging control architecture (Policy and Charging Control, referred to as PCC) defined by the 3rd Generation Partnership Project (3rd Generation Partnership Project, referred to as 3GPP) in related technologies, as shown in figure 1 As shown, the Policy and Charging Rules Function (Policy and Charging Rules Function, PCRF for short) is the core of the entire PCC architecture. To formulate the control strategy, the PCRF needs to combine the service information received from the application function (ApplicationFunction, referred to as AF), the user subscription information received from the user subscription database (SubscriptionProfileRepository, referred to as SPR), and the strategy conf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/24
CPCH04L12/14
Inventor 周晓云金海孙闵史旭刚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products