CN115087071B - Slice management method, user equipment and storage medium - Google Patents

Slice management method, user equipment and storage medium Download PDF

Info

Publication number
CN115087071B
CN115087071B CN202110281461.0A CN202110281461A CN115087071B CN 115087071 B CN115087071 B CN 115087071B CN 202110281461 A CN202110281461 A CN 202110281461A CN 115087071 B CN115087071 B CN 115087071B
Authority
CN
China
Prior art keywords
application
slice
network slice
user equipment
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110281461.0A
Other languages
Chinese (zh)
Other versions
CN115087071A (en
Inventor
丁志东
周晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202110281461.0A priority Critical patent/CN115087071B/en
Publication of CN115087071A publication Critical patent/CN115087071A/en
Application granted granted Critical
Publication of CN115087071B publication Critical patent/CN115087071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Abstract

The disclosure provides a slice management method, user equipment and a storage medium, wherein the method comprises the following steps: the user equipment sets slicing admittance rules for each application installed in the user equipment; when an application initiates a service request, judging whether the application is in a state of admitting access to a network slice or not based on a slice admittance rule of the application; if yes, permitting the network slice request of the application; if not, the network slice request of the application is masked. The technical scheme provided by the disclosure realizes that the access of the network slice is limited at the user equipment side based on the user demand, and improves the user experience.

Description

Slice management method, user equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a slice management method, a user equipment, and a computer readable storage medium.
Background
The network slicing technology is a key technology of 5G (5 th Generation mobile networks or 5th Generation wireless systems, 5th-Generation, fifth Generation mobile communication technology) and aims to provide services for different tenants and differentiated services through a customized network. Wherein the single network slice selection assistance information (S-nsai, single Network Slice Selection Assistance Information for short) identifies a particular network slice, which is not repeated within the public land mobile network (PLMN, public Land Mobile Network). In the registration process of the network slice, the UE (User Equipment) sends a request for selecting the network slice to the RAN (Radio Access Network) according to the Configured network slice selection assistance information (Configured nsai, configured Network Slice Selection Assistance Information for short) and the Allowed network slice selection assistance information (Allowed nsai, allowed Network Slice Selection Assistance Information for short) of the current network, and the RAN selects the access and mobility management entity (AMF, access and Mobility Management Function) according to the Requested nsai to complete the subsequent registration process.
The inventors have found that if a certain Application (APP) on the user equipment is to use the network slice service, the Application needs to actively transfer a specific network capability parameter, and the Operating System (OS) of the user equipment passes the parameter to a modulation unit (modem), and the modulation unit completes the subsequent flow. However, the operating system of the user equipment currently does not have the capability of allowing the user to autonomously control the connection of the network slice, and cannot limit the use of the network slice, and simply setting a certain setting item of the application cannot control whether the network slice is accessed or not, so that inconvenience is brought to the use of the user in a scenario that the user may want to limit the access of the network slice based on the factor of control cost or other user self factors.
Disclosure of Invention
The present disclosure has been made in order to at least partially solve the technical problems occurring in the prior art.
According to an aspect of the embodiments of the present disclosure, there is provided a slice management method, which is applied to a user equipment, including:
respectively performing slicing admittance rule setting on each application installed in the user equipment;
when an application initiates a service request, judging whether the application is in a state of admitting access to a network slice or not based on a slice admittance rule of the application;
if yes, permitting the network slice request of the application;
if not, the network slice request of the application is masked.
According to another aspect of the embodiments of the present disclosure, there is provided a user equipment including:
the setting module is used for setting slicing admittance rules for all applications installed in the user equipment respectively;
the judging module is used for judging whether an application is in a state of admitting to a network slice or not currently based on a slice admittance rule of the application when the application initiates a service request; the method comprises the steps of,
the processing module is used for permitting the network slice request of the application when the judging module judges that the application is in the state of permitting access to the network slice currently; and shielding the network slice request of the application when the judging module judges that the application is in the state of prohibiting access to the network slice currently.
According to yet another aspect of the embodiments of the present disclosure, there is provided a user equipment including a memory and a processor, the memory storing a computer program therein, the processor executing the aforementioned slice management method when the processor runs the computer program stored in the memory.
According to still another aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the aforementioned slice management method.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
according to the slice management method provided by the embodiment of the disclosure, the user equipment judges whether the application initiating the service request is currently permitted to access the network slice based on the preset slice access rule, if not, the network slice request of the application is directly shielded, so that the access of the network slice can be limited on the user equipment side based on the user requirement, and the user experience is improved.
Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the disclosure. The objectives and other advantages of the disclosure will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosed embodiments and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain, without limitation, the disclosed embodiments.
Fig. 1 is a schematic flow chart of a slice management method according to an embodiment of the disclosure;
fig. 2 is one of schematic structural diagrams of a user equipment according to an embodiment of the present disclosure;
fig. 3 is a second schematic structural diagram of a ue according to an embodiment of the present disclosure.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the following detailed description of the specific embodiments of the present disclosure will be given with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present disclosure, and are not of specific significance per se. Thus, "module," "component," or "unit" may be used in combination.
Fig. 1 is a flow chart of a slice management method according to an embodiment of the disclosure. As shown in fig. 1, the method includes the following steps S101 to S104.
S101, respectively performing slicing admittance rule setting on all Applications (APP) installed in user equipment;
s102, when an application initiates a service request, judging whether the application is in a state of admitting access to a network slice currently based on a slice admittance rule of the application, if so, executing step S103; if not, executing step S104;
s103, permitting a network slice request of the application;
s104, shielding the network slice request of the application.
In this embodiment, the user equipment determines whether the application that initiates the service request currently grants access to the network slice based on the preset slice admission rule, and if not, directly masks the network slice request of the application, so that access of the network slice can be restricted at the user equipment side based on user requirements (such as factors based on control cost or other user factors, and the like), and user experience is improved.
In a specific embodiment, the slice admission rule includes: the application is permitted to access the network slice for a preset period of time.
In this embodiment, the slice admission rules of each application may be set according to the personal requirement of the user, and the settings of whether and when to admit access to the network slice may be made for each application.
For example, if the application a grants access to the network slice in the preset time period A1, in a time period other than A1, when the application a initiates a service request, it is known according to the slice admission rule of the application a that the application a is currently in a state of prohibiting access to the network slice, and the user equipment shields the network slice request of the application a; the user equipment grants the network slice request of application a only if application a initiates a service request within time period A1.
If the preset time period of the access network slice permitted by the application B is zero, that is, the application B does not permit the access network slice in all time periods, then whenever the application B initiates a service request, the user equipment will mask the network slice request of the application B until the user changes the slice admission rule of the application B.
In one embodiment, step S101 includes the following steps S1011 and S1012.
S1011, providing a visual operation interface;
s1012, receiving slice admittance rules respectively set by a user for each application on a visual operation interface.
In this embodiment, by providing a visual operation interface for a user, the user can set a slice admission rule for each application on the visual operation interface.
In a specific embodiment, after step S101, the method further includes the following step S105:
s105, storing the set slice admission rules of each application.
In this embodiment, after the slicing admission rules of each application are set according to the personal requirement of the user, the user setting information may be stored, so that the subsequent judgment and use are facilitated. The memory of the user equipment can be used for storing the user setting information.
It should be noted that, the slice management method disclosed in the present disclosure cannot be implemented by simply setting a certain setting item of the APP, that is, whether the network slice is accessed or not cannot be controlled by setting a certain setting item of the APP. In addition, in the slice management method disclosed in the present disclosure, based on a preset slice admission rule, it is determined whether an APP currently grants access to a network slice to determine whether to mask a network slice request of the APP, and there is also a substantial difference between determining a certain setting item of the APP to determine a next operation, and taking the APP automatically determines whether to allow automatic update or built-in data update using data traffic without WiFi being turned on as an example, the specific analysis is as follows:
the APP automatically identifies the network type (cellular network or WIFI network) based on the network type parameter of calling an Operating System (OS), wherein the parameter is an existing interface of the OS, and the APP directly calls. The slice switch (i.e. whether to permit the network slice request of the APP) according to the present disclosure, because the OS does not have parameters and interfaces of related slices and has no capability of controlling the connection of the network slices, the OS cannot be used to limit the access of the network slices, so as to solve the problem, the present disclosure determines whether the APP is currently permitted to access the network slices by presetting slice access rules of various APPs to determine whether to mask the network slice request of the APP, which is essentially different from a setting item of the APP alone.
For ease of understanding, the following will take the Android system as an example to outline the difference between the implementation procedure of APP automatic identification network type (Cellular or WiFi) and whether the APP related to the present disclosure grants access to a network slice:
1) And the APP monitors network type parameters through a connectitymanager interface of the Android, judges whether data are currently available in a corresponding callback celluar network call back (taking a cellular network as an example), and directly creates a Socket or indirectly creates the Socket through other network libraries (commonly used OkHttp) to communicate with a server if the data are available.
2) APP uses slice service flow:
if the APP is to use slice services, the relevant slice parameters need to be transmitted to the modem (modulation unit) through the requestNetwork interface of the Android, and at this time, the actual slice parameters (the parameters just characterize slice registration related parameters such as the urs p rule parameters, slice identifiers, etc.) are received by the callback, and it is noted that no special slice interface nor explicit slice parameters exist in the process, and the specific registration parameters are transmitted in the whole process.
Therefore, if access to the network slice is to be controlled, a corresponding functional module (corresponding to the aforementioned steps S102 to S104) needs to be additionally added to complete access control of the network slice between the APP and the OS, so that simply setting a certain setting item of the APP cannot realize access control of the network slice.
According to the slice management method provided by the embodiment of the disclosure, when an application installed in user equipment initiates a service request, the user equipment judges whether the application is currently permitted to access a network slice or not based on a preset slice admittance rule, if so, the network slice request of the application is not processed at all, and the network slice request of the application is directly permitted; if not, the network slicing request of the application is shielded, namely the network slicing request of the application is not initiated, so that the access of the network slicing is limited on the user equipment side based on the user requirement, and the user experience is improved.
Based on the same technical concept, the embodiments of the present disclosure correspondingly provide a user equipment, as shown in fig. 2, where the user equipment 2 includes: a setting module 21, a judging module 22 and a processing module 23.
Wherein, the setting module 21 is configured to set slicing admittance rules for each application installed in the user equipment; the judging module 22 is configured to judge whether an application is currently in a state of admitting access to a network slice based on a slice admittance rule of the application when the application initiates a service request; the processing module 23 is configured to grant the network slice request of the application when the judging module 22 judges that the application is currently in the state of granting access to the network slice; and shielding the network slice request of the application when the judging module 22 judges that the application is in the state of prohibiting access to the network slice currently.
In a specific embodiment, the slice admission rules set by the setting module 21 include: the application is permitted to access the network slice for a preset period of time.
In one embodiment, the setting module 21 includes: an interface unit and a receiving unit.
Wherein the interface unit is arranged to provide a visual operation interface; the receiving unit is configured to receive slice admittance rules respectively set by a user for each application on the visual operation interface.
In a specific embodiment, the user equipment 2 further comprises: a storage module 24.
The storage module 24 is arranged to store the slice admission rules for each application that has been set by the setting module 21.
Based on the same technical concept, the embodiments of the present disclosure correspondingly further provide a user equipment, as shown in fig. 3, where the user equipment 3 includes a memory 31 and a processor 32, where the memory 31 stores a computer program, and when the processor 32 runs the computer program stored in the memory 31, the processor 32 executes the slice management method described above.
When a service request is initiated by an application installed in the user equipment provided by the embodiment of the disclosure, judging whether the application is currently permitted to access a network slice or not based on a preset slice admittance rule, if so, not performing any processing on the network slice request of the application, and directly permitting the network slice request of the application; if not, the network slicing request of the application is shielded, namely the network slicing request of the application is not initiated, so that the access of the network slicing is limited on the user equipment side based on the user requirement, and the user experience is improved.
Based on the same technical concept, the embodiments of the present disclosure correspondingly further provide a computer-readable storage medium having a computer program stored thereon, which when executed by a processor, performs the aforementioned slice management method.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present disclosure, and not for limiting the same; although the present disclosure has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present disclosure.

Claims (8)

1. A slice management method, applied to a user equipment, the method comprising:
slice admission rule setting is respectively carried out on each application installed in user equipment to set whether each application is permitted to access a network slice and when each application is permitted to access the network slice, and the slice admission rule comprises: permitting the application to access the network slice within a preset time period;
when an application initiates a service request, judging whether the application is in a state of admitting access to a network slice or not based on a slice admittance rule of the application;
if yes, permitting the network slice request of the application;
if not, the network slice request of the application is masked.
2. The method according to claim 1, wherein the slicing admission rule setting is performed on each application installed in the user equipment, respectively, and includes:
providing a visual operation interface; the method comprises the steps of,
and receiving slice admittance rules respectively set by the user for each application on the visual operation interface.
3. The method as recited in claim 1, further comprising:
the set slice admission rules for each application are stored.
4. A user device, comprising:
a setting module configured to set slice admission rules for each application installed in a user equipment to set whether and when each application is admitted to an access network slice, the slice admission rules comprising: permitting the application to access the network slice within a preset time period;
the judging module is used for judging whether an application is in a state of admitting to a network slice or not currently based on a slice admittance rule of the application when the application initiates a service request; the method comprises the steps of,
the processing module is used for permitting the network slice request of the application when the judging module judges that the application is in the state of permitting access to the network slice currently; and shielding the network slice request of the application when the judging module judges that the application is in the state of prohibiting access to the network slice currently.
5. The user device of claim 4, wherein the setting module comprises:
an interface unit configured to provide a visual operation interface; the method comprises the steps of,
and the receiving unit is used for receiving slice admittance rules respectively set by the user for each application on the visual operation interface.
6. The user equipment of claim 4, further comprising:
and the storage module is used for storing the slicing admittance rules of each application set by the setting module.
7. A user equipment comprising a memory and a processor, the memory having stored therein a computer program, which when executed by the processor performs the slice management method according to any one of claims 1 to 3.
8. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, performs the slice management method according to any one of claims 1 to 3.
CN202110281461.0A 2021-03-16 2021-03-16 Slice management method, user equipment and storage medium Active CN115087071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110281461.0A CN115087071B (en) 2021-03-16 2021-03-16 Slice management method, user equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110281461.0A CN115087071B (en) 2021-03-16 2021-03-16 Slice management method, user equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115087071A CN115087071A (en) 2022-09-20
CN115087071B true CN115087071B (en) 2024-01-30

Family

ID=83246411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110281461.0A Active CN115087071B (en) 2021-03-16 2021-03-16 Slice management method, user equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115087071B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107919969A (en) * 2016-10-09 2018-04-17 ***通信有限公司研究院 Policy control method and device
CN109391648A (en) * 2017-08-04 2019-02-26 华为技术有限公司 It is a kind of to apply correlating method, device and the communication system being sliced with network
CN109565732A (en) * 2016-08-10 2019-04-02 日本电气株式会社 Wireless access network node, wireless terminal, core net node and its method
CN110391926A (en) * 2018-04-20 2019-10-29 ***通信有限公司研究院 Network is sliced application control method and device, communication equipment and storage medium
CN111698725A (en) * 2020-06-23 2020-09-22 腾讯科技(深圳)有限公司 Method for dynamically determining network slice and electronic equipment
CN112020121A (en) * 2018-01-19 2020-12-01 Oppo广东移动通信有限公司 Access control method, device and computer storage medium
CN112075055A (en) * 2018-02-02 2020-12-11 诺基亚通信公司 Using self-operation use cases to identify and solve problems causing network slice reselection
CN112152926A (en) * 2019-06-28 2020-12-29 华为技术有限公司 Method and device for managing network slices of application
CN112350847A (en) * 2020-04-21 2021-02-09 中兴通讯股份有限公司 Network selection method, connection method, terminal and storage medium
CN112448830A (en) * 2019-08-30 2021-03-05 中国电信股份有限公司 Network slicing implementation method, entity and system
WO2022016050A1 (en) * 2020-07-17 2022-01-20 Google Llc Permission-based network slice selection

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109565732A (en) * 2016-08-10 2019-04-02 日本电气株式会社 Wireless access network node, wireless terminal, core net node and its method
CN107919969A (en) * 2016-10-09 2018-04-17 ***通信有限公司研究院 Policy control method and device
CN109391648A (en) * 2017-08-04 2019-02-26 华为技术有限公司 It is a kind of to apply correlating method, device and the communication system being sliced with network
CN112020121A (en) * 2018-01-19 2020-12-01 Oppo广东移动通信有限公司 Access control method, device and computer storage medium
CN112075055A (en) * 2018-02-02 2020-12-11 诺基亚通信公司 Using self-operation use cases to identify and solve problems causing network slice reselection
CN110391926A (en) * 2018-04-20 2019-10-29 ***通信有限公司研究院 Network is sliced application control method and device, communication equipment and storage medium
CN112152926A (en) * 2019-06-28 2020-12-29 华为技术有限公司 Method and device for managing network slices of application
CN112448830A (en) * 2019-08-30 2021-03-05 中国电信股份有限公司 Network slicing implementation method, entity and system
CN112350847A (en) * 2020-04-21 2021-02-09 中兴通讯股份有限公司 Network selection method, connection method, terminal and storage medium
CN111698725A (en) * 2020-06-23 2020-09-22 腾讯科技(深圳)有限公司 Method for dynamically determining network slice and electronic equipment
WO2022016050A1 (en) * 2020-07-17 2022-01-20 Google Llc Permission-based network slice selection

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Satisfying network slicing constraints via 5G MAC scheduling;Silvio Mandelli;《IEEEXplore》;全文 *
网络切片标准分析与发展现状;魏垚;谢沛荣;;移动通信(第04期);全文 *

Also Published As

Publication number Publication date
CN115087071A (en) 2022-09-20

Similar Documents

Publication Publication Date Title
CN115484659B (en) Network access control method, device, computer readable medium and electronic equipment
EP3614654B1 (en) Ims parameter configuration method, system and mobile terminal
US11190985B1 (en) Internet of things (IoT) devices wireless communication service management platform
EP3837805B1 (en) Methods, apparatus and computer-readable mediums supporting subscriptions to events in a core network
KR20120025997A (en) Apparatus and method for supporting location update registration process in machine to machine communication system
CN107005832B (en) Network registration method and device for terminal and terminal
US20230319577A1 (en) Postponed esim delivery to secondary mobile wireless device for cellular wireless service subscription
US20160088463A1 (en) Method and apparatus to manage user/device profiles for public safety applications
CN112673659A (en) Method and electronic device for automatically switching between multiple profiles in an ESIM
CN105530665B (en) Method and device for adjusting DRX period of intelligent terminal in idle state
CN104285473B (en) Method and apparatus for the multipriority access in Radio Network System
CN115087071B (en) Slice management method, user equipment and storage medium
WO2015176535A1 (en) Sim registration method, terminal, network server, computer program, and carrier
CN112165718B (en) Network configuration method and device of terminal, storage medium, terminal and baseband chip
EP3758396B1 (en) Communication control device, communication setting method, communication setting program, and communication system
CN103828458A (en) Processing device, communication system, communication terminal, method for controlling terminal device, and non-transitory computer readable medium in which program is stored
CN114616899A (en) Terminal control apparatus and method
US20230171689A1 (en) Controlling radio modem power-save mode
EP4189933B1 (en) Methods and apparatuses for policy control
US20240129896A1 (en) Methods and systems for providing communication between a multi-sim user equipment and networks
WO2021208572A1 (en) Information obtaining method and apparatus, electronic device, and computer readable storage medium
US20240121592A1 (en) Method for suspending service and method for indicating suspension
US20230084955A1 (en) Activation of One of a Maximum Number of Communication Profiles Associated With a User
US20230052844A1 (en) Device imei/imeisv/tac screening and steering while roaming in wireless networks
US20220322489A1 (en) Controlling and restricting of user identities per ue

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant