WO2010060356A1 - 一种移动受限终端紧急业务的管理方法、装置与*** - Google Patents

一种移动受限终端紧急业务的管理方法、装置与*** Download PDF

Info

Publication number
WO2010060356A1
WO2010060356A1 PCT/CN2009/074924 CN2009074924W WO2010060356A1 WO 2010060356 A1 WO2010060356 A1 WO 2010060356A1 CN 2009074924 W CN2009074924 W CN 2009074924W WO 2010060356 A1 WO2010060356 A1 WO 2010060356A1
Authority
WO
WIPO (PCT)
Prior art keywords
emergency service
sfa
emergency
context
identifier
Prior art date
Application number
PCT/CN2009/074924
Other languages
English (en)
French (fr)
Inventor
梁文亮
卢磊
李波杰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2010060356A1 publication Critical patent/WO2010060356A1/zh
Priority to US13/114,406 priority Critical patent/US8229391B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/50Connection management for emergency connections

Definitions

  • the present invention claims to be submitted to the Chinese Patent Office on November 26, 2008, and the application number is 200810217683. 0, the invention name is "a mobile limited terminal emergency service” The priority of the Chinese Patent Application, which is incorporated herein by reference.
  • TECHNICAL FIELD The present invention relates to the field of communications technologies, and in particular, to a method, apparatus, and system for managing emergency services of mobile restricted terminals.
  • BACKGROUND OF THE INVENTION WiMAX (Worldwide Interoperabior for Microwave Access) technology is an air interface standard based on the IEEE 802.16 series of broadband wireless standards.
  • the wireless side of the current WiMAX network is mainly based on the IEEE 802.16d/e standard; the 802.16d standard defines the MAC (Medium Access Control) layer of the fixed broadband wireless access system supporting multiple service types and corresponding Multiple physical layer frameworks; The 802.16e standard adds some new features to the 802.16d standard to support user mobility.
  • Figure 1 is a WiMAX network architecture reference model, which mainly includes three parts: a client (mobi le station/ subscriber station, referred to as MS/SS, ie, mobile terminal/registered terminal), and an access service network (ASN). And the Connectivity Service Network (CSN).
  • MS/SS mobile le station/ subscriber station
  • ASN access service network
  • CSN Connectivity Service Network
  • the ASN may include a base station (BS) and an access service network gateway (ASN GW); the CSN may include a PPS (Prepaid Service) server, AAA (Authorization, Authentication and Accounting) , authentication, authorization and billing) Logical entities such as the server.
  • BS base station
  • ASN GW access service network gateway
  • PPS Prepaid Service
  • AAA Authorization, Authentication and Accounting
  • Logical entities such as the server.
  • the logical entities between the MS/SS, the ASN, and the CSN communicate through the interface from R1 to R6, as shown in Figure 1, where the R1 interface is a wireless air interface, mainly defined by IEEE802.16d/e.
  • R2 is a logical interface, and R3, R4, and R5 interfaces are wired interfaces.
  • WiMAX networks can support three application scenarios of MS, namely fixed scenes, nomadic scenes and moving scenes.
  • the inventor has found that when the MS is in a fixed scenario or a nomadic scenario, the prior art cannot implement management of an ES (Emergency Service) service of the mobile restricted terminal MS.
  • ES Error Service
  • the embodiment of the invention discloses a method, a device and a system for managing an emergency service of a mobile restricted terminal, so as to implement management of an emergency service of the mobile limited terminal MS.
  • a method for managing emergency services of mobile restricted terminals comprising:
  • the anchor service flow authorization entity A-SFA obtains emergency service information or an emergency service identifier, and the emergency service information or the emergency service identifier is used to indicate that the mobile service is provided to the mobile limited terminal MS;
  • the data path registration request carries the emergency service identifier
  • the emergency service information is obtained, generating an emergency service identifier according to the emergency service indicator or the emergency service information, and carrying the generated emergency service identifier in the data path registration request.
  • a management device for an emergency service of a mobile restricted terminal comprising an acquisition module, a context maintenance module, and a sending module, wherein:
  • the obtaining module is configured to obtain emergency service information or an emergency service identifier.
  • the context maintenance module is configured to construct an emergency service indicator in the context of the terminal MS according to the emergency service information or the emergency service identifier acquired by the acquiring module;
  • the sending module is configured to send a data path registration request to the base station BS or send a resource reservation request to the service service flow authorization entity S-SFA. If the acquisition module obtains the emergency service identifier, the data path is registered. And the emergency service identifier is carried in the request or the resource reservation request, or the emergency service indicator obtained by the acquiring module is obtained according to the emergency service indicator of the context maintenance module or the acquiring module. The emergency service identifier generated by the emergency service information, and the generated emergency service identifier is carried in the data path registration request or the resource reservation request.
  • a base station includes a receiving module, a context maintenance module, and a mobility restriction policy execution module, where the receiving module is configured to receive an emergency service identifier from an access network gateway;
  • the context maintenance module is configured to construct an emergency service indicator in a context of the terminal MS according to the emergency service information or the emergency service identifier received by the receiving module;
  • the mobility restriction policy execution module is configured to suspend execution of a mobility restriction policy for the MS according to an emergency service indicator in a context of the MS in the context maintenance module.
  • a management system for mobile limited terminal emergency services comprising an access network gateway ASN GW and a base station BS communicably connected thereto
  • the ASN GW is configured to obtain emergency service information or an emergency service identifier, where the emergency service information or the emergency service identifier is used to indicate that the mobile limited terminal MS is provided with an emergency service;
  • the data path registration request carries the emergency service identifier, or according to the emergency service indicator or the emergency service information Generating an emergency service identifier, and carrying the generated emergency service identifier in the data path registration request;
  • the BS is configured to construct an emergency service indicator in the context of the MS maintained by itself according to an emergency service identifier from the ASN GW, and suspend execution of a mobility restriction policy for the MS.
  • the A-SFA can obtain emergency service information or an emergency service identifier, and indicate that the service initiated by the MS is an emergency service by constructing an emergency service indicator in the context of the MS.
  • an emergency service indicator in the context of the MS.
  • FIG. 2 is a schematic diagram of an application network model according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for managing an emergency service of a mobile restricted terminal according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a method for managing an emergency service of a mobile restricted terminal according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a method for managing an emergency service of a mobile restricted terminal according to an embodiment of the present invention
  • FIG. 6 is a flowchart of a method for managing an emergency service of a mobile restricted terminal according to an embodiment of the present invention
  • FIG. 7 is a flowchart of a method for managing an emergency service of a mobile restricted terminal according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a device for managing an emergency service of a mobile restricted terminal according to an embodiment of the present invention
  • FIG. 9 is a schematic structural diagram of a base station according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a management system for an emergency service of a mobile restricted terminal according to an embodiment of the present invention.
  • IMS Internet protocol multimedia subsystem
  • P-CSCF Proxy-Cal l Session Control Function
  • SIP Session Initiation Protocol
  • the P-CSCF functions as an AF (Appl ication Function) when interconnected with a PCC (Pol icy and Charging Control) system.
  • the illustrated E-CSCF represents an SCCF that specifically manages the ES in the system, and a BP Emergency-Cal l Session Control Function, which is connected to the ES network.
  • Other network elements of the IMS system are not shown in Figure 2.
  • the MS uses the IMS system through the P-CSCF.
  • the existing technology is used for the use of the IMS system, and details are not described herein again.
  • a PCC system can be deployed in the network.
  • the PCR Pul icy Control and Charging Rules Function
  • the fusion which is located in the CSN, mainly functions as dynamic QoS policy control and flow-based charging control, and also provides authorization control function based on user subscription information, that is, according to the P-CSCF or PCEF (Pol icy and Charging Enforcement) Function, policy and accounting enforcement function entity) Provides resource description information and SPR located in CSN
  • PCC Rules Policy rules
  • PCEF Policy rules
  • A-SFA Anchor-Service Flow Authorization
  • S-SFA Server-Service Flow Authorization
  • an embodiment of the present invention discloses a method for managing an emergency service of a mobile restricted terminal.
  • the mobility policy is restricted to be applied only to the fixed A scene or a nomadic scene is called a mobile limited terminal.
  • MS mobile limited terminal
  • the network access zone of the fixed access user is the identity or regional information of one or more BSs associated with the network subscription; the network access zone of the nomadic user may span a large geographical area, and the user may be in different geographic regions. Location access to the network. Due to the existence of the mobility limitation, the MS may be limited in its use of the ES service and cannot succeed.
  • the technical solution disclosed in the embodiment of the present invention provides a method for managing an ES requested by a mobile restricted terminal to implement management of an emergency service of the mobile restricted terminal MS. It should be noted that, in the embodiment of the present invention, the MS may access any BS when initiating the ES, and does not limit whether the BS is located in the network access area of the MS. The method is as shown in FIG.
  • Step 301 The anchor service flow authorization entity A-SFA obtains emergency service information or emergency service identifier for providing emergency services for the terminal MS.
  • the manner in which the A-SFA obtains the emergency service information or the emergency service identifier may be at least the following:
  • the A-SFA is sent from the voice service provider VSP to initiate an emergency service bearer channel and an indication of service flow establishment.
  • the indication includes the emergency service information; or, receiving an access permission indication from the AAA server, where the access permission indication carries the emergency service identifier; or receiving the function entity from the policy control and charging rule PCRC PCC (Policy and Charging
  • Step 302 Construct an emergency service indicator in the context of the MS that is maintained by itself according to the emergency service information or the emergency service identifier.
  • the emergency service information is used in the prior art to indicate that a certain service is for emergency services, such as a SIP (Session Initiation Protocol), and a URI (Uniform Resource Identifier) in each message.
  • SIP Session Initiation Protocol
  • URI Uniform Resource Identifier
  • NAI Network Access Identifier
  • the emergency service identifier is a cell defined in the embodiment of the present invention, and is represented by an ES-flag in the subsequent embodiment. The ES-flag is used to indicate that the message in which it is located is a message applied to an emergency service, and the service triggered by the message is an emergency service.
  • the ES-flag may be generated by a network element in the network according to the emergency service information.
  • the emergency service indicator is an attribute in the context of an MS defined by an embodiment of the present invention.
  • the emergency service indicator is an indication bit (ES bit ) as an example.
  • an emergency service indicator is constructed corresponding to the described in the context of the MS, indicating that the MS for which the context of the MS in which it is located is using the emergency service (ES); when it is cleared, corresponding
  • the emergency service indicator is cleared in the context of the MS to indicate that the MS for which the context of the MS in which it is located does not use emergency services.
  • each network element that performs the mobility restriction policy on the network side is set according to the ES bit, suspends execution of the mobility restriction policy for the MS, and is cleared according to the ES bit, and resumes execution.
  • the mobility restriction policy of the MS may be defined.
  • the network element responsible for maintaining the context of the MS on the network side may set the ES bit in the context of the MS it maintains according to the ES-flag in the message received by the network, or may be based on the MS maintained by itself. In the case where the ES bit in the context is set, the ES-Flag is carried in the message sent to other network elements.
  • the use of the ES bit to represent the emergency service indicator is merely for convenience of illustration.
  • the ES bit may adopt other technical means for indicating a specific attribute in the prior art.
  • a field may be used, and a specific field value is set to represent the corresponding information.
  • the A-SFA obtains the emergency service identifier in the step 301, the data service registration request sent to the BS in the step is the emergency service identifier, or if the emergency service identifier is used, If the A-SFA obtains the emergency service information, the A-SFA in the step generates an emergency service identifier according to the emergency service indicator or the emergency service information, and generates the emergency service. The identification is carried in the data path registration request.
  • the A-SFA can obtain the emergency service information or the emergency service identifier for providing emergency services for the terminal MS, and indicate that the service initiated by the MS is urgent by constructing an emergency service indicator in the context of the MS.
  • the service then sends the emergency service identifier to the base station BS to implement management of the emergency service of the MS.
  • the following embodiments further describe the management method of the mobile restricted terminal emergency service in a manner of a preferred implementation.
  • the ES is controlled by the AAA to describe a management method for the emergency service of the mobile restricted terminal.
  • a PCC system may be deployed in the network, or the PCC system may not be deployed. Regardless of whether a PCC system is deployed in the network, the ES should be controlled by AAA.
  • the MS is in a normal online state before initiating the ES. The method is shown in Figure 4, and the specific steps are as follows:
  • the MS initiates an emergency service and establishes a connection with the VSP through the R2 interface.
  • This process is implemented by the prior art and will not be described here.
  • the VSP can discover that the service is an emergency service.
  • Step 401 The VSP triggers the A-SFA of the MS to initiate the establishment of the ES service flow.
  • the emergency service information is delivered to the A-SFA to indicate that the service is an emergency service.
  • the technology for implementing this step is prior art, and the specific message for implementing the trigger may be different according to different VoIP protocols.
  • the VSP may send a SIP OK message to the A-SFA, and the URI in the SIP OK message is set to an ES URN to indicate that the service is an emergency service.
  • Step 402 The A-SFA sets the emergency service indicator ES bit in the context of the MS according to the emergency service information, and initiates establishment of a service flow for carrying the ES service.
  • the ES bit is defined in the embodiment of the present invention, when it is set in the context of the MS, indicating that the mobility restriction policy of the MS is suspended.
  • the Authenticator located with the A-SFA may suspend the mobility restriction policy for the MS in this step.
  • Step 403 The A-SFA sends an RR-Req (Resource Reservation) message to the S-SFA (Serving-Service Flow Authorization) to establish a service flow carrying the ES. –
  • the Req message carries the emergency service identifier ES-Flag.
  • the ES_Flag is generated by the A_SFA according to the emergency service information or the set ES bit. It should be noted that the A-SFA and the S-SFA may also be located in the same ASN GW. If the A-SFA and the S-SFA are located in the same ASN GW, this step may omit or use the internal protocol of the ASN GW. achieve.
  • Step 404 The S-SFA sets an ES bit in a context of an MS maintained by itself according to the ES-flag, and sends the service flow information and the ES-flag in the RR-Req message to the BS.
  • the sending manner may be: encapsulating the service flow information in the RR_Req message and the ES-flag carried in the Path_Reg_Req
  • Step 405 The BS sets an ES bit in the context of the MS that it maintains according to the ES-flag, and sends a DSA-Req (Dynamic service addition) message to the MS to establish an air interface carrying the ES. business flow.
  • the BS may suspend performing a mobility restriction policy for the MS in this step.
  • Step 406 The MS sends a DSA_Rsp (Dynamic Service Addition) message to the BS as a reply.
  • DSA_Rsp Dynamic Service Addition
  • Step 407 The BS sends a Path_Reg_Rsp (Data Path Registration Response) message to the S-SFA as a reply.
  • Step 408 The S-SFA sends an RR—Rsp (Resource Reservation) message to the A-SFA as a reply.
  • the A-SFA and the S-SFA may also be located in the same ASN GW. If the A-SFA and the S-SFA are located in the same ASN GW, this step may omit or use the internal protocol of the ASN GW. achieve.
  • the Authenticator located in step 402 with the A-SFA does not suspend execution of the mobility restriction policy for the MS, the Authenticator located with the A-SFA in this step pauses to perform mobility for the MS. Restriction strategy. It should be noted that the Authenticator suspending execution of the mobility restriction policy for the MS and the A-SFA sending the RR_Ack message to the S-SFA does not have a strict timing relationship. It should be noted that the A-SFA and the S-SFA may also be located in the same ASN GW. If the A-SFA and the S-SFA are located in the same ASN GW, this step may omit or use the internal protocol of the ASN GW. achieve.
  • Step 410 The S-SFA sends a Path_Reg_Ack (Data Channel Registration Response) message to the BS as a response. If the S-SFA in step 404 does not suspend execution of the mobility restriction policy for the MS, the S-SFA in this step suspends execution of the mobility restriction policy for the MS. It should be noted that the S-SFA suspension execution of the mobility restriction policy for the MS does not have a strict timing relationship with the sending of the Path_Reg_Ack message to the BS.
  • Path_Reg_Ack Data Channel Registration Response
  • Step 411 The BS sends a DSA_Ack (Dynamic Service Addition) message to the MS as a response. If the BS does not suspend execution of the mobility restriction for the MS in step 405 The policy, the BS in this step suspends the mobility restriction policy for the MS. It should be noted that the BS suspension execution of the mobility restriction policy for the MS does not have a strict timing relationship with the sending of the DSA_Ack message to the MS.
  • Step 412 The MS uses an emergency service.
  • Step 413 The MS emergency service ends.
  • the A-SFA may clear the ES bit in the context of the MS maintained by itself, and initiate a process of deleting the data channel and the service flow for carrying the ES service.
  • the Authenticator located with the A-SFA may resume performing a mobility restriction policy for the MS.
  • Step 414 The A-SFA sends an RR-Req (Resource Reservation) message to the S-SFA, and deletes the service flow carrying the ES. It should be noted that the A-SFA and the S-SFA may also be located in the same ASN GW. If the A-SFA and the S-SFA are located in the same ASN GW, this step may omit or use the internal protocol of the ASN GW. achieve.
  • Path-DeReg_Req Data Channel Deregistration Request
  • the S-SFA may clear the ES bit in the context of the MS maintained by itself, and resume performing the mobility restriction policy for the MS.
  • Step 416 The BS sends a DSD-Req (Dynamic Service Delete) message to the MS, and deletes the air interface service flow that carries the ES.
  • the BS may clear the ES bit in the context of the MS maintained by itself, and resume performing the mobility restriction policy for the MS.
  • Step 418 The BS sends a Path_DeReg_Rsp (Data Channel Logout Response) message to the S-SFA as a reply.
  • Step 419 The S-SFA sends an RR-Rsp (Resource Reservation) message to the A-SFA as a reply. It should be noted that the A-SFA and the S-SFA may also be located in the same ASN GW. If the A-SFA and the S-SFA are located in the same ASN GW, this step may omit or use the internal protocol of the ASN GW. achieve. Step 420: The A-SFA sends an RR_Ack (Resource Reservation) message to the S-SFA as a response. If the A-SFA does not clear the ES bit in the context of the MS maintained by itself in step 413, in this step, the A-SFA clears the ES bit in the context of the MS maintained by itself.
  • RR_Ack Resource Reservation
  • the Authenticator in which the A-SFAs are located together resumes the mobility restriction policy for the MS. Or the Authenticator located with the A-SFA does not resume performing the mobility restriction policy for the MS in step 413, and in this step, the Authenticator resumes performing the mobility restriction policy for the MS. It should be noted that the Authenticator resumes execution of the mobility restriction policy for the MS and does not have a strict timing relationship with the sending of the RR_Ack message to the S-SFA. It should be noted that the A-SFA and the S-SFA may also be located in the same ASN GW. If the A-SFA and the S-SFA are located in the same ASN GW, this step may omit or use the internal protocol of the ASN GW.
  • Step 421 The S-SFA sends a Path_DeReg_Ack (Data Channel Logout Answer) message to the BS as a response. If the S-SFA does not clear the ES bit in the context of the MS maintained by itself in step 415, and resumes performing the mobility restriction policy for the MS, then the ES in the context of the MS maintained by itself in this step The bit is cleared, and the mobility restriction policy for the MS is resumed. It should be noted that the S-SFA resumes execution of the mobility restriction policy for the MS and does not have a strict timing relationship with the sending of the Path_DeReg_Ack message to the BS.
  • Path_DeReg_Ack Data Channel Logout Answer
  • Step 422 The BS sends a DSD_Ack (Dynamic Service Delete) message to the MS as a response. If the BS does not clear the ES bit in the context of the MS maintained by itself in step 416, and resumes performing the mobility restriction policy for the MS, then in this step, the ES bit in the context of the MS maintained by itself is cleared. Zero, resumes execution of the mobility restriction policy for the MS. It should be noted that the BS resumes performing the mobility restriction policy for the MS and does not have a strict timing relationship to send the DSD_Ack message to the MS.
  • DSD_Ack Dynamic Service Delete
  • Step 423 Optionally, if the network side finds that the MS is already outside the network access area, the MS network revocation process is initiated, and the MS completes the network retreat according to the prior art.
  • the A-SFA may set the ES bit in the context of the MS maintained by itself according to the ES-Flag. And sending the ES-Flag to the S-SFA and the BS, and defining that the ES bit is set in the context of the MS, suspending execution of the mobility restriction policy for the MS, so that the MS can be used normally ES business. Further, after the ES service is completed, the mobility restriction policy may be resumed.
  • the MS is in the normal online state when the ES is initiated.
  • the MS may not be in the network when it initiates the ES.
  • the following embodiment discloses a technical solution when the MS does not launch the ES when it is not in the network.
  • the ES is controlled by the AAA to describe a management method for the emergency service of the mobile restricted terminal.
  • a PCC system may be deployed in the network, or the PCC system may not be deployed. Regardless of whether a PCC system is deployed in the network, the ES should be controlled by AAA. The method is as shown in FIG.
  • Step 501 The MS needs to perform an emergency service, discovers and selects a network, and initiates a network access process.
  • Step 503 The ES policy and the hotline service policy installed by the service provider in the background are saved on the AAA server.
  • the AAA server performs authentication and authorization on the emergency service of the MS according to the ES policy, and sends an Access Accept message to the Authenticator located in the ASN GW, where the access permission message carries the MS for the MS Mobility limit parameters and emergency service identity ES-Flag.
  • Step 504 The Authenticator provides an optional hotline service according to the policy delivered by the AAA server. This step is an optional step.
  • the hotline service is a service provided by the network side to the terminal according to its own policy in a special case. For example, in the case of a terminal arrears, for the emergency call service, the network side provides the service provided by the terminal.
  • Step 505 The service flow is established or modified between the ASN GW and the BS for the service, and the ES_Flag is delivered to the BS.
  • the SFA on the ASN GW that is located together with the Authenticator sets an emergency service indicator ES bit in the context of the MS maintained by the ES-flag, and the Authenticator pauses execution for the MS.
  • the mobility restriction policy; the SFA encapsulates the service flow information of the session and the ES-flag in a Path_Reg_Req (Data Path Registration Request) message, and sends the message to the BS;
  • the ES bit in the context is set, and the mobility restriction policy for the MS is suspended.
  • the registration of the data path is further completed between the BS and the S-SFA according to the prior art process.
  • the SFA may be divided into A-SFA and S-SFA deployed on different ASNs.
  • the SFA located together with the Authenticator is called A-SFA, and the above steps are further.
  • the A-SFA performs an interaction with the S-SFA to establish a service flow, and sends the information to the S-SFA.
  • the resource reservation request message carries the ES-flag, indicating that the service is an emergency service, and the S-SFA sets the emergency service indicator ES bit in the context of the MS maintained by the S-SFA according to the ES-flag. And suspending performing a mobility restriction policy for the MS; the S-SFA sends the ES-Flag to the BS according to the foregoing interaction process between the SFA and the BS.
  • Step 506 The MS acquires an IP address.
  • Step 507 Optionally, if a PCC system is deployed in the network, the PC-EF and the PCRF jointly establish an IP-CAN (Internet Protocol-Connective Access Network) session.
  • IP-CAN Internet Protocol-Connective Access Network
  • the PCEF is actually formed by merging existing network elements in the WiMAX network, that is, the function of the PCEF in the PCC system is from the WiMAX network.
  • the existing network elements are implemented separately.
  • the A-SFA is established directly with the PCRF.
  • the accounting client (Accounting Client) located on the ASN GW sends an Accounting Start message to the AAA server, indicating that the emergency service is started.
  • the MS uses the emergency service through a VSP (Voice Service Provider).
  • VSP Voice Service Provider
  • Step 510 The emergency service ends, and each entity that maintains the context of the MS clears the ES bit in the context of the respective maintained MS, and resumes executing the mobility restriction policy for the MS.
  • the network side initiates re-authentication. In the re-authentication process, if the network side finds that the MS accesses outside the network access area, it initiates the MS network revocation process.
  • the AAA can indicate that the service is an emergency service by setting the ES-Flag, so that each network element maintains the MS itself according to the ES-Flag.
  • the mobility restriction policy of the MS is suspended, so that each network element suspends execution in the emergency service.
  • the MS's mobility restriction policy enables the MS to successfully complete emergency services. Further, after the ES service is completed, the mobility restriction policy may be resumed.
  • the above two embodiments illustrate the management method of the emergency service of the mobile restricted terminal by taking the ES in the network as an example of AAA control.
  • the ES may not be controlled by the AAA.
  • the implementation of the management method for the mobile service of the mobile restricted terminal in this scenario will be discussed below.
  • a scenario in which a PCC system is deployed in a network and the ES is controlled by a PCRF is taken as an example to describe a method for managing an emergency service of a mobile restricted terminal.
  • the MS is in a normal online state before initiating the ES. The method is as shown in FIG. 6.
  • Step 601 The MS initiates an emergency service, and sends a SIP INVITE CSession Initiation Protocol INVITE, a Session Initiation Protocol Invite message to the P-CSCF, and the URI (Uniform Resource Identifier) in the message , Universal Resource Identifier) is set to ES URN.
  • the ES URN is an attribute value, indicating that the current service is an emergency service.
  • Step 602 The P-CSCF identifies that the service is an emergency service according to the value of the URI of the SIP INVITE message as an ES URN. Once the P-SCSF identifies the service as an emergency service, by including in the SIP message
  • the Resource-Priority attribute value is used to set the high priority identifier.
  • the interaction between the P-SCSF and the E-CSCF is performed, and a high-priority session is established according to the existing process. The specific process is not described here.
  • Step 603 The P-CSCF instructs the PCRF to establish a high-priority bearer by setting a reservation priority attribute value, and indicates that the bearer is used for emergency services by setting an emergency service identifier ES_Flag.
  • the information exchange between the P-CSCF and the PCRF may be specifically performed through an existing Rx interface, and details are not described herein again.
  • Step 604 The PCRF and the A_PCEF (Anchor_Policy and Charging Enforcement Function) interact with the PCC message through the R3 interface, and deliver the ES-flag to the A-PCEF.
  • the PCEF is actually formed by merging existing network elements in the WiMAX network, that is, the function of the PCEF in the PCC system is from the WiMAX network.
  • the existing network elements are implemented separately.
  • the A-SFA is established directly with the PCRF.
  • Step 605 The A-SFA sets an emergency service indicator ES bit according to the ES-flag in the context of the MS maintained by itself, and the Authenticator located together with the A-SFA suspends execution of mobility of the MS. Restriction strategy.
  • Step 606 The S-SFA in the A-PCEF creates or modifies a service flow for the emergency service, and indicates that the service flow is directed to the emergency service.
  • the A-SFA carries the ES-Flag in the resource reservation request message that interacts with the S_SFA, indicating that the service is Emergency service; if the A-SFA and the S-SFA are located on the same ASN GW, the foregoing steps may be omitted or completed by the internal protocol of the GW.
  • the S-SFA sets an ES bit in the context of the MS maintained by itself according to the ES-flag, and suspends execution of a mobility restriction policy for the MS, and sends a Path_Reg_Req to the BS (data path) a registration request) message, the message carrying the ES-flag to indicate that the service flow is for emergency services, and the BS sets the ES bit in the context of the MS maintained by itself according to the ES-flag, and pauses Performing a mobility restriction policy for the MS; the Path-Reg-Rsp (Data Path Registration Response) message and the Path-Reg-Ack (data path) are further completed between the BS and the S-SFA according to the prior art process.
  • Step 607 The MS establishes an emergency service session through the E-CSCF.
  • Step 608 The emergency service ends, and the network side deletes the related service flow and the data path.
  • Step 609 The BS, the S-SFA, and the A-SFA clear the ES bit in the context of the MS that is maintained by itself, and the BS, the S-SFA, and the Authenticator resume performing the mobility restriction policy of the MS. It should be noted that this step and step 608 can also be performed simultaneously within the scope of the prior art.
  • Step 610 Optionally, if the BS currently accessed by the MS is not in the network access area, the network side initiates a network disconnection process of the MS.
  • the P-CSCF can set the emergency service identifier ES-Flag to indicate that the service is an emergency service, so that each network element is configured according to the method of the embodiment of the present invention.
  • the ES-Flag sets the ES bit in the context of the MS that is maintained by itself, and defines the ES bit in the context of the MS to be set, suspends the mobility restriction policy of the MS, so that each network element The mobility restriction policy of the MS is suspended in the emergency service, so that the MS successfully completes the emergency service. Further, after the ES service is completed, the mobility restriction policy may be resumed.
  • the processing method may be: before the step 601 of the embodiment shown in FIG. Steps 501 to 508 of the method are shown. It should be noted that, in step 503, the Accept Access message carries a mobility restriction parameter, The ES-Flag is not carried; In step 505, the ASN GW does not perform operations related to the ES-Flag or ES bit. Thereafter, it can be completely performed in accordance with the method of the embodiment shown in FIG. 6.
  • Step 701 The MS sends a MOB_MSHO_REQ (Mobile Station Handover Request) message to a serving base station (Serving BS), initiates a handover process, and the MOB_MSH0-REQ message Contains one or more possible target base station identifiers.
  • MOB_MSHO_REQ Mobile Station Handover Request
  • Step 702 The Serving BS finds that the ES bit in the context of the MS maintained by itself is set, and the mobility restriction policy of the MS has been suspended, and sends a HO_Req (Handover Request) message to one or more targets.
  • a base station (Target BS)
  • the HO_Req message carries a context of the MS
  • the context of the MS includes a mobility restriction parameter
  • the ES bit is already set, so that the target BS is suspended for the
  • the mobility restriction policy of the MS further completes the handover process.
  • the target base station may obtain an authorization key context of the MS by using a context request procedure with an Authenticator of the MS.
  • Step 704 Optionally, if the network supports the data path pre-registration mechanism, the Target BS may initiate a data path pre-establishment process with an Anchor DPF (Anchor Data Path Function entity).
  • Anchor DPF Anchor Data Path Function entity.
  • Step 705 The Target BS sends a HO-Rsp (Handover Response) message to the Serving BS, and responds to the handover request.
  • Step 706 The Serving BS sends a MOB_BSH0-RSP (Base Station Handover Response) message to the MS, where the MOB_BSH0-RSP message may include a switchable target base station selected by the network for the MS. Logo.
  • Step 707 The Serving BS sends a HO_Ack (Handover Answer) message to the Target BS, indicating that it has received the HO_Rsp (Handover Response) message.
  • the MS completes the handover according to the flow of the prior art. It should be noted that, this embodiment describes the problem that the MS performs handover in the process of using emergency services. For the processing of the MS after the handover is completed, reference may be made to the foregoing embodiment.
  • the Serving BS of the MS can transmit the context of the MS that is set by the ES bit to the Target BS, so that the mobility restriction policy of the MS can also be suspended and executed in the Target BS. Inter-BS handover during emergency service use to maintain continuity of emergency services.
  • the embodiment of the invention further discloses a management device for the emergency service of the mobile restricted terminal, so as to implement the method disclosed in the above embodiments.
  • the device includes a receiving module 800, a context maintenance module 802, and a sending module 804, where: the receiving module 800 is configured to obtain emergency service information or an emergency service identifier, the emergency service information or an emergency service identifier. It is used to indicate that emergency services are provided for the mobile limited terminal MS.
  • the context maintenance module 802 is configured to construct an emergency service indicator in the context of the terminal MS according to the emergency service information or the emergency service identifier acquired by the receiving module 800.
  • the emergency service information is obtained by the receiving module 800, according to the emergency service information, or if the receiving module 800 obtains the emergency service identifier, according to the emergency service identifier.
  • the sending module 804 is configured to send a data path registration request to the base station BS or send a resource reservation request to the service service flow authorization entity S-SFA. If the acquisition module 800 obtains the emergency service identifier, the data is sent.
  • the emergency service identifier is carried in the path registration request or the resource reservation request, or the emergency service indicator or the location according to the context maintenance module 802, if the acquisition module 800 obtains the emergency service information
  • the emergency service information generates an emergency service identifier
  • the generated emergency service identifier is carried in the data path registration request or the resource reservation request.
  • the device further includes: a mobility restriction policy execution module 806, configured to pause execution of mobility restrictions for the MS according to an emergency service indicator in a context of the MS in the context maintenance module 802. Strategy.
  • the device may be an access network gateway ASN GW including an A-SFA.
  • the receiving module 800 is configured to receive an indication or an access permission indication for initiating an emergency service bearer channel and service flow establishment carrying an emergency service identifier or
  • the PCC indicates that the mobility restriction policy enforcement module 806 can be an authenticator.
  • the device may also be an access network gateway ASN GW including an S-SFA.
  • the receiving module 800 is configured to receive a resource reservation request carrying an emergency service identifier.
  • the embodiment of the invention further discloses a base station for managing emergency services of the mobile restricted terminal to implement the method disclosed in the foregoing embodiments.
  • the base station includes a receiving module 900, a context maintenance module 902, and a mobility restriction policy enforcement module 904, wherein the receiving module 900 is configured to receive an emergency service identifier from an access network gateway.
  • the receiving module 900 may receive a data path registration request from an A-SFA or an S-SFA located at an access network gateway, where the data path registration request carries the emergency service identifier.
  • the context maintenance module 902 is configured to construct an emergency service indicator in the context of the terminal MS according to the emergency service information or the emergency service identifier received by the receiving module 900.
  • the mobility restriction policy execution module 904 is configured to use The emergency traffic indicator in the context of the MS in the context maintenance module 902 suspends execution of a mobility restriction policy for the MS.
  • the emergency service identifier received by the receiving module 900 can identify that the service is an emergency service, and the context maintenance module 902 of the MS sets an emergency in the context of the corresponding MS.
  • the service indicator, and the mobility restriction policy execution module 904 suspends execution of the mobility restriction policy for the MS to open the ES service for the MS.
  • the embodiment of the invention further discloses a management system for mobile restricted terminal emergency services, so as to implement the method disclosed in the foregoing embodiments.
  • the system includes an access network gateway ASN GW100 and a base station BS 102 communicably connected thereto, and the ASN GW 100 includes an A-SFA 1000 for acquiring emergency service information or an emergency service identifier.
  • the emergency service information or the emergency service identifier is used to indicate that the mobile restricted terminal MS is provided with an emergency service; and the emergency service indicator is constructed according to the emergency service information or the emergency service identifier in the context of the MS that is maintained by itself; Registering a request to the BS 102, if the emergency service identifier is obtained, the data path registration request carries the emergency service identifier, or generates an emergency according to the emergency service indicator or the emergency service information The service identifier, and the generated emergency service identifier is carried in the data path registration request.
  • the BS 102 is configured to construct an emergency service indicator in the context of the MS maintained by itself according to an emergency service identifier from the ASN GW 100, and suspend execution of a mobility restriction policy for the MS.
  • the ASN GW 100 further includes an authenticator 1002 located with the A-SFA 1000, where the authenticator 1002 is configured to perform the emergency according to the context of the MS on the A-SFA 1000.
  • the traffic indicator suspends execution of the mobility restriction policy for the MS.
  • the system may further include an ASN GW 104, where the ASN GW 104 includes a serving service flow authorization entity S-SFA 1040, and is communicably connected to the A-SFA 1000 and the BS 102 on the ASN GW 100.
  • the A-SFA 1000 is further configured to send a resource reservation request to the S-SFA 1040.
  • the resource reservation request carries the emergency service identifier, or if obtained, Generating an emergency service identifier according to the emergency service indicator or the emergency service information, and carrying the generated emergency service identifier in the data path registration request; the S-SFA 1040 Receiving a resource reservation request from the A-SFA 1000, constructing an emergency service indicator in the context of the MS maintained by the emergency service identifier carried in the resource reservation request, and suspending execution for the
  • the mobility restriction policy of the MS sends a data path registration request to the BS 102, where the emergency service identifier is carried in the data path registration request.
  • the BS 102 is further configured to construct an emergency service indicator in the context of the MS maintained by itself according to the emergency service identifier of the S-SFA from the ASN GW 102, and suspend execution of the mobility restriction policy for the MS.
  • the A-SFA 91000 can determine that the service is an emergency service by acquiring the emergency service identifier, and construct an emergency service indicator in the context of the MS that it maintains.
  • an authenticator 91002 located with the A-SFA 91000 suspends execution of a mobility restriction policy for the MS according to the emergency service indicator, and the A-SFA 10900 sends the emergency service identifier to the S - SFA9104004 and or BS906102, causing the S-SFA 90410 40 and BS 906 102 to construct an emergency traffic indicator in the context of their own maintained MS and to suspend execution of a mobility restriction policy for the MS to open the ES for the MS.
  • the A-SFA can identify the service as an emergency service by acquiring the emergency service identifier, and construct an emergency service in the context of the MS maintained by itself.
  • An indicator the Authent icator co-located with the A-SFA, suspends execution of a mobility restriction policy for the MS according to the emergency service indicator, and sends the emergency service identity to the S-SFA And the BS, causing the S-SFA and the BS to construct an emergency service indicator in the context of the MS maintained by itself, suspending execution of the mobility restriction policy for the MS, and opening the ES for the MS. Further, in the process of using the emergency service by the MS, handover can also be implemented. Further, after the emergency service is terminated by the MS, the execution of the mobility restriction policy for the MS may be resumed by clearing the emergency service indicator in the context of the MS, and the MS is found to be in the network on the network side. When the access area is outside, the MS network revocation process is initiated.
  • the present invention can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is a better implementation. the way.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk or the like includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Public Health (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种移动受限终端紧急业务的管理方法、 装置与*** 本申请要求于 2008年 11月 26日提交中国专利局、 申请号为 200810217683. 0、 发 明名称为 "一种移动受限终端紧急业务的管理方法、 装置与***"的中国专利申请的优 先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明属于通信技术领域, 尤其涉及一种移动受限终端紧急业务的管理方法、 装置 与***。 背景技术 WiMAX (Worldwide Interoperabi l ity for Microwave Access , 全球微波互联接入) 技术是以 IEEE 802. 16的系列宽频无线标准为基础提出的一种空中接口标准。当前 WiMAX 网络无线侧主要基于 IEEE 802. 16d/e标准; 802. 16d标准定义了支持多种业务类型的固 定宽带无线接入***的 MAC (Medium Access Control , 媒体接入控制) 层和相对应的多 个物理层框架; 802. 16e标准在 802. 16d标准的基础上增加了部分新功能, 以支持用户 的移动性。
图 1为 WiMAX网络架构参考模型, 主要包括三个部分: 客户端 (mobi le station/ subscriber station,简称 MS/SS,即移动终端 /注册终端)、接入业务网(Access Service Network , 简称 ASN) 及连接业务网 (Connectivity Service Network, 简称 CSN)。
其中, ASN可以包括基站(Base Station,简称 BS )和接入业务网网关(Access Service Network Gateway, 简称 ASN GW); CSN可以包括 PPS (Prepaid Service, 预付费) 服务 器、 AAA (Authorization, Authentication and Accounting, 认证、 授权禾口计费) 月艮 务器等逻辑实体。
在现有协议中, MS/SS、 ASN, CSN之间的逻辑实体间通过从 R1到 R6的接口来进行 通信, 如图 1, 其中 R1接口为无线空中接口, 主要由 IEEE802. 16d/e定义, R2为逻辑 接口, R3、 R4、 R5接口均为有线接口。
WiMAX网络可以支持 MS的三种应用场景, 即固定场景、游牧场景和移动场景。发明 人发现, 当 MS处于固定场景或者游牧场景时, 现有技术无法实现对移动受限终端 MS的 ES ( Emergency Service, 紧急业务) 服务的管理。 发明内容
本发明实施例公开了一种移动受限终端紧急业务的管理方法、 装置与***, 以实现 对移动受限终端 MS的紧急业务的管理。
一种移动受限终端紧急业务的管理方法, 包括:
锚定业务流授权实体 A-SFA获取紧急业务信息或者紧急业务标识, 所述紧急业务信 息或者紧急业务标识用于指示为移动受限终端 MS提供紧急业务;
根据所述紧急业务信息或者紧急业务标识在自身维护的所述 MS的上下文中构建紧 急业务指示符;
发送数据通路注册请求到基站 BS, 若获取的为所述紧急业务标识, 则所述数据通路 注册请求中携带所述紧急业务标识,
或者, 若获取的为所述紧急业务信息, 则根据所述紧急业务指示符或所述紧急业务 信息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路注册请求 中。
一种移动受限终端紧急业务的管理装置, 包括获取模块、 上下文维护模块和发送模 块, 其中:
所述获取模块用于获取紧急业务信息或者紧急业务标识;
所述上下文维护模块用于根据所述获取模块获取的所述紧急业务信息或者紧急业 务标识, 在终端 MS的上下文中构建紧急业务指示符;
所述发送模块用于发送数据通路注册请求到基站 BS或者发送资源预留请求到服务 业务流授权实体 S-SFA, 若所述获取模块获取的为所述紧急业务标识, 则所述数据通路 注册请求或资源预留请求中携带所述紧急业务标识, 或者, 若所述获取模块获取的为所 述紧急业务信息,则根据所述上下文维护模块的所述紧急业务指示符或所述获取模块获 取的紧急业务信息生成的紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据 通路注册请求或资源预留请求中。
一种基站, 包括接收模块, 上下文维护模块和移动性限制策略执行模块, 其中, 所述接收模块用于接收来自接入网网关的紧急业务标识;
所述上下文维护模块用于根据所述接收模块接收的所述紧急业务信息或者紧急业 务标识, 在终端 MS的上下文中构建紧急业务指示符;
所述移动性限制策略执行模块用于根据所述上下文维护模块中的所述 MS的上下文 中的紧急业务指示符暂停执行针对所述 MS的移动性限制策略。 一种移动受限终端紧急业务的管理***, 包括接入网网关 ASN GW和与之以可通信方 式连接的基站 BS,
所述 ASN GW用于获取紧急业务信息或者紧急业务标识, 所述紧急业务信息或者紧急 业务标识用于指示为移动受限终端 MS提供紧急业务;
根据所述紧急业务信息或者紧急业务标识在自身维护的所述 MS的上下文中构建紧 急业务指示符;
发送数据通路注册请求到所述 BS, 若获取的为所述紧急业务标识, 则所述数据通路 注册请求中携带所述紧急业务标识, 或者, 根据所述紧急业务指示符或所述紧急业务信 息生成的紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路注册请求 中;
所述 BS用于根据来自所述 ASN GW的紧急业务标识在自身维护的所述 MS的上下文中构 建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略。
通过应用本发明实施例公开的方法、 装置和***, A-SFA可以获取紧急业务信息或 者紧急业务标识, 并通过在 MS的上下文中构建紧急业务指示符标示此次 MS发起的业务是 紧急业务, 以实现对所述 MS的紧急业务的管理。 附图说明 图 1为现有技术中 WiMAX网络逻辑结构图;
图 2为本发明实施例的应用网络模型示意图;
图 3为本发明实施例公开的移动受限终端紧急业务的管理方法流程图;
图 4为本发明实施例公开的移动受限终端紧急业务的管理方法流程图;
图 5为本发明实施例公开的移动受限终端紧急业务的管理方法流程图;
图 6为本发明实施例公开的移动受限终端紧急业务的管理方法流程图;
图 7为本发明实施例公开的移动受限终端紧急业务的管理方法流程图;
图 8为本发明实施例公开的移动受限终端紧急业务的管理装置结构示意图; 图 9为本发明实施例公开的基站的结构示意图;
图 10为本发明实施例公开的移动受限终端紧急业务的管理***构成示意图。 具体实施方式 为使本发明的目的、 技术方案和优点更加清楚, 下面结合附图对本发明具体实施例 作进一步的详细描述。 本发明实施例所描述的技术方案是基于 IMS ( Internet protocol multimedia subsystem, IP多媒体子***) 的 ES应用, 其网络模型如图 2所示。 P-CSCF (Proxy-Cal l Session Control Function, 代理呼叫会话控制功能实体) 是 MS联系 IMS的第一个连接点, 在 SIP ( Session Initiation Protocol , 会话发起协议) 层, P-CSCF充当 SIP代理服务器的功能; 在与 PCC (Pol icy and Charging Control , 策 略与计费控制) ***互连时, P-CSCF充当 AF (Appl ication Function, 应用功能实体) 的功能。 图示的 E-CSCF表示在***中专门管理 ES的 SCCF, BP Emergency-Cal l Session Control Function (紧急呼叫会话控制功能实体) , 与所述 ES网络连接。 IMS***的其 他网元图 2未示出。 MS通过所述 P-CSCF使用 IMS***。 在本发明实施例中, 对于 IMS*** 的使用均采用现有技术, 此处不再赘述。 可选的,网络中可以部署 PCC***。在 PCC***中, PCRF(Pol icy Control and Charging Rules Function, 策略控制和计费规则功能实体) 是 PDF (Pol icy Decision Function, 策略决策功能实体) 和 CRF (Charging Rule Function, 计费规则功能实体) 的融合体, 其位于 CSN, 主要功能是动态 QoS策略控制和基于流的计费控制, 同时还提供基于用户签 约信息的授权控制功能, 即根据所述 P-CSCF或 PCEF (Pol icy and Charging Enforcement Function, 策略与计费执行功能实体) 提供的资源描述信息以及位于 CSN的 SPR
( Subscription Profi le Repository, 用户签约数据库) 提供的用户签约消息, 生成 相应的 PCC Rules (PCC规则)并通过 R3接口下放至 PCEF。在 WiMAX网络中部署 PCC***时, 所述 PCEF是一个逻辑概念, 是由 WiMAX网络中的既有网元融合而成的, 也就是说, PCC系 统中的 PCEF的功能是由 WiMAX网路中的既有网元分别实现的。 具体的, 在本实施例中, 参与的网元包括 A-SFA (Anchor-Service Flow Authorization, 锚定业务流授权实体) 和 S-SFA ( Serving-Service Flow Authorization, 服务业务流授权实体) 。 在本发明 实施例后续的论述中, 若网络中部署有 PCC***, 则在论述到 PCEF时, 将采用 WiMAX网络 中实际涉及的网元进行论述, 以使本发明实施例的技术方案能够被清楚完整的理解。 基于图 2所述的网络,本发明实施例公开了一种移动受限终端紧急业务的管理方法。 所述方法中的移动终端与网络侧的签约关系中,其移动性策略被限制为只能应用于固定 场景或者游牧场景, 故称为移动受限终端。 为了表述的方便, 在以下的实施例中, 仍称 为 MS。 固定接入用户的网络接入区是与网络签约相关的一个或多个 BS的标识或者是地区 信息; 游牧用户的网络接入区可能横跨一个很大的地理区域, 用户可以在不同的地理位 置接入网络。 由于所述移动性限制的存在, MS在使用 ES业务时, 可能受到限制而无法成 功。 本发明实施例公开的技术方案提供了一种对移动受限的终端请求的 ES进行管理的 方法, 以实现对移动受限终端 MS的紧急业务的管理。 需要说明的是, 本发明实施例中 MS在发起 ES时可以接入任意 BS, 而不限定所述 BS是 否位于所述 MS的网络接入区。 所述方法如图 3所示, 具体步骤如下: 步骤 301、锚定业务流授权实体 A-SFA获取为终端 MS提供紧急业务的紧急业务信息或 者紧急业务标识。 具体的, 所述 A-SFA获取所述紧急业务信息或者紧急业务标识的方式至少可以有以 下几种: 所述 A-SFA来自语音业务提供商 VSP的发起紧急业务承载通道和业务流建立的指示, 所述指示中包含所述紧急业务信息; 或者, 接收来自 AAA服务器的接入允许指示, 所述接入允许指示中携带所述紧急业 务标识; 或者, 接收来自策略控制和计费规则功能实体 PCRF的 PCC (Policy and Charging
Control , 策略与计费控制) 指示, 所述 PCC指示中携带所述紧急业务标识。 步骤 302、 根据所述紧急业务信息或者紧急业务标识, 在自身维护的所述 MS的上下 文中构建紧急业务指示符。 需要说明的是,所述紧急业务信息为现有技术中用来指示某次业务是针对紧急业务 的信息, 例如 SIP (Session Initiation Protocol , 会话发起协议) 下, 各消息中的 URI (Uniform Resource Identifier, 通用资源标识符) 设置为 ES URN, 则表示此次业务 是针对紧急业务的; 再例如, 在 EAP (Extensible Authentication Protocol , 可扩展 认证协议)认证中, NAI (Network Access Identifier,网络接入标识)设置为 NAI ( sm=2), 则表示此次业务是针对紧急业务的。 所述设置为 ES URN的 URI或 NAI ( sm=2) 即所述的紧 急业务信息。 所述紧急业务标识为本发明实施例定义的一个信元, 在后续实施例中用 ES— Flag表 示。 所述 ES— Flag用于指示其所在的消息是应用于紧急业务的消息, 所述消息触发的业 务为紧急业务。 所述 ES— Flag可以是网络中的网元根据所述紧急业务信息生成的。 所述紧急业务指示符是本发明实施例定义的一个 MS的上下文中的属性。在本发明后 续实施例中, 以所述紧急业务指示符为一个指示位 (ES bit ) 为例加以说明。 将其置位 时, 对应于所述的在 MS的上下文中构建紧急业务指示符, 用于指示其所在的 MS的上下文 所针对的 MS正在使用紧急业务(ES) ; 将其清零时, 对应于所述的在 MS的上下文中清除 紧急业务指示符, 用于指示其所在的 MS的上下文所针对的 MS没有使用紧急业务。 进一步 的, 可以定义网络侧各执行移动性限制策略的网元根据所述 ES bit被置位, 暂停执行针 对所述 MS的移动性限制策略, 根据所述 ES bit被清零, 恢复执行针对所述 MS的移动性限 制策略。 并且, 网络侧负责维护 MS的上下文的网元可以根据其收到的消息中的所述 ES— Flag, 将其维护的 MS的上下文中的 ES bit置位, 也可以根据其自身维护的 MS的上下 文中的 ES bit被置位的情况, 在其发往其他网元的消息中携带所述 ES— Flag。 本领域技 术人员可以理解, 所述使用 ES bit表示所述紧急业务指示符只是为了举例说明的方便。 在本说明书的所有实施例中, 所述 ES bit都可以采用现有技术中的其他表示特定属性的 技术手段, 例如, 可以使用一个字段, 并设置特定的字段值来表示相应的信息。 步骤 303、 发送数据通路注册请求到基站 BS, 所述数据通路注册请求中携带紧急业 务标识。 需要说明的是, 若步骤 301中所述 A-SFA获取的为紧急业务标识, 则本步骤中发 送到所述 BS的数据通路注册请求中携带的为所述紧急业务标识, 或者, 若步骤 301中所 述 A-SFA获取的为所述紧急业务信息,则本步骤中所述 A-SFA根据所述紧急业务指示符或 所述紧急业务信息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通 路注册请求中。 通过应用本实施例公开的方法, A-SFA可以获取为终端 MS提供紧急业务的紧急业务 信息或紧急业务标识, 并通过在 MS的上下文中构建紧急业务指示符标示此次 MS发起的业 务是紧急业务, 再将紧急业务标识发送给基站 BS, 以实现对所述 MS的紧急业务的管理。 下面各实施例以优选实现方案的方式,分情况对所述的移动受限终端紧急业务的管 理方法进一步介绍。 本发明实施例以 ES由 AAA控制, 来说明移动受限终端紧急业务的管理方法。 在本发 明实施例描述的场景中, 网络中可以部署有 PCC***, 也可以不部署 PCC***。 无论网络 中是否部署 PCC***, ES都应该由 AAA控制。 需要说明的是, 在本发明实施例的场景中, 所述 MS在发起 ES之前已经处于正常的在 网状态。 所述方法如图 4所示, 具体步骤如下:
MS发起紧急业务, 通过 R2接口建立与 VSP之间的连接。 这一过程采用现有技术实现, 此处不再赘述。 在此过程中, 所述 VSP可以发现此次业务为紧急业务。 步骤 401、 VSP触发 MS的 A-SFA发起 ES业务流建立, 在所述触发过程中, 将紧急业务 信息传递给所述 A-SFA, 以指示本次业务为紧急业务。 实现本步骤的技术为现有技术, 根据不同的 VoIP协议, 实现所述触发的具体消息会有所不同。 例如, 若所述 VoIP协议是 基于 SIP的, 则所述 VSP可以发送 SIP OK消息到所述 A-SFA, 所述 SIP OK消息中的 URI设置 为 ES URN, 以指示此次业务为紧急业务。 步骤 402、 所述 A-SFA根据所述紧急业务信息, 在 MS的上下文中将紧急业务指示符 ES bit置位, 并发起建立用于承载 ES业务的业务流。 所述 ES bit在本发明实施例中定义为, 当其在 MS的上下文中置位时, 表示所述 MS的移动性限制策略暂停执行。 可选的, 与所述 A-SFA位于一起的 Authenticator可以在本步骤暂停执行针对所述 MS的移动性限制策略。 步骤 403、 所述 A-SFA发送 RR— Req (Resource Reservation, 资源预留请求) 消息到 S-SFA (Serving-Service Flow Authorization, 服务业务流授权实体) , 建立承载 ES 的业务流, 所述 RR— Req消息中携带紧急业务标识 ES— Flag。 所述 ES— Flag是所述 A_SFA根 据所述紧急业务信息或者所述置位的 ES bit生成的。 需要说明的是, 所述 A-SFA与 S-SFA也可以位于同一 ASN GW, 若所述 A-SFA与 S-SFA位 于同一 ASN GW, 则本步骤可省略或用所述 ASN GW的内部协议实现。 步骤 404、 所述 S-SFA根据所述 ES— Flag将自身维护的 MS的上下文中的 ES bit置位, 并将所述 RR— Req消息中的业务流信息及所述 ES— Flag发送到 BS。 可选的, 发送方式可以 是将所述 RR— Req消息中的业务流信息及其中携带的所述 ES— Flag封装在 Path— Reg— Req
(数据通道注册请求) 消息中发送到 BS。 可选的, 所述 S-SFA可以在本步骤暂停执行针 对所述 MS的移动性限制策略。 步骤 405、 所述 BS根据所述 ES— Flag将自身维护的 MS的上下文中的 ES bit置位, 并向 MS发送 DSA— Req (Dynamic service addition, 动态业务增加请求) 消息, 建立承载 ES 的空口业务流。 可选的, 所述 BS可以在本步骤暂停执行针对所述 MS的移动性限制策略。 步骤 406、 所述 MS向所述 BS发送 DSA— Rsp (Dynamic service addition, 动态业务增 加响应) 消息作为回复。 步骤 407、 所述 BS向所述 S-SFA发送 Path— Reg— Rsp (数据通路注册响应)消息, 作为 回复。 步骤 408、 所述 S-SFA向所述 A-SFA发送 RR— Rsp ( Resource Reservation, 资源预留 响应) 消息作为回复。 需要说明的是, 所述 A-SFA与 S-SFA也可以位于同一 ASN GW, 若所述 A-SFA与 S-SFA位 于同一 ASN GW, 则本步骤可省略或用所述 ASN GW的内部协议实现。 步骤 409、 所述 A-SFA向所述 S-SFA发送 RR— Ack ( Resource Reservation, 资源预留 应答) 消息作为应答。 如果步骤 402中与所述 A-SFA位于一起的 Authenticator没有暂停 执行针对所述 MS的移动性限制策略,则本步骤中与所述 A-SFA位于一起的 Authenticator 暂停执行针对所述 MS的移动性限制策略。 需要说明的是, 所述 Authenticator暂停执行 针对所述 MS的移动性限制策略与所述 A-SFA向所述 S-SFA发送 RR— Ack消息并没有严格的 时序关系。 需要说明的是, 所述 A-SFA与 S-SFA也可以位于同一 ASN GW, 若所述 A-SFA与 S-SFA位 于同一 ASN GW, 则本步骤可省略或用所述 ASN GW的内部协议实现。 但如果步骤 402中与 所述 A-SFA位于一起的 Authenticator没有暂停执行针对所述 MS的移动性限制策略,则与 所述 A-SFA位于一起的 Authenticator应当暂停执行针对所述 MS的移动性限制策略。 步骤 410、 所述 S-SFA向所述 BS发送 Path— Reg— Ack (数据通道注册应答)消息作为应 答。 如果步骤 404中所述 S-SFA没有暂停执行针对所述 MS的移动性限制策略, 则本步骤中 所述 S-SFA暂停执行针对所述 MS的移动性限制策略。 需要说明的是, 所述 S-SFA暂停执行 针对所述 MS的移动性限制策略与所述向所述 BS发送 Path— Reg— Ack消息并没有严格的时 序关系。
步骤 411、 所述 BS向所述 MS发送 DSA— Ack (Dynamic service addition, 动态业务增 加应答) 消息作为应答。 如果步骤 405中所述 BS没有暂停执行针对所述 MS的移动性限制 策略, 则本步骤中所述 BS暂停执行针对所述 MS的移动性限制策略。 需要说明的是, 所述 BS暂停执行针对所述 MS的移动性限制策略与所述向所述 MS发送 DSA—Ack消息并没有严格 的时序关系。 步骤 412、 MS使用紧急业务。 步骤 413、 MS紧急业务结束, 所述 A-SFA可以将自身维护的 MS的上下文中的 ES bit清 零, 并发起删除用于承载 ES业务的数据通道和业务流的过程。 可选的, 与所述 A-SFA位 于一起的 Authenticator可以恢复执行针对所述 MS的移动性限制策略。 步骤 414、 所述 A-SFA发送 RR— Req (Resource Reservation, 资源预留请求) 消息到 所述 S-SFA, 删除承载 ES的业务流。 需要说明的是, 所述 A-SFA与 S-SFA也可以位于同一 ASN GW, 若所述 A-SFA与 S-SFA位 于同一 ASN GW, 则本步骤可省略或用所述 ASN GW的内部协议实现。 步骤 415、 所述 S-SFA向所述 BS发送 Path— DeReg— Req (数据通道注销请求)消息, 删 除承载 ES的业务流和数据通道。 可选的, 所述 S-SFA可以将自身维护的 MS的上下文中的 ES bit清零, 并恢复执行针对所述 MS的移动性限制策略。 步骤 416、 所述 BS向所述 MS发送 DSD— Req (Dynamic service deletion, 动态业务删 除请求)消息, 删除承载 ES的空口业务流。 可选的, 所述 BS可以将自身维护的 MS的上下 文中的 ES bit清零, 并恢复执行针对所述 MS的移动性限制策略。 步骤 417、 所述 MS向所述 BS发送 DSD— Rsp (Dynamic service deletion, 动态业务删 除响应) 消息作为回复。 步骤 418、 所述 BS向所述 S-SFA发送 Path— DeReg— Rsp (数据通道注销响应)消息作为 回复。 步骤 419、 所述 S-SFA向所述 A-SFA发送 RR— Rsp (Resource Reservation, 资源预留 响应) 消息作为回复。 需要说明的是, 所述 A-SFA与 S-SFA也可以位于同一 ASN GW, 若所述 A-SFA与 S-SFA位 于同一 ASN GW, 则本步骤可省略或用所述 ASN GW的内部协议实现。 步骤 420、 所述 A-SFA向所述 S-SFA发送 RR— Ack (Resource Reservation, 资源预留 应答)消息作为应答。 如果所述 A-SFA没有在步骤 413中将自身维护的 MS的上下文中的 ES bit清零, 则在本步骤中, 所述 A-SFA将自身维护的 MS的上下文中的 ES bit清零, 并且与 所述 A-SFA位于一起的 Authenticator恢复执行针对所述 MS的移动性限制策略。或者与所 述 A-SFA位于一起的 Authenticator没有在步骤 413中恢复执行针对所述 MS的移动性限制 策略, 则在本步骤中, 所述 Authenticator恢复执行针对所述 MS的移动性限制策略。 需 要说明的是, 所述 Authenticator恢复执行针对所述 MS的移动性限制策略与所述向所述 S-SFA发送 RR— Ack消息并没有严格的时序关系。 需要说明的是, 所述 A-SFA与 S-SFA也可以位于同一 ASN GW, 若所述 A-SFA与 S-SFA位 于同一 ASN GW, 则本步骤可省略或用所述 ASN GW的内部协议实现, 但与所述 A-SFA位于 一起的 Authent i cator应当恢复执行针对所述 MS的移动性限制策略。 步骤 421、 所述 S-SFA向所述 BS发送 Path— DeReg— Ack (数据通道注销应答)消息作为 应答。 如果所述 S-SFA没有在步骤 415将自身维护的 MS的上下文中的 ES bit清零, 恢复执 行针对所述 MS的移动性限制策略,则在本步骤将自身维护的 MS的上下文中的 ES bit清零, 并恢复执行针对所述 MS的移动性限制策略。 需要说明的是, 所述 S-SFA恢复执行针对所 述 MS的移动性限制策略与所述向所述 BS发送 Path— DeReg— Ack消息并没有严格的时序关 系。 步骤 422、 所述 BS向所述 MS发送 DSD— Ack (Dynamic service deletion, 动态业务删 除应答)消息作为应答。如果所述 BS没有在步骤 416将自身维护的 MS的上下文中的 ES bit 清零, 恢复执行针对所述 MS的移动性限制策略, 则在本步骤将自身维护的 MS的上下文中 的 ES bit清零, 恢复执行针对所述 MS的移动性限制策略。 需要说明的是, 所述 BS恢复执 行针对所述 MS的移动性限制策略与向所述 MS发送 DSD— Ack消息并没有严格的时序关系。 步骤 423、 可选的, 若网络侧发现所述 MS已经在网络接入区以外, 则发起 MS退网过 程, MS按照现有技术完成退网。 通过应用本实施例的方法, 在网络中由 AAA控制 ES的场景下, 在网的 MS在发起 ES的 时候, A-SFA可以根据 ES-Flag将自身维护的 MS的上下文中的 ES bit置位, 并将所述 ES-Flag发送到 S-SFA和 BS, 并定义所述 MS的上下文中 ES bit置位时, 暂停执行针对所述 MS的移动性限制策略, 以使所述 MS可以正常使用 ES业务。 进一步的, 还可以在所述 ES业 务完成之后, 恢复执行所述移动性限制策略。
上述实施例中, MS在发起 ES时, 处于正常在网状态。 但在紧急业务的场景下, MS发 起 ES时很可能不在网。 以下实施例公开了 MS不在网时发起 ES时的技术方案。 本发明实施例以 ES由 AAA控制, 来说明移动受限终端紧急业务的管理方法。 在本发 明实施例描述的场景中, 网络中可以部署有 PCC***, 也可以不部署 PCC***。 无论网络 中是否部署 PCC***, ES都应该由 AAA控制。 所述方法如图 5所示, 具体步骤如下: 步骤 501、 MS需要进行紧急业务, 发现并选择网络, 发起入网过程。 步骤 502、 MS执行与 AAA服务器之间接入认证过程, 即 EAP认证过程。 在所述 EAP认证 中, MS使用 NAI ( sm=2) 标明此次认证是针对紧急业务的。 所述 NAI为网络接入标识 (Network Access Identifier) 。 所述过程为现有技术, 此处不再赘述。 步骤 503、 AAA服务器上保存有由业务提供商后台安装的 ES策略和热线服务策略。 AAA 服务器根据所述 ES策略, 对所述 MS的所述紧急业务进行认证授权, 并向位于 ASN GW的 Authenticator发送 Access Accept (接入允许) 消息, 所述接入允许消息中携带针对所 述 MS的移动性限制参数和紧急业务标识 ES— Flag。 所述 ES— Flag为消息中的一个信元, 根 据所述 NAI ( sm=2) 生成。 步骤 504、 所述 Authenticator根据所述 AAA服务器下发的策略, 提供可选的热线服 务。 本步骤为可选步骤。 所述热线服务为在特殊情况下, 网络侧根据自身策略设定为终 端提供的服务。 例如在终端欠费的情况下, 对于紧急呼叫业务, 网络侧为终端提供的服 务。 步骤 505、 所述 ASN GW与 BS之间为此次业务建立或修改业务流, 并将所述 ES_Flag传 递给所述 BS。 具体为: 所述 ASN GW上的与所述 Authenticator位于一起的 SFA根据所述 ES— Flag在自身维护 的 MS的上下文中将紧急业务指示符 ES bit置位, 所述 Authenticator暂停执行针对所述 MS的移动性限制策略; 所述 SFA将本次会话的业务流信息及所述 ES— Flag封装在 Path— Reg— Req (数据通路注 册请求) 消息中发送给 BS; 所述 BS将自身维护的 MS的上下文中的 ES bit置位, 并暂停执行针对所述 MS的移动性 限制策略;所述 BS与所述 S-SFA之间进一步按照现有技术流程完成所述数据通路的注册。 需要说明的是, 所述 SFA可能分为 A-SFA和 S-SFA部署于不同的 ASN GW上, 在此场景 下,则与所述 Authenticator位于一起的 SFA被称为 A-SFA,上述步骤进一步包括,在 A-SFA 根据所述 ES— Flag在自身维护的 MS的上下文中将紧急业务指示符 ES bit置位后, 所述 A-SFA与 S-SFA进行业务流建立的交互, 并在发送给所述 S-SFA的资源预留请求消息中携 带所述 ES— Flag, 指示此次业务为紧急业务, 所述 S-SFA根据所述 ES— Flag在自身维护的 MS的上下文中将紧急业务指示符 ES bit置位, 暂停执行针对所述 MS的移动性限制策略; 所述 S-SFA按照前述 SFA与 BS的交互流程将所述 ES— Flag发送给所述 BS。 步骤 506、 MS获取 IP地址。 步骤 507、 可选的, 若网络中部署有 PCC***, 则由 PCEF与 PCRF共同建立 IP-CAN ( Internet Protocol-Connect ive Access Network, IP -连接接入网络) 会话。 如前所 述, 在 WiMAX网络中部署 PCC***时, 所述 PCEF实际是由 WiMAX网络中的既有网元融合而 成的, 也就是说, PCC***中的 PCEF的功能是由 WiMAX网路中的既有网元分别实现的。 在 本步骤中, 直接与所述 PCRF建立会话的是 A-SFA。 步骤 508、 位于所述 ASN GW上的计费客户端 (Account ing Cl ient ) 发送 Account ing Start消息到 AAA服务器, 指示开始所述紧急业务。 步骤 509、 MS通过 VSP ( Voice Service Provider, 语音业务提供商)使用紧急业务。 步骤 510、 紧急业务结束, 维护所述 MS的上下文的各主体将各自维护的 MS的上下文 中的 ES bit清零, 并恢复执行针对所述 MS的移动性限制策略。 具体过程可以参考图 4所 示实施例步骤 413至步骤 422,此处不再赘述。网络侧发起重鉴权,在所述重鉴权过程中, 若网络侧发现所述 MS在网络接入区以外接入时, 发起 MS的退网过程。 通过应用本发明实施例的方法, 在网络中 ES业务由 AAA控制时, AAA可以通过设置 ES-Flag指示此次业务为紧急业务, 以使各网元根据所述 ES-Flag将自身维护的 MS的上下 文中的 ES bit置位, 并定义所述 MS的上下文中的 ES bit置位时, 暂停执行所述 MS的移动 性限制策略, 以使各网元在此次紧急业务中暂停执行所述 MS的移动性限制策略, 使所述 MS顺利完成紧急业务。 进一步的, 还可以在所述 ES业务完成之后, 恢复执行所述移动性 限制策略。
上述两个实施例以网络中的 ES由 AAA控制为例说明了移动受限终端紧急业务的管理 方法。 但在网络中部署有 PCC***时, 所述 ES可能不由 AAA控制。 以下将讨论这一场景下 移动受限终端紧急业务的管理方法的实现。 本发明实施例以网络中部署有 PCC***, 且 ES由 PCRF控制的场景为例, 来说明移动 受限终端紧急业务的管理方法。 需要说明的是, 在本发明实施例的场景中, 所述 MS在发起 ES之前已经处于正常的在 网状态。 所述方法如图 6所示, 具体步骤如下: 步骤 601、 MS发起紧急业务,发送 SIP INVITE CSession Initiation Protocol INVITE, 会话发起协议邀请)消息到 P-CSCF, 所述消息中的 URI (Uniform Resource Identifier, 通用资源标识符)设置为 ES URN。 所述 ES URN是一个属性值, 表示本次业务为紧急业务。 步骤 602、 所述 P-CSCF根据所述 SIP INVITE消息的 URI的值为 ES URN, 识别此次业务 是紧急业务。 一旦所述 P-SCSF识别所述业务为紧急业务, 则通过在 SIP消息中包含
Resource-Priority属性值来设置高优先级标识。所述 P-SCSF与 E-CSCF之间进行所述 SIP 消息的交互, 按照现有流程建立高优先级会话, 具体过程此处不再赘述。 步骤 603、 所述 P-CSCF通过设置 reservation priority (预设优先权) 属性值来指 示 PCRF建立高优先级的承载, 并通过设置紧急业务标识 ES— Flag来指示所述承载用于紧 急业务。 所述 P-CSCF与所述 PCRF之间的信息交互具体可以通过现有定义的 Rx接口完成, 此处不再赘述。 步骤 604、所述 PCRF与 A_PCEF(Anchor_ Policy and Charging Enforcement Function, 锚定策略与计费执行功能实体)通过 R3接***互 PCC消息, 并将所述 ES— Flag传递给所述 A - PCEF。 如前所述, 在 WiMAX网络中部署 PCC***时, 所述 PCEF实际是由 WiMAX网络中的既有 网元融合而成的, 也就是说, PCC***中的 PCEF的功能是由 WiMAX网路中的既有网元分别 实现的。 在本步骤中, 直接与所述 PCRF建立会话的是 A-SFA。 步骤 605、 所述 A-SFA根据所述 ES— Flag在自身维护的 MS的上下文中将紧急业务指示 符 ES bit置位, 与所述 A-SFA位于一起的 Authenticator暂停执行所述 MS的移动性限制策 略。 步骤 606、 A-PCEF中的 S-SFA为紧急业务创建或修改业务流, 并指示该业务流针对紧 急业务。 具体为: 若所述 A-SFA与所述 S-SFA位于不同的 ASN GW上, 则所述 A-SFA在与所述 S_SFA交互的 资源预留请求消息中携带所述 ES— Flag, 指示此次业务为紧急业务; 若所述 A-SFA与所述 S-SFA位于同一 ASN GW上, 则上述步骤可以省略或者通过所述 GW的内部协议完成。 所述 S-SFA根据所述 ES— Flag将自身维护的 MS的上下文中的 ES bit置位, 并暂停执行 针对所述 MS的移动性限制策略, 并向 BS发送 Path— Reg— Req (数据通路注册请求) 消息, 所述消息中携带所述 ES— Flag, 以指示该业务流针对紧急业务, 所述 BS根据所述 ES— Flag 将自身维护的 MS的上下文中的 ES bit置位, 并暂停执行针对所述 MS的移动性限制策略; 所述 BS与所述 S-SFA之间进一步按照现有技术流程完成 Path— Reg— Rsp (数据通路注册响 应)消息和 Path— Reg— Ack (数据通路注册应答)消息的交互, 完成所述数据通路的注册。 步骤 607、 MS通过 E-CSCF建立紧急业务会话。 步骤 608、 紧急业务结束, 网络侧删除相关的业务流和数据通路。 具体过程可以参 考图 4所示实施例步骤 413至步骤 422, 此处不再赘述。 步骤 609、 所述 BS、 S-SFA和 A-SFA将自身维护的 MS的上下文中的 ES bit清零, 所述 BS、 S-SFA和 Authenticator恢复执行所述 MS的移动性限制策略。 需要说明的是, 在现有 技术可行的范围内, 本步骤与步骤 608也可以同时执行。 步骤 610、 可选的, 如果所述 MS当前接入的 BS不在网络接入区内, 则网络侧发起所 述 MS的退网过程。 通过应用本发明实施例的方法, 在网络中部署有 PCC***且 ES业务由 PCRF控制时, P-CSCF可以通过设置紧急业务标识 ES-Flag指示此次业务为紧急业务, 以使各网元根据 所述 ES-Flag将自身维护的 MS的上下文中的 ES bit置位, 并定义所述 MS的上下文中的 ES bit置位时, 暂停执行所述 MS的移动性限制策略, 以使各网元在此次紧急业务中暂停执 行所述 MS的移动性限制策略, 使所述 MS顺利完成紧急业务。 进一步的, 还可以在所述 ES 业务完成之后, 恢复执行所述移动性限制策略。
需要说明的是, 在网络中部署有 PCC***, 且 ES由 PCRF控制时, 若 MS发起 ES时不在 网, 所述处理方法可以为, 在图 6所示实施例的步骤 601之前执行图 5所示方法的步骤 501 至步骤 508。 需要说明的是, 在步骤 503中, Accept Access消息中携带移动性限制参数, 不携带 ES-Flag; 在步骤 505中, ASN GW不进行与 ES— Flag或 ES bit相关的操作。 此后, 可以按照图 6所示实施例的方法完整执行。
上述各实施例分情况讨论了移动受限的 MS发起紧急业务的方法。在紧急业务的使用 过程中, 所述 MS可能发生移动而需要在 BS之间进行切换。 在所述切换过程中, 需要保持 所述紧急业务的连续性。 以下实施例讨论了在移动受限的终端切换的过程中, 保持其正 在使用的紧急业务的连续性的方法。 所述方法如图 7所示, 具体步骤如下: 步骤 701、 MS发送 MOB— MSHO— REQ (移动台切换请求)消息到服务基站(Serving BS), 发起切换过程, 所述 MOB— MSH0—REQ消息中包含一个或多个可能的目标基站标识。 步骤 702、 所述 Serving BS发现自身维护的所述 MS的上下文中 ES bit置位, 且所述 MS的移动性限制策略已经暂停执行, 发送 HO— Req (切换请求)消息到一个或多个目标基 站 (Target BS) , 所述 HO— Req消息携带有 MS的上下文, 所述 MS的上下文包含有移动性 限制参数, 且所述 ES bit已经置位, 以使所述 Target BS暂停执行针对所述 MS的移动性 限制策略, 进一步完成切换过程。 步骤 703、 可选的, 目标基站可以通过与 MS的 Authenticator (鉴权器)之间的上下 文请求过程获取 MS的授权密钥上下文。 若服务基站预先向所述 Authenticator请求了针 对目标基站的 MS的授权密钥上下文, 并携带在 HO— Req消息中发送到了目标基站, 或者目 标基站决定在本基站接入时再向所述 Authenticator请求授权密钥上下文, 则该步骤可 省略。 步骤 704、 可选的, 若网络支持数据通路预注册机制, 则 Target BS可发起与 Anchor DPF (Anchor Data Path Function, 锚定数据通路功能实体) 之间的数据通路预建立过 程。 步骤 705、 Target BS发送 HO— Rsp (切换响应) 消息到所述 Serving BS, 应答切换请 求。 步骤 706、 所述 Serving BS发送 MOB— BSH0— RSP (基站切换响应) 消息到所述 MS, 所 述 MOB— BSH0— RSP消息可包含一个或多个网络为所述 MS选择的可切换的目标基站标识。 步骤 707、 所述 Serving BS发送 HO— Ack (切换应答) 消息到所述 Target BS, 表示其 已经收到 HO— Rsp (切换响应) 消息。 所述 MS按照现有技术的流程完成切换。 需要说明的是, 本实施例描述的是所述 MS在使用紧急业务的过程中进行切换的问 题。 切换完成后对所述 MS的处理, 可以参考前述实施例。 通过应用本实施例公开的方法, MS的 Serving BS可以把 ES bit置位的 MS的上下文传 送给 Target BS, 以使所述 MS的移动性限制策略在所述 Target BS也可以暂停执行, 顺利 完成紧急业务使用过程中的 BS间切换, 保持紧急业务的连续性。
本发明实施例还公开了一种移动受限终端紧急业务的管理装置, 以实现上述实施例 中公开的方法。 如图 8所示,所述装置包括接收模块 800,上下文维护模块 802和发送模块 804,其中: 所述接收模块 800用于获取紧急业务信息或者紧急业务标识, 所述紧急业务信息或 者紧急业务标识用于指示为移动受限终端 MS提供紧急业务。 所述上下文维护模块 802用于根据所述接收模块 800获取的所述紧急业务信息或者 紧急业务标识,在终端 MS的上下文中构建紧急业务指示符。具体的,若所述接收模块 800 获取的为所述紧急业务信息, 则根据所述紧急业务信息, 或者, 若所述接收模块 800获 取的为所述紧急业务标识, 则根据所述紧急业务标识, 在自身维护的所述 MS的上下文中 构建紧急业务指示符。 所述发送模块 804用于发送数据通路注册请求到基站 BS或者发送资源预留请求到服 务业务流授权实体 S-SFA, 若所述获取模块 800获取的为所述紧急业务标识, 则所述数据 通路注册请求或资源预留请求中携带所述紧急业务标识, 或者, 若所述获取模块 800获 取的为所述紧急业务信息, 则根据所述上下文维护模块 802的所述紧急业务指示符或所 述紧急业务信息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路 注册请求或资源预留请求中。 可选的, 所述装置还包括: 移动性限制策略执行模块 806,用于根据所述上下文维护模块 802中的所述 MS的上下 文中的紧急业务指示符暂停执行针对所述 MS的移动性限制策略。 所述装置可以是包含 A-SFA的接入网网关 ASN GW, 此时所示接收模块 800用于接收携 带有紧急业务标识的发起紧急业务承载通道和业务流建立的指示或者接入允许指示或 者 PCC指示, 所述移动性限制策略执行模块 806可以是鉴权器。 所述装置也可以是包含 S-SFA的接入网网关 ASN GW, 此时所述接收模块 800用于接收携带有紧急业务标识的资源 预留请求。 通过应用本实施例公开的装置, 当终端 MS发起 ES时, 可以通过接收模块 800接收到 的紧急业务信息或者紧急业务标识识别此次业务为紧急业务, 由 MS的上下文维护模块 802在相应 MS的上下文中设置紧急业务指示符, 并由移动性限制策略执行模块 806暂停执 行针对所述 MS的移动性限制策略, 为所述 MS开放 ES业务。
本发明实施例进一步公开了一种基站, 用于对移动受限终端的紧急业务进行管理, 以实现上述实施例中公开的方法。 如图 9所示, 所述基站包括接收模块 900, 上下文维护模块 902和移动性限制策略执 行模块 904, 其中, 所述接收模块 900用于接收来自接入网网关的紧急业务标识。 具体的, 所述接收模 块 900可以接收来自位于接入网网关的 A-SFA或者 S-SFA的数据通路注册请求, 所述数据 通路注册请求中携带所述紧急业务标识。 所述上下文维护模块 902用于根据所述接收模块 900接收的所述紧急业务信息或者 紧急业务标识, 在终端 MS的上下文中构建紧急业务指示符; 所述移动性限制策略执行模块 904用于根据所述上下文维护模块 902中的所述 MS的 上下文中的紧急业务指示符暂停执行针对所述 MS的移动性限制策略。 通过应用本实施例公开的基站, 当终端 MS发起 ES时, 可以通过接收模块 900接收到 的紧急业务标识识别此次业务为紧急业务, 由 MS的上下文维护模块 902在相应 MS的上下 文中设置紧急业务指示符, 并由移动性限制策略执行模块 904暂停执行针对所述 MS的移 动性限制策略, 为所述 MS开放 ES业务。
本发明实施例进一步公开了一种移动受限终端紧急业务的管理***, 以实现前述实 施例公开的方法。 如图 10所示, 所述***包括接入网网关 ASN GW100和与之以可通信方式连接的基站 BS 102 , 所述 ASN GW100包含 A-SFA1000, 用于获取紧急业务信息或者紧急业务标识, 所 述紧急业务信息或者紧急业务标识用于指示为移动受限终端 MS提供紧急业务;根据所述 紧急业务信息或者紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指示符; 发送数据通路注册请求到所述 BS 102 , 若获取的为所述紧急业务标识, 则所述数据通路 注册请求中携带所述紧急业务标识, 或者, 根据所述紧急业务指示符或所述紧急业务信 息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路注册请求中。 所述 BS 102用于根据来自所述 ASN GW100的紧急业务标识在自身维护的所述 MS的上下 文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略。 可选的, 所述 ASN GW100还包括与所述 A-SFA1000位于一起的鉴权器 1002, 所述鉴权 器 1002用于根据所述 A-SFA1000上的所述 MS的上下文中的所述紧急业务指示符暂停执行 针对所述 MS的移动性限制策略。 可选的, 所述***还可以包括 ASN GW104, 所述 ASN GW104包含服务业务流授权实体 S-SFA1040, 与所述 ASN GW100上的 A-SFA1000和所述 BS 102以可通信方式连接。 所述 A-SFA1000还用于向所述 S-SFA1040发送资源预留请求, 若获取的为所述紧急业务标识, 则所述资源预留请求中携带所述紧急业务标识, 或者, 若获取的为所述紧急业务信息, 根据所述紧急业务指示符或所述紧急业务信息生成紧急业务标识, 并将所述生成的紧急 业务标识携带在所述数据通路注册请求中;所述 S-SFA1040用于接收来自所述 A-SFA1000 的资源预留请求,根据所述资源预留请求中携带的所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略; 发送数据 通路注册请求到所述 BS 102 , 所述数据通路注册请求中携带所述紧急业务标识。 所述 BS 102还用于根据来自所述 ASN GW102的 S-SFA的紧急业务标识在自身维护的所述 MS的上 下文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略。 通过应用本发明实施例公开的***, MS发起 ES时, A-SFA91000可以通过获取到的紧 急业务标识判别此次业务为紧急业务,在其自身维护的 MS的上下文中构建紧急业务指示 符。 进一步的, 与所述 A-SFA91000位于一起的鉴权器 91002根据所述紧急业务指示符暂 停执行针对所述 MS的移动性限制策略, 所述 A-SFA10900并将所述紧急业务标识发送到 S-SFA9104004和或 BS906102 ,使所述 S-SFA9041040和 BS906102在其自身维护的 MS的上下 文中构建紧急业务指示符,并暂停执行针对所述 MS的移动性限制策略,为所述 MS开放 ES。 通过应用本发明实施例公开的方法、 装置和***, MS发起 ES时, A-SFA可以通过获 取到的紧急业务标识判别此次业务为紧急业务,在其自身维护的 MS的上下文中构建紧急 业务指示符,与所述 A-SFA位于一起的 Authent icator根据所述紧急业务指示符暂停执行 针对所述 MS的移动性限制策略, 所述 A-SFA并将所述紧急业务标识发送到 S-SFA和 BS, 使 所述 S-SFA和 BS在其自身维护的 MS的上下文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略, 为所述 MS开放 ES。 进一步的, 在所述 MS使用紧急业务的过程中, 还可以实现切换。 进一步的, 在所述 MS使用紧急业务结束后, 还可以通过清除 MS的上下 文中的紧急业务指示符, 恢复针对所述 MS的移动性限制策略的执行, 并在网络侧发现所 述 MS处于网络接入区以外时, 发起 MS的退网过程。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可借助 软件加必需的通用硬件平台的方式来实现, 当然也可以通过硬件, 但很多情况下前者是 更佳的实施方式。 基于这样的理解, 本发明的技术方案本质上或者说对现有技术做出贡 献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在可读取的存储介质 中, 如计算机的软盘, 硬盘或光盘等, 包括若干指令用以使得一台计算机设备 (可以是 个人计算机, 服务器, 或者网络设备等) 执行本发明各个实施例所述的方法。 以上实施例仅用以说明本发明的技术方案, 而非对其限制; 尽管参照前述实施例对 本发明进行了详细的说明, 本领域的普通技术人员应当理解: 其依然可以对前述各实施 例所记载的技术方案进行修改, 或者对其中部分技术特征进行等同替换; 而这些修改或 者替换, 并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权利要求
1、 一种移动受限终端紧急业务的管理方法, 其特征在于, 该方法包括: 锚定业务流授权实体 A-SFA获取紧急业务信息或者紧急业务标识, 所述紧急业务信 息或者紧急业务标识用于指示为移动受限终端 MS提供紧急业务;
根据所述紧急业务信息或者紧急业务标识在自身维护的所述 MS的上下文中构建紧 急业务指示符;
发送数据通路注册请求到基站 BS, 若获取的为所述紧急业务标识, 则所述数据通路 注册请求中携带所述紧急业务标识,
或者, 若获取的为所述紧急业务信息, 则根据所述紧急业务指示符或所述紧急业务 信息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路注册请求 中。
2、 如权利要求 1所述的方法, 其特征在于, 所述 A-SFA获取紧急业务信息或者紧急 业务标识具体为:
接收来自语音业务提供商 VSP的发起紧急业务承载业务流建立的指示, 所述指示中 包含所述紧急业务信息;
或者, 接收来自认证、 授权和计费 AAA服务器的接入允许指示, 所述接入允许指示 中携带所述紧急业务标识:
或者, 接收来自策略控制和计费规则功能实体 PCRF的策略与计费控制 PCC指示, 所 述 PCC指示中携带所述紧急业务标识。
3、 如权利要求 2所述的方法, 其特征在于, 若所述 A-SFA接收了来自语音业务提供 商 VSP的发起紧急业务承载业务流建立的指示, 则在发送数据通路注册请求到 BS之前进 一步包括步骤:
所述 A-SFA发送资源预留请求到服务业务流授权实体 S-SFA,所述资源预留请求中携 带紧急业务标识,所述紧急业务标识是根据所述紧急业务指示符或所述紧急业务信息生 成的;
所述 S-SFA根据所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指 示符;
所述发送数据通路注册请求到 BS具体为所述 S-SFA将所述数据通路注册请求发送到 所述 BS, 所述数据通路注册请求中携带所述紧急业务标识;
之后进一步包括步骤: 所述 BS根据所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指示 符。
4、 如权利要求 3所述的方法, 其特征在于, 进一步包括步骤:
在所述 A-SFA收到来自所述 S-SFA的资源预留响应后, 与所述 A-SFA位于一起的鉴权 器暂停执行针对所述 MS的移动性限制策略, 所述 A-SFA发送资源预留应答给所述 S-SFA; 所述 S-SFA暂停执行针对所述 MS的移动性限制策略, 发送数据通路注册应答给所述
BS ;
所述 BS暂停执行针对所述 MS的移动性限制策略。
5、 如权利要求 2所述的方法, 其特征在于, 若所述 A-SFA接收了来自语音业务提供 商 VSP的发起紧急业务承载业务流建立的指示, 则在发送数据通路注册请求到 BS之前进 一步包括步骤:
与所述 A-SFA位于一起的鉴权器暂停执行针对所述 MS的移动性限制策略; 所述 A-SFA发送资源预留请求到服务业务流授权实体 S-SFA,所述资源预留请求中携 带紧急业务标识,所述紧急业务标识是根据所述紧急业务指示符或所述紧急业务信息生 成的;
所述 S-SFA根据所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指 示符, 暂停执行针对所述 MS的移动性限制策略;
所述发送数据通路注册请求到 BS具体为所述 S-SFA将所述数据通路注册请求发送到 所述 BS, 所述数据通路注册请求中携带所述紧急业务标识;
之后进一步包括步骤:
所述 BS根据所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指示 符, 暂停执行针对所述 MS的移动性限制策略。
6、 如权利要求 4或 5所述的方法, 其特征在于, 所述 MS使用紧急业务结束后, 进一 步包括步骤:
所述 A-SFA收到来自所述 S-SFA的资源预留响应后,将自身维护的 MS的上下文中的紧 急业务指示符清除, 与所述 A-SFA位于一起的鉴权器恢复执行针对所述 MS的移动性限制 策略, 所述 A-SFA向所述 S-SFA发送资源预留应答以确认所述业务流已经删除;
所述 S-SFA将自身维护的 MS的上下文中的紧急业务指示符清除, 并恢复执行针对所 述 MS的移动性限制策略, 向所述 BS发送数据通路注销应答; 所述 BS将自身维护的 MS的上下文中的紧急业务指示符清除,恢复执行针对所述 MS的 移动性限制策略。
7、 如权利要求 4或 5所述的方法, 其特征在于, 所述 MS使用紧急业务结束后, 进一 步包括步骤:
所述 A-SFA将自身维护的 MS的上下文中的紧急业务指示符清除, 发送资源预留请求 到所述 S-SFA, 发起删除承载所述紧急业务的业务流, 与所述 A-SFA位于一起的鉴权器恢 复执行针对所述 MS的移动性限制策略;
所述 S-SFA向所述 BS发送数据通路注销请求,所述 S-SFA将自身维护的 MS的上下文中 的紧急业务指示符清除, 并恢复执行针对所述 MS的移动性限制策略;
所述 BS将自身维护的 MS的上下文中的紧急业务指示符清除, 并恢复执行针对所述 MS 的移动性限制策略。
8、 如权利要求 4或 5所述的方法, 其特征在于, 若所述 MS在使用紧急业务的过程中 发生切换, 则进一步包括步骤:
所述 MS的服务基站接收来自所述 MS的移动台切换请求;
所述服务基站发送切换请求到目标基站, 所述切换请求中携带有 MS的上下文, 所述
MS的上下文包含有移动性限制参数和所述紧急业务指示符, 以使所述目标基站暂停执行 针对所述 MS的移动性限制策略。
9、 如权利要求 2所述的方法, 其特征在于, 若所述 A-SFA接收的是携带有所述紧急 业务标识的接入允许指示, 则此前进一步包括步骤:
所述 MS在与所述 AAA服务器之间的接入认证过程中通过网络接入标识标明此次认证 是针对紧急业务的;
所述 AAA服务器根据自身的紧急业务策略完成所述认证过程, 并根据所述网络接入 标识生成所述紧急业务标识。
10、 如权利要求 2所述的方法, 其特征在于, 若所述 A-SFA接收的是 PCC指示, 则此 前进一步包括步骤:
代理呼叫会话控制功能实体 P-CSCF接收来自所述 MS的会话发起协议邀请,所述会话 发起协议邀请的通用资源标识符指示此次业务为紧急业务;
所述 P-CSCF根据所述通用资源标识符生成所述紧急业务标识, 并将所述紧急业务标 识发送到所述 PCRF。
11、 如权利要求 10所述的方法, 其特征在于, 所述 P-CSCF接收会话发起协议邀请之 前进一步包括步骤:
所述 MS在与认证、 授权和计费 AAA服务器之间的接入认证过程中, 通过网络接入标 识标明此次认证是针对紧急业务的;
所述 AAA服务器根据自身的紧急业务策略完成所述认证过程, 并向所述 A-SFA发送接 入允许指示。
12、 如权利要求 9或 10或 11所述的方法, 其特征在于,
在发送数据通路注册请求到 BS之前进一步包括步骤:
与所述 A-SFA位于一起的鉴权器暂停执行针对所述 MS的移动性限制策略; 所述 A-SFA发送资源预留请求到服务业务流授权实体 S-SFA,所述资源预留请求中携 带所述紧急业务标识;
所述 S-SFA根据所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指 示符, 暂停执行针对所述 MS的移动性限制策略;
所述发送数据通路注册请求到 BS具体为所述 S-SFA将所述数据通路注册请求发送到 所述 BS, 所述数据通路注册请求中携带所述紧急业务标识;
此后进一步包括步骤:
所述 BS根据所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指示 符, 暂停执行针对所述 MS的移动性限制策略。
13、 如权利要求 12所述的方法, 其特征在于, 所述 MS使用紧急业务结束后, 进一步 包括步骤:
所述 A-SFA将自身维护的 MS的上下文中的紧急业务指示符清除, 发送资源预留请求 到所述 S-SFA, 发起删除承载所述紧急业务的业务流, 与所述 A-SFA位于一起的鉴权器恢 复执行针对所述 MS的移动性限制策略;
所述 S-SFA向所述 BS发送数据通路注销请求,所述 S-SFA将自身维护的 MS的上下文中 的紧急业务指示符清除, 并恢复执行针对所述 MS的移动性限制策略;
所述 BS将自身维护的 MS的上下文中的紧急业务指示符清除, 并恢复执行针对所述 MS 的移动性限制策略。
14、 如权利要求 12所述的方法, 其特征在于, 若所述 MS在使用紧急业务的过程中发 生切换, 则进一步包括步骤:
所述 MS的服务基站接收来自所述 MS的移动台切换请求; 所述服务基站发送切换请求到目标基站, 所述切换请求中携带有 MS的上下文, 所述 MS的上下文包含有移动性限制参数和所述紧急业务指示符, 以使所述目标基站暂停执行 针对所述 MS的移动性限制策略。
15、一种移动受限终端紧急业务的管理装置,其特征在于,所述装置包括获取模块、 上下文维护模块和发送模块, 其中:
所述获取模块用于获取紧急业务信息或者紧急业务标识;
所述上下文维护模块用于根据所述获取模块获取的所述紧急业务信息或者紧急业 务标识, 在终端 MS的上下文中构建紧急业务指示符;
所述发送模块用于发送数据通路注册请求到基站 BS或者发送资源预留请求到服务 业务流授权实体 S-SFA, 若所述获取模块获取的为所述紧急业务标识, 则所述数据通路 注册请求或资源预留请求中携带所述紧急业务标识, 或者, 若所述获取模块获取的为所 述紧急业务信息,则根据所述上下文维护模块的所述紧急业务指示符或所述获取模块获 取的紧急业务信息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通 路注册请求或资源预留请求中。
16、 如权利要求 15所述的装置, 其特征在于, 还包括移动性限制策略执行模块, 所述移动性限制策略执行模块用于根据所述上下文维护模块中的所述 MS的上下文 中的紧急业务指示符暂停执行针对所述 MS的移动性限制策略。
17、 一种基站, 其特征在于, 所述基站包括接收模块, 上下文维护模块和移动性限 制策略执行模块, 其中,
所述接收模块用于接收来自接入网网关的紧急业务标识;
所述上下文维护模块用于根据所述接收模块接收的所述紧急业务信息或者紧急业 务标识, 在终端 MS的上下文中构建紧急业务指示符;
所述移动性限制策略执行模块用于根据所述上下文维护模块中的所述 MS的上下文 中的紧急业务指示符暂停执行针对所述 MS的移动性限制策略。
18、 一种移动受限终端紧急业务的管理***, 其特征在于, 所述***包括第一接入 网网关和与之以可通信方式连接的基站 BS,
所述第一接入网网关包含锚定业务流授权实体 A-SFA, 用于获取紧急业务信息或者 紧急业务标识,所述紧急业务信息或者紧急业务标识用于指示为移动受限终端 MS提供紧 急业务; 根据所述紧急业务信息或者紧急业务标识在自身维护的所述 MS的上下文中构建紧 急业务指示符;
发送数据通路注册请求到所述 BS, 若获取的为所述紧急业务标识, 则所述数据通路 注册请求中携带所述紧急业务标识, 或者, 根据所述紧急业务指示符或所述紧急业务信 息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路注册请求中; 所述 BS用于根据来自所述第一接入网网关的紧急业务标识,在自身维护的所述 MS的 上下文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略。
19、 如权利要求 18所述的***, 其特征在于, 所述第一接入网网关还包括与所述 A-SFA位于一起的鉴权器,所述鉴权器用于根据所述 A-SFA上的所述 MS的上下文中的所述 紧急业务指示符暂停执行针对所述 MS的移动性限制策略。
20、 如权利要求 18或 19所述的***, 其特征在于, 所述***还包括第二接入业务网 网关, 所述第二接入业务网网关包含与所述第一接入业务网网关上的 A-SFA和所述 BS以 可通信方式连接的服务业务流授权实体 S-SFA, 其中,
所述第一接入业务网网关的 A-SFA还向所述第二接入业务网网关的 S-SFA发送资源 预留请求, 若获取的为所述紧急业务标识, 则所述资源预留请求中携带所述紧急业务标 识, 或者, 若获取的为所述紧急业务信息, 根据所述紧急业务指示符或所述紧急业务信 息生成紧急业务标识, 并将所述生成的紧急业务标识携带在所述数据通路注册请求中; 所述第二接入业务网网关的 S-SFA用于接收来自所述第一接入业务网网关的 A-SFA 的资源预留请求,根据所述资源预留请求中携带的所述紧急业务标识在自身维护的所述 MS的上下文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策略; 发送数据 通路注册请求到所述 BS, 所述数据通路注册请求中携带所述紧急业务标识;
所述 BS还用于根据来自所述第二接入业务网网关的 S-SFA的紧急业务标识, 在自身 维护的所述 MS的上下文中构建紧急业务指示符, 暂停执行针对所述 MS的移动性限制策 略。
PCT/CN2009/074924 2008-11-26 2009-11-17 一种移动受限终端紧急业务的管理方法、装置与*** WO2010060356A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/114,406 US8229391B2 (en) 2008-11-26 2011-05-24 Method, apparatus and system for managing emergency services of mobility-restricted mobile station

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810217683.0 2008-11-26
CN200810217683A CN101742454B (zh) 2008-11-26 2008-11-26 一种移动受限终端紧急业务的管理方法、装置与***

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/114,406 Continuation US8229391B2 (en) 2008-11-26 2011-05-24 Method, apparatus and system for managing emergency services of mobility-restricted mobile station

Publications (1)

Publication Number Publication Date
WO2010060356A1 true WO2010060356A1 (zh) 2010-06-03

Family

ID=42225256

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/074924 WO2010060356A1 (zh) 2008-11-26 2009-11-17 一种移动受限终端紧急业务的管理方法、装置与***

Country Status (3)

Country Link
US (1) US8229391B2 (zh)
CN (1) CN101742454B (zh)
WO (1) WO2010060356A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017107115A1 (zh) * 2015-12-23 2017-06-29 华为技术有限公司 一种下行紧急业务传输方法、基站、用户设备及***

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101546780B1 (ko) * 2008-12-18 2015-08-25 삼성전자주식회사 광대역 무선통신 망에서 서비스 플로우 변경 시 오류 처리를 위한 장치 및 방법
US20110094994A1 (en) 2009-10-26 2011-04-28 Applied Materials, Inc. Inductively coupled plasma apparatus
US9516176B2 (en) * 2012-05-31 2016-12-06 At&T Intellectual Property I, L.P. Long term evolution network billing management
US11122092B2 (en) * 2019-08-05 2021-09-14 Verizon Patent And Licensing Inc. System and method for prioritizing SIP registrations

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031135A (zh) * 2006-03-03 2007-09-05 华为技术有限公司 一种紧急呼叫方法及***
WO2008052744A2 (en) * 2006-10-30 2008-05-08 Nokia Corporation Processing of an emergency session in a wimax network
CN101198159A (zh) * 2007-12-17 2008-06-11 华为技术有限公司 全球微波接入互操作性网络中紧急服务呼叫的处理方法
WO2008093218A2 (en) * 2007-01-31 2008-08-07 Nokia Corporation Emergency and priority calling support in wimax

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6041047A (en) * 1992-10-05 2000-03-21 Telefonaktiebolaget Lm Ericsson Digital control channels having logical channels supporting broadcast SMS
GB2361389B (en) * 2000-04-15 2004-01-28 Ericsson Telefon Ab L M Telecommunications system
WO2003063536A1 (en) * 2002-01-25 2003-07-31 Nokia Corporation Emergency session request handling in a network
US7539186B2 (en) * 2003-03-31 2009-05-26 Motorola, Inc. Packet filtering for emergency service access in a packet data network communication system
US8145182B2 (en) * 2004-05-07 2012-03-27 Interdigital Technology Corporation Supporting emergency calls on a wireless local area network
MX2007007461A (es) * 2004-12-23 2007-08-20 Ericsson Telefon Ab L M Metodo para informar a multiples terminales moviles de un evento de emergencia.
US20060258354A1 (en) 2005-05-13 2006-11-16 Ul Haq Tanveer Method for restricting mobility in wireless mobile systems
US10178522B2 (en) * 2005-08-02 2019-01-08 Qualcomm Incorporated VoIP emergency call support
US20070213029A1 (en) * 2006-01-13 2007-09-13 Nokia Corporation System and Method for Provisioning of Emergency Calls in a Shared Resource Network
CN101014004B (zh) 2007-01-16 2011-08-24 华为技术有限公司 紧急呼叫处理方法和***以及一种软交换
US8107954B2 (en) * 2007-03-09 2012-01-31 Research In Motion Limited System and method for wireless network selection by multi-mode devices
US8452285B2 (en) * 2007-05-10 2013-05-28 Sparkmotion Inc. Method for handover in wireless communications network comprising a number of sub-networks
EP2241055B1 (en) * 2008-02-07 2016-04-13 Telefonaktiebolaget LM Ericsson (publ) Communicating cell restriction status information between radio access network nodes
US8041335B2 (en) * 2008-04-18 2011-10-18 Kineto Wireless, Inc. Method and apparatus for routing of emergency services for unauthorized user equipment in a home Node B system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101031135A (zh) * 2006-03-03 2007-09-05 华为技术有限公司 一种紧急呼叫方法及***
WO2008052744A2 (en) * 2006-10-30 2008-05-08 Nokia Corporation Processing of an emergency session in a wimax network
WO2008093218A2 (en) * 2007-01-31 2008-08-07 Nokia Corporation Emergency and priority calling support in wimax
CN101198159A (zh) * 2007-12-17 2008-06-11 华为技术有限公司 全球微波接入互操作性网络中紧急服务呼叫的处理方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017107115A1 (zh) * 2015-12-23 2017-06-29 华为技术有限公司 一种下行紧急业务传输方法、基站、用户设备及***
US10313863B2 (en) 2015-12-23 2019-06-04 Huawei Technologies Co., Ltd. Downlink emergency service transmission method, base station, user equipment, and system

Also Published As

Publication number Publication date
US20110281548A1 (en) 2011-11-17
CN101742454A (zh) 2010-06-16
US8229391B2 (en) 2012-07-24
CN101742454B (zh) 2012-10-17

Similar Documents

Publication Publication Date Title
JP7025528B2 (ja) ネットワークハンドオーバ方法、装置、およびシステム
US7809003B2 (en) Method for the routing and control of packet data traffic in a communication system
JP5588017B2 (ja) 発展型パケットシステム及びその緊急呼出のアタッチメント処理方法
WO2008131689A1 (fr) Procédé et système de fourniture d'un service de communication d'urgence et dispositifs correspondants
WO2019196785A1 (zh) 语音切换方法和装置、终端及存储介质
WO2009100609A1 (zh) 一种单无线信道语音业务连续性的域切换方法
WO2013189217A1 (zh) 分组网关标识信息的更新方法、aaa服务器和分组网关
WO2010081329A1 (zh) 业务流迁移过程中对网络资源进行控制的方法和***
KR20110138548A (ko) 응급 콜을 지원하는 이동 통신 시스템에서 보안 관리 방법 및 장치와 그 시스템
KR101148036B1 (ko) Lte망과 무선랜망간의 핸드오버 방법 및 그 시스템
WO2008128454A1 (fr) Procédé et appareil de contrôle de politique et de facturation
WO2010063175A1 (zh) 实现数据网关切换的方法、装置和***
WO2006122487A1 (fr) MÉTHODE ET SYSTÈME POUR CHANGER LA QdS DANS UN I-WLAN
WO2011147074A1 (zh) 策略与计费控制的实现方法、***及相应设备
WO2009046598A1 (fr) Procédé pour établir une porteuse dédiée pour un terminal utilisateur
CN107404715B (zh) 位置信息提供方法及装置
WO2010060356A1 (zh) 一种移动受限终端紧急业务的管理方法、装置与***
WO2010108367A1 (zh) 业务切换方法、业务信息控制方法、相关设备及***
WO2016065639A1 (zh) 数据处理的方法、装置、终端、移动管理实体及***
WO2011134102A1 (zh) 关联会话的方法、装置及***
WO2019029228A1 (zh) 语音业务的处理方法及装置、存储介质
WO2011020273A1 (zh) 一种紧急业务的处理方法和***
WO2010091589A1 (zh) 一种安全认证方法
WO2012023420A1 (ja) 移動通信方法及びポリシー制御ノード
WO2010043095A1 (zh) 一种用于用户注册失败处理的方法及移动管理实体

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09828616

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09828616

Country of ref document: EP

Kind code of ref document: A1