[go: up one dir, main page]

WO2006015543A1 - A processing method for re-authorization and re-authorization event and event triggers - Google Patents

A processing method for re-authorization and re-authorization event and event triggers Download PDF

Info

Publication number
WO2006015543A1
WO2006015543A1 PCT/CN2005/001231 CN2005001231W WO2006015543A1 WO 2006015543 A1 WO2006015543 A1 WO 2006015543A1 CN 2005001231 W CN2005001231 W CN 2005001231W WO 2006015543 A1 WO2006015543 A1 WO 2006015543A1
Authority
WO
WIPO (PCT)
Prior art keywords
tpf
event
authentication
crf
ocs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2005/001231
Other languages
French (fr)
Chinese (zh)
Inventor
Xiaoqin Duan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2006015543A1 publication Critical patent/WO2006015543A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1485Tariff-related aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/62Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on trigger specification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/20Technology dependant metering
    • H04M2215/204UMTS; GPRS

Definitions

  • the present invention relates to the field of packet data charging, and more particularly to a processing method for re-authenticating and re-authenticating events and triggering events based on packet data flow accounting.
  • FIG. 1 shows a packet data protocol context (PDP Context, Packet Data Protocol Context) activation, data transmission, deactivation flow diagram, as shown in Figure 1, in the General Packet Radio Service (GPRS, General Packet Radio Service), activated
  • GPRS General Packet Radio Service
  • PDN Packet Data Network
  • deactivation flow diagram as shown in Figure 1, in the General Packet Radio Service (GPRS, General Packet Radio Service), activated
  • GPRS General Packet Radio Service
  • PDN Packet Data Network
  • Step 101 The mobile terminal (MS) sends a PDP Context Request (Active PDP Context Request) to the Serving GPRS Support Node (SGSN), where the Activate PDP Context Request carries the network layer service access point identifier.
  • NSAPI Network Layer Service Access Point Identifier
  • PDP type PDP type
  • APN Access Point Name
  • QoS quality of service
  • TI Transaction Identifier
  • GGSN Gateway GPRS Support Node
  • TID Tunnel Identifier
  • the PDP type includes the end-to-end protocol (PPP, Peer- Peer Protocol type, Internet Protocol (IP) type, etc.;
  • APN can be provided by the MS to the SGSN, and the SGSN is addressed to the corresponding GGSN according to the APN, the GGSN root
  • the MS may not provide the APN to the SGSN according to the APN.
  • the SGSN may select the default APN according to the subscription information of the MS user.
  • the QoS parameter is the quality requirement of the packet data service specified by the MS. ⁇ Used by the MS to identify a PDP context
  • Step 102 After receiving the Activate PDP Context Request, the SGSN performs security check and encryption with the MS. This step is optional.
  • Step 103 The SGSN parses the address information of the GGSN according to the APN. If the SGSN can parse the address information of the GGSN according to the APN, the TEID is created for the PDP Context, and the TEID can be an International Mobile Subscriber Identity (IMSI) and an NSAPI.
  • the SGSN sends a PDP Context Request to the GGSN.
  • the PDP Context Request contains the PDP type, PDP address, APN, QoS parameters, TEID, and selection mode.
  • the PDP address can be MS.
  • the IP address is an optional parameter.
  • the PDP Context creation request may not carry the PDP address.
  • the GGSN may assign an IP address to the MS in the subsequent processing, or may assign an IP to the MS by the PDN that finally establishes a connection with the MS. Address;
  • the selection mode refers to the APN selection mode, that is, whether the APN is selected by the MS or selected by the SGSN. If the SGSN cannot resolve the address information of the GGSN according to the APN, the SGSN rejects the PDP Context activation request initiated by the MS.
  • Step 104 After receiving the PDP Context creation request, the GGSN determines an external PDN according to the APN, then allocates a Charging ID, initiates charging, and negotiates QoS. If the GGSN can meet the quality of service requirements of the QoS parameter, the SGSN sends the SGSN to the SGSN.
  • the PDP Context Create Response (Representation PDP Context Response), which carries the TEID, the PDP address, the Backbone Bearer protocol, the agreed QoS parameters, and the Charging ID. If the GGSN cannot meet the quality of service requirements of the QoS parameters, the GGSN rejects the PDP Context creation request initiated by the SGSN. The SGSN then rejects the PDP Context activation request initiated by the MS.
  • Step 105 After receiving the PDP Context creation response, the SGSN inserts NSAPI and GGSN address information for identifying the PDP Context in the PDP Context, and selects a radio priority according to the agreed QoS parameter, and then returns a PDP Context activation response to the MS (Activate PDP Context Accept ), the PDP Context activation response carries information such as PDP type, PDP address, ⁇ , agreed QoS parameters, wireless priority, PDP configuration options, and the like. And, the SGSN starts charging. After receiving the PDP Context activation response, the MS has established a direct route between the MS and the GGSN, and can perform packet data transmission.
  • Step 106 The MS performs packet data interaction through the SGSN, the GGSN, and the PDN.
  • PDP Context Deactivation Request Deactivate PDP Context Request
  • Step 108 After receiving the PDP Context deactivation request, the SGSN performs security check and encryption with the MS. This step is an optional step.
  • Steps 109 to 111 The SGSN sends a PDP Context Request to the GGSN, and the PDP Context Delete Request carries the TEID.
  • the GGSN After receiving the PDP Context deletion request, the GGSN ends the charging of the MS, deletes the PDP Context corresponding to the TEID, and then sends a PDP Context Response (DDP) to the SGSN.
  • the PDP Context delete response carries the TEID.
  • the SGSN After receiving the PDP Context deletion response, the SGSN ends the charging of the MS, deletes the PDP Context corresponding to the TEID, and then sends a PDP Context Deactivation Response (Deactivate PDP Context Response) to the MS.
  • the PDP Context deactivation response carries the TI. .
  • the MS After receiving the PDP Context deactivation response, the MS deletes the PDP Context corresponding to TI.
  • the charging termination point is set in the PDP Context.
  • the MS can perform multiple services based on an activated PDP Context, that is, if the PDN can provide multiple services, such as email (email), Based on the WAP (Wireless Application Protocol) browsing service and the file transfer protocol (FTP) file transfer service, the MS can pass an activated PDP after establishing a transmission channel with the PDN.
  • email email
  • WAP Wireless Application Protocol
  • FTP file transfer protocol
  • the Context carries various services that the PDN can provide.
  • the charging mode of the operator for various services is likely to adopt different charging methods.
  • the e-mail receiving and sending events may be triggered by the secondary charging, and the WAP browsing service may be based on the flow accounting fee.
  • the rate of the WAP browsing service and the rate of the file transfer service are different according to the flow rate. Therefore, according to the existing GPRS charging system, different services carried by the same PDP Context cannot be performed at all. Perform differentiated billing.
  • IP Flows IP data streams
  • Service Data Flow IP data stream
  • IP data stream-based charging can be considered as filtering out IP data streams of different services carried in the same PDP Context through filters of similar filters, and then separately charging IP data streams filtered by different filters. In order to achieve separate billing for different business data streams.
  • the granularity of the IP data-based charging is much smaller than the charging granularity based on a PDP Context.
  • the granularity can be regarded as the size of the screening hole.
  • the charging granularity based on a PDP Context is a PDP Context.
  • the meshing granularity based on the IP data stream is an IP service data stream is a sieve hole, that is, a plurality of sieve holes are included for one PDP Context, and therefore, the charging and ratio based on the IP data stream is based on Compared to the charging of a PDP Context, IP data stream based charging can provide operators or service providers with more abundant charging means.
  • the 3GPP describes the system structure, functional requirements, and message interaction procedures of the FBC.
  • the FBC system structure supporting online charging is shown in Figure 2A.
  • the customized application based on mobile network enhanced logic (CAMEL, Customised Application for Mobile Network Enhanced Logic (SCP) Service Control Point (SCP) and Service Data Flow Based Credit Control Function (CCF) 202 constitute an online charging system (OCS, Online Charging System ) 206.
  • the CCF 202 communicates with the Service Data Flow Based Charging Rule Function (CRF) 203 through the Ry interface, and the CRF 203 communicates with the Application Function (AF) through the R interface.
  • the CRF 203 communicates with the Traffic Plane Function (TPF) 205 through the Gx interface, and the CCF 202 communicates with the TPF 205 through the Gy interface.
  • CCF Service Data Flow Based Charging Rule Function
  • TPF Traffic Plane Function
  • the structure of the FBC system supporting offline charging is as shown in FIG. 2B.
  • the CRF 203 communicates with the AF 204 through the Rx interface, the CRF 203 communicates with the TPF 205 through the Gx interface, and the TPF 205 communicates with the charging gateway function entity through the Gz interface (CGF, Charging).
  • the Gateway Function 207 is interworking with a Charging Collection Function (CCF) 208.
  • CCF Charging Collection Function
  • the TPF 205 carries the IP data stream.
  • the TPF 205 sends a charging rule request to the CRF 203 through the Gx interface, where the charging rule request carries information related to the user and the MS, bearer characteristics, and Network related information, etc., wherein the information related to the user and the MS may be a mobile station international number (MSISDN), an international mobile subscriber identity (IMSI), etc., and the network related information may be a mobile network coding (MNC), a mobile country. Code (MCC), etc.
  • MSISDN mobile station international number
  • IMSI international mobile subscriber identity
  • MNC mobile network coding
  • MCC mobile country. Code
  • the charging rules may be different, such as the corresponding rate of the QoS parameter falling. Also fell.
  • the TPF 205 may resend the charging rule request to the CRF 203 to request a new charging rule when the bearer is modified; the CRF 203 selects an appropriate charging rule according to the above input information provided by the TPF 205, and returns to the TPF 205.
  • the selected charging rule includes charging mechanism, charging type, charging key, service data flow filter, and charging rule priority.
  • the charging mechanism may be online charging or offline charging; the charging type may be charging based on the length of time or based on data traffic; the charging key is a parameter related to the rate, and the CRF 203 may not directly.
  • the TPF 205 is provided with a rate, and only the rate-related parameters are provided to the TPF 205; the service data filter is used to indicate which IP data streams the TPF 205 filters, and then the TPF 205 filters the filtered IP data according to the charging rules. Billing.
  • the service data filter may include an IP5 tuple, and the IP5 tuple may include source/destination IP address, source/destination port number (Port Number), protocol identifier (Protocol ID), and the like.
  • the CRF 203 indicates the TPF 205 to the source address. Filters the IP data stream of 10.0.0.1, the destination address is 10.0.0.2, the source/destination port number is 20, the protocol type is Transmission Control Protocol (TCP), and the filtered IP data stream is calculated according to the charging rule. fee.
  • TCP Transmission Control Protocol
  • the CRF 203 may provide a trigger event (Event Trigger) to the TPF 205 to request the TPF 205 to request a new charging rule from the CRF 205 when a specific event occurs, such as the CRF 203 requesting the TPF 205 to perform an event modification on some bearers. At the time, a new charging rule is requested from the CRF 203. Trigger events can be thought of as events related to billing rules.
  • the CRF 203 may also select an appropriate charging rule based on the input information of the AF 204 or the OCS 206, such as the AF 204 notifying the CRF 203 of the service currently used by the user.
  • Type CRF 203 selects the corresponding charging rule according to the type of service.
  • the OCS 206 is composed of two functional entities, the SCP 201 and the CCF (Service Data Flow Based Credit Control Function) 202.
  • the CCF (Service Data Flow Based Credit Control Function) 202 is a functional entity that performs credit control and is applied only to online charging. The system can be implemented by adding new functions to the existing OCS 206.
  • the CCF (Service Data Flow Based Credit Control Function) 202 manages and controls the user credit.
  • the CCF (Service Data Flow Based Credit Control Function) 202 is in the user credit pool.
  • the credit is authenticated, and the credit that the user can use is delivered to the TPF 205 through the Gy interface.
  • the OCS 206 may request the TPF 205 to report to the re-authorisation triggers when they occur, and then the OCS 206 re-authenticates the user according to the corresponding re-authentication event reported by the TPF 205, and may recalculate the user. Credit. For example, after the user credit provided by the OCS 206 to the TPF 205 is used, the TPF 205 needs to report the allowed user credit usage expiration event to the OCS 206 according to the allowed credit expiration event in the re-authentication event, and the OCS 206 according to the remaining user account. Information, recalculate the credits allowed to be used by the user.
  • the OCS 206 determines the rate according to the current location of the user, and calculates the credit of the user according to the rate; when the user moves to another location, if the SGSN changes, the TPF 205 needs to re-examine the basis.
  • the SGSN change event in the right event reports the occurrence of the SGSN change event to the OCS 206, and the OCS 206 re-determines the rate according to the current location of the user update, and recalculates the user's credit.
  • the OCS 206 determines the rate according to the current QoS parameter of the service used by the user
  • the TPF 205 needs to report the occurrence of the bearer modification event to the OCS 206 according to the bearer modification event in the re-authentication event.
  • the OCS 206 determines the rate based on the modified QoS parameters of the user and recalculates the credit of the user.
  • the TPF 205 is a GGSN
  • the AF is a service gateway or a service server in the PDN
  • the CRF 203 is a new logical entity.
  • TPF 205 is the charging rule
  • the enforcement point, CRF 203 is the control point of the charging rule.
  • the triggering event triggers the charging rule request process, that is, the TPF requests the charging rule from the CRF, and the triggering event triggers the TPF to request the charging rule from the CRF.
  • the charging rule request process that is, the TPF requests the charging rule from the CRF
  • the triggering event triggers the TPF to request the charging rule from the CRF.
  • Step 301 The user equipment (UE) sends a Modify Bearer Service Request to the TPF.
  • the GGSN receives the PDP Context Request (Update PDP Context Request).
  • Step 302 After receiving the bearer modification request, the TPF matches the bearer modification event with the pre-stored trigger event. If yes, go to step 303; otherwise, continue to monitor the trigger event.
  • Step 303 The TPF sends a Request Charging Rule to the CRF, where the charging rule request carries the input information for determining the charging rule by the CRF.
  • Steps 304 to 305 After receiving the charging rule request, the CRF may, according to the input information carried in the charging rule request, select an appropriate charging rule according to the related input information provided by the AF, and then return the provisioning to the TPF. Provision Charging Rules, which can be carried with the selected charging rules and charging rule operation instructions.
  • Step 306 After receiving the charging rule, the TPF performs corresponding operations on the charging rule selected by the CRP according to the charging rule operation instruction.
  • Step 307 The TPF returns a Modify Bearer Service Accept to the UE, and continues the subsequent bearer modification process.
  • the bearer modification triggers the re-authentication process, that is, the TPF requests the OCS to re-authenticate the user.
  • the specific implementation process is shown in Figure 4:
  • Step 401 The UE sends a Modify Bearer Service Request to the TPF.
  • the GGSN receives the PDP Context Request (Update PDP Context Request).
  • Step 402 After receiving the bearer modification request, the TPF matches the bearer modification event with the pre-stored re-authentication event. If yes, go to step 403. Otherwise, continue to monitor the occurrence of the re-authentication event.
  • Step 403 The TPF sends a credit control request (Credit Control Request) to the OCS, where the credit control request carries the remaining credit of the user and related charging rule information, and requests the OCS to recalculate the credit of the user.
  • the relevant charging rule information provided by the TPF to the OCS can be obtained from the CRF.
  • Step 404 After receiving the credit control request, the OCS recalculates the credit of the user, and then returns a credit control response (Credit Control Answer) to the TPF. If the OCS calculates the credit of the user, the credit control response carries the OCS re The calculated user credit, if the OCS does not calculate the credit of the user, the credit control response may carry an error reason value.
  • Step 405 After receiving the credit control response, the TPF returns a Modify Bearer Service Accept to the UE. If the credit control response carries the user's credit, the TPF accepts the bearer modification request initiated by the UE, and continues the subsequent bearer. Modifying the process; if the credit control response does not carry the user's credit, the UE-initiated bearer modification request is rejected.
  • the specification describes the charging mode of the CRF that controls the TPF through the triggering event reporting mechanism, that is, the TPF reports the trigger event to the CRF, and the CRF learns the change of the bearer through the trigger event reported by the TPF, and then determines the corresponding meter.
  • the fee rules are issued to the TPF.
  • the trigger events defined in the specification may include: SGSN change events, QoS changes events, RAT type change events, and transport stream template (TFT) changes ( TFT change) event.
  • the specification also describes how the OCS controls the credit usage of the TPF through the mechanism reported by the re-authentication event, that is, the TPF reports to the OCS after the re-authentication event occurs.
  • the OCS obtains the credit usage of the user and the change of the bearer through the re-authentication event reported by the TPF, and recalculates the credit of the user and delivers the credit to the TPF.
  • the re-authentication event defined in the specification may include: a credit authorization lifetime expiry event, a user idle state timeout event, a charging rule is changed event, and may also include some GPRS events. , such as SGSN change event, QoS parameter change event, RAT type change event.
  • both the trigger event and the re-authentication event include GPRS events, such as SGSN change events, QoS parameter change events, RAT type change events, etc., so that for a certain GPRS event, the TPF will use the GPRS event.
  • the trigger event and the re-authentication event are matched. Therefore, the occurrence of the GPRS event needs to be reported to the CRF and the OCS, respectively, resulting in waste of resources of the FBC system.
  • an object of the present invention is to provide a processing method for performing re-authentication
  • another object of the present invention is to provide a method for processing a re-authentication event and a trigger event, which is improved based on packet data flow charging. Implement the process.
  • the present invention provides a processing method for performing re-authentication, the method comprising the following steps:
  • Al and CRF provide re-authentication indication to the TPF
  • the TPF initiates a re-authentication process.
  • the step A1 further includes: the CRF receives an internal or external event, determines whether the TPF is required to initiate a re-authentication process, and if yes, performs step A1.
  • the internal event is: The trigger event reported to the CRF when the TPF detects the trigger event.
  • the external event is: Input information provided by the OCS or AF to the CRF.
  • the process of determining whether the TPF initiates the re-rights right is: determining whether the received event matches the obtained re-authentication event, and if yes, performing step A1.
  • the determining whether the TPF needs to initiate the re-authentication process is: determining whether the event triggered by the received event matches the obtained re-authentication event, and if yes, performing step A1.
  • the re-authentication event is: a re-authentication event configured in the CRF, or a re-authentication event provided by the OCS to the CRF, or a combination of the two.
  • the re-authentication indication further includes: re-authentication event information.
  • the TPF initiates the re-authentication process in step B1:
  • the TPF requests the OCS to re-authenticate the user.
  • the step B1 further includes: the TPF provides re-authentication event information to the OCS.
  • the step B1 further includes: the OCS recalculates the credit of the user, and returns the recalculated user credit to the TPF.
  • the present invention also provides a method for processing a re-authentication event and a trigger event, the method comprising the following steps:
  • the CRF receives an internal or external event, and determines whether the TPF needs to initiate a re-authentication process. If yes, step B2 is performed;
  • the CRF provides a re-authentication indication to the TPF, and according to the received re-authentication indication, the TPF initiates a re-authentication procedure.
  • the internal event is: The event that the TPF reports to the CRF when the trigger event occurs.
  • the external event is: Input information provided by the OCS or AF to the CRF.
  • the trigger event is provided by the CRF to the TPF.
  • the step B2 further includes: the TPF providing the trigger event reported to the CRF as re-authentication event information to the OCS.
  • step A2 The process of determining whether the TPF is required to initiate the re-authentication process in step A2 is as follows: Trigger event matches get re-authentication event, and if so, proceed to step B 2.
  • the re-authentication event is: a re-authentication event configured in the CRF, or a re-authentication event provided by the OCS to the CRF, or a combination of the two.
  • the re-authentication indication further includes: re-authentication event information.
  • the TPF initiates the re-authentication process in step B2 as follows: The TPF requests the OCS to re-authenticate the user.
  • the step B2 further includes: the TPF providing re-authentication event information to the OCS.
  • the step B2 further includes: the OCS recalculates the credit of the user, and returns the recalculated user credit to the TPF.
  • the step B2 further includes: the OCS recalculates the credit of the user, and returns the recalculated user credit to the TPF.
  • the CRF determines whether the TPF is required to initiate a re-authentication process, and if necessary, the CRF instructs the TPF to request the OCS to re-authenticate the user.
  • the TPF can only monitor the occurrence of a trigger event, and report to the CRF when the trigger event occurs, and the CRF determines whether the trigger event requires the TPF to initiate a re-authentication process; the CRF can also be based on external event information, such as OCS, The AF selects the input information from the charging rule provided by the CRF to determine whether the TPF needs to initiate the re-authentication process.
  • the implementation process based on packet data flow charging is improved, the information interaction between the FBC entities is reduced, the resources between the FBC entities are greatly saved, and the information exchange process between the FBC entities is further improved. Clear and clear.
  • Figure 1 shows the PDP Context activation, data transmission, deactivation flowchart
  • Figure 2A shows the structure of the FBC system supporting online charging
  • FIG. 2B is a structural diagram of an FBC system supporting offline charging
  • FIG. 3 is a flow chart showing a triggering rule triggered by a trigger event TPF to a CRF in the prior art
  • FIG. 4 is a flow chart showing a re-authentication of a TPF request OCS by a re-authentication event trigger in the prior art
  • FIG. 5 is a flow chart showing online charging when a trigger event occurs in the present invention.
  • FIG. 6 is a flow chart showing the OCS providing input information to the CRF in the present invention
  • FIG. 7 is a flow chart showing the online charging when the bearer is modified in the present invention
  • Fig. 8 is a flow chart showing the online charging of the CRF based on external input information in the present invention. Mode for carrying out the invention
  • the TPF only monitors the occurrence of the triggering event, and reports to the CRF when the triggering event occurs.
  • the CRF determines whether the TPF needs to initiate the re-authentication process according to the triggering event reported by the TPF. If yes, the TPF is notified to request the OCS. Re-authenticate the user.
  • FIG. 5 is a flowchart showing the online charging when the triggering event occurs in the present invention. As shown in FIG. 5, the online charging implementation process when the triggering event occurs includes the following steps:
  • Step 501 The TPF monitors the occurrence of the trigger event to determine whether the currently occurring event matches the stored trigger event. If yes, go to step 502. Otherwise, continue to monitor the occurrence of the trigger event.
  • the specific implementation process is as follows:
  • the TPF sends a charging rule request to the CRF, where the charging rule request carries charging rule input information, such as UE information, network information, and the like.
  • the CRF selects an appropriate charging rule according to the received revenue information, and the charging mechanism in the charging rule indicates "online charging”.
  • the CRF can further determine that the TPF needs to be monitored according to the input information provided by the TPF. trigger event, The charging rule and the triggering event are then sent to the TPF.
  • the CRF can also provide the TPF with a trigger event that requires it to be monitored.
  • the CRF can continue to send a new trigger event to the TPF after receiving the trigger event reported by the TPF.
  • the CRF When the CRF receives the input information provided by an external entity, such as AF or OCS, it can also provide the TPF with a trigger event that requires it to be monitored. That is, the CRF can actively send a trigger event to the TPF.
  • an external entity such as AF or OCS
  • the TPF After receiving the charging rules and triggering events provided by the CRF, the TPF monitors the occurrence of the triggering event, filters out the corresponding IP data stream according to the filter in the charging rule, and then applies the corresponding charging rule to filter. The outgoing IP data stream is charged.
  • the TPF instructs "online charging” according to the charging mechanism in the charging rule, requests the user credit from the OCS, and the OCS calculates the credit of the user and returns it to the TPF.
  • Step 502 The TPF sends a charging rule request to the CRF, where the charging rule request carries the input information for determining the charging rule by the CRF and the currently occurring trigger event.
  • Step 503 to step 504 After receiving the charging rule request, the CRF may further select an appropriate charging rule according to the related input information provided by the AF according to the input information carried in the charging rule request, and the CRF is charged according to the charging.
  • the triggering event carried in the rule request determines whether the re-authentication process needs to be triggered.
  • the charging rule is returned to the TPF, and the provided charging rule carries the selected charging rule, the charging rule operation instruction, and Re-authentication indication
  • the re-authentication indication is used to notify the TPF to initiate a re-authentication process, requesting the OCS to re-authenticate the user
  • the re-authentication indication may carry event information that triggers re-authentication, and is used for CRF via
  • the TPF notifies the OCS of the reason for triggering the current re-authentication right; otherwise, the charging rule is returned to the TPF, and the provided charging rule carries only the selected charging rule and the charging rule operation indication.
  • Step 505 After receiving the charging rule, the TPF operates the indication according to the charging rule to the CRF. The selected charging rules are operated accordingly.
  • Step 506 The TPF sends a credit control request to the OCS according to the re-authentication indication carried in the charging rule, where the credit control request carries the remaining credit of the user, and requests the OCS to recalculate the credit of the user.
  • the credit control request may further carry event information that triggers the current re-authentication process in the re-authentication indication, to notify the OCS of the reason for triggering the current re-authentication.
  • Step 507 After receiving the credit control request, the OCS recalculates the credit of the user, and then returns a credit control response to the TPF. If the OCS calculates the credit of the user, the credit control response carries the user credit recalculated by the OCS. If the OCS does not calculate the credit of the user, the credit control response may carry an error cause value.
  • the CRF may not provide a re-authentication indication to the TPF.
  • the TPF determines whether the OCS is required to re-authenticate the user according to the charging rule sent by the CRF. For example, the TPF determines whether the charging key in the charging rule changes. Or the TPF determines whether the filter in the charging rule changes.
  • the CRF determines whether the TPF needs to initiate the re-authentication process: by pre-configuring the re-authentication event in the CRF, or by carrying the re-authentication event when the OCS provides the input information to the CRF, so that the CRF acquires the TPF.
  • the event that initiates the re-authentication process is performed.
  • the CRF matches the obtained re-authentication event by the triggering event reported by the TPF. If the CRF can match, the CRF determines that the triggering event requires the TPF to initiate the re-authentication process. Otherwise, The CR determines that the trigger event does not require the TPF to initiate the re-authentication process.
  • the CRF learns that the charging rule is modified into a re-authentication event.
  • the AF can provide input information to the CRF, and the CRF selects a new charging rule according to the input information.
  • the CRF receives The AF provides an input information event that triggers the charging rule to modify the SCA event.
  • Figure 6 is a flow chart showing the input of information from the OCS to the CRF in the present invention, as shown in Figure 6.
  • the implementation of the OCS to provide input information to the CRF includes the following steps:
  • Step 601 The OCS sends an OCS-related charging information to the CRF, where the information may further carry a re-authentication event that is sent to the TPF by the CRF.
  • the trigger event sent to the TPF may include a corresponding re-authentication event.
  • the TPF may only monitor the trigger event and report it to the CRF when the trigger event occurs;
  • the triggering event reported by the TPF determines whether the triggering event is a re-authentication event. Whether the TPF needs to initiate a re-authentication process requests the OCS to re-authenticate the user.
  • Step 602 The CRF sends a response message to the OCS.
  • the charging rule is changed in the CRF, or the charging rule is changed when the OCS sends the OCS-related charging information to the CRF.
  • the CRF needs to trigger the re-authentication process when the charging rule changes.
  • the operator performs sub-regional charging for the user, that is, the operator charges the user at different rates according to the range of the local area when the user uses the service.
  • the TPF detects the SGSN in the trigger event. After the change event occurs, the CRF is reported to the CRF. Further, the TPF can provide the CRF with the address information of the SGSN where the user is currently located.
  • the CRF learns the rate of the service used by the user in the current local area according to the SGSN change event and the address information of the SGSN where the user is currently located. Then, the charging rule is modified, such as modifying the charging key in the charging rule, and using the new charging button to indicate the current rate. In addition, the CRF determines that the SGSN change event causes a change in the charging rule. According to the re-authentication event information obtained by the CRF, the TPF needs to initiate a re-authentication process when the charging rule changes. The new charging rule and the re-authentication indication may further carry the re-authentication event information, such as the charging rule change, to notify the OCS via the TPF to trigger the reason of the current re-authentication right.
  • the TPF filters out the filter based on the received charging rule (Filter).
  • the corresponding IP data stream is then charged by the corresponding charging rule for the filtered IP data stream.
  • the TPF requests the OCS to re-authenticate the user according to the re-authentication indication, and the OCS recalculates the credit of the user and returns to the TPF.
  • FIG. 7 is a flowchart showing the online charging when the bearer is modified in the present invention. As shown in FIG. 7, the online charging implementation process when the bearer is modified includes the following steps:
  • Step 701 to step 702 are basically the same as steps 301 to 302.
  • Steps 703 to 708 are basically the same as steps 502 to 507.
  • Step 709 is substantially the same as step 405.
  • the OCS reports and requests a new user credit mechanism, so that the OCS can know the usage of the service by the user, such as the length of time that the user uses a certain service. , or data traffic that occurs when a user uses a service.
  • operators can use some preferential charging policies to attract users. For example, when the accumulated time length of a certain service is reached, the data traffic of a certain service reaches a certain value. At this time, the rate of the corresponding service is adjusted to the preferential rate.
  • the OCS can provide the CRF with input information for determining the charging rule, and notify the CRF to use the new service rate for the user to use the corresponding service. .
  • the CRF selects an appropriate charging rule and sends it to the TPF according to the input information of the charging rule provided by the OCS.
  • the AF may also provide the CRF with input information for determining the charging rule.
  • a service uses time-sharing charging, for example, the rate of the user using the service is different at different times on the same day, and the AF determines that the user uses a certain service to enter.
  • the AF may provide the CRF with input information for determining the charging rule, and notify the CRF to use the new service rate for the user to use the corresponding service for charging.
  • the CRF selects the appropriate charging rule and sends it to the TPF based on the input information of the charging rule provided by the AF.
  • the CRF in the case of online charging, when the CRF is received from the outside, it is used for determining
  • the input information of the fee rule can be used to deliver the appropriate charging rule to the TPF, and the CRF can determine whether the TPF needs to initiate the re-authentication process according to the input information. If necessary, the re-authentication indication is sent to the TPF, and the specific implementation is implemented.
  • the process is shown in Figure 8:
  • Step 801 The CRF receives an internal or external Trigger Event and information related to the event, such as an event in which the AF or OCS sends a charging rule selection input information to the CRF.
  • Step 802 The CRF selects an appropriate charging rule according to the obtained input information.
  • the input information may be the charging related input information provided by the AF.
  • the user uses a certain service provided by the AF, and the service has special requirements for charging, for example, the charging rate is different from the charging rate of other services, so
  • the AF provides the CRF with the charging input information related to the service; the charging related input information provided by the TPF; or the charging related input information provided by the OCS; and the CRF determines whether the TPF needs to initiate the re-authentication
  • the re-authentication indication is sent to the TPF, and the re-authentication indication may further carry the re-authentication event information, so as to notify the OCS via the TPF to trigger the current re-authentication reason. Otherwise, In step 803, the re-authentication indication is not required to be sent to the TPF, and steps 805 to 806 may be omitted.
  • Step 803 If the charging rule changes, the CRF sends a charging rule to the TPF, where the charging rule can carry the selected charging rule, the charging rule operation indication, and the re-authentication indication.
  • Step 804 After receiving the charging rule, the TPF performs corresponding operations on the charging rule selected by the CRF according to the charging rule operation indication.
  • Step 805 The TPF sends a credit request (Credit Request) to the OCS according to the re-authentication indication carried in the provided charging rule, where the credit request carries the remaining credit of the user and related new charging rule information.
  • Request OCS to recalculate the user's credit.
  • the re-authentication event information carried in the re-authentication indication may be further carried in the credit request to notify the OCS of the reason for triggering the current re-authentication right.
  • Step 806 After receiving the credit request, the OCS recalculates the credit of the user, and then returns a credit response (Credit Response) to the TPF. If the OCS calculates the credit of the user, the credit response carries the user credit recalculated by the OCS. If the OCS does not calculate the credit of the user, the credit response may carry an error reason value.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Providing a processing method for re-authorization, the method includes: CRF provides a re-authorization indication to TPF; TPF initiates re-authorization flow according to the received re-authorization indication. Also providing a processing method for re-authorization event and event triggers, the method includes: CRF receives internal or external event, then judges TPF whether need to initiate re-authorization flow, if so, CRF provides a re-authorization indication to TPF, TPF initiates re-authorization flow according to the received re-authorization indication. In accordance with the embodiments provided by the present invention, the service data flow based charging flow is consummated, and the interaction for the information between the FBC entities are decreased, so the resources between the FBC entities is saved, and the interaction flow for the information between the FBC entities become clear and explicit.

Description

一种进行重鉴权及重鉴权事件和触发事件的处理方法  Method for processing re-authentication and re-authentication events and trigger events

技术领域 Technical field

本发明涉及分组数据计费领域, 特别是指一种在基于分组数据流计 费中进行重鉴权及重鉴权事件和触发事件的处理方法。 发明背景  The present invention relates to the field of packet data charging, and more particularly to a processing method for re-authenticating and re-authenticating events and triggering events based on packet data flow accounting. Background of the invention

随着分组数据业务应用的逐渐广泛, 如何准确合理地对分组数据业 务进行计费, 已成为运营商普遍关注的问题。  With the gradual wide application of packet data services, how to accurately and reasonably charge packet data services has become a common concern of operators.

图 1示出了分组数据协议上下文(PDP Context, Packet Data Protocol Context )激活、 数据传输、 去激活流程图, 如图 1所示, 在通用分组无 线业务( GPRS, General Packet Radio Service ) 中, 激活 PDP Context、 与外部分组数据网络 ( PDN, Packet Data Network )进行数据交互、 去 激活该 PDP Context的实现过程包括以下步骤:  Figure 1 shows a packet data protocol context (PDP Context, Packet Data Protocol Context) activation, data transmission, deactivation flow diagram, as shown in Figure 1, in the General Packet Radio Service (GPRS, General Packet Radio Service), activated The PDP Context, the data interaction with the external packet data network (PDN, Packet Data Network), and the process of deactivating the PDP Context include the following steps:

步驟 101 : 移动终端 ( MS ) 向服务通用分组无线业务支持节点 ( SGSN, Serving GPRS Support Node )发送 PDP Context 激活请求 ( Activate PDP Context Request ), 该 Activate PDP Context Request中携 带有网络层业务访问点标识( NSAPI, Network Layer Service Access Point Identifier ), PDP类型、 接入点名称(APN, Access Point Name )、 要求 的服务质量(QoS )参数、 事务标识(TI, Transaction Identifier )等信息, 其中, NSAPI在 SGSN和网关通用分组无线业务支持节点 (GGSN, Gateway GPRS Support Node )之间作为隧道标识( TID, Tunnel Identifier ) 的组成部分, 用于标识 PDP Context; PDP类型包括端对端协议( PPP, Peer-Peer Protocol )类型、 网际协议( IP, Internet Protocol )类型等; APN 可由 MS向 SGSN提供, SGSN根据 APN寻址到相应 GGSN, GGSN根 据 APN确定 MS所要访问的外部网络, MS也可不向 SGSN提供 APN, 此时, 由 SGSN根据 MS用户的签约信息选择缺省的 APN; QoS参数为 MS指定的分组数据业务所要达到的质量要求; Ή用于 MS标识某个 PDP context Step 101: The mobile terminal (MS) sends a PDP Context Request (Active PDP Context Request) to the Serving GPRS Support Node (SGSN), where the Activate PDP Context Request carries the network layer service access point identifier. (NSAPI, Network Layer Service Access Point Identifier), PDP type, access point name (APN, Access Point Name), required quality of service (QoS) parameter, transaction identifier (TI, Transaction Identifier), etc., where NSAPI is The SGSN and the Gateway GPRS Support Node (GGSN) are used as part of the Tunnel Identifier (TID) to identify the PDP Context. The PDP type includes the end-to-end protocol (PPP, Peer- Peer Protocol type, Internet Protocol (IP) type, etc.; APN can be provided by the MS to the SGSN, and the SGSN is addressed to the corresponding GGSN according to the APN, the GGSN root The MS may not provide the APN to the SGSN according to the APN. The SGSN may select the default APN according to the subscription information of the MS user. The QoS parameter is the quality requirement of the packet data service specified by the MS. ΉUsed by the MS to identify a PDP context

步骤 102: SGSN收到 Activate PDP Context Request后, 与 MS进行 安全性检查和加密, 该步骤为可选步驟。  Step 102: After receiving the Activate PDP Context Request, the SGSN performs security check and encryption with the MS. This step is optional.

步骤 103: SGSN根据 APN解析 GGSN的地址信息, 如果 SGSN能 够根据 APN解析出 GGSN的地址信息, 则为 PDP Context创建 TEID , 该 TEID可为国际移动用户标识( IMSI, International Mobile Subscriber Identity )与 NSAPI的组合, 然后 SGSN向 GGSN发送 PDP Context创 建请求( Create PDP Context Request ), 该 PDP Context创建请求中携带 有 PDP类型、 PDP地址、 APN、 QoS参数、 TEID、 选择模式等, 其中, PDP地址可为 MS的 IP地址, 为可选参数, PDP Context创建请求中可 不携带 PDP地址, 此时, 在后续的处理过程中, 可由 GGSN为 MS分 配 IP地址, 也可由最终与 MS建立连接的 PDN为 MS分配 IP地址; 选 择模式是指 APN的选择模式, 即 APN是由 MS选定的还是由 SGSN选 定的。 如果 SGSN无法根据 APN解析出 GGSN的地址信息, 则 SGSN 拒绝 MS发起的 PDP Context激活请求。  Step 103: The SGSN parses the address information of the GGSN according to the APN. If the SGSN can parse the address information of the GGSN according to the APN, the TEID is created for the PDP Context, and the TEID can be an International Mobile Subscriber Identity (IMSI) and an NSAPI. The SGSN sends a PDP Context Request to the GGSN. The PDP Context Request contains the PDP type, PDP address, APN, QoS parameters, TEID, and selection mode. The PDP address can be MS. The IP address is an optional parameter. The PDP Context creation request may not carry the PDP address. In this case, the GGSN may assign an IP address to the MS in the subsequent processing, or may assign an IP to the MS by the PDN that finally establishes a connection with the MS. Address; The selection mode refers to the APN selection mode, that is, whether the APN is selected by the MS or selected by the SGSN. If the SGSN cannot resolve the address information of the GGSN according to the APN, the SGSN rejects the PDP Context activation request initiated by the MS.

步骤 104: GGSN收到 PDP Context创建请求后, 根据 APN确定外 部 PDN, 然后分配计费标识(Charging ID )、 启动计费, 并且协商 QoS, 如果 GGSN能够满足 QoS参数的服务质量要求, 则向 SGSN返回 PDP Context创建响应 ( Create PDP Context Response ), 该 PDP Context创建 响应中携带有 TEID、 PDP地址、 链路承载(Backbone Bearer )协议、 商定的 QoS参数、 Charging ID等信息。 如果 GGSN无法满足 QoS参数 的服务质量要求, 则 GGSN拒绝 SGSN发起的 PDP Context创建请求, 然后 SGSN拒绝 MS发起的 PDP Context激活请求。 Step 104: After receiving the PDP Context creation request, the GGSN determines an external PDN according to the APN, then allocates a Charging ID, initiates charging, and negotiates QoS. If the GGSN can meet the quality of service requirements of the QoS parameter, the SGSN sends the SGSN to the SGSN. The PDP Context Create Response (Representation PDP Context Response), which carries the TEID, the PDP address, the Backbone Bearer protocol, the agreed QoS parameters, and the Charging ID. If the GGSN cannot meet the quality of service requirements of the QoS parameters, the GGSN rejects the PDP Context creation request initiated by the SGSN. The SGSN then rejects the PDP Context activation request initiated by the MS.

步骤 105: SGSN收到 PDP Context创建响应后, 在 PDP Context中 插入用于标识 PDP Context的 NSAPI和 GGSN地址信息,并根据商定的 QoS 参数选择无线优先权, 然后向 MS 返回 PDP Context 激活响应 ( Activate PDP Context Accept ),该 PDP Context激活响应中携带有 PDP 类型、 PDP地址、 Ή、 商定的 QoS参数、 无线优先权、 PDP配置选项等 信息。 并且, SGSN启动计费。 MS收到 PDP Context激活响应, 就已经 建立了 MS与 GGSN直接的路由 , 可以进行分组数据的传输了。  Step 105: After receiving the PDP Context creation response, the SGSN inserts NSAPI and GGSN address information for identifying the PDP Context in the PDP Context, and selects a radio priority according to the agreed QoS parameter, and then returns a PDP Context activation response to the MS (Activate PDP Context Accept ), the PDP Context activation response carries information such as PDP type, PDP address, Ή, agreed QoS parameters, wireless priority, PDP configuration options, and the like. And, the SGSN starts charging. After receiving the PDP Context activation response, the MS has established a direct route between the MS and the GGSN, and can perform packet data transmission.

步骤 106: MS通过 SGSN、 GGSN与 PDN进行分组数据的交互。 步骤 107: 结束分组数据交互后, MS向 SGSN发送 PDP Context去 激活请求( Deactivate PDP Context Request ),该 PDP Context去激活请求 中携带有 Ή。  Step 106: The MS performs packet data interaction through the SGSN, the GGSN, and the PDN. Step 107: After ending the packet data interaction, the MS sends a PDP Context Deactivation Request (Deactivate PDP Context Request) to the SGSN, where the PDP Context Deactivation Request carries a defect.

步骤 108: SGSN收到 PDP Context去激活请求后, 与 MS进行安全 性检查和加密, 该步骤为可选步骤。  Step 108: After receiving the PDP Context deactivation request, the SGSN performs security check and encryption with the MS. This step is an optional step.

步骤 109〜步骤 111 : SGSN向 GGSN发送 PDP Context删除请求 ( Delete PDP Context Request ),该 PDP Context删除请求中携带有 TEID。  Steps 109 to 111: The SGSN sends a PDP Context Request to the GGSN, and the PDP Context Delete Request carries the TEID.

GGSN收到 PDP Context删除请求后, 结束对 MS的计费, 删除对应于 TEID的 PDP Context, 然后向 SGSN发送 PDP Context删除响应( Delete PDP Context Response ),该 PDP Context删除响应中携带有 TEID。 SGSN 收到 PDP Context删除响应后,结束对 MS的计费,删除对应于 TEID的 PDP Context, 然后向 MS发送 PDP Context去激活响应( Deactivate PDP Context Response ), 该 PDP Context去激活响应中携带有 TI。 MS收到 PDP Context去激活响应后, 删除对应于 TI的 PDP Context After receiving the PDP Context deletion request, the GGSN ends the charging of the MS, deletes the PDP Context corresponding to the TEID, and then sends a PDP Context Response (DDP) to the SGSN. The PDP Context delete response carries the TEID. After receiving the PDP Context deletion response, the SGSN ends the charging of the MS, deletes the PDP Context corresponding to the TEID, and then sends a PDP Context Deactivation Response (Deactivate PDP Context Response) to the MS. The PDP Context deactivation response carries the TI. . After receiving the PDP Context deactivation response, the MS deletes the PDP Context corresponding to TI.

由图 1描述的实现过程可见, 当前的 GPRS计费系统中, 由于计费 的起始点设置在 PDP Context激活时,计费的终止点设置在 PDP Context 删除时, 因此只能根据 PDP Context传输的数据流量进行计费, 或是根 据 PDP Context处于激活状态的时间长度进行计费。 然而, 在实际应用 中, MS与 PDN进行数据交互后,该 MS可以基于一个激活的 PDP Context 进行多种业务, 也就是说, 如果 PDN 能够提供多种业务, 如电子邮件 ( Email ) 收发业务、 基于无线应用协议的 (WAP, Wireless Application Protocol )的浏览业务、 基于文件传输协议(FTP, File Transfer Protocol ) 的文件传输等业务,则 MS在与该 PDN建立传输通道后,可通过一个激 活的 PDP Context承载该 PDN能够提供的各种业务。 但是, 运营商对于 各种业务的计费模式很可能采用不同的计费方式, 如对于 Email收发业 务可基于 Email接收和发送事件的触发按次计费, 对于 WAP浏览业务 可根据流量计费,对于文件传输业务也可根据流量计费, WAP浏览业务 的费率与文件传输业务的费率却不尽相同, 这样, 根据现有的 GPRS计 费系统 , 根本无法对同一 PDP Context承载的不同业务进行区分计费。 As can be seen from the implementation process described in FIG. 1, in the current GPRS charging system, since the starting point of charging is set when the PDP Context is activated, the charging termination point is set in the PDP Context. When deleting, it can only be charged according to the data traffic transmitted by the PDP Context, or according to the length of time the PDP Context is activated. However, in actual applications, after the MS interacts with the PDN, the MS can perform multiple services based on an activated PDP Context, that is, if the PDN can provide multiple services, such as email (email), Based on the WAP (Wireless Application Protocol) browsing service and the file transfer protocol (FTP) file transfer service, the MS can pass an activated PDP after establishing a transmission channel with the PDN. The Context carries various services that the PDN can provide. However, the charging mode of the operator for various services is likely to adopt different charging methods. For example, for the E-mail receiving and receiving service, the e-mail receiving and sending events may be triggered by the secondary charging, and the WAP browsing service may be based on the flow accounting fee. For the file transfer service, the rate of the WAP browsing service and the rate of the file transfer service are different according to the flow rate. Therefore, according to the existing GPRS charging system, different services carried by the same PDP Context cannot be performed at all. Perform differentiated billing.

针对上述情况, 第三代合作伙伴计划 ( 3GPP, The 3rd Generation Partnership Project )目前正在讨论如何实现基于 IP数据流的计费( FBC, Flow Based Charging )。 对于一个分组数据业务而言, MS的用户使用该 业务时,传输和接收到的所有 IP数据流(IP Flow ),也可为 IP分组包(IP packet ), 总称为业务数据流( Service Data Flow ), 即业务数据流是多个 IP数据流组成的集合, 因此基于 IP数据流的计费能够真实反映某个业 务数据流对资源的占用情况。基于 IP数据流的计费可被认为是通过一些 类似筛子的过滤器将同一 PDP Context中承载的不同业务的 IP数据流分 别筛选出来, 然后针对不同过滤器过滤出的 IP数据流进行分别计费, 以 达到对不同的业务数据流分别计费的目的。这样,基于 IP数据流的计费 粒度要远远小于基于一个 PDP Context的计费粒度, 粒度可看作是筛子 孔的大小,基于一个 PDP Context的计费粒度是一个 PDP Context就是一 个筛子孔, 而基于 IP数据流的计费粒度则是一个 IP业务数据流则为一 个筛子孔, 即针对一个 PDP Context中包含多个筛子孔, 因此, 基于 IP 数据流的计费与比基于一个 PDP Context的计费相比, 基于 IP数据流的 计费能够为运营商或业务提供者提供更为丰富的计费手段。 In response to the above situation, the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) is currently discussing how to implement FBC (Flow Based Charging). For a packet data service, when the user of the MS uses the service, all IP data streams (IP Flows) transmitted and received may also be IP packets, which are collectively referred to as Service Data Flow. ), that is, the service data stream is a set of multiple IP data streams, so the charging based on the IP data stream can truly reflect the occupation of resources by a certain service data stream. IP data stream-based charging can be considered as filtering out IP data streams of different services carried in the same PDP Context through filters of similar filters, and then separately charging IP data streams filtered by different filters. In order to achieve separate billing for different business data streams. In this way, the granularity of the IP data-based charging is much smaller than the charging granularity based on a PDP Context. The granularity can be regarded as the size of the screening hole. The charging granularity based on a PDP Context is a PDP Context. The meshing granularity based on the IP data stream is an IP service data stream is a sieve hole, that is, a plurality of sieve holes are included for one PDP Context, and therefore, the charging and ratio based on the IP data stream is based on Compared to the charging of a PDP Context, IP data stream based charging can provide operators or service providers with more abundant charging means.

3GPP中对 FBC的系统结构、 功能要求以及消息交互流程等方面均 进行了描述, 支持在线计费的 FBC系统结构如图 2A所示, 基于移动网 络增强逻辑的客户化应用 (CAMEL, Customised Application for Mobile Network Enhanced Logic ) 的业务控制点 ( SCP, Service Control Point ) 201和基于业务数据流计费的信用控制功能实体( CCF, Service Data Flow Based Credit Control Function ) 202组成了在线计费系统( OCS , Online Charging System ) 206。 CCF 202通过 Ry接口与基于业务数据流计费的 计费规则功能实体 ( CRF , Service Data Flow Based Charging Rule Function ) 203 互通, CRF 203 通过 R 接口与应用功能实体(AF, Application Function ) 204互通, CRF 203通过 Gx接口与传输面功能实 体( TPF , Traffic Plane Function ) 205互通, CCF 202通过 Gy接口与 TPF 205互通。  The 3GPP describes the system structure, functional requirements, and message interaction procedures of the FBC. The FBC system structure supporting online charging is shown in Figure 2A. The customized application based on mobile network enhanced logic (CAMEL, Customised Application for Mobile Network Enhanced Logic (SCP) Service Control Point (SCP) and Service Data Flow Based Credit Control Function (CCF) 202 constitute an online charging system (OCS, Online Charging System ) 206. The CCF 202 communicates with the Service Data Flow Based Charging Rule Function (CRF) 203 through the Ry interface, and the CRF 203 communicates with the Application Function (AF) through the R interface. The CRF 203 communicates with the Traffic Plane Function (TPF) 205 through the Gx interface, and the CCF 202 communicates with the TPF 205 through the Gy interface.

支持离线计费的 FBC系统结构如图 2B所示, CRF 203通过 Rx接 口与 AF 204互通, CRF 203通过 Gx接口与 TPF 205互通, TPF 205通 过 Gz接口分别与计费网关功能实体( CGF , Charging Gateway Function ) 207和计费采集功能实体( CCF, Charging Collection Function ) 208互通。  The structure of the FBC system supporting offline charging is as shown in FIG. 2B. The CRF 203 communicates with the AF 204 through the Rx interface, the CRF 203 communicates with the TPF 205 through the Gx interface, and the TPF 205 communicates with the charging gateway function entity through the Gz interface (CGF, Charging). The Gateway Function 207 is interworking with a Charging Collection Function (CCF) 208.

TPF 205承载 IP数据流, 当 IP数据流的承载建立时, TPF 205通过 Gx接口向 CRF 203发送计费规则请求 , 该计费规则请求中携带有与用 户和 MS相关的信息、 承载特性以及与网络相关的信息等, 其中与用户 · 和 MS相关的信息可为移动台国际号码(MSISDN )、 国际移动用户标识 ( IMSI )等, 与网络相关的信息可为移动网络编码(MNC )、 移动国家 码(MCC )等。 另外, 由于在 IP数据流传输过程中, 会对承载进行修 改, 如对 QoS参数进行重新协商, 当用户使用同一业务的 QoS参数不 同时, 计费规则可能不同, 如 QoS参数下降相应的费率也下降。 此时, TPF 205可在承载修改时, 重新向 CRF 203发送计费规则请求, 请求新 的计费规则; CRF 203根据 TPF 205提供的上述输入信息选择适当的计 费规则,并向 TPF 205返回选定的计费规则,计费规则中包括计费机制、 计费类型、计费键、 业务数据流过滤器、 计费规则优先级等信息。 其中, 计费机制可为采用在线计费还是离线计费; 计费类型可为基于时间长度 进行计费还是基于数据流量进行计费;计费键是与费率相关的参数, CRF 203可不直接向 TPF 205提供费率, 而只是向 TPF 205提供与费率相关 的参数; 业务数据过滤器用于指示 TPF 205对哪些 IP数据流进行过滤, 然后 TPF 205根据计费规则对过滤出的 IP数据流进行计费。业务数据过 滤器可包含 IP5元组, IP5元组可包括源 /目的 IP地址、 源 /目的端口号 ( Port Number )、 协议标识( Protocol ID )等信息, 例如, CRF 203指示 TPF 205对源地址为 10.0.0.1、目的地址为 10.0.0.2、源 /目的端口号为 20、 协议类型为传输控制协议 ( TCP )的 IP数据流进行过滤, 并根据计费规 则对过滤出的 IP数据流进行计费。 The TPF 205 carries the IP data stream. When the bearer of the IP data stream is established, the TPF 205 sends a charging rule request to the CRF 203 through the Gx interface, where the charging rule request carries information related to the user and the MS, bearer characteristics, and Network related information, etc., wherein the information related to the user and the MS may be a mobile station international number (MSISDN), an international mobile subscriber identity (IMSI), etc., and the network related information may be a mobile network coding (MNC), a mobile country. Code (MCC), etc. In addition, since the bearer is modified during the IP data stream transmission process, such as renegotiating the QoS parameters, when the QoS parameters of the same service are different, the charging rules may be different, such as the corresponding rate of the QoS parameter falling. Also fell. At this time, the TPF 205 may resend the charging rule request to the CRF 203 to request a new charging rule when the bearer is modified; the CRF 203 selects an appropriate charging rule according to the above input information provided by the TPF 205, and returns to the TPF 205. The selected charging rule includes charging mechanism, charging type, charging key, service data flow filter, and charging rule priority. The charging mechanism may be online charging or offline charging; the charging type may be charging based on the length of time or based on data traffic; the charging key is a parameter related to the rate, and the CRF 203 may not directly The TPF 205 is provided with a rate, and only the rate-related parameters are provided to the TPF 205; the service data filter is used to indicate which IP data streams the TPF 205 filters, and then the TPF 205 filters the filtered IP data according to the charging rules. Billing. The service data filter may include an IP5 tuple, and the IP5 tuple may include source/destination IP address, source/destination port number (Port Number), protocol identifier (Protocol ID), and the like. For example, the CRF 203 indicates the TPF 205 to the source address. Filters the IP data stream of 10.0.0.1, the destination address is 10.0.0.2, the source/destination port number is 20, the protocol type is Transmission Control Protocol (TCP), and the filtered IP data stream is calculated according to the charging rule. fee.

CRF 203可向 TPF 205提供触发事件( Event Trigger ),用以要求 TPF 205在特定事件发生时, 向 CRF 205请求新的计费规则, 如 CRF 203要 求 TPF 205在某些承载进行修改的事件发生时, 向 CRF 203请求新的计 费规则。 触发事件可视为与计费规则相关的事件。  The CRF 203 may provide a trigger event (Event Trigger) to the TPF 205 to request the TPF 205 to request a new charging rule from the CRF 205 when a specific event occurs, such as the CRF 203 requesting the TPF 205 to perform an event modification on some bearers. At the time, a new charging rule is requested from the CRF 203. Trigger events can be thought of as events related to billing rules.

CRF 203除了根据 TPF 205提供的输入信息选择适当的计费规则之 外, CRF 203还可根据 AF 204或 OCS 206的输入信息选择适当的计费 规则, 如 AF 204通知 CRF 203用户当前使用的业务类型, CRF 203根 据该业务类型选择相应的计费规则。 OCS 206由 SCP 201和 CCF ( Service Data Flow Based Credit Control Function ) 202两个功能实体組成, 其中, CCF ( Service Data Flow Based Credit Control Function ) 202是执行信用控制的功能实体,仅应用于在线 计费系统, 可通过在现有的 OCS 206中增加新的功能来实现。 在在线计 费过程中, CCF ( Service Data Flow Based Credit Control Function ) 202 对用户信用进行管理和控制,当用户使用业务时, CCF( Service Data Flow Based Credit Control Function ) 202对该用户信用池中的信用进行鉴权, 并通过 Gy接口向 TPF 205下发用户能够使用的信用。 In addition to selecting an appropriate charging rule based on the input information provided by the TPF 205, the CRF 203 may also select an appropriate charging rule based on the input information of the AF 204 or the OCS 206, such as the AF 204 notifying the CRF 203 of the service currently used by the user. Type, CRF 203 selects the corresponding charging rule according to the type of service. The OCS 206 is composed of two functional entities, the SCP 201 and the CCF (Service Data Flow Based Credit Control Function) 202. The CCF (Service Data Flow Based Credit Control Function) 202 is a functional entity that performs credit control and is applied only to online charging. The system can be implemented by adding new functions to the existing OCS 206. In the online charging process, the CCF (Service Data Flow Based Credit Control Function) 202 manages and controls the user credit. When the user uses the service, the CCF (Service Data Flow Based Credit Control Function) 202 is in the user credit pool. The credit is authenticated, and the credit that the user can use is delivered to the TPF 205 through the Gy interface.

另外, OCS 206 可要求 TPF 205 在重鉴权事件(Re-authorisation triggers )发生时向其上报, 然后 OCS 206根据 TPF 205上报的相应重鉴 权事件对用户进行重鉴权,并可能重新计算用户的信用。例如, OCS 206 向 TPF 205提供的用户信用使用完毕, TPF 205需根据重鉴权事件中的 允许信用过期事件,向 OCS 206上报其允许的用户信用使用过期事件的 发生, OCS 206根据用户剩余帐户信息, 重新对允许用户使用的信用进 行计算。 又例如, 分区域计费时, OCS 206根据用户当前所在位置确定 费率, 并根据该费率计算用户的信用; 当用户移动至另一位置时, 如 SGSN发生变化, TPF 205需要根据重鉴权事件中的 SGSN变化事件, 向 OCS 206上报 SGSN变化事件的发生, OCS 206根据用户更新后的当 前所在位置重新确定费率,并重新计算用户的信用。又例如,当 OCS 206 根据用户使用业务的当前 QoS参数确定费率, 当用户对 QoS参数进行 修改, TPF 205需要根据重鉴权事件中的承载修改事件, 向 OCS 206上 报承载修改事件的发生, OCS 206根据用户修改后的 QoS参数确定费率, 并重新计算用户的信用。  In addition, the OCS 206 may request the TPF 205 to report to the re-authorisation triggers when they occur, and then the OCS 206 re-authenticates the user according to the corresponding re-authentication event reported by the TPF 205, and may recalculate the user. Credit. For example, after the user credit provided by the OCS 206 to the TPF 205 is used, the TPF 205 needs to report the allowed user credit usage expiration event to the OCS 206 according to the allowed credit expiration event in the re-authentication event, and the OCS 206 according to the remaining user account. Information, recalculate the credits allowed to be used by the user. For another example, in the case of sub-area charging, the OCS 206 determines the rate according to the current location of the user, and calculates the credit of the user according to the rate; when the user moves to another location, if the SGSN changes, the TPF 205 needs to re-examine the basis. The SGSN change event in the right event reports the occurrence of the SGSN change event to the OCS 206, and the OCS 206 re-determines the rate according to the current location of the user update, and recalculates the user's credit. For example, when the OCS 206 determines the rate according to the current QoS parameter of the service used by the user, when the user modifies the QoS parameter, the TPF 205 needs to report the occurrence of the bearer modification event to the OCS 206 according to the bearer modification event in the re-authentication event. The OCS 206 determines the rate based on the modified QoS parameters of the user and recalculates the credit of the user.

对应于 GPRS网络, TPF 205为 GGSN, AF为 PDN中的一个业务 网关或业务服务器, CRF 203为新增的逻辑实体。 TPF 205为计费规则 的执行点, CRF 203为计费规则的控制点。 Corresponding to the GPRS network, the TPF 205 is a GGSN, the AF is a service gateway or a service server in the PDN, and the CRF 203 is a new logical entity. TPF 205 is the charging rule The enforcement point, CRF 203 is the control point of the charging rule.

目前, 3GPP 定义了承载修改时, 在线计费情况下, 触发事件的发 生会触发计费规则请求流程, 即 TPF向 CRF请求计费规则, 触发事件 触发的 TPF向 CRF请求计费规则的处理过程如图 3所示:  At present, when the 3GPP defines the bearer modification, in the case of online charging, the triggering event triggers the charging rule request process, that is, the TPF requests the charging rule from the CRF, and the triggering event triggers the TPF to request the charging rule from the CRF. As shown in Figure 3:

步骤 301:用户设备( UE )向 TPF发送承载修改请求( Modify Bearer Service Request ), 在 GPRS网络中, 则是 GGSN收到 PDP Context更新 请求( Update PDP Context Request )。  Step 301: The user equipment (UE) sends a Modify Bearer Service Request to the TPF. In the GPRS network, the GGSN receives the PDP Context Request (Update PDP Context Request).

步骤 302: TPF收到承载修改请求后, 将承载修改事件与预先存储 的触发事件相匹配, 如果能够匹配, 则执行步骤 303; 否则, 继续监测 触发事件的发生。  Step 302: After receiving the bearer modification request, the TPF matches the bearer modification event with the pre-stored trigger event. If yes, go to step 303; otherwise, continue to monitor the trigger event.

步骤 303: TPF向 CRF发送计费规则请求( Request Charging Rules ), 该计费规则请求中携带有供 CRF确定计费规则的输入信息。  Step 303: The TPF sends a Request Charging Rule to the CRF, where the charging rule request carries the input information for determining the charging rule by the CRF.

步骤 304〜步骤 305: CRF收到计费规则请求后, 根据该计费规则请 求中携带的输入信息, 还可根据 AF提供的相关输入信息, 选择适当的 计费规则, 然后向 TPF返回提供计费规则 ( Provision Charging Rules ), 该提供计费规则中可携带有选定的计費规则和计费规则操作指示。  Steps 304 to 305: After receiving the charging rule request, the CRF may, according to the input information carried in the charging rule request, select an appropriate charging rule according to the related input information provided by the AF, and then return the provisioning to the TPF. Provision Charging Rules, which can be carried with the selected charging rules and charging rule operation instructions.

步骤 306: TPF收到提供计费规则后,根据计费规则操作指示对 CRP 选定的计费规则进行相应操作。  Step 306: After receiving the charging rule, the TPF performs corresponding operations on the charging rule selected by the CRP according to the charging rule operation instruction.

步驟 307: TPF 向 UE返回承载修改响应 (Modify Bearer Service Accept ), 并继续后续的承载修改流程。  Step 307: The TPF returns a Modify Bearer Service Accept to the UE, and continues the subsequent bearer modification process.

对于在线计费情况下, 承载修改会触发重鉴权流程, 即 TPF请求 OCS对用户进行重鉴权的流程, 具体实现过程如图 4所示:  In the case of online charging, the bearer modification triggers the re-authentication process, that is, the TPF requests the OCS to re-authenticate the user. The specific implementation process is shown in Figure 4:

步骤 401: UE 向 TPF发送承载修改请求(Modify Bearer Service Request ), 在 GPRS 网络中, 则是 GGSN收到 PDP Context更新请求 ( Update PDP Context Request )。 步骤 402: TPF收到承载修改请求后, 将承载修改事件与预先存储 的重鉴权事件进行匹配, 如果能够匹配, 则执行步骤 403, 否则, 继续 监测重鉴权事件的发生。 Step 401: The UE sends a Modify Bearer Service Request to the TPF. In the GPRS network, the GGSN receives the PDP Context Request (Update PDP Context Request). Step 402: After receiving the bearer modification request, the TPF matches the bearer modification event with the pre-stored re-authentication event. If yes, go to step 403. Otherwise, continue to monitor the occurrence of the re-authentication event.

步骤 403: TPF向 OCS发送信用控制请求( Credit Control Request ), 该信用控制请求中携带有用户的剩余信用和相关的计费规则信息, 请求 OCS重新计算用户的信用。 TPF向 OCS提供的相关计费规则信息可来 自 CRF。  Step 403: The TPF sends a credit control request (Credit Control Request) to the OCS, where the credit control request carries the remaining credit of the user and related charging rule information, and requests the OCS to recalculate the credit of the user. The relevant charging rule information provided by the TPF to the OCS can be obtained from the CRF.

步骤 404: OCS收到信用控制请求后, 重新对用户的信用进行计算, 然后向 TPF返回信用控制响应( Credit Control Answer ), 如果 OCS计算 出用户的信用, 则该信用控制响应中携带有 OCS重新计算的用户信用, 如果 OCS未计算出用户的信用,则该信用控制响应中可携带有差错原因 值。  Step 404: After receiving the credit control request, the OCS recalculates the credit of the user, and then returns a credit control response (Credit Control Answer) to the TPF. If the OCS calculates the credit of the user, the credit control response carries the OCS re The calculated user credit, if the OCS does not calculate the credit of the user, the credit control response may carry an error reason value.

步骤 405: TPF 收到信用控制响应后, 向 UE返回承载修改响应 ( Modify Bearer Service Accept ), 如果信用控制响应中携带有用户的信 用,则 TPF接受 UE发起的承载修改请求,并继续后续的承载修改流程; 如果信用控制响应中未携带有用户的信用, 则拒绝 UE发起的承载修改 请求。  Step 405: After receiving the credit control response, the TPF returns a Modify Bearer Service Accept to the UE. If the credit control response carries the user's credit, the TPF accepts the bearer modification request initiated by the UE, and continues the subsequent bearer. Modifying the process; if the credit control response does not carry the user's credit, the UE-initiated bearer modification request is rejected.

目前, 规范中对 CRF通过触发事件上报机制控制 TPF的计费方式 进行了描述,即 TPF监测到触发事件发生后向 CRF上报, CRF通过 TPF 上报的触发事件获知承载发生变化, 然后确定相应的计费规则并下发给 TPF。规范中定义的触发事件可包括: SGSN变化(SGSN change )事件, QoS参数变化( QoS changes )事件,无线接入技术( RAT )类型变化( RAT type change )事件, 传输流模板 ( TFT ) 变化(TFT change )事件。  At present, the specification describes the charging mode of the CRF that controls the TPF through the triggering event reporting mechanism, that is, the TPF reports the trigger event to the CRF, and the CRF learns the change of the bearer through the trigger event reported by the TPF, and then determines the corresponding meter. The fee rules are issued to the TPF. The trigger events defined in the specification may include: SGSN change events, QoS changes events, RAT type change events, and transport stream template (TFT) changes ( TFT change) event.

另外, 规范中还对 OCS通过重鉴权事件上报的机制控制 TPF的信 用使用情况进行了描述, 即 TPF监测到重鉴权事件发生后向 OCS上报, OCS通过 TPF上报的重鉴权事件,获知用户的信用使用情况以及承载的 变化, 对用户的信用重新进行计算并下发给 TPF。 规范中定义的重鉴权 事件可包括: 允许信用过期 ( credit authorization lifetime expiry )事件, 用户空闲状态超时(idle timeout )事件, 计费规则变化( charging rule is changed )事件, 还可包括一些 GPRS事件, 如 SGSN变化事件, QoS 参数变化事件, RAT类型变化事件。 In addition, the specification also describes how the OCS controls the credit usage of the TPF through the mechanism reported by the re-authentication event, that is, the TPF reports to the OCS after the re-authentication event occurs. The OCS obtains the credit usage of the user and the change of the bearer through the re-authentication event reported by the TPF, and recalculates the credit of the user and delivers the credit to the TPF. The re-authentication event defined in the specification may include: a credit authorization lifetime expiry event, a user idle state timeout event, a charging rule is changed event, and may also include some GPRS events. , such as SGSN change event, QoS parameter change event, RAT type change event.

通过以上描述可见, 触发事件和重鉴权事件中都包括 GPRS事件, 如 SGSN变化事件、 QoS参数变化事件、 RAT类型变化事件等, 这样, 对于某个发生的 GPRS事件, TPF会将该 GPRS事件同时匹配到触发事 件和重鉴权事件, 因此, 需要分别向 CRF和 OCS上报该 GPRS事件的 发生, 造成对 FBC系统资源的浪费。 发明内容  It can be seen from the above description that both the trigger event and the re-authentication event include GPRS events, such as SGSN change events, QoS parameter change events, RAT type change events, etc., so that for a certain GPRS event, the TPF will use the GPRS event. At the same time, the trigger event and the re-authentication event are matched. Therefore, the occurrence of the GPRS event needs to be reported to the CRF and the OCS, respectively, resulting in waste of resources of the FBC system. Summary of the invention

有鉴于此,本发明的一个目的在于提供一种进行重鉴权的处理方法, 本发明的另一目的在于提供一种重鉴权事件和触发事件的处理方法, 完 善基于分组数据流计费的实现流程。  In view of this, an object of the present invention is to provide a processing method for performing re-authentication, and another object of the present invention is to provide a method for processing a re-authentication event and a trigger event, which is improved based on packet data flow charging. Implement the process.

为了达到上述目的, 本发明提供了一种进行重鉴权的处理方法, 该 方法包含以下步骤:  In order to achieve the above object, the present invention provides a processing method for performing re-authentication, the method comprising the following steps:

Al、 CRF向 TPF提供重鉴权指示;  Al and CRF provide re-authentication indication to the TPF;

Bl、 根据收到的重鉴权指示, TPF发起重鉴权流程。  Bl. According to the received re-authentication indication, the TPF initiates a re-authentication process.

所述步骤 A1之前进一步包括: CRF收到内部或外部的事件, 判断 是否需要 TPF发起重鉴权流程, 如果是, 则执行步骤 Al。  The step A1 further includes: the CRF receives an internal or external event, determines whether the TPF is required to initiate a re-authentication process, and if yes, performs step A1.

所述内部事件为: TPF监测到触发事件发生时, 向 CRF上报的触发 事件。  The internal event is: The trigger event reported to the CRF when the TPF detects the trigger event.

所述外部事件为: OCS或 AF向 CRF提供的输入信息。 所述判断是否需要 TPF发起重答权流程为: 判断接收到的事件是否 匹配获取的重鉴权事件, 如果是, 则执行步骤 Al。 The external event is: Input information provided by the OCS or AF to the CRF. The process of determining whether the TPF initiates the re-rights right is: determining whether the received event matches the obtained re-authentication event, and if yes, performing step A1.

所述判断是否需要 TPF发起重鉴权流程为: 判断接收到的事件引发 的事件是否匹配获取的重鉴权事件, 如果是, 则执行步骤 Al。  The determining whether the TPF needs to initiate the re-authentication process is: determining whether the event triggered by the received event matches the obtained re-authentication event, and if yes, performing step A1.

所述重鉴权事件为: CRF中配置的重鉴权事件, 或 OCS向 CRF提 供的重鉴权事件, 或以上二者的组合。  The re-authentication event is: a re-authentication event configured in the CRF, or a re-authentication event provided by the OCS to the CRF, or a combination of the two.

所述重鉴权指示中进一步包括: 重鉴权事件信息。  The re-authentication indication further includes: re-authentication event information.

步骤 B 1中所述 TPF发起重鉴权流程为: TPF请求 OCS对用户进行 重鉴权。  The TPF initiates the re-authentication process in step B1: The TPF requests the OCS to re-authenticate the user.

所述步骤 B1中进一步包括: TPF向 OCS提供重鉴权事件信息。 所述步骤 B1之后进一步包括: OCS重新对用户的信用进行计算, 并向 TPF返回重新计算后的用户信用。  The step B1 further includes: the TPF provides re-authentication event information to the OCS. The step B1 further includes: the OCS recalculates the credit of the user, and returns the recalculated user credit to the TPF.

本发明还提供了一种重鉴权事件和触发事件的处理方法, 该方法包 含以下步骤:  The present invention also provides a method for processing a re-authentication event and a trigger event, the method comprising the following steps:

A2、 CRF收到内部或外部的事件, 判断是否需要 TPF发起重鉴权 流程, 如果是, 则执行步骤 B2;  A2. The CRF receives an internal or external event, and determines whether the TPF needs to initiate a re-authentication process. If yes, step B2 is performed;

B2、 CRF 向 TPF提供重鉴权指示, 根据收到的重鉴权指示, TPF 发起重鉴权流程。  B2, the CRF provides a re-authentication indication to the TPF, and according to the received re-authentication indication, the TPF initiates a re-authentication procedure.

所述内部事件为: TPF监测到触发事件发生时, 向 CRF上报的事 件。  The internal event is: The event that the TPF reports to the CRF when the trigger event occurs.

所述外部事件为: OCS或 AF向 CRF提供的输入信息。  The external event is: Input information provided by the OCS or AF to the CRF.

所述触发事件是由 CRF向 TPF提供的。  The trigger event is provided by the CRF to the TPF.

所述步骤 B2进一步包括: TPF将上报给 CRF的触发事件作为重鉴 权事件信息提供给 OCS。  The step B2 further includes: the TPF providing the trigger event reported to the CRF as re-authentication event information to the OCS.

步骤 A2中所述判断是否需要 TPF发起重鉴权流程为: 判断发生的 触发事件是否匹配获取的重鉴权事件, 如果是, 则执行步驟 B2The process of determining whether the TPF is required to initiate the re-authentication process in step A2 is as follows: Trigger event matches get re-authentication event, and if so, proceed to step B 2.

所述重鉴权事件为: CRF中配置的重鉴权事件, 或 OCS向 CRF提 供的重鉴权事件, 或以上二者的组合。  The re-authentication event is: a re-authentication event configured in the CRF, or a re-authentication event provided by the OCS to the CRF, or a combination of the two.

所述重鉴权指示中进一步包括: 重鉴权事件信息。  The re-authentication indication further includes: re-authentication event information.

步骤 B2中所述 TPF发起重鉴权流程为: TPF请求 OCS对用户进行 重鉴权。  The TPF initiates the re-authentication process in step B2 as follows: The TPF requests the OCS to re-authenticate the user.

所述步骤 B2中进一步包括: TPF向 OCS提供重鉴权事件信息。 所述步骤 B2之后进一步包括: OCS重新对用户的信用进行计算, 并向 TPF返回重新计算后的用户信用。  The step B2 further includes: the TPF providing re-authentication event information to the OCS. The step B2 further includes: the OCS recalculates the credit of the user, and returns the recalculated user credit to the TPF.

所述步驟 B2之后进一步包括: OCS重新对用户的信用进行计算, 并向 TPF返回重新计算后的用户信用。  The step B2 further includes: the OCS recalculates the credit of the user, and returns the recalculated user credit to the TPF.

根据本发明提出的方法, 由 CRF确定是否需要 TPF发起重鉴权流 程, 如果需要, 则 CRF指示 TPF请求 OCS对用户进行重鉴权。 另外, 本发明中, TPF可仅监测触发事件的发生,在触发事件发生时向 CRF上 报, 由 CRF确定该触发事件是否需要 TPF发起重鉴权流程; CRF也可 根据外部事件信息,如 OCS、 AF向 CRF提供的计费规则选择输入信息, 确定是否需要 TPF发起重鉴权流程。 根据本发明提出的方案, 完善了基 于分组数据流计费的实现流程,减少了 FBC各实体间的信息交互, 大大 节省了 FBC各实体间的资源, 使得 FBC各实体间的信息交互流程更为 清晰、 明确。 附图简要说明  According to the method proposed by the present invention, the CRF determines whether the TPF is required to initiate a re-authentication process, and if necessary, the CRF instructs the TPF to request the OCS to re-authenticate the user. In addition, in the present invention, the TPF can only monitor the occurrence of a trigger event, and report to the CRF when the trigger event occurs, and the CRF determines whether the trigger event requires the TPF to initiate a re-authentication process; the CRF can also be based on external event information, such as OCS, The AF selects the input information from the charging rule provided by the CRF to determine whether the TPF needs to initiate the re-authentication process. According to the solution proposed by the present invention, the implementation process based on packet data flow charging is improved, the information interaction between the FBC entities is reduced, the resources between the FBC entities are greatly saved, and the information exchange process between the FBC entities is further improved. Clear and clear. BRIEF DESCRIPTION OF THE DRAWINGS

图 1示出了 PDP Context激活、 数据传输、 去激活流程图; 图 2A示出了支持在线计费的 FBC系统结构图;  Figure 1 shows the PDP Context activation, data transmission, deactivation flowchart; Figure 2A shows the structure of the FBC system supporting online charging;

图 2B示出了支持离线计费的 FBC系统结构图; 图 3示出了现有技术中触发事件触发 TPF向 CRF请求计费规则流 程图; 2B is a structural diagram of an FBC system supporting offline charging; FIG. 3 is a flow chart showing a triggering rule triggered by a trigger event TPF to a CRF in the prior art;

图 4示出了现有技术中重鉴权事件触发 TPF请求 OCS进行重鉴权 流程图;  FIG. 4 is a flow chart showing a re-authentication of a TPF request OCS by a re-authentication event trigger in the prior art;

图 5示出了本发明中触发事件发生时的在线计费流程图;  FIG. 5 is a flow chart showing online charging when a trigger event occurs in the present invention; FIG.

图 6示出了本发明中 OCS向 CRF提供输入信息的流程图; 图 7示出了本发明中承载修改时的在线计费流程图;  6 is a flow chart showing the OCS providing input information to the CRF in the present invention; FIG. 7 is a flow chart showing the online charging when the bearer is modified in the present invention;

图 8示出了本发明中 CRF根据外部输入信息的在线计费流程图。 实施本发明的方式  Fig. 8 is a flow chart showing the online charging of the CRF based on external input information in the present invention. Mode for carrying out the invention

为使本发明的目的、 技术方案和优点更加清楚, 下面结合附图对本 发明作进一步的详细描述。  In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings.

本发明中, TPF仅对触发事件的发生进行监测, 在触发事件发生时 向 CRF上报, 由 CRF根据 TPF上报的触发事件, 确定是否需要 TPF发 起重鉴权流程, 如果是, 则通知 TPF请求 OCS对用户进行重鉴权。  In the present invention, the TPF only monitors the occurrence of the triggering event, and reports to the CRF when the triggering event occurs. The CRF determines whether the TPF needs to initiate the re-authentication process according to the triggering event reported by the TPF. If yes, the TPF is notified to request the OCS. Re-authenticate the user.

图 5示出了本发明中触发事件发生时的在线计费流程图, 如图 5所 示, 触发事件发生时的在线计费实现过程包括以下步骤:  FIG. 5 is a flowchart showing the online charging when the triggering event occurs in the present invention. As shown in FIG. 5, the online charging implementation process when the triggering event occurs includes the following steps:

步驟 501: TPF对触发事件的发生进行监测, 判断当前发生的事件 与存储的触发事件是否匹配, 如果匹配, 则执行步骤 502, 否则, 继续 监测触发事件的发生。  Step 501: The TPF monitors the occurrence of the trigger event to determine whether the currently occurring event matches the stored trigger event. If yes, go to step 502. Otherwise, continue to monitor the occurrence of the trigger event.

承载建立时, 具体实现过程如下: 在线计费情况下, 承载建立时, TPF向 CRF发送计费规则请求,该计费规则请求中携带有计费规则输入 信息, 如 UE的信息、 网络信息等, CRF根据收到的收入信息选择适当 的计费规则, 该计费规则中的计费机制指示为 "在线计费", 另外, CRF 根据 TPF提供的输入信息,可进一步确定需要 TPF进行监测的触发事件, 然后将计费规则和触发事件下发给 TPF。 When the bearer is set up, the specific implementation process is as follows: In the online charging mode, when the bearer is established, the TPF sends a charging rule request to the CRF, where the charging rule request carries charging rule input information, such as UE information, network information, and the like. The CRF selects an appropriate charging rule according to the received revenue information, and the charging mechanism in the charging rule indicates "online charging". In addition, the CRF can further determine that the TPF needs to be monitored according to the input information provided by the TPF. trigger event, The charging rule and the triggering event are then sent to the TPF.

承载修改时, CRF也可向 TPF提供要求其进行监测的触发事件, 即 当触发事件发生时, CRF收到 TPF上报的触发事件后, 可继续向 TPF 下发新的触发事件。  When the bearer is modified, the CRF can also provide the TPF with a trigger event that requires it to be monitored. When the trigger event occurs, the CRF can continue to send a new trigger event to the TPF after receiving the trigger event reported by the TPF.

当 CRF接收到外部实体, 如 AF、 OCS, 提供的输入信息后, 也可 向 TPF提供要求其进行监控的触发事件, 即 CRF可以主动地向 TPF下 发触发事件。  When the CRF receives the input information provided by an external entity, such as AF or OCS, it can also provide the TPF with a trigger event that requires it to be monitored. That is, the CRF can actively send a trigger event to the TPF.

TPF收到 CRF提供的计费规则和触发事件后,对触发事件的发生进 行监测, 并根据计费规则中的过滤器(Filter )过滤出相应的 IP数据流, 然后应用相应计费规则对过滤出的 IP数据流进行计费。 TPF根据计费规 则中的计费机制指示 "在线计费", 向 OCS请求用户信用, OCS对用户 的信用进行计算并向 TPF返回。  After receiving the charging rules and triggering events provided by the CRF, the TPF monitors the occurrence of the triggering event, filters out the corresponding IP data stream according to the filter in the charging rule, and then applies the corresponding charging rule to filter. The outgoing IP data stream is charged. The TPF instructs "online charging" according to the charging mechanism in the charging rule, requests the user credit from the OCS, and the OCS calculates the credit of the user and returns it to the TPF.

步骤 502: TPF向 CRF发送计费规则请求, 该计费规则请求中携带 有供 CRF确定计费规则的输入信息和当前发生的触发事件。  Step 502: The TPF sends a charging rule request to the CRF, where the charging rule request carries the input information for determining the charging rule by the CRF and the currently occurring trigger event.

步骤 503〜步骤 504: CRF收到计费规则请求后, 根据该计费规则请 求中携带的输入信息, 还可进一步根据 AF提供的相关输入信息, 选择 适当的计费规则,并且 CRF根据计费规则请求中携带的触发事件,判断 是否需要触发重鉴权流程, 如果是, 则向 TPF返回提供计费规则, 该提 供计费规则中携带有选定的计费规则、 计费规则操作指示和重鉴权指 示, 重鉴权指示用于通知 TPF发起重鉴权流程, 请求 OCS对用户进行 重鉴权, 进一步地, 重鉴权指示中可携带触发重鉴权的事件信息, 用于 CRF经由 TPF通知 OCS触发当前重鉴权的原因; 否则, 向 TPF返回提 供计费规则, 该提供计费规则中仅携带有选定的计费规则和计费规则操 作指示。  Step 503 to step 504: After receiving the charging rule request, the CRF may further select an appropriate charging rule according to the related input information provided by the AF according to the input information carried in the charging rule request, and the CRF is charged according to the charging. The triggering event carried in the rule request determines whether the re-authentication process needs to be triggered. If yes, the charging rule is returned to the TPF, and the provided charging rule carries the selected charging rule, the charging rule operation instruction, and Re-authentication indication, the re-authentication indication is used to notify the TPF to initiate a re-authentication process, requesting the OCS to re-authenticate the user, and further, the re-authentication indication may carry event information that triggers re-authentication, and is used for CRF via The TPF notifies the OCS of the reason for triggering the current re-authentication right; otherwise, the charging rule is returned to the TPF, and the provided charging rule carries only the selected charging rule and the charging rule operation indication.

步骤 505: TPF收到提供计费规则后,根据计费规则操作指示对 CRF 选定的计费规则进行相应操作。 Step 505: After receiving the charging rule, the TPF operates the indication according to the charging rule to the CRF. The selected charging rules are operated accordingly.

步骤 506: TPF根据提供计费规则中携带的重鉴权指示, 向 OCS发 送信用控制请求, 该信用控制请求中携带有用户的剩余信用, 请求 OCS 重新计算用户的信用。 信用控制请求中可进一步携带有重鉴权指示中触 发当前重鉴权流程的事件信息, 用以通知 OCS触发当前重鉴权的原因。  Step 506: The TPF sends a credit control request to the OCS according to the re-authentication indication carried in the charging rule, where the credit control request carries the remaining credit of the user, and requests the OCS to recalculate the credit of the user. The credit control request may further carry event information that triggers the current re-authentication process in the re-authentication indication, to notify the OCS of the reason for triggering the current re-authentication.

步骤 507: OCS收到信用控制请求后, 重新对用户的信用进行计算, 然后向 TPF返回信用控制响应, 如果 OCS计算出用户的信用, 则该信 用控制响应中携带有 OCS重新计算的用户信用, 如果 OCS未计算出用 户的信用, 则该信用控制响应中可携带有差错原因值。  Step 507: After receiving the credit control request, the OCS recalculates the credit of the user, and then returns a credit control response to the TPF. If the OCS calculates the credit of the user, the credit control response carries the user credit recalculated by the OCS. If the OCS does not calculate the credit of the user, the credit control response may carry an error cause value.

另外, CRF也可不向 TPF提供重鉴权指示, 由 TPF根据 CRF下发 的计费规则, 判断是否需要请求 OCS对用户进行重鉴权, 如 TPF判断 计费规则中的计费键是否变化,或 TPF判断计费规则中的过滤器是否变 化。  In addition, the CRF may not provide a re-authentication indication to the TPF. The TPF determines whether the OCS is required to re-authenticate the user according to the charging rule sent by the CRF. For example, the TPF determines whether the charging key in the charging rule changes. Or the TPF determines whether the filter in the charging rule changes.

本发明中, CRF判断是否需要 TPF发起重鉴权流程可为: 通过在 CRF中预先配置重鉴权事件, 或是通过 OCS向 CRF提供输入信息时携 带重鉴权事件, 使得 CRF获取到需要 TPF发起重鉴权流程的事件, 然 后, CRF通过对 TPF上报的触发事件与获取到的重鉴权事件进行匹配, 如果能够匹配, 则 CRF判断出该触发事件需要 TPF发起重鉴权流程, 否则, CR 判断出该触发事件不需要 TPF发起重鉴权流程; 也可为判断 收到的事件所引发的事件是否匹配获取的重鉴权事件, 如收到的事件能 够引发重鉴权事件的发生。 如, CRF获知计费规则修改为重鉴权事件, 在用户使用 AF提供业务的过程中, AF可向 CRF提供输入信息, CRF 根据该输入信息选择新的计费规则, 此时, CRF收到的 AF提供输入信 息事件则引发了计费规则修改重婆权事件。  In the present invention, the CRF determines whether the TPF needs to initiate the re-authentication process: by pre-configuring the re-authentication event in the CRF, or by carrying the re-authentication event when the OCS provides the input information to the CRF, so that the CRF acquires the TPF. The event that initiates the re-authentication process is performed. Then, the CRF matches the obtained re-authentication event by the triggering event reported by the TPF. If the CRF can match, the CRF determines that the triggering event requires the TPF to initiate the re-authentication process. Otherwise, The CR determines that the trigger event does not require the TPF to initiate the re-authentication process. It can also determine whether the event triggered by the received event matches the obtained re-authentication event. For example, the received event can trigger the re-authentication event. For example, the CRF learns that the charging rule is modified into a re-authentication event. In the process of the user providing the service by using the AF, the AF can provide input information to the CRF, and the CRF selects a new charging rule according to the input information. At this time, the CRF receives The AF provides an input information event that triggers the charging rule to modify the SCA event.

图 6示出了本发明中 OCS向 CRF提供输入信息的流程图, 如图 6 所示, OCS向 CRF提供输入信息的实现过程包括以下步骤: Figure 6 is a flow chart showing the input of information from the OCS to the CRF in the present invention, as shown in Figure 6. As shown, the implementation of the OCS to provide input information to the CRF includes the following steps:

步骤 601 : OCS向 CRF发送 OCS相关的计费信息, 该信息中可进 一步携带需要 CRF下发给 TPF的重鉴权事件。  Step 601: The OCS sends an OCS-related charging information to the CRF, where the information may further carry a re-authentication event that is sent to the TPF by the CRF.

CRF接收到重鉴权事件后,向 TPF下发的触发事件中可包含相应的 重鉴权事件, 此时, TPF可仅对触发事件进行监测, 并在触发事件发生 时向 CRF上报; CRF根据 TPF上报的触发事件, 判断该触发事件是否 为重鉴权事件, 是否需要 TPF发起重鉴权流程, 请求 OCS对用户进行 重鉴权。  After the CRF receives the re-authentication event, the trigger event sent to the TPF may include a corresponding re-authentication event. At this time, the TPF may only monitor the trigger event and report it to the CRF when the trigger event occurs; The triggering event reported by the TPF determines whether the triggering event is a re-authentication event. Whether the TPF needs to initiate a re-authentication process requests the OCS to re-authenticate the user.

步骤 602: CRF向 OCS发送响应消息。  Step 602: The CRF sends a response message to the OCS.

下面以一应用实例为例对上述过程作进一步描述 , 例如,在 CRF中 预先配置计费规则变化重鉴权事件( charging rule is changed ),或是 OCS 向 CRF发送 OCS相关的计费信息时携带有计费规则变化重鉴权事件, 此时, CRF获知计费规则发生变化时需要 TPF发起重鉴权流程。 另夕卜, 运营商对用户进行分区域计费, 即运营商根据用户使用业务时所在地域 范围的不同, 对用户采用不同的费率进行计费, 此时, TPF监测到触发 事件中的 SGSN变化事件发生后上报给 CRF, 进一步地, TPF可向 CRF 提供用户当前所在 SGSN的地址信息, CRF根据 SGSN变化事件及用户 当前所在 SGSN的地址信息, 获知用户在当前所在地域范围使用业务的 费率, 然后对计费规则进行修改, 如对计费规则中的计费键(charging key )进行修改, 使用新的计费键来指示当前费率。 并且, CRF 判断出 该 SGSN变化事件引起了计费规则的改变,根据 CRF获取到的重鉴权事 件信息, 计费规则发生变化时需要 TPF发起重鉴权流程, 此时, CR 向 TPF下发新的计费规则以及重鉴权指示, 该重鉴权指示中可进一步携带 有重鉴权事件信息, 如计费规则改变, 用以经由 TPF通知 OCS触发当 前重鉴权的原因。 TPF根据收到的计费规则中的过滤器(Filter )过滤出 相应的 IP数据流, 然后应用相应计费规则对过滤出的 IP数据流进行计 费。 TPF根据重鉴权指示, 请求 OCS对用户进行重鉴权, OCS对用户 的信用重新进行计算并向 TPF返回。 The following process is further described by using an application example as an example. For example, the charging rule is changed in the CRF, or the charging rule is changed when the OCS sends the OCS-related charging information to the CRF. There is a charging rule change re-authentication event. At this time, the CRF needs to trigger the re-authentication process when the charging rule changes. In addition, the operator performs sub-regional charging for the user, that is, the operator charges the user at different rates according to the range of the local area when the user uses the service. At this time, the TPF detects the SGSN in the trigger event. After the change event occurs, the CRF is reported to the CRF. Further, the TPF can provide the CRF with the address information of the SGSN where the user is currently located. The CRF learns the rate of the service used by the user in the current local area according to the SGSN change event and the address information of the SGSN where the user is currently located. Then, the charging rule is modified, such as modifying the charging key in the charging rule, and using the new charging button to indicate the current rate. In addition, the CRF determines that the SGSN change event causes a change in the charging rule. According to the re-authentication event information obtained by the CRF, the TPF needs to initiate a re-authentication process when the charging rule changes. The new charging rule and the re-authentication indication may further carry the re-authentication event information, such as the charging rule change, to notify the OCS via the TPF to trigger the reason of the current re-authentication right. The TPF filters out the filter based on the received charging rule (Filter). The corresponding IP data stream is then charged by the corresponding charging rule for the filtered IP data stream. The TPF requests the OCS to re-authenticate the user according to the re-authentication indication, and the OCS recalculates the credit of the user and returns to the TPF.

图 7示出了本发明中承载修改时的在线计费流程图, 如图 7所示, 承载修改时的在线计费实现过程包括以下步骤:  FIG. 7 is a flowchart showing the online charging when the bearer is modified in the present invention. As shown in FIG. 7, the online charging implementation process when the bearer is modified includes the following steps:

步骤 701〜步骤 702与步骤 301〜步骤 302基本相同。  Step 701 to step 702 are basically the same as steps 301 to 302.

步骤 703〜步骤 708与步骤 502〜步骤 507基本相同。  Steps 703 to 708 are basically the same as steps 502 to 507.

步骤 709与步骤 405基本相同。  Step 709 is substantially the same as step 405.

在线计费时, 通过 TPF在 OCS分配的用户信用用尽时, 向 OCS上 报并请求新的用户信用机制,使得 OCS能够获知用户对某一业务的使用 情况, 如用户使用某一业务的时间长度, 或用户使用某一业务时发生的 数据流量。 运营商为鼓励用户更多地使用业务, 可采用一些优惠的计费 政策来吸引用户, 如用户使用某一业务的累积时间长度达到一定值时 , 或用户使用某一业务的数据流量达到一定值时, 对该用户使用相应业务 的费率进行调整为优惠费率, 此时, OCS可向 CRF提供确定计费规则 的输入信息, 通知 CRF对该用户使用相应业务采用新的费率进行计费。 CRF根据 OCS提供的确定计费规则的输入信息, 选择适当的计费规则 并下发给 TPF。  During online charging, when the user credit allocated by the OCS is exhausted by the TPF, the OCS reports and requests a new user credit mechanism, so that the OCS can know the usage of the service by the user, such as the length of time that the user uses a certain service. , or data traffic that occurs when a user uses a service. In order to encourage users to use more services, operators can use some preferential charging policies to attract users. For example, when the accumulated time length of a certain service is reached, the data traffic of a certain service reaches a certain value. At this time, the rate of the corresponding service is adjusted to the preferential rate. At this time, the OCS can provide the CRF with input information for determining the charging rule, and notify the CRF to use the new service rate for the user to use the corresponding service. . The CRF selects an appropriate charging rule and sends it to the TPF according to the input information of the charging rule provided by the OCS.

另外, AF也可向 CRF提供确定计费规则的输入信息, 例如, 某业 务使用分时计费, 如在同一天的不同时段用户使用该业务的费率不同, 当 AF确定用户使用某业务进入优惠时段时, 此时, AF可向 CRF提供 确定计费规则的输入信息,通知 CRF对该用户使用相应业务采用新的费 率进行计费。 CRF根据 AF提供的确定计费规则的输入信息, 选择适当 的计费规则并下发给 TPF。  In addition, the AF may also provide the CRF with input information for determining the charging rule. For example, a service uses time-sharing charging, for example, the rate of the user using the service is different at different times on the same day, and the AF determines that the user uses a certain service to enter. At the time of the preferential period, at this time, the AF may provide the CRF with input information for determining the charging rule, and notify the CRF to use the new service rate for the user to use the corresponding service for charging. The CRF selects the appropriate charging rule and sends it to the TPF based on the input information of the charging rule provided by the AF.

本发明中, 在线计费情况下, 当 CRF收到来自外部的、 用于确定计 费规则的输入信息, 可向 TPF主动下发适当的计费规则, 并且, CRF可 根据输入信息确定是否需要 TPF发起重鉴权流程, 如果需要, 则向 TPF 下发重鉴权指示, 具体实现过程如图 8所示: In the present invention, in the case of online charging, when the CRF is received from the outside, it is used for determining The input information of the fee rule can be used to deliver the appropriate charging rule to the TPF, and the CRF can determine whether the TPF needs to initiate the re-authentication process according to the input information. If necessary, the re-authentication indication is sent to the TPF, and the specific implementation is implemented. The process is shown in Figure 8:

步骤 801 : CRF 收到某个内部或外部的事件 (Internal or External Trigger Event ), 以及与该事件相关的信息, 如 AF或 OCS向 CRF发送 计费规则选择输入信息的事件。  Step 801: The CRF receives an internal or external Trigger Event and information related to the event, such as an event in which the AF or OCS sends a charging rule selection input information to the CRF.

步骤 802: CRF根据获取的输入信息选择适当的计费规则。 这些输 入信息可为 AF提供的计费相关输入信息, 例如, 用户使用 AF提供的 某一业务, 该 务对计费有特殊要求, 如计费费率与其他业务的计费费 率不同, 因此, AF向 CRF提供与该业务相关的计费输入信息; 也可为 TPF提供的计费相关输入信息; 也可为 OCS提供的计费相关输入信息; 并且, CRF判断是否需要 TPF发起重鉴权流程, 如果需要, 则步骤 803 中需要向 TPF下发重鉴权指示,重鉴权指示中可进一步携带有重鉴权事 件信息, 用以经由 TPF通知 OCS触发当前重鉴权的原因, 否则, 步驟 803中无需向 TPF下发重鉴权指示, 且步骤 805〜步骤 806可省略。  Step 802: The CRF selects an appropriate charging rule according to the obtained input information. The input information may be the charging related input information provided by the AF. For example, the user uses a certain service provided by the AF, and the service has special requirements for charging, for example, the charging rate is different from the charging rate of other services, so The AF provides the CRF with the charging input information related to the service; the charging related input information provided by the TPF; or the charging related input information provided by the OCS; and the CRF determines whether the TPF needs to initiate the re-authentication The process, if necessary, in step 803, the re-authentication indication is sent to the TPF, and the re-authentication indication may further carry the re-authentication event information, so as to notify the OCS via the TPF to trigger the current re-authentication reason. Otherwise, In step 803, the re-authentication indication is not required to be sent to the TPF, and steps 805 to 806 may be omitted.

步骤 803:如果计费规则发生变化, CRF向 TPF发送提供计费规则, 该提供计费规则中可携带有选定的计费规则、 计费规则操作指示和重鉴 权指示。  Step 803: If the charging rule changes, the CRF sends a charging rule to the TPF, where the charging rule can carry the selected charging rule, the charging rule operation indication, and the re-authentication indication.

步骤 804: TPF收到提供计费规则后,根据计费规则操作指示对 CRF 选定的计费规则进行相应操作。  Step 804: After receiving the charging rule, the TPF performs corresponding operations on the charging rule selected by the CRF according to the charging rule operation indication.

步骤 805: TPF根据收到的提供计费规则中携带的重鉴权指示, 向 OCS发送信用请求(Credit Request ), 该信用请求中携带有用户的剩余 信用和相关的新的计费规则信息,请求 OCS重新计算用户的信用。信用 请求中可进一步携带有重鉴权指示中携带的重鉴权事件信息, 用以通知 OCS触发当前重鉴权的原因。 步骤 806: OCS收到信用请求后, 重新对用户的信用进行计算, 然 后向 TPF返回信用响应 ( Credit Response ), 如果 OCS计算出用户的信 用, 则该信用响应中携带有 OCS重新计算的用户信用, 如果 OCS未计 算出用户的信用, 则该信用响应中可携带有差错原因值。 Step 805: The TPF sends a credit request (Credit Request) to the OCS according to the re-authentication indication carried in the provided charging rule, where the credit request carries the remaining credit of the user and related new charging rule information. Request OCS to recalculate the user's credit. The re-authentication event information carried in the re-authentication indication may be further carried in the credit request to notify the OCS of the reason for triggering the current re-authentication right. Step 806: After receiving the credit request, the OCS recalculates the credit of the user, and then returns a credit response (Credit Response) to the TPF. If the OCS calculates the credit of the user, the credit response carries the user credit recalculated by the OCS. If the OCS does not calculate the credit of the user, the credit response may carry an error reason value.

总之, 以上所述仅为本发明的较佳实施例而已, 并非用于限定本发 明的保护范围。  In summary, the above description is only the preferred embodiment of the present invention and is not intended to limit the scope of the present invention.

Claims

权利要求书 Claim 1、一种进行重鉴权的处理方法,其特征在于,该方法包含以下步骤: Al、 CRF向 TPF提供重鉴权指示;  A method for processing re-authentication, characterized in that the method comprises the following steps: Al, CRF provide re-authentication indication to the TPF; Bl、 根据收到的重鉴权指示, TPF发起重鉴权流程。  Bl. According to the received re-authentication indication, the TPF initiates a re-authentication process. 2、 根据权利要求 1所述的方法, 其特征在于, 所述步驟 A1之前进 一步包括: CRF收到内部或外部的事件, 判断是否需要 TPF发起重鉴权 流程, 如果是, 则执行步骤 Al。  2. The method according to claim 1, wherein the step A1 further comprises: the CRF receiving an internal or external event, determining whether the TPF is required to initiate a re-authentication process, and if yes, performing step A1. 3、 根据权利要求 2 所述的方法, 其特征在于, 所述内部事件为: TPF监测到触发事件发生时, 向 CRF上报的触发事件。  The method according to claim 2, wherein the internal event is: a trigger event reported by the TPF to the CRF when the trigger event occurs. 4、 根据权利要求 2 所述的方法, 其特征在于, 所述外部事件为: OCS或 AF向 CR 提供的输入信息。  4. The method according to claim 2, wherein the external event is: input information provided by the OCS or the AF to the CR. 5、 根据权利要求 2 所述的方法, 其特征在于, 所述判断是否需要 TPF发起重鉴权流程为:判断接收到的事件是否匹配获取的重鉴权事件, 如果是, 则执行步驟 Al。  The method according to claim 2, wherein the determining whether the TPF is required to initiate the re-authentication process is: determining whether the received event matches the obtained re-authentication event, and if yes, performing step A1. 6、 根据权利要求 2 所述的方法, 其特征在于, 所述判断是否需要 TPF发起重鉴权流程为: 判断接收到的事件引发的事件是否匹配获取的 重鉴权事件, 如果是, 则执行步驟 Al。  The method according to claim 2, wherein the determining whether the TPF needs to initiate the re-authentication process is: determining whether the event triggered by the received event matches the obtained re-authentication event, and if yes, executing Step Al. 7、 根据权利要求 5所述的方法, 其特征在于, 所述重鉴权事件为: CRF中配置的重鉴权事件, 或 OCS向 CRF提供的重鉴权事件, 或以上 二者的组合。  The method according to claim 5, wherein the re-authentication event is: a re-authentication event configured in the CRF, or a re-authentication event provided by the OCS to the CRF, or a combination of the two. 8、根据权利要求 5所述的方法, 其特征在于, 所述重鉴权指示中进 一步包括: 重鉴权事件信息。  The method according to claim 5, wherein the re-authentication indication further comprises: re-authentication event information. 9、 根据权利要求 8所述的方法, 其特征在于, 步骤 B1中所述 TPF 发起重鉴权流程为: TPF请求 OCS对用户进行重鉴权。 The method according to claim 8, wherein the TPF initiates a re-authentication process in step B1: the TPF requests the OCS to re-authenticate the user. 10、 根据权利要求 7所述的方法, 其特征在于, 所述步骤 B1 中进 一步包括: TPF向 OCS提供重鉴权事件信息。 10. The method according to claim 7, wherein the step B1 further comprises: the TPF providing re-authentication event information to the OCS. 11、 根据权利要求 7所述的方法, 其特征在于, 所述步骤 B1之后 进一步包括: OCS重新对用户的信用进行计算,并向 TPF返回重新计算 后的用户信用。  The method according to claim 7, wherein the step B1 further comprises: the OCS recalculating the credit of the user, and returning the recalculated user credit to the TPF. 12、 一种重鉴权事件和触发事件的处理方法, 其特征在于, 该方法 包含以下步骤:  12. A method for processing a re-authentication event and a triggering event, characterized in that the method comprises the following steps: A2、 CRF收到内部或外部的事件, 判断是否需要 TPF发起重鉴权 流程, 如果是, 则执行步骤 B2;  A2. The CRF receives an internal or external event, and determines whether the TPF needs to initiate a re-authentication process. If yes, step B2 is performed; B2、 CRF 向 TPF提供重鉴权指示, 根据收到的重鉴权指示, TPF 发起重鉴权流程。  B2, the CRF provides a re-authentication indication to the TPF, and according to the received re-authentication indication, the TPF initiates a re-authentication procedure. 13、 根据权利要求 12所述的方法, 其特征在于, 所述内部事件为: TPF监测到触发事件发生时, 向 CRF上报的事件。  The method according to claim 12, wherein the internal event is: an event reported by the TPF to the CRF when the trigger event occurs. 14、 根据权利要求 12所述的方法, 其特征在于, 所述外部事件为: OCS或 AF向 CRF提供的输入信息。  14. The method according to claim 12, wherein the external event is: input information provided by the OCS or AF to the CRF. 15、根据权利要求 13所述的方法, 其特征在于, 所述触发事件是由 CRF向 TPF提供的。  The method according to claim 13, wherein the trigger event is provided by the CRF to the TPF. 16、 根据权利要求 13所述的方法, 其特征在于, 所述步骤 B2进一 步包括: TPF 将上报给 CRF 的触发事件作为重鉴权事件信息提供给 ocs。  The method according to claim 13, wherein the step B2 further comprises: the TPF providing the trigger event reported to the CRF as re-authentication event information to the ocs. 17、 根据权利要求 12所述的方法, 其特征在于, 步骤 A2中所述判 断是否需要 TPF发起重鉴权流程为:判断发生的触发事件是否匹配获取 的重鉴权事件, 如果是, 则执行步骤 B2。  The method according to claim 12, wherein the determining, in step A2, whether the TPF needs to initiate a re-authentication process is: determining whether the triggered event matches the acquired re-authentication event, and if so, executing Step B2. 18、根据权利要求 17所述的方法,其特征在于,所述重鉴权事件为: CRF中配置的重鉴权事件, 或 OCS向 CRF提供的重鉴权事件, 或以上 二者的组合。 The method according to claim 17, wherein the re-authentication event is: a re-authentication event configured in the CRF, or a re-authentication event provided by the OCS to the CRF, or more a combination of the two. 19、根据权利要求 17所述的方法, 其特征在于, 所述重鉴权指示中 进一步包括: 重鉴权事件信息。  The method according to claim 17, wherein the re-authentication indication further comprises: re-authentication event information. 20、根据权利要求 19所述的方法,其特征在于,步骤 B2中所述 TPF 发起重鉴权流程为: TPF请求 OCS对用户进行重鉴权。  The method according to claim 19, wherein the TPF initiates a re-authentication process in step B2: the TPF requests the OCS to re-authenticate the user. 21、 根据权利要求 20所述的方法, 其特征在于, 所述步驟 B2中进 一步包括: TPF向 OCS提供重鉴权事件信息。  The method according to claim 20, wherein the step B2 further comprises: the TPF providing re-authentication event information to the OCS. 22、 根据权利要求 19所述的方法, 其特征在于, 所述步骤 B2之后 进一步包括: OCS重新对用户的信用进行计算,并向 TPF返回重新计算 后的用户信用。  22. The method according to claim 19, wherein the step B2 further comprises: the OCS recalculating the credit of the user and returning the recalculated user credit to the TPF. 23、 根据权利要求 12所述的方法, 其特征在于, 所述步骤 B2之后 进一步包括: OCS重新对用户的信用进行计算, 并向 TPF返回重新计算 后的用户信用。  The method according to claim 12, wherein the step B2 further comprises: the OCS recalculating the credit of the user, and returning the recalculated user credit to the TPF.
PCT/CN2005/001231 2004-08-10 2005-08-10 A processing method for re-authorization and re-authorization event and event triggers Ceased WO2006015543A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200410070068.3 2004-08-10
CN 200410070068 CN1735023A (en) 2004-08-10 2004-08-10 Method for carrying out repetitive authority and processing repetitive authority event and triggering event

Publications (1)

Publication Number Publication Date
WO2006015543A1 true WO2006015543A1 (en) 2006-02-16

Family

ID=35839137

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/001231 Ceased WO2006015543A1 (en) 2004-08-10 2005-08-10 A processing method for re-authorization and re-authorization event and event triggers

Country Status (2)

Country Link
CN (1) CN1735023A (en)
WO (1) WO2006015543A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111093195A (en) * 2019-11-29 2020-05-01 北京长焜科技有限公司 Method for controlling authentication strategy

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183939B (en) * 2006-11-14 2010-06-09 中兴通讯股份有限公司 Re-authorization method based on multi-factor authentication
CN101291233B (en) * 2007-04-20 2011-04-20 华为技术有限公司 Method and system realizing event detection
CN107819925A (en) * 2017-11-15 2018-03-20 珠海市魅族科技有限公司 A kind of information transferring method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001091446A2 (en) * 2000-05-24 2001-11-29 Nokia Corporation Common charging identifier for communication networks
WO2003081843A1 (en) * 2002-03-27 2003-10-02 Telefonaktiebolaget Lm Ericsson (Publ) Charging in a communications network
EP1422866A1 (en) * 2002-11-25 2004-05-26 Swisscom AG Process and apparatus for determining cost data for the billing of datatransport

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001091446A2 (en) * 2000-05-24 2001-11-29 Nokia Corporation Common charging identifier for communication networks
WO2003081843A1 (en) * 2002-03-27 2003-10-02 Telefonaktiebolaget Lm Ericsson (Publ) Charging in a communications network
EP1422866A1 (en) * 2002-11-25 2004-05-26 Swisscom AG Process and apparatus for determining cost data for the billing of datatransport

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111093195A (en) * 2019-11-29 2020-05-01 北京长焜科技有限公司 Method for controlling authentication strategy

Also Published As

Publication number Publication date
CN1735023A (en) 2006-02-15

Similar Documents

Publication Publication Date Title
US20070185809A1 (en) Method and system for processing online charging
US7889650B2 (en) Method for establishing diameter session for packet flow based charging
US8798575B2 (en) Method for improving service data flow based charging and system thereof
WO2005096547A1 (en) A method for controlling the charging of the packet data service
JP4402714B2 (en) How to handle event triggers and re-authentication triggers in flow-based billing
JP4482030B2 (en) Re-authentication processing method based on charging of packet data flow
WO2005099184A1 (en) A method for improving charging rules in packet data services and the operation thereof
CN100527676C (en) Processing method and system based on group data stream charge
CN100401675C (en) A method for processing billing information
CN100546248C (en) A method for realizing packet data service charging and controlling service access
WO2006015543A1 (en) A processing method for re-authorization and re-authorization event and event triggers
CN100397821C (en) Processing method based on packet data flow charging
WO2006060964A1 (en) A system and processing method for charging based on the packet data flow
WO2011127666A1 (en) Processing methode, device and system for charging
CN100438412C (en) Method for processing charging key
CN101159567A (en) A processing method in charging based on packet data flow
CN100362794C (en) A Credit Control Method Based on Service Data Flow Online Charging
WO2012041148A1 (en) Method and system for monitoring volume usage
CN101145917A (en) A method for processing billing keys
WO2006015550A1 (en) A method for distributing the dialog number of the charging based on the packet data flow

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase