A service authorization method, device and readable medium

A service and service request technology, applied in the communication field, can solve problems such as weakened control capabilities, unfavorable core network enablement and control, core network inability to request authentication or billing of service, and achieve the effect of easy management

Active Publication Date: 2021-04-13
CHINA MOBILE GRP BEIJING +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above solution, since the service request is not reported to the core network, the core network cannot perform authentication or billing for the service request initiated by the user equipment, but the MEC server uses the above-mentioned "all open" method to process the service request , making the core network's ability to control the related services of third-party applications weakened, which is not conducive to the core network's ability to enable and control third-party applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A service authorization method, device and readable medium
  • A service authorization method, device and readable medium
  • A service authorization method, device and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention, and in the absence of conflict, the present invention The embodiments and the features in the embodiments can be combined with each other.

[0058] Such as figure 1 As shown in , it is a schematic flowchart of the service authorization method provided by the embodiment of the present invention, which may include the following steps:

[0059] S101: The MEC server receives a service request message sent by a user equipment.

[0060] Wherein, the service request message is used to instruct the user equipment to request the server of the third-party application to provide corresponding services, and the service request message includes the access address of the authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A service authorization method and device are used to enable and control third-party applications by a core network. The method includes: the MEC server receives the service request message sent by the user equipment; the MEC server sends the service request message to the P-GW; the P-GW adds the mobile station integrated service digital network number of the user equipment to the service request message and sends the service request message sent to the authentication and billing platform; the authentication and billing platform performs the business authorization of the third-party application to the MSISDN number according to the application identification, and then obtains the access address of the server of the third-party application by searching the first management list; the authentication and billing platform sends P-GW sends a service authorization message; P-GW sends the service authorization message to the MEC server; the MEC server sends a service authorization message to the server of the third-party application, and the server of the third-party application sends a service response message to the user equipment to provide the user equipment with Corresponding service.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a service authorization method and device. Background technique [0002] Mobile Edge Computing (MEC) is a technology that sinks data processing and data calculation to the edge of the network to achieve fast computing on the edge of the network, thereby realizing rapid service response of applications. [0003] At present, when MEC is used to process related services of third-party applications, the following scheme is usually adopted: the MEC server receives the service request for the third-party application sent by the user equipment, and sends the service request to the server of the third-party application, and the first The three-party application server responds to the service request. In the above solution, since the service request is not reported to the core network, the core network cannot perform authentication or billing for the service request initia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/24H04W12/06
CPCH04W4/24H04W12/06
Inventor 谭朝丽来志远
Owner CHINA MOBILE GRP BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products