WO2023213177A1 - Procédé et appareil de communication - Google Patents

Procédé et appareil de communication Download PDF

Info

Publication number
WO2023213177A1
WO2023213177A1 PCT/CN2023/088281 CN2023088281W WO2023213177A1 WO 2023213177 A1 WO2023213177 A1 WO 2023213177A1 CN 2023088281 W CN2023088281 W CN 2023088281W WO 2023213177 A1 WO2023213177 A1 WO 2023213177A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
information
message
identification
allowed
Prior art date
Application number
PCT/CN2023/088281
Other languages
English (en)
Chinese (zh)
Inventor
封召
辛阳
王远
胡力
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023213177A1 publication Critical patent/WO2023213177A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the embodiments of the present application relate to fields such as communication, and in particular, to a communication method and device.
  • Embodiments of the present application provide a communication method and device to improve communication security.
  • a communication method is provided.
  • the execution subject of the method can be a data management network element or a component applied in the data management network element, such as a chip, a processor, etc.
  • the following description takes the execution subject being the data management network element as an example.
  • the data management network element may receive a first message from the first device.
  • the first message includes first indication information, an identification of the terminal device, and a target type.
  • the first indication information is used to indicate a target request for network information.
  • Devices and targets use devices.
  • the data management network element may send a second message to the second device corresponding to the network information of the target type based on the first message and the subscription information of the terminal device; wherein the second message is To obtain network information of the target type.
  • the data management network element can verify the first message. Only after the verification passes, the corresponding network information will be obtained, which can improve communication security.
  • the subscription information includes allowed requesting devices and allowed usage devices.
  • the allowed request device and the allowed use device include: the allowed request device is an application function device, and the allowed use device is a terminal device; or, the allowed request device is a terminal device; The requesting device and the allowed use device are both application function devices; or the allowed requesting device and the allowed use device are both terminal devices.
  • the data management network element determines that authorization conditions are met based on the first message and the subscription information of the terminal device; and sends the second device corresponding to the target type of network information. Two messages.
  • the allowed requesting device and the allowed usage device included in the subscription information include the target requesting device and the target usage device
  • Requesting a device and using a device can be regarded as a method of obtaining network information.
  • the data management network element verifies the method of obtaining network information, regardless of the content of the obtained network information.
  • the target requesting device and the target usage device are determined.
  • the device does not meet the authorization conditions.
  • Requesting equipment and using equipment can be regarded as ways to obtain network information.
  • Data management network The method of obtaining network information is verified independently of the content of the obtained network information.
  • the subscription information does not include the type of network information that is allowed to be obtained and the first message includes the target type, it is determined that the target type meets the authorization conditions; or, if the subscription The information includes a type of network information that is allowed to be obtained, and the first message includes the target type.
  • the type of network information that is allowed to be obtained includes the target type, it is determined that the target type complies with the authorization. condition.
  • the types of network information include: event identifiers and/or analysis identifiers.
  • the subscription information does not include an allowed service identifier and the first message includes a target service identifier, it is determined that the target service identifier meets the authorization conditions; or, if the subscription information includes an allowed service identifier, The first message includes a target service identifier.
  • the allowed service identifiers included in the subscription information include the target service identifier, it is determined that the target service identifier meets the authorization conditions.
  • the subscription information does not include an identification of an application function that allows obtaining network information
  • the first message includes an identification of a target application function
  • the subscription information includes an identification of an application function that is allowed to obtain network information
  • the first message includes an identification of a target application function
  • the identification of an application function that is allowed to obtain network information included in the subscription information includes the When identifying the target application function, it is determined that the identification of the target application function meets the authorization conditions.
  • the subscription information does not include an identification of an application that is allowed to obtain network information and the first message includes an identification of a target application, it is determined that the identification of the target application meets the authorization conditions;
  • the subscription information includes an identification of an application that is allowed to obtain network information
  • the first message includes an identification of a target application, and when the identification of an application that is allowed to obtain network information included in the subscription information includes the When the identification of the target application is determined, it is determined that the identification of the target application meets the authorization conditions.
  • the data management network element receiving the first message from the first device includes: the data management network element receiving the first message from the first device through a third device.
  • the second message includes the address of the third device, and the address of the third device is used by the second device to send the network information of the target type to the third device.
  • Network information is obtained through forwarding by a third device.
  • the third device can also perform compliance verification on the first message to improve communication security.
  • the third device may be NEF.
  • the first device is an application function device or a terminal device
  • the second device is any one of the following: user plane functional device, access management functional device, network data analysis functional device, session management functional device, operation supervision and management device, application functional device .
  • a communication method is provided.
  • the execution subject of the method may be the first device or a component applied in the first device, such as a chip, a processor, etc.
  • the following description takes the execution subject being the first device as an example.
  • the first device sends first information to the data management network element.
  • the first message includes first indication information, an identification of the terminal device, and a target type.
  • the first indication information is used to indicate the target requesting device and target usage of network information.
  • Equipment so that the data management network element sends a request to the network of the target type based on the first message and the subscription information of the terminal device.
  • the second device sends a second message corresponding to the network information; wherein the second message is used to obtain the network information of the target type.
  • a communication device which device has the function of implementing any of the above aspects and any possible implementation of any aspect. These functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more functional modules corresponding to the above functions.
  • the communication device includes: a receiving module, configured to receive a first message from a first device, where the first message includes first indication information, an identification of the terminal device, and a target type, where the first indication information is For indicating the target requesting device and the target using device of the network information; the sending module is configured to send a second device to the second device corresponding to the network information of the target type based on the first message and the subscription information of the terminal device. Two messages; wherein the second message is used to obtain network information of the target type.
  • the communication device includes: a sending module, configured to send a first message to the data management network element.
  • the first message includes first indication information, an identification of the terminal device, and a target type.
  • the first indication information is To indicate the target requesting device and the target using device of the network information, so that the data management network element sends a message to the second device corresponding to the network information of the target type based on the first message and the subscription information of the terminal device.
  • the second message wherein the second message is used to obtain the network information of the target type.
  • a communication device including a processor and, optionally, a memory; the processor is coupled to the memory; the memory is used to store computer programs or instructions; the processor, For executing part or all of the computer programs or instructions in the memory, when the part or all of the computer programs or instructions are executed, in a method for implementing any of the above aspects and any possible implementation of any aspect. function.
  • the device may further include a transceiver, and the transceiver is configured to send signals processed by the processor, or receive signals input to the processor.
  • the transceiver may perform transmitting actions or receiving actions in any aspect and any possible implementation of any aspect.
  • the present application provides a chip system.
  • the chip system includes one or more processors (which may also be referred to as processing circuits), and the processors are electrically coupled to a memory (which may also be referred to as a storage medium).
  • the memory may be located in the chip system, or may not be located in the chip system; the memory is used to store computer programs or instructions; the processor is used to execute part or all of the memory Computer programs or instructions, when part or all of the computer programs or instructions are executed, are used to implement the functions in any of the above aspects and any possible implementation method of any aspect.
  • the chip system may also include an input-output interface (which may also be called a communication interface).
  • the input-output interface is used to output signals processed by the processor, or to receive input to the processor. signal to the processor.
  • the input and output interface can perform sending actions or receiving actions in any aspect and any possible implementation of any aspect. Specifically, the output interface performs the sending action, and the input interface performs the receiving action.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • a computer-readable storage medium for storing a computer program including instructions for implementing the functions of any aspect and any possible implementation of any aspect.
  • a computer-readable storage medium for storing a computer program executed by a computer When executed, the computer may be caused to execute any of the above aspects and any possible implementation method of any aspect.
  • a computer program product includes: computer program code.
  • the computer program code When the computer program code is run on a computer, it causes the computer to execute any of the above aspects and any possibility of any aspect. method in the implementation.
  • a communication system which communication system includes a data management network element that performs the above first aspect and the method in any possible implementation of the first aspect, and a data management network element that performs the above second aspect and the second aspect. Any possible implementation of the method in the first device.
  • a ninth aspect provides a communication system, which includes a method for performing the above first aspect and any possible implementation of the first aspect and a second device; the second device is configured to receive the The above-mentioned data management network element sends a message; the message is used to obtain the network information of the target type.
  • Figure 1a is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • Figure 1b is a schematic structural diagram of another communication system provided by an embodiment of the present application.
  • Figure 2 is a schematic diagram of a communication flow provided by an embodiment of the present application.
  • Figure 3 is a schematic diagram of a communication process provided by an embodiment of the present application.
  • Figure 4 is a schematic diagram of a communication flow provided by an embodiment of the present application.
  • Figure 5 is a schematic diagram of a communication process provided by an embodiment of the present application.
  • Figure 6 is a structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 7 is a structural diagram of a communication device provided by an embodiment of the present application.
  • system architecture of the method provided by the embodiments of the present application will be briefly described below. It can be understood that the system architecture described in the embodiments of the present application is to more clearly illustrate the technical solutions of the embodiments of the present application, and does not constitute a limitation on the technical solutions provided by the embodiments of the present application.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, such as satellite communication systems and traditional mobile communication systems.
  • the satellite communication system can be integrated with the traditional mobile communication system (ie, terrestrial communication system).
  • Communication systems such as: wireless local area network (WLAN) communication system, wireless fidelity (WiFi) system, long term evolution (LTE) system, LTE frequency division duplex (FDD) ) system, LTE time division duplex (TDD), fifth generation (5th generation, 5G) system or new radio (NR), sixth generation (6th generation, 6G) system, and other future Communication systems, etc., also support communication systems integrating multiple wireless technologies.
  • WLAN wireless local area network
  • WiFi wireless fidelity
  • LTE long term evolution
  • FDD LTE frequency division duplex
  • TDD LTE time division duplex
  • 5th generation, 5G LTE time division duplex
  • NR new radio
  • 6th generation, 6G and other future Communication systems, etc.
  • non-terrestrial networks such as drones, satellite communication systems,
  • the following uses only the fifth generation communication system as an example to describe the application scenarios of the embodiments of the present application and The method of the embodiment of this application.
  • This application takes the 5G communication system as an example.
  • FIG. 1a is a schematic diagram of a 5G communication system architecture to which this application can be applied.
  • Figure 1a is a schematic diagram of the 5G network architecture based on service-based architecture.
  • Figure 1b is a schematic diagram of another 5G communication system architecture to which this application can be applied.
  • Figure 1b is a schematic diagram of the 5G architecture based on point-to-point.
  • the main difference between Figure 1a and Figure 1b is that the interfaces between the network elements in Figure 1a are service-oriented interfaces, while the interfaces between the network elements in Figure 1b are point-to-point interfaces.
  • the 5G network architecture shown in Figure 1a and Figure 1b can include a terminal equipment part, an access network part, and a core network part. Optionally, it also includes data network (DN) and application function (AF) network element parts.
  • the terminal accesses the core network through the access network, and the core network communicates with the DN or AF.
  • DN data network
  • AF application function
  • Terminal device also known as user equipment (UE)
  • UE user equipment
  • UE is a device with wireless transceiver functions that can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; it can also be deployed on the water on board (such as ships, etc.); it can also be deployed in the air (such as on aircraft, balloons, satellites, etc.).
  • the terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer with wireless transceiver functions, a virtual reality (VR) terminal, an augmented reality (AR) terminal, or an industrial control (industrial control) ), wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, and wireless terminals in transportation safety , wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • a mobile phone mobile phone
  • a tablet computer pad
  • a computer with wireless transceiver functions a virtual reality (VR) terminal, an augmented reality (AR) terminal, or an industrial control (industrial control)
  • VR virtual reality
  • AR augmented reality
  • industrial control industrial control
  • the (radio)access network (R)AN) device in this application is a device that provides wireless communication functions for terminal devices.
  • the (R)AN device is also called an access network device.
  • RAN equipment in this application includes but is not limited to: next-generation base station (g nodeB, gNB), evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B in 5G (node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmitting point (transmitting point, TP), mobile switching center, etc.
  • next-generation base station g nodeB, gNB
  • evolved node B evolved node B
  • eNB radio network controller
  • RNC radio network controller
  • node B in 5G node B,
  • the names of equipment with base station functions may be different.
  • RAN Fifth Generation
  • gNB Fifth Generation NodeB
  • eNB evolved NodeB
  • Node B Node B
  • Data network DN can deploy a variety of services and provide data and/or voice services to terminal devices.
  • DN is a private network of a smart factory.
  • the sensors installed in the workshop of the smart factory can be terminal devices.
  • Sensors and control servers are deployed in the DN, and the control server can provide services for the sensors.
  • the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
  • DN is the internal office network of a company.
  • the mobile phones or computers of employees of the company can be used as terminal devices.
  • the employees' mobile phones or computers can access information and data resources on the company's internal office network.
  • Application network elements mainly support interaction with the 3rd generation partnership project (3GPP) core network to provide services, such as influencing data routing decisions, policy control functions or providing some third-party services to the network side.
  • the application network element may be an application function (AF) network element.
  • AF application function
  • future communication systems application network elements can still be AF network elements, or they can have other names. There are no restrictions on application.
  • the core network part may include one or more of the following network elements:
  • the access management network element (also known as the mobility management network element) is a control plane network element provided by the operator's network. It is responsible for access control and mobility management of terminal devices accessing the operator's network, including mobility status, for example. Manage and allocate user temporary identities, authentication and user functions.
  • the access management network element may be an access and mobility management function (AMF) network element.
  • AMF access and mobility management function
  • the access management network element can still be an AMF network element, or it can also have other names, which is not limited in this application.
  • the session management network element is mainly responsible for session management in mobile networks, such as session establishment, modification, and release. Specific functions include assigning IP addresses to users and selecting user plane network elements that provide packet forwarding functions.
  • the session management network element may be a session management function (SMF) network element.
  • SMF session management function
  • the session management network element can still be an SMF network element, or it can also have other names, which is not limited in this application.
  • User plane network elements are responsible for forwarding and receiving user data in terminal devices. It can receive user data from the data network and transmit it to the terminal device through the access network device; the user plane network element can also receive user data from the terminal device through the access network device and forward it to the data network.
  • the transmission resources and scheduling functions in the user plane network element that provide services for terminal equipment are managed and controlled by the SMF network element.
  • the user plane network element may be a user plane function (UPF) network element.
  • UPF user plane function
  • user plane network elements can still be UPF network elements, or they can have other names, which are not limited in this application.
  • the data management network element is used to generate authentication credentials, user identification processing (such as storing and managing user permanent identities, etc.), access control and contract data management, etc.
  • the data management network element may be a unified data management (UDM) network element.
  • UDM unified data management
  • future communication systems unified data management can still be a UDM network element, or it can also have other names, which is not limited by this application.
  • the policy control network element mainly supports providing a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is also responsible for obtaining user subscription information related to policy decisions.
  • the policy control network element may be a policy and charging rules function (PCRF) network element.
  • the policy control network element may be a policy control function (PCF) network element.
  • PCF policy control function
  • the policy control network element can still be a PCF network element, or it can also have other names, which is not limited in this application.
  • Network storage network elements can be used to provide network element discovery functions and provide network element information corresponding to network element types based on requests from other network elements.
  • NRF also provides network element management services, such as network element registration, update, de-registration, network element status subscription and push, etc.
  • the network storage network element may be a network registration function (network repository function, NRF) network element.
  • network storage network elements can still be NRF network elements, or they can have other names, which are not limited in this application.
  • the network opening function network element can be used to provide services and capabilities provided by 3GPP network function equipment to be securely opened to the outside.
  • the network exposure function network element may be a network exposure function (NEF) network element.
  • NEF network exposure function
  • network open function network elements can still be NEF network elements, or they can also have other names, which are not limited in this application.
  • Network slice selection network elements can be used to select appropriate network slices for terminal services.
  • the network slice selection network element may be a network slice selection function (NSSF) network element.
  • network open function network elements can still be NSSF network elements, or they can have other names. This application is not limited.
  • Network data can be analyzed from each network function (NF), such as policy control network element, session management network element, user plane network element, access management network element, and application function network element (through network capability opening function).
  • NF network function
  • the network data analysis network element can be a network data analytics function (NWDAF).
  • NWDAF network data analytics function
  • network open function network elements can still be NWDAF network elements, or they can also have other names, which are not limited in this application.
  • the unified data storage network element is responsible for storing structured data information, including contract information, policy information, and network data or business data defined in standard formats.
  • the unified data storage network element can be unified data storage (unified data repository, UDR).
  • network open function network elements can still be UDR network elements, or they can also have other names, which are not limited in this application.
  • the above network elements or functions can be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • a platform for example, a cloud platform.
  • the above network element or function can be implemented by one device, or can be implemented by multiple devices together, or can be a functional module in one device, which is not specifically limited in the embodiments of this application.
  • the network data analysis function NWDAF can collect the network information of the UE from the network and provide analysis results related to the UE. For example, NWDAF obtains information such as the UE identity, UE location list, tracking area or cell through which the UE passes, etc. from the AMF. For example, NWDAF obtains information from the AF such as the UE identity, the application identity that provides the information, the UE location list with timestamp, the geographical area that the UE entered (which can be identified by latitude and longitude), and the time when the UE entered the area. For example, NWDAF can perform UE mobility analysis and output statistics or prediction information related to UE mobility, such as predicting where the UE will be at a certain time in the future.
  • NWDAF can perform UE mobility analysis and output statistics or prediction information related to UE mobility, such as predicting where the UE will be at a certain time in the future.
  • NWDAF can perform UE interactivity analysis and output statistics or prediction information related to UE interactivity, such as the throughput rate of UE service data transmission at a certain time in the future.
  • NWDAF can analyze UE abnormal behavior, output UE abnormal behavior information, and identify abnormal UEs, such as excessive traffic, distributed denial of service (DDOS) attacks, etc.
  • DDOS distributed denial of service
  • the operator and the UE can sign an agreement and pre-configure the user consent information of the UE contract in the UDM.
  • NWDAF Before NWDAF collects the UE's network information, it first retrieves user consent information from UDM to check whether the user authorizes data collection. If the user does not grant it, NWDAF will not subscribe to network information related to this user; if the user grants it, NWDAF subscribes to network information related to this user from the network function NF that provides the corresponding network information.
  • network information (which may be network information related to the UE or network information unrelated to the UE):
  • the AF can subscribe to the network for the UE's network information, and the network notifies the AF of the UE's network information.
  • the application layer AF trains an artificial intelligence (AI) model.
  • AI artificial intelligence
  • the AI model can be inferred based on the UE's network information (such as quality of service (QoS) and sustainability (Sustainability)).
  • Application layer parameters of autonomous driving such as video encoding, autonomous driving level, etc.
  • AF needs to subscribe to the network information of the UE.
  • the application layer parameters are obtained through information reasoning, and the parameters can be sent to the UE through the application layer for execution.
  • the AF subscribes to the network information on behalf of the UE, and the network notifies the UE.
  • V2X applications have high real-time requirements, and the UE may download an AI model from the AF to perform inference operations locally. At this time, the UE needs to obtain network information from the network (for example, quality of service sustainability (QoS Sustainability)).
  • QoS Sustainability quality of service sustainability
  • One solution may be that the UE informs the AF, and the AF subscribes to the network information on behalf of the UE, and then the network can send the UE's network information to the UE through the control plane or user plane.
  • the UE directly subscribes to the network information and the network notifies the UE.
  • the UE directly issues a subscription to the network through the control plane or user plane, and then the network sends the network information to the UE through the control plane or user plane.
  • this application proposes a variety of solutions to ensure security.
  • the data management network element in the following example can be one of UDM, UDR, and NRF.
  • the first device can be one of AF, UE, and NEF.
  • the second device can be UPF, AMF, NWDAF, SMF, and OAM. , one of the AF devices.
  • Step 201 The first device sends a first message to the data management network element.
  • the data management network element receives the first message from the first device.
  • the first message is used to obtain network information.
  • the network information may be network information related to the UE, such as the location of the UE, the tracking area or cell that the UE passes through, and the QoS information of the UE, such as up/downlink data rate, throughput, and delay. , jitter and other information; network information can also be network information unrelated to the UE, such as network element load information (for example, used to assist the UE in accessing low-load UPF), network performance analysis information (for example, used to assist the UE in meeting the network performance requirements) Send data when requested), etc.
  • network element load information for example, used to assist the UE in accessing low-load UPF
  • network performance analysis information for example, used to assist the UE in meeting the network performance requirements
  • the first message may include the identification of the terminal device and the target type of the network information.
  • the first message may also include but is not limited to one or more of the following information: first indication information, target usage purpose of network information, target service identifier, target AF identifier, target application program (APP) ) logo.
  • the first indication information is used to indicate the target requesting device and the target using device of network information. In this application, it is the first device that requests network information, so the target requester device is the first device.
  • the parameters requested by the first device are called target parameters (for example, target Type, target request device, target usage device, target usage purpose, target business identifier, target AF identifier, target application identifier), the word "target” is only for convenience of distinction and should not be limiting. This information will be introduced in detail later.
  • Step 202 Based on the first message and the subscription information of the terminal device, the data management network element sends a second message to the second device corresponding to the network information of the target type; wherein the second message is used to obtain Network information of the target type.
  • the second device may be understood as a device that provides network information of the target type.
  • the contract information includes but is not limited to one or more of the following information: the identification of the terminal device, the allowed requesting device and the allowed use device, the type of network information that is allowed to be obtained, the allowed use purpose of the network information, the allowed business service identification, the identification of the AF that is allowed to obtain network information, the identification of the application APP that is allowed to obtain network information, and an indication of whether obtaining network information is allowed.
  • the parameters in the subscription information such as type, requesting device, using device, purpose of use, service identification, AF identification, application identification
  • allowed parameters such as allowed parameters.
  • the requesting device and the allowed use device the type of network information allowed to be obtained, the allowed use purpose of the network information, the allowed business identification, the identification of the AF that is allowed to obtain the network information, the identification of the application APP that is allowed to obtain the network information),
  • the three words "permitted" are only for the convenience of distinction and should not be limiting.
  • the identification of the terminal equipment can be a general public subscription identifier (GPSI) or a user permanent identifier (subscription permanent identifier, SUPI).
  • GPSI general public subscription identifier
  • SUPI subscription permanent identifier
  • the allowed requesting device and the allowed use device include but are not limited to one or more of the following: the allowed requesting device is the application function AF, the allowed use device is the terminal device UE; or, the allowed requesting device and the allowed use device Both are application functions AF; or, the allowed requesting device and the allowed usage device are both terminal equipment UE. Allowed request devices and allowed use devices need to be used in pairs. Allowed request devices and allowed use devices can also be understood as allowed acquisition methods.
  • Allowed acquisition methods include but are not limited to one or more of the following: Allow the AF to obtain network information (that is, the allowed requesting device and the allowed use device are both AF), or allow the AF to obtain network information on behalf of the UE (that is, the allowed requesting device is AF, and the allowed use device is UE), allow the UE to obtain the network Information (the allowed requesting device is and the allowed using device is both UE).
  • the first indication information is used to indicate the target requesting device and the target using device of the network information.
  • the target requesting device is the first device, and the target using device and the target requesting device may be the same or different.
  • the target requesting device is AF and the target using device is UE; for example, the target requesting device is AF and the target using device is AF; for example, the target requesting device is UE and the target using device is UE.
  • the first indication information is used to indicate the target acquisition method of network information.
  • the target acquisition method may be that the AF obtains the network information (for example, the target requesting device is the AF, the target using device is the AF), or the AF obtains the network information instead of the UE.
  • the target requesting device is AF and the target using device is UE).
  • the UE obtains network information (for example, the target requesting device is UE and the target using device is UE).
  • the method of obtaining network information can be represented by an indication, or the requesting device and the using device can be represented by an indication.
  • the indication can occupy 2 bits or more bits, for example, when it occupies 2 bits, and the value of the 2 bits is "00" , indicating that the acquisition method is AF to obtain network information (that is, the requesting device is AF and the using device is AF); for example, when it occupies 2 bits and the value of the 2 bit is "01", it indicates that the acquisition method is AF instead of UE to obtain network information (i.e.
  • the requesting device is AF and the using device is UE); for another example, when 2 bits are occupied and the value of the 2 bits is "10", it indicates that the acquisition method is that the UE obtains network information (that is, the requesting device is UE and the using device is UE).
  • This value is only an example and should not limit the application.
  • the value of the indication included in the first message is used to represent the target requesting device and the target using device, or the value of the indication included in the first message is used to represent the target acquisition method.
  • the value of the indication included in the first message can be Is a.
  • the value of the indication included in the subscription information is used to indicate the allowed requesting device and the allowed use device, or the value of the indication included in the subscription information is used to indicate the allowed acquisition method.
  • the subscription information may include one or more
  • the allowed acquisition method that is, the value of indication in the contract information can be one or more.
  • the purpose of using network information can be understood as the purpose of requesting network information. For example, generating autonomous driving application layer parameters, reasoning V2X application parameters, node selection for federated learning, user selection for federated learning model training, application layer AI/ML operations on auxiliary AF, etc.
  • the value of purpose included in the first message is used to indicate the target usage purpose.
  • the first message may include one or more target usage purposes, so the value of purpose included in the first message may be one or more.
  • the value of purpose included in the contract information is used to indicate the allowed use purpose.
  • the contract information may include one or more allowed use purposes, that is, the value of purpose in the contract information may be one or more.
  • the service identifier is used to identify the type of service, which can be the type of application layer service, such as V2X service and federated learning service.
  • Business identification can be represented by service ID.
  • the value of the service ID included in the first message is used to represent the target service identifier.
  • the first message may include one or more service identifiers, and the value of the service ID included in the first message may be one or more.
  • the value of the service ID included in the subscription information is used to represent the allowed service identifier.
  • the subscription information may include one or more allowed service identifiers, that is, the value of the service ID in the subscription information may be one or more.
  • the purpose of use can be a specific purpose of use in the type of business. For example, the purpose of use in V2X business can be to infer V2X application parameters; as another example, the purpose of use in federated learning business can be node selection for federated learning.
  • the type of network information can be identified by an event ID (Event ID) or an analytics ID (Analytics ID).
  • Analytics ID can be used to identify the type of data analysis obtained from NWDAF.
  • Event ID is used to identify the type of event requested from other core network NFs except NWDAF.
  • the value of the Event ID/Analytics ID included in the first message is used to represent the target type.
  • the first message may include one or more target types.
  • the value of the Event ID/Analytics ID included in the first message may be one or more.
  • the value of Event ID/Analytics ID included in the contract information is used to indicate the type of network information that is allowed to be obtained.
  • the contract information can include one or more types of network information that is allowed to be obtained, that is, the Event ID/Analytics ID in the contract information.
  • the value of Analytics ID can be one or more. It is understandable that the value of Event ID/Analytics ID can also be in the form of "00", "01”, etc. For example, "00” represents QoS Sustainability, "01” represents UE Mobility, "11” represents UE reachability, etc.
  • the first device can determine the target type of the network information to be requested. For example, the first device stores the corresponding relationship between the network information required to complete the service and the value of the Event ID/Analytics ID, such as what is required by task A in the service.
  • Analytics ID QoS Sustainability corresponding to the network information
  • Event ID UE reachability corresponding to the network information required by task B in the business.
  • Analytics ID QoS Sustainability is included in the first message.
  • Event ID UE is included in the first message. reachability.
  • the identity of the application function is represented by the AF ID, and the value of the AF ID included in the first message is used to represent the identity of the target AF.
  • the identification of the application function introduced here can be applied to the scenario where the AF obtains network information on behalf of the UE (that is, the target requesting device is the AF and the target using device is the UE).
  • the identification of the target application function carried in the first message indicates which application function replaces it.
  • the UE obtains network information.
  • the first message may include an identification of a target application function, then the The value of the AF ID included in a message can be one.
  • the value of the AF ID included in the subscription information is used to represent the identification of the AF that is allowed to obtain network information.
  • the subscription information may include one or more identifications of the AF that is allowed to obtain network information, that is, the value of the AF ID in the subscription information is The value can be one or more.
  • the identity of the application is represented by APP ID.
  • the value of the APP ID included in the first message is used to represent the identity of the target application.
  • the identity of the application introduced here can be applied to AF instead of UE to obtain network information (i.e. target In a scenario where the requesting device is AF and the target using device is UE) and the UE obtains network information (that is, the target using device and the target requesting device are both UE), the first message carries the identification of the target application to indicate which application or applications are used.
  • the network information, the first message may include the identification of one or more target applications, and the value of the APP ID included in the first message may be one or more.
  • the value of the APP ID included in the contract information is used to represent the identification of the application that is allowed to obtain network information.
  • the contract information may include the identification of one or more applications that are allowed to obtain network information, that is, the APP ID in the contract information.
  • the value of can be one or more.
  • the subscription information includes an indication of whether to allow the network information to be obtained, and is used to indicate whether the first device is allowed to obtain the network information. It can be identified by consent indication.
  • the form of consent indication is 1-bit information. When the value of consent indication is "0", it means that the first device is not allowed to obtain network information. When the value of consent indication is "1”, it means that it is allowed. The first device obtains network information.
  • the data management network element When the data management network element sends the second message to the second device corresponding to the network information of the target type based on the first message and the subscription information of the terminal device, the data management network element may be based on the The first message and the contract information of the terminal device are used to determine whether the authorization conditions are met; if it is determined that the authorization conditions are met, a second message is sent to the second device corresponding to the network information of the target type. If it is determined that the target requesting device and the target using device do not meet the authorization conditions, the network information will not be obtained from the second device, and further optionally, a rejection message may be replied to the first device.
  • the data management network element can verify multiple pieces of information in the first message based on the contract information. Only after the verification passes, the corresponding information will be obtained. Network information can improve communication security.
  • the data management network element determines whether the authorization conditions are met based on the first message and the contract information of the terminal device, it may be to determine whether each piece of information included in the first message meets the authorization conditions. Only when all information meets the authorization conditions will it be determined that it meets the authorization conditions. As long as any piece of information does not meet the authorization conditions, it will be determined that it does not meet the authorization conditions.
  • the data management network element when the data management network element determines whether authorization conditions are met based on the first message and the subscription information of the terminal device, the data management network element may determine that the subscription information of the terminal device includes Whether the target requesting device and the target usage device are included in the allowed requesting devices and the allowed usage devices; when the target requesting device and the target usage device are included, it is determined that the target requesting device and the target usage device meet the authorization conditions; when When the target requesting device and the target using device are not included, it is determined that the target requesting device and the target using device do not meet the authorization conditions. It should be noted that the requesting device and the using device are used in pairs, that is, the requesting device and the using device are a pair and cannot be judged separately.
  • the data management network element determines whether the target acquisition method is included in the allowed acquisition methods included in the contract information; when the target acquisition method is included, it is determined that the target acquisition method meets the authorization conditions; if not, When the target acquisition method is included, it is determined that the target acquisition method does not meet the authorization conditions.
  • the data management network element may determine whether the value of the indication in the subscription information includes the value of the indication in the first message; if it does, determine that the value of the indication in the first message complies with Authorization conditions; if not included, it is determined that the value of indication in the first message does not meet the authorization conditions.
  • the indication value in the contract information is only "00".
  • the indication value in the first message is "01" it is determined that the indication value "01" does not meet the authorization conditions.
  • the indication value in the subscription information includes “00" and "01”. If the indication value in the first message is "01”, it is determined that the indication value "01" meets the authorization conditions. This process is to verify that the method used to obtain network information is compliant and has nothing to do with the content of the network information obtained.
  • the subscription information does not include the type of network information that is allowed to be obtained, and the first message includes one or more target types, it is determined that the one or more target types meet the authorization conditions.
  • the subscription information does not include the types of network information that are allowed to be obtained, by default all types meet the authorization conditions.
  • the contract information does not include the values of Event ID and/or Analytics ID
  • the first message includes the values of Event ID and/or Analytics ID
  • the subscription information includes a type of network information that is allowed to be obtained, and the first message includes one or more target types
  • the data management network element sends the second message to the second device corresponding to the network information of one or more target types that meets the authorization conditions.
  • the data management network element may not send the second message to the second device corresponding to the target type of network information that does not meet the authorization conditions.
  • the contract information includes the values of Event ID and/or Analytics ID
  • the first message includes the values of one or more Event IDs and/or Analytics ID
  • the value determines whether the Event ID value in the contract information includes the value of the Event ID in the first message; if it is included, it is determined that the value of the Event ID in the first message meets the authorization conditions; if it is not included, Then it is determined that the value of the Event ID in the first message does not meet the authorization conditions.
  • any Analytics ID whether the value of the Analytics ID in the contract information includes the value of the Analytics ID in the first message; if it is included, then determine the value of the Analytics ID in the first message. Meets the authorization conditions; if it is not included, it is determined that the value of the Analytics ID in the first message does not meet the authorization conditions.
  • the subscription information does not include an allowed service identification and the first message includes one or more target service identifications, it is determined that the one or more target service identifications meet the authorization conditions.
  • the contract information does not include allowed service identifiers, by default all service identifiers meet the authorization conditions.
  • the subscription information does not include the value of service ID and the first message includes the value of service ID, it is determined that the value of service ID in the first message meets the authorization conditions.
  • the subscription information includes an allowed service identifier and the first message does not include a target service identifier, it is determined that the authorization conditions are not met. In a specific example, if the subscription information includes the value of service ID and the first message does not include the value of service ID, it is determined that the authorization conditions are not met.
  • the first message includes one or more target service identifiers
  • the subscription information includes the value of the service ID and the first message includes the value of the service ID
  • it is determined whether the value of the service ID in the subscription information includes the service ID in the first message. If the value is included, it is determined that the value of the service ID in the first message meets the authorization conditions. If it is not included, it is determined that the value of the service ID in the first message does not meet the authorization conditions.
  • any target service identifier determines whether the target service identifier meets the authorization conditions. For example, for any target service identifier, determine whether the allowed service identifiers included in the subscription information include the target service identifier; when the target service identifier is included, it is determined that the target service identifier meets the authorization conditions; when it does not When the target service identifier is included, it is determined that the target service identifier does not meet the authorization conditions. As long as at least one target service identifier meets the authorization conditions, the second message can be sent.
  • the data management network element can also notify the first device of the target service identifier that meets the authorization conditions, so that the first device only uses the network information when executing services that meet the authorization conditions, and does not use the network information when executing services that do not meet the authorization conditions. Do not use network information to improve communication security.
  • the allowed service identifiers included in the subscription information include all target service identifiers; when all the target service identifiers are included, it is determined that all the target service identifiers comply with the authorization condition, the second message can be sent; when any target service identifier is not included, it is determined that all the target service identifiers do not meet the authorization conditions, and the second message is not sent.
  • any target service identifier does not meet the authorization conditions, network information will not be requested, which can prevent the first device from using the network information in services that do not meet the authorization conditions.
  • the identification of the application function if the subscription information does not include the identification of the application function that allows obtaining network information, and the first message includes the identification of the target application function, it is determined that the identification of the target application function meets the authorization conditions.
  • the contract information does not include the identification of application functions that are allowed to obtain network information, by default all application functions meet the authorization conditions.
  • the subscription information does not include the value of AF ID and the first message includes the value of AF ID, it is determined that the value of AF ID in the first message meets the authorization conditions.
  • the subscription information includes an identification of an application function that is allowed to obtain network information and the first message does not include an identification of a target application function, it is determined that the authorization conditions are not met.
  • the subscription information includes the value of AF ID and the first message does not include the value of AF ID, it is determined that the authorization conditions are not met.
  • the subscription information includes an identification of an application function that allows obtaining network information
  • the first message includes an identification of a target application function
  • the identification of the target application function when the identification of the target application function is included, it is determined that the identification of the target application function meets the authorization conditions; when the identification of the target application function is not included, the identification of the target application function is determined Does not meet authorization conditions.
  • the subscription information includes the value of AF ID and the first message includes the value of AF ID
  • the identification of the application program if the subscription information does not include the identification of the application program that is allowed to obtain network information and the first message includes the identification of the target application program, it is determined that the identification of the target application program meets the authorization conditions.
  • the subscription information does not include the identification of applications that are allowed to obtain network information, by default all applications meet the authorization conditions.
  • the contract information does not include the value of the APP ID and the first message includes the value of the APP ID, it is determined that the value of the APP ID in the first message meets the authorization conditions.
  • the subscription information includes the identification of an application that is allowed to obtain network information and the first message does not include the identification of the target application, it is determined that the authorization conditions are not met.
  • the subscription information includes the value of the APP ID and the first message does not include the value of the APP ID, it is determined that the authorization conditions are not met.
  • the subscription information includes the identification of an application that is allowed to obtain network information
  • the first message includes the identification of one or more target applications
  • it is determined that the identification of the application that is allowed to obtain network information included in the subscription information is Whether the identification of the target application is included; when the identification of the target application is included, it is determined that the identification of the target application meets the authorization conditions; when the identification of the target application is not included, it is determined that the target application The program's identity does not meet the authorization conditions.
  • the subscription information includes the value of the APP ID and the first message includes the value of the APP ID
  • whether the identity of any target application meets the authorization conditions can be determined respectively. For example, for the identification of any target application, determine whether the identification of the allowed application included in the subscription information includes the identification of the target application; when the identification of the target application is included, determine whether the identification of the target application is included. The identification of the application program meets the authorization conditions. When the identification of the target application program is not included, it is determined that the identification of the target application program does not meet the authorization conditions. As long as at least one identity of the target application meets the authorization conditions, the second message can be sent.
  • the data management network element can also notify the first device of the identification of the target application that meets the authorization conditions, so that the applications that meet the authorization conditions use the network information, and the applications that do not meet the authorization conditions do not use the network information, so that Improve communication security.
  • the use purpose if the first message includes the target use purpose of the network information, determine whether the allowed use purpose of the network information included in the subscription information includes the target use purpose; when the target use purpose is included When the target use purpose is not included, it is determined that the target use purpose does not meet the authorization conditions. In a specific example, it is determined whether the value of purpose in the subscription information includes the value of purpose in the first message; if it is included, it is determined that the value of purpose in the first message meets the authorization conditions; if it is not included, Then it is determined that the value of purpose in the first message does not meet the authorization conditions. By verifying the purpose of use, you can ensure that network information is used for compliant purposes and improve communication security.
  • the data management network element can also notify the first device of the target use purpose that meets the authorization conditions, so that the second device uses the network information for purposes that meet the authorization conditions, and does not use the network for purposes that do not meet the authorization conditions. information to improve communication security.
  • the data management network element verifies the requesting device and using device, the type of network information, purpose of use, service identification, AF identification, APP identification, whether access to network information is allowed, etc., to ensure security.
  • the first device (for example, the first device is AF) sends the subscription information of the terminal device to the data management network element.
  • the data management network element receives the terminal device from the first device. contract information.
  • the first device dynamically stores the subscription information of the UE participating in the application layer service into the UDM instead of a fixed preconfiguration solution, which increases the flexibility of configuration of the subscription information.
  • the network operator can also directly configure the contract information in the data management network element according to the agreement.
  • the data management network element receives the first message from the first device.
  • the data management network element may receive the first message from the first device through a third device; for example, the third device may transmit the first message from the first device.
  • the first message is forwarded to the data management network element. It may also be that the third device forwards multiple pieces of information from the first device (identification of the terminal device, target type of the network information, first instruction information, target use purpose of the network information, target The service identifier, the identifier of the target AF, the identifier of the target application program (APP)) are sent to the data management network element.
  • the second message sent by the data management network element to the second device includes the address of the third device, and the address of the third device is used by the second device to send the network information of the target type to the second device.
  • the third device then sends the network information of the target type to the first device.
  • the identification of the terminal device sent by the first device to the third device and the identification of the terminal device sent by the third device to the data management network element may be the same or different.
  • the identity of the terminal device sent by the first device to the third device is the general public subscription identifier GPSI
  • the identity of the terminal device sent by the third device to the data management network element is user permanent identity SUPI.
  • the third device can also perform compliance verification on the first message to improve communication security.
  • the third device may be NEF.
  • the first device is AF
  • the acquisition method is AF to obtain network information (that is, both the requesting device and the using device are AF).
  • Step 300 AF and UE sign an agreement Information (such as UE’s network information).
  • the AF determines the UE that needs to join the application layer service (for example, the UE sends a service request to the AF) and determines that the service needs to obtain network information from the communication system.
  • the following agreement can be signed:
  • the AF can sign an agreement X1 with the UE to indicate that the UE allows the AF to obtain network information from the communication network.
  • the UE allows the AF to obtain specific UE network information for a specific purpose from the communication network.
  • the AF can sign an agreement Y1 with the communication system to indicate that the communication system allows the AF to obtain network information from the communication network.
  • the UE allows the AF to obtain network information of a specific UE from the communication network for a specific purpose.
  • the content of Agreement Under the premise your network information is collected from the operator's network.
  • the content of the agreement Y1 includes: Because of the need for the V2X service to generate automatic driving application layer parameters, the user ## allows the company to collect the network information of the user ## from the operator network.
  • Step 301 AF sends a message to NEF, and accordingly, NEF receives the message from AF.
  • This message may be used to send subscription information.
  • the message may be a Parameter Provision Create/Update Request (or Subscription Information Create/Update Request) (ParameterProvision_Create/Update request) message.
  • the message may include but is not limited to one or more of the following: the identification of the terminal device (such as the general public subscription identifier GPSI), the allowed purpose of use (such as the value of purpose), the allowed service identifier (such as the value of service ID) value), allowed requesting devices and allowed usage devices (such as the value of Indication), the type of network information allowed to be obtained (such as the value of Event ID and/or the value of Analytics ID).
  • the identification of the terminal device such as the general public subscription identifier GPSI
  • the allowed purpose of use such as the value of purpose
  • the allowed service identifier such as the value of service ID
  • allowed usage devices such as the value of Indication
  • the type of network information allowed to be obtained such as the value of Event ID and/or the value of Analytics ID.
  • AF can send (parameter provision create/update request (or called contract information create/update request) message to NEF through the Nnef_ParameterProvision_Create/Update request service operation.
  • Step 302 NEF sends a message to UDM, and accordingly, UDM receives the message from NEF.
  • This message may be used to send subscription information.
  • the message may be a Parameter Provision Create/Update Request (or Subscription Information Create/Update Request) (ParameterProvision_Create/Update request) message.
  • the message may include, but is not limited to, one or more of the following: the identification of the terminal device (such as the user permanent identity SUPI), the allowed purpose of use (such as the value of purpose), the allowed service identification (such as the value of service ID) ), allowed requesting devices and allowed usage devices (such as the value of Indication), the type of network information allowed to be obtained (such as the value of Event ID and/or the value of Analytics ID).
  • the identification of the terminal device such as the user permanent identity SUPI
  • the allowed purpose of use such as the value of purpose
  • the allowed service identification such as the value of service ID
  • allowed usage devices such as the value of Indication
  • the type of network information allowed to be obtained such as the value of Event ID and/or the value of Analytics ID.
  • NEF can send parameter provision creation/update request (or subscription information creation/update request) message to UDM through the Nudm_ParameterProvision_Create/Update request service operation.
  • NEF When AF is a third-party application function, for security reasons, the interaction between AF and the NF and OAM of the core network can pass through NEF, and NEF will verify the legitimacy of the message from AF.
  • NEF before NEF sends a message to UDM, it can first verify whether the message from AF (that is, the message in step 301) is legal, and then send it to UDM after verifying that the message from AF (that is, the message in step 301) is legal. information.
  • NEF can store the mapping relationship between External GPSI (External Network UE Identity) and SUPI. After receiving the message from AF, NEF will convert the External GPSI into SUPI, and then use SUPI to replace AF and send it to the NF of the core network. information. If the mapping relationship between External GPSI and SUPI is not saved in NEF, NEF can first convert External GPSI to Inter GPSI, and then request UDR to obtain the SUPI corresponding to Inter GPSI based on Inter GPSI.
  • External GPSI Extra Network UE Identity
  • NEF also controls the mapping relationship between AF identification and the type of network information allowed to be obtained (such as the value of Event ID and/or the value of Analytics ID), as well as related inbound restrictions (i.e., limiting what AF can request Event ID/Analytics ID) and outbound restrictions (that is, limiting the Event ID/Analytics ID that can be notified to AF).
  • inbound restrictions i.e., limiting what AF can request Event ID/Analytics ID
  • outbound restrictions that is, limiting the Event ID/Analytics ID that can be notified to AF.
  • subsequent AF requests network information from the NF of the core network, it also needs to go through NEF, and NEF will verify the request.
  • the legality of the sum notification for example, step 307, step 312a).
  • Step 303 UDM saves the user consent information of the contract (which can be referred to as the contract information or user consent information).
  • the subscription information includes one or more of the following: the identification of the terminal device (such as the permanent user identification SUPI), the indication information of whether to allow access to network information (such as the value of consent indication), the permitted purpose of use (such as the value of purpose). value), allowed service identifiers (such as the value of service ID), allowed requesting devices and allowed use devices (such as the value of Indication), the type of network information allowed to be obtained (such as the value of Event ID and/or Analytics ID value).
  • the indication of whether to allow obtaining network information can be set by UDM.
  • UDM saves user consent information: ⁇ SUPI, consent indication, purpose, service ID, Indication, Event ID/Analytics ID>.
  • the value of purpose corresponding to the same SUPI can be one or more, the value of service ID can be one or more, and the value of Indication can be one or more. ; the value of Event ID/Analytics ID can be one or more.
  • step 304a After UDM saves the user consent information, it sends a response message to NEF.
  • UDM sends response messages to NEF through the Nudm_ParameterProvision_Create/Update response service operation.
  • This response message can be used to indicate that the UE's subscription information has been saved in the UDM.
  • step 304b NEF sends a response message to AF.
  • NEF sends a response message to AF through the Nnef_ParameterProvision_Create/Update response service operation.
  • This response message can be used to indicate that the UE's subscription information has been saved in the UDM.
  • step 305a UPF sends the mapping relationship between UPF ID and SUPI to UDM, and UDM saves the mapping relationship between UPF ID and SUPI into the contract information.
  • mapping relationship can be carried in the registration request.
  • UPF sends the mapping relationship between UPF ID and SUPI to UDM through the Nudm_UECM_Registration Request service operation.
  • step 305b UDM sends a response message to UPF.
  • UDM can send response messages to UPF through the Nudm_UECM_Registration Response service operation.
  • the response message may be used to indicate receipt of the mapping relationship in step 305a.
  • the AF may later need to request network information from the UPF, and the mapping relationship is saved.
  • the UDM can find the service provider for the UE based on the mapping relationship between SUPI and ⁇ UPF ID, SUPI>. UPF and then requests network information from the UPF.
  • Step 306 AF determines that network information is needed.
  • the AF determines that the service requires network information of a certain UE.
  • the application layer AF trains an AI model, which can infer the application layer parameters of autonomous driving (such as video encoding, autonomous driving level, etc.) based on the UE's network information (such as QoS Sustainability).
  • the UE requests application layer parameters from the AF
  • the AI model in order to use the AI model to obtain the application layer parameters
  • the AF needs to request the network information of the UE from the communication system.
  • the AF obtains the application layer parameters based on the network information and the AI model and sends them to the UE.
  • Step 307 AF sends a message to NEF to request network information.
  • the message can be an event open subscription message.
  • the message includes one or more of the following: the identification of the terminal device (such as the general public subscription identifier (GPSI)), the target type of the network information (such as the value of the Event ID and/or the value of the Analytics ID), the an instruction message (e.g. Such as the value of Indication), the target usage purpose of the network information (such as the value of purpose), and the target service identifier (such as the value of service ID).
  • the target requesting device indicated by the first indication information is AF
  • the target using device is AF.
  • AF sends messages to NEF through the Nnef_EventExposure_Subscribe service operation.
  • Step 308 NEF sends a message to UDM to request network information.
  • the message can be an event open subscription message.
  • the message includes one or more of the following: the identity of the terminal device (such as user permanent identity SUPI), the target type of network information (such as the value of Event ID and/or the value of Analytics ID), the first instruction information ( For example, the value of Indication), the target use purpose of the network information (such as the value of purpose), the target service identifier (such as the value of service ID), and the address of NEF (the value of NEF address).
  • the target requesting device indicated by the first indication information is AF
  • the target using device is AF.
  • NEF sends messages to UDM through the Nudm_EventExposure_Subscribe service operation.
  • NEF address can be the IP address of NEF.
  • the purpose of including NEF address is to provide the second device with network information (such as UPF, NWDAF, AMF, SMF, OAM, AF, etc.). After obtaining the requested network information, it can directly Send network information to the NEF according to the NEF address.
  • network information such as UPF, NWDAF, AMF, SMF, OAM, AF, etc.
  • Step 309 UDM determines whether the authorization conditions are met based on the information in step 308.
  • the network information of the corresponding target type can be obtained. If the authorization conditions are not met, the message can be rejected. The process of determining whether each piece of information meets the authorization conditions can be referred to the previous introduction and will not be repeated again.
  • Step 310 If the UDM determines that the authorization conditions are met, the UDM requests network information from the corresponding second device (ie, data providing network element, such as UPF, NWDAF, AMF, SMF, OAM, AF, etc.).
  • data providing network element such as UPF, NWDAF, AMF, SMF, OAM, AF, etc.
  • NEF address is an optional parameter. If the NEF address is carried in step 308, the NEF address can also be carried in step 310 to indicate that after obtaining the requested network information, the data providing network element can directly NEF address sends network information to the NEF.
  • steps 311a and 312a are processes that include NEF address in step 310
  • steps 311b, 312b, and 313b are processes that do not include NEF address in step 310.
  • Step 311a If the NEF address is included in step 310, the UPF can configure the network according to the NEF address. Network information is sent to the NEF.
  • UPF notifies the NEF of network information through the Nupf_EventExposure_Notify service operation.
  • Step 312a After NEF verifies the validity of the notification, it can send the network information to AF.
  • NEF After NEF verifies the legality of the notification, NEF sends the network information to AF through the Nnef_EventExposure_Notify service operation.
  • Step 311b If the NEF address is not included in step 310, the UPF can send the network information to the UDM.
  • UPF sends network information to UDM through the Nupf_EventExposure_Notify service operation.
  • Step 312b UDM sends network information to NEF.
  • UDM notifies NEF of network information through the Nudm_EventExposure_Notify service operation.
  • Step 313b After NEF verifies the legality of the notification, it can send the network information to AF.
  • NEF After NEF verifies the legality of the notification, NEF notifies AF of the network information through the Nnef_EventExposure_Notify service operation.
  • This example ensures that AF obtains UE information with the consent of UE by signing agreements between UE and AF and between AF and communication system, preventing user network data from being disclosed at will, and protecting the privacy and security of user data.
  • This example uses AF to store the subscription information of UEs participating in application layer services in UDM, including UE ID (i.e. SUPI), purpose, service ID, Indication, Event ID/Analytics ID and other information, which limits the UE networks that the UE allows AF to obtain.
  • UE ID i.e. SUPI
  • purpose i.e. SUPI
  • service ID Indication
  • Event ID/Analytics ID Event ID/Analytics ID
  • the AF dynamically stores the subscription information of UEs participating in application layer services into the UDM instead of a fixed preconfiguration solution, which increases the flexibility of subscription information configuration.
  • the first device is a UE
  • the acquisition method is AF to obtain network information instead of the UE (that is, the request is set to AF, and the using device is the UE).
  • Step 400 The AF and the communication system sign an agreement Y2 to indicate that the communication system allows the AF to help the UE obtain network information from the communication system; the AF and the UE sign an agreement X2 to indicate that the AF allows the UE to obtain network information from the communication network.
  • protocol X2 indicates that based on protocol Y2, AF allows the UE to obtain network information from the communication network.
  • protocol X2 indicates that AF allows the UE to obtain specific network information for specific purposes from the communication network.
  • protocol Y2 indicates that the communication system allows the AF to help the UE obtain specific network information for specific purposes from the communication network.
  • the AF determines the UE that wants to perform the application layer service locally on the UE (for example, the UE downloads the AI model from the AF and informs the AF that the UE wants to perform AI inference locally) and determines that the service needs to be communicated from Network information is obtained from the system and these agreements can be signed.
  • Step 401 Configure UE subscription information in UDM.
  • the subscription information includes one or more of the following: the identification of the terminal device (such as the user permanent identity SUPI), the indication information of whether to allow access to network information (such as the value of consent indication), the allowed purpose of use (such as the value of purpose). value), allowed service identifiers (such as the value of service ID), allowed requesting devices and allowed usage devices (such as the value of Indication), the type of network information allowed to be obtained (such as the value of Event ID and/or The value of Analytics ID), the identification of the target application that allows obtaining network information (such as the value of APP ID), and the identification of the target application function that allows obtaining network information (such as the value of AF ID).
  • the identification of the terminal device such as the user permanent identity SUPI
  • the indication information of whether to allow access to network information such as the value of consent indication
  • the allowed purpose of use such as the value of purpose). value
  • allowed service identifiers such as the value of service ID
  • allowed requesting devices and allowed usage devices such as the value of Indication
  • UDM saves user consent information: ⁇ SUPI, consent indication, purpose, service ID, Indication, Event ID/Analytics ID, APP ID, AF ID>.
  • the value of purpose corresponding to the same SUPI can be one or more, the value of service ID can be one or more, and the value of Indication can be one or more.
  • the value of Event ID/Analytics ID can be one or more; the value of APP ID can be one or more; the value of AF ID can be one or more.
  • Step 402 The UE requests network information from the AF.
  • the UE determines that it needs to obtain network information from the network element of the communication system.
  • the UE can send a request to the AF to request the AF to help the UE obtain (for example, subscribe to) network information from the communication system.
  • the UE may send a request message to the AF to request the AF to help the UE obtain network information from the communication system.
  • the request message may include one or more of the following: the identification of the terminal device (such as the General Public Subscription Identifier (GPSI)), The target type of network information (such as the value of Event ID and/or the value of Analytics ID), the target use purpose of the network information (such as the value of purpose), the target service identifier (such as the value of service ID), The identification of the target application (such as the value of APP ID).
  • GPSI General Public Subscription Identifier
  • the target type of network information such as the value of Event ID and/or the value of Analytics ID
  • the target use purpose of the network information such as the value of purpose
  • the target service identifier such as the value of service ID
  • the identification of the target application such as the value of APP ID.
  • Step 403 AF sends a message to NEF to request network information.
  • the message can be an event open subscription message.
  • the message includes one or more of the following: the identification of the terminal device (such as the General Public Subscription Identifier (GPSI)), the target type of the network information (such as the value of the Event ID and/or the value of the Analytics ID), the An indication information (such as the value of Indication), the target use purpose of the network information (such as the value of purpose), the target service identifier (such as the value of service ID), the identifier of the target application function (such as the value of AF ID) value), the identification of the target application (such as the value of APP ID).
  • the target requesting device indicated by the first indication information is AF
  • the target using device is AF.
  • the message of step 403 may also include the identification of the target application function (for example, the value of AF ID) and/or the identification of the target application (for example, the value of APP ID).
  • the target requesting device indicated by the first indication information is the AF
  • the target using device is the UE.
  • AF sends messages to NEF through the Nnef_EventExposure_Subscribe service operation.
  • Step 404 NEF sends a message to UDM to request network information.
  • Step 404 and step 308 may be mutually referenced.
  • the message can be an event open subscription message.
  • the message includes one or more of the following: the identity of the terminal device (such as user permanent identity SUPI), the target type of network information (such as the value of Event ID and/or the value of Analytics ID), the first instruction information ( For example, the value of Indication), the target use purpose of the network information (such as the value of purpose), the target service identifier (such as the value of service ID), the identification of the target application function (such as the value of AF ID), the target The identification of the application (such as the value of APP ID).
  • the target requesting device indicated by the first indication information is AF
  • the target using device is AF.
  • the message in step 404 may also include the identification of the target application function (for example, the value of AF ID) and/or the identification of the target application (for example, the value of APP ID).
  • the target requesting device indicated by the first indication information is the AF
  • the target using device is the UE.
  • AF sends messages to NEF through the Nnef_EventExposure_Subscribe service operation.
  • Step 405 UDM determines whether the authorization conditions are met based on the information in step 403.
  • Step 405 and step 309 may refer to each other.
  • the difference includes that step 405 may also determine whether the identification of the target application function (for example, the value of AF ID) and/or the identification of the target application (for example, the value of APP ID) matches. Meet the authorization conditions.
  • the identification of the target application function for example, the value of AF ID
  • the identification of the target application for example, the value of APP ID
  • step 406 reference may be made to the process of step 310, which will not be described again.
  • Steps 407a and 408a are processes including the NEF address in step 406.
  • Step 407a may refer to the process of step 311a, and will not be repeated.
  • Step 408a may refer to the process of step 312a, and details will not be repeated.
  • Steps 407b, 408b and 409b are processes that do not include the NEF address in step 406.
  • Step 407b may refer to the process of step 311b, and details will not be repeated.
  • Step 408b may refer to the process of step 312b, and details will not be repeated.
  • Step 409b can refer to the process of step 313b, and the details will not be repeated.
  • Step 410 After receiving the network information, the AF may send the network information to the UE.
  • the AF can send subscribed network information to the UE through the application layer.
  • the second device in step 406 can send the network information to the AMF/SMF, by AMF/SMF is sent directly to the UE through the control plane.
  • AMF sends network information to the UE through the UE Configuration Update Command (UE Configuration Update Command)
  • SMF sends network information to the UE through the PDU Session Modification Command (PDU Session Modification Command).
  • the second device in step 406 can send the network information to the UPF, and the UPF passes The user plane is sent directly to the UE.
  • UPF is sent to the UE through the user plane downlink data packet.
  • an indication of the sending method of the network information can be carried in step 403, step 404, and step 405, for example, instructing the second device to send the network information directly to the UE through the control plane, or through the user.
  • the page is sent directly to UE.
  • the first device is a UE
  • the acquisition method is for the UE to obtain network information (that is, both the requester and the user are UE).
  • Step 500 The AF and the communication system sign an agreement Y3 to indicate that the communication system allows the UE to obtain network information from the communication system.
  • protocol Y3 indicates that the communication system allows the UE to obtain specific network information for specific purposes from the communication network.
  • the AF determines the UE that wants to perform the application layer service locally on the UE (for example, the UE downloads the AI model from the AF and informs the AF that the UE wants to perform AI inference locally) and determines that the service needs to be communicated from Network information is obtained from the system and these agreements can be signed.
  • Step 501 Save the UE's subscription information in the UDM.
  • the subscription information includes one or more of the following: the identification of the terminal device (such as the permanent user identification SUPI), the indication information of whether to allow access to network information (such as the value of consent indication), the permitted purpose of use (such as the value of purpose). value), allowed service identifiers (such as the value of service ID), allowed requesting devices and allowed use devices (such as the value of Indication), the type of network information allowed to be obtained (such as the value of Event ID and/or The value of Analytics ID), the identification of the target application that allows obtaining network information (such as the value of APP ID).
  • the identification of the terminal device such as the permanent user identification SUPI
  • the indication information of whether to allow access to network information such as the value of consent indication
  • the permitted purpose of use such as the value of purpose. value
  • allowed service identifiers such as the value of service ID
  • allowed requesting devices and allowed use devices such as the value of Indication
  • the type of network information allowed to be obtained such as the value of Event ID and/or The value of Analytics ID
  • UDM saves user consent information: ⁇ SUPI, consent indication, purpose, service ID, Indication, Event ID/Analytics ID, APP ID>.
  • the value of purpose corresponding to the same SUPI can be one or more
  • the value of service ID can be one or more
  • the value of Indication can be one or more.
  • the value of Event ID/Analytics ID can be one or more; the value of APP ID can be one or more.
  • Step 502 The UE negotiates with the AF and determines that the UE can directly request network information from the communication system.
  • the UE determines that it needs to obtain network information from the network element of the communication system.
  • the UE can negotiate with the AF to determine that the UE can directly request network information from the network element of the communication system. For example, network information is requested (the request may be a subscription) through the control plane or user-oriented communication system.
  • Step 503 The UE sends a message to the second device (ie, data providing network element, such as UPF, NWDAF, AMF, SMF, OAM, AF, etc.) to request network information.
  • the second device ie, data providing network element, such as UPF, NWDAF, AMF, SMF, OAM, AF, etc.
  • the UE may send the message to the second device through the control plane or user plane.
  • the message may be a Registration Request message; when the second device is SMF, the message may be a PDU Session Establishment Request message; when the second device is UPF, the message The message can be a user plane uplink packet.
  • the message includes one or more of the following: the identification of the terminal device (such as User Permanent Identity (SUPI)), the target type of network information (such as the value of Event ID and/or the value of Analytics ID), the first Indication information (such as the value of Indication), the target use purpose of the network information (such as the value of purpose), the target service identifier (such as the value of service ID), the identifier of the target application (such as the value of APP ID) ).
  • the target requesting device indicated by the first indication information is the UE
  • the target using device is the UE.
  • Step 504 The second device sends a message to UDM.
  • the message includes one or more of the following: the identity of the terminal device (such as User Permanent Identity (SUPI)), the target type of network information (such as the value of Event ID and/or the value of Analytics ID), the first indication Information (such as the value of Indication), the target use purpose of the network information (such as the value of purpose), the target business identifier (such as the value of service ID), the identifier of the target application (such as the value of APP ID) .
  • the target requesting device indicated by the first indication information is the UE
  • the target using device is the UE.
  • the message can be a subscription message.
  • the second device sends a subscription message to UDM through the Nudm_SDM_Subscribe Subscribe service operation to retrieve the UE's subscription information.
  • Step 505 UDM determines whether the authorization conditions are met based on the information in step 504.
  • Step 505 and step 309 may refer to each other.
  • the difference includes that step 505 can also determine whether the identification of the target application (such as the value of the APP ID) meets the authorization conditions.
  • Step 506 UDM sends a message to the second device to request network information.
  • the message can be a subscription notification message.
  • the message includes an indication of whether to allow or not to obtain network information.
  • UDM uses the Nudm_SDM_Subscribe Notify service operation to send a subscription notification message to the second device.
  • the notification message carries an authorization indication.
  • the value of the authorization indication can indicate whether to allow or not to obtain network information.
  • the form of the authorization indication is 1-bit information. When the authorization indication value is "0", it means that the network information is not allowed to be obtained. When the authorization indication value is "1", it means that the network information is allowed to be obtained.
  • Step 507 When determining that obtaining network information is allowed, the second device collects network information.
  • the second device determines that the network allows the UE to obtain network information according to the authorization indication, the subsequent data collection process is performed.
  • Step 508 The second device sends the network information to the UE.
  • the second device may send the collected network information to the UE through the control plane or the user plane.
  • the network information can be carried in the configuration update command (UE Configuration Update Command); when the second device is an SMF, the network information can be carried in the configuration update command (UE Configuration Update Command). Update Command); when the second device is UPF, the network information can be carried in the user plane downlink data packet.
  • step 504 may be replaced by: the second device sends a message (such as a data analysis subscription request message) to the NWDAF, and then the NWDAF sends a message to the UDM to retrieve the UE's subscription information.
  • the message includes one of the following: One or more items: the identification of the terminal device (such as User Permanent Identity (SUPI)), the target type of network information (such as the value of Event ID and/or the value of Analytics ID), the first indication information (such as the value of Indication) value), the target use purpose of the network information (such as the value of purpose), the target business identifier (such as the value of service ID), and the identifier of the target application (such as the value of APP ID).
  • the target requesting device indicated by the first indication information is the UE, and the target using device is the UE.
  • the second device can send a message (such as a subscription request for data analysis) to NWDAF through the Nnwdaf_AnalyticsSubscription_Subscribe service operation.
  • a message such as a subscription request for data analysis
  • NWDAF can retrieve UE subscription information from UDM through the Nudm_SDM_Subscribe Subscribe service operation.
  • Steps 506, 507 and 508 can be replaced by: UDM sends a message to NWDAF to request network information (the network information can be a data analysis result), and NWDAF obtains the network information (the network information can be a data analysis result) and sends it to The second device then sends the network information (the network information may be a data analysis result) to the UE through the control plane or the user plane.
  • the message sent by UDM to NWDAF may be a subscription notification message.
  • the message includes an indication of whether to allow or not to obtain network information.
  • UDM sends subscription notification messages to NWDAF through the Nudm_SDM_Subscribe Notify service operation.
  • the subscription notification message carries an authorization indication.
  • the value of the authorization indication can indicate whether to allow or not allow access to network information.
  • the authorization indication is in the form of 1-bit information. When the value of the authorization indication is "0", it means that access to network information is not allowed. , when the authorization indication value is "1", it means that obtaining network information is allowed.
  • NWDAF can send network information to the second device through the Nnwdaf_AnalyticsSubscription_Notify service operation.
  • the AF signs an agreement with the communication system, and the network stores the UE's contract information in the UDM, which limits the purpose and scope of the network information that the communication system allows the UE to obtain. In this way, the subsequent UE directly requests the network for acquisition.
  • UDM can determine whether the requested content is within the allowed range based on the contract information, which enhances the standardization and security of the UE's ability to obtain network data.
  • the method in the embodiment of the present application is introduced above, and the device in the embodiment of the present application will be introduced below.
  • the method and the device are conceived based on the same technology. Since the principles of the method and the device in solving problems are similar, the implementation of the device and the method can be referred to each other, and the repeated points will not be repeated.
  • Embodiments of the present application can divide the device into functional modules according to the above method examples.
  • the device can be divided into functional modules corresponding to each function, or two or more functions can be integrated into one module.
  • These modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. There may be other division methods during specific implementation.
  • the device 600 may include: a processing module 610, optionally, a receiving module 620a, a sending module 620b, Storage module 630.
  • the processing module 610 can be connected to the storage module 630, the receiving module 620a, and the sending module 620b respectively.
  • the storage module 630 can also be connected to the receiving module 620a and the sending module 620b.
  • the above-mentioned receiving module 620a and sending module 620b can also be integrated together and defined as a transceiving module.
  • the device 600 may be a data management network element, or may be a chip or functional unit applied in the data management network element.
  • the device 600 has any function of the data management network element in the above method.
  • the device 600 can perform various steps performed by the data management network element and UDM in the methods of FIG. 2, FIG. 3, FIG. 4, and FIG. 5.
  • the receiving module 620a can perform the receiving action performed by the data management network element in the above method embodiment.
  • the sending module 620b can perform the sending action performed by the data management network element in the above method embodiment.
  • the processing module 610 can perform other actions except sending actions and receiving actions among the actions performed by the data management network element in the above method embodiment.
  • the receiving module 620a is configured to receive a first message from a first device.
  • the first message includes first indication information, an identification of the terminal device, and a target type.
  • the first indication information is used to Indicate the target requesting device and the target using device of the network information;
  • the sending module 620b is configured to send a second device to the second device corresponding to the network information of the target type based on the first message and the subscription information of the terminal device. Two messages; wherein the second message is used to obtain network information of the target type.
  • the subscription information includes allowed requesting devices and allowed usage devices.
  • the allowed requesting device and the allowed use device include that the allowed requesting device is an application function device and the allowed use device is a terminal device; or, the allowed requesting device and the allowed use device are both application function devices; or , the allowed requesting devices and the allowed using devices are both terminal devices.
  • the processing module 610 is configured to determine that authorization conditions are met based on the first message and the subscription information of the terminal device; and the sending module 620b is configured to send a corresponding message to the network information of the target type.
  • the second device sends the second message.
  • the processing module 610 is specifically configured to determine the target request when the target requesting device and the target usage device are included in the allowed requesting devices and allowed usage devices included in the subscription information.
  • the device and the described target use device meet the authorization conditions.
  • the processing module 610 is specifically configured to determine that if the subscription information does not include the type of network information that is allowed to be obtained and the first message includes the target type, the target type meets the authorization conditions; Or, if the subscription information includes a type of network information that is allowed to be obtained, the first message includes the target type, and when the type of network information that is allowed to be obtained includes the target type, then Determine that the target type meets the authorization conditions.
  • the type of network information includes: event identification and/or analysis identification.
  • the processing module 610 is specifically configured to determine that if the subscription information does not include an allowed service identifier and the first message includes a target service identifier, the target service identifier meets the authorization conditions; or if The subscription information includes an allowed service identifier, and the first message includes a target service identifier. When the allowed service identifiers included in the subscription information include the target service identifier, it is determined that the target service identifier meets the authorization conditions. .
  • the processing module 610 is specifically configured to determine if the subscription information does not include an identification of an application function that allows obtaining network information and the first message includes an identification of a target application function. The identification meets the authorization conditions; or, if the subscription information includes an identification of an application function that is allowed to obtain network information, the first message includes an identification of the target application function.
  • the subscription information includes an application that is allowed to obtain network information
  • the identification of the function includes the identification of the target application function, it is determined that the identification of the target application function meets the authorization conditions.
  • the processing module 610 is specifically configured to determine if the subscription information does not include an identification of an application that is allowed to obtain network information and the first message includes an identification of a target application. The identification meets the authorization conditions; or, if the subscription information includes the identification of an application that is allowed to obtain network information, the first message includes the identification of the target application. When the subscription information includes the identification of an application that is allowed to obtain network information, When the identification includes the identification of the target application, it is determined that the identification of the target application meets the authorization conditions.
  • the receiving module 620a is specifically configured to receive the first message from the first device through the third device; the second message includes the address of the third device, and the address of the third device Used by the second device to send the network information of the target type to the third device.
  • the storage module 630 can store computer execution instructions for the method executed by the data management network element, so that the processing module 610, the receiving module 620a and the sending module 620b execute the method executed by the data management network element in the above example. .
  • the storage module may include one or more memories, and the memories may be devices used to store programs or data in one or more devices or circuits.
  • the storage module can be a register, cache or RAM, etc., and the storage module can be integrated with the processing module.
  • the storage module can be a ROM or other types of static storage devices that can store static information and instructions, and the storage module can be independent from the processing module.
  • the transceiver module may be an input or output interface, a pin or a circuit, etc.
  • the device 600 may be a first device, or may be a chip or functional unit applied in the first device.
  • the device 600 has any function of the first device in the above method.
  • the device 600 can perform each step performed by the first device in the above methods of FIG. 2, FIG. 3, FIG. 4, and FIG. 5.
  • the receiving module 620a can perform the receiving action performed by the first device in the above method embodiment.
  • the sending module 620b can perform the sending action performed by the first device in the above method embodiment.
  • the processing module 610 may perform other actions except sending actions and receiving actions among the actions performed by the first device in the above method embodiment.
  • the sending module 620b is configured to send a first message to the data management network element.
  • the first message includes first indication information, an identification of the terminal device, and a target type.
  • the first indication information is To indicate the target requesting device and the target using device of the network information, so that the data management network element sends a message to the second device corresponding to the network information of the target type based on the first message and the subscription information of the terminal device.
  • the second message wherein the second message is used to obtain the network information of the target type.
  • the storage module 630 can store computer execution instructions for the method executed by the first device, so that the processing module 610, the receiving module 620a and the sending module 620b execute the method executed by the first device in the above example.
  • the storage module may include one or more memories, and the memories may be devices used to store programs or data in one or more devices or circuits.
  • the storage module can be a register, cache or RAM, etc., and the storage module can be integrated with the processing module.
  • the storage module can be a ROM or other types of static storage devices that can store static information and instructions, and the storage module can be independent from the processing module.
  • the transceiver module may be an input or output interface, a pin or a circuit, etc.
  • the device can be implemented by a general bus architecture.
  • FIG. 7 a schematic block diagram of a communication device 700 is provided.
  • the device 700 may include a processor 710 and, optionally, a transceiver 720 and a memory 730 .
  • the transceiver 720 can be used to receive programs or instructions and transmit them to the processor 710, or the transceiver 720 can be used to communicate and interact with other communication devices between the device 700, such as interactive control signaling and/or services. Data etc.
  • the transceiver 720 may be a code and/or data read and write transceiver, or the transceiver 720 may be a signal transmission transceiver between a processor and a transceiver.
  • the processor 710 and the memory 730 are electrically coupled.
  • the device 700 may be a data management network element, or may be a chip applied in the data management network element. It should be understood that the device has any functions of the data management network element in the above method. For example, the device 700 can perform various steps performed by the data management network element in the methods of FIG. 2, FIG. 3, FIG. 4, and FIG. 5.
  • the memory 730 is used to store computer programs; the processor 710 can be used to call the computer program or instructions stored in the memory 730 to execute the method performed by the data management network element in the above example, or by The transceiver 720 performs the method performed by the data management network element in the above example.
  • the device 700 may be a first device, or may be a chip applied in the first device. It should be understood that the device has any functions of the first device in the above method. For example, the device 700 can perform various steps performed by the first device in the methods of FIG. 2, FIG. 3, FIG. 4, and FIG. 5.
  • the memory 730 is used to store computer programs; the processor 710 can be used to call the computer program or instructions stored in the memory 730 to execute the method executed by the first device in the above example, or through the The transceiver 720 performs the method performed by the first device in the above example.
  • the processing module 610 in FIG. 6 can be implemented by the processor 710.
  • the receiving module 620a and the sending module 620b in FIG. 6 can be implemented by the transceiver 720.
  • the transceiver 720 is divided into a receiver and a transmitter, the receiver performs the function of the receiving module, and the transmitter performs the function of the transmitting module.
  • the storage module 630 in FIG. 6 can be implemented through the memory 730.
  • the device can be implemented by a general-purpose processor (a general-purpose processor can also be called a chip or a chip system).
  • a general-purpose processor can also be called a chip or a chip system.
  • a general processor that implements a device applied to a data management network element or a first device includes: a processing circuit (the processing circuit may also be called a processor); optionally, it also includes: and The processing circuit is internally connected to an input and output interface for communication and a storage medium (the storage medium may also be called a memory).
  • the storage medium is used to store instructions executed by the processing circuit to execute the data management network element or the first device in the above example. method of execution.
  • the processing module 610 in Figure 6 can be implemented by a processing circuit.
  • the receiving module 620a and the sending module 620b in Figure 6 can be implemented through input and output interfaces.
  • the input and output interface is divided into an input interface and an output interface.
  • the input interface performs the function of the receiving module
  • the output interface performs the function of the sending module.
  • the storage module 630 in Figure 6 can be implemented through a storage medium.
  • the device of the embodiment of the present application can also be implemented using the following: one or more FPGAs (Field Programmable Gate Arrays), PLDs (Programmable Logic Devices), controllers, state machines, gate logic, discrete hardware components, any other suitable circuit, or any combination of circuits capable of performing the various functions described throughout this application.
  • FPGAs Field Programmable Gate Arrays
  • PLDs Programmable Logic Devices
  • controllers state machines, gate logic, discrete hardware components, any other suitable circuit, or any combination of circuits capable of performing the various functions described throughout this application.
  • Embodiments of the present application also provide a computer-readable storage medium storing a computer program.
  • the computer program When executed by a computer, the computer can be used to execute the above communication method.
  • the computer program includes instructions for implementing the above communication method.
  • An embodiment of the present application also provides a computer program product, which includes: computer program code.
  • computer program product which includes: computer program code.
  • the computer program code When the computer program code is run on a computer, the computer can execute the communication method provided above.
  • Embodiments of the present application also provide a communication system.
  • the communication system includes: a data management network element that performs the above communication method, and a second device.
  • the processor mentioned in the embodiments of this application may be a central processing unit (CPU), a baseband processor.
  • the baseband processor and the CPU may be integrated together or separated, or may be a network processor (network processor).
  • processor, NP network processor
  • the processor may further include a hardware chip or other general-purpose processor.
  • the above-mentioned hardware chip can be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
  • the above-mentioned PLD can be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a general array logic (GAL) and other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. or any combination thereof.
  • CPLD complex programmable logic device
  • FPGA field-programmable gate array
  • GAL general array logic
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • non-volatile memory may be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Random Access Memory
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the transceiver mentioned in the embodiment of this application may include a separate transmitter and/or a separate receiver, or the transmitter and receiver may be integrated.
  • the transceiver can work under the instructions of the corresponding processor.
  • the transmitter can correspond to the transmitter in the physical device
  • the receiver can correspond to the receiver in the physical device.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the displayed Or the mutual coupling or direct coupling or communication connection discussed may be indirect coupling or communication connection through some interfaces, devices or units, or it may be electrical, mechanical or other forms of connection.
  • the units described as separate components may or may not be physically separated.
  • the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple mobile management devices. . Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiments of the present application.
  • each functional unit in various embodiments of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above integrated units can be implemented in the form of hardware or software functional units.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or part of the contribution, or all or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes several The instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande se rapporte au domaine technique des communications. Elle concerne un procédé et un appareil de communication utilisés pour améliorer la sécurité de communication. Le procédé comprend les étapes suivantes : un élément réseau de gestion de données reçoit un premier message d'un premier dispositif, le premier message comprenant des premières informations d'indication, un identifiant d'un dispositif terminal et un type cible, et les premières informations d'indication servant à indiquer un dispositif demandeur cible et un dispositif utilisateur cible par rapport à des informations de réseau ; puis, l'élément réseau de gestion de données envoie, d'après le premier message et les informations d'abonnement du dispositif terminal, un second message à un second dispositif correspondant aux informations réseau du type cible, le second message servant à acquérir les informations réseau du type cible. Lorsqu'un premier dispositif doit acquérir des informations réseau à partir d'un élément réseau de gestion de données, l'élément réseau de gestion de données peut vérifier un premier message, et les informations réseau correspondantes peuvent être acquises uniquement lorsque la vérification est réussie, ce qui permet d'améliorer la sécurité de communication.
PCT/CN2023/088281 2022-05-06 2023-04-14 Procédé et appareil de communication WO2023213177A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210488009.6 2022-05-06
CN202210488009.6A CN117061135A (zh) 2022-05-06 2022-05-06 一种通信方法及装置

Publications (1)

Publication Number Publication Date
WO2023213177A1 true WO2023213177A1 (fr) 2023-11-09

Family

ID=88646235

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/088281 WO2023213177A1 (fr) 2022-05-06 2023-04-14 Procédé et appareil de communication

Country Status (2)

Country Link
CN (1) CN117061135A (fr)
WO (1) WO2023213177A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117880794A (zh) * 2024-03-07 2024-04-12 荣耀终端有限公司 一种通信方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586599A (zh) * 2020-04-24 2020-08-25 腾讯科技(深圳)有限公司 网络辅助信息提供方法及相关设备
CN111586601A (zh) * 2020-04-24 2020-08-25 腾讯科技(深圳)有限公司 网络辅助信息提供方法及相关设备
CN113055879A (zh) * 2019-12-10 2021-06-29 华为技术有限公司 一种用户标识接入方法及通信装置
WO2022027492A1 (fr) * 2020-08-06 2022-02-10 华为技术有限公司 Procédé, dispositif et système de communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055879A (zh) * 2019-12-10 2021-06-29 华为技术有限公司 一种用户标识接入方法及通信装置
CN111586599A (zh) * 2020-04-24 2020-08-25 腾讯科技(深圳)有限公司 网络辅助信息提供方法及相关设备
CN111586601A (zh) * 2020-04-24 2020-08-25 腾讯科技(深圳)有限公司 网络辅助信息提供方法及相关设备
WO2022027492A1 (fr) * 2020-08-06 2022-02-10 华为技术有限公司 Procédé, dispositif et système de communication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117880794A (zh) * 2024-03-07 2024-04-12 荣耀终端有限公司 一种通信方法及装置

Also Published As

Publication number Publication date
CN117061135A (zh) 2023-11-14

Similar Documents

Publication Publication Date Title
US11917498B2 (en) Communication method and communications apparatus
WO2021017689A1 (fr) Procédé et appareil d'acquisition de données de plan utilisateur et support de stockage
US20220338106A1 (en) Slice control method and apparatus
WO2020200254A1 (fr) Procédé et appareil de communication
WO2020253735A1 (fr) Procédé et dispositif de gestion des encombrements
WO2021051420A1 (fr) Procédé et appareil de détermination d'un enregistrement de cache dns
WO2023082878A1 (fr) Procédé et appareil de communication
US20220263879A1 (en) Multicast session establishment method and network device
WO2022222817A1 (fr) Procédé et appareil de sélection de serveur d'application d'extrémité
WO2023213177A1 (fr) Procédé et appareil de communication
US20220006816A1 (en) Terminal management and control method, apparatus, and system
WO2021159415A1 (fr) Procédé, appareil et système de communication
WO2023078183A1 (fr) Procédé de collecte de données et appareil de communication
US20240179801A1 (en) Communication method and apparatus
WO2023041054A1 (fr) Procédé et appareil de vérification de réseau
US20240224098A1 (en) Network verification method and apparatus
WO2023197737A1 (fr) Procédé d'envoi de message, procédé de gestion de pin, appareil de communication et système de communication
WO2023231450A1 (fr) Procédé de synchronisation temporelle et appareil de communication
WO2023083153A1 (fr) Procédé d'obtention d'un résultat de classification de sécurité et appareil de communication
US20230136984A1 (en) Method and apparatus for verifying compliance with ue route selection policy
WO2023221604A1 (fr) Procédé et appareil de communication
WO2023185062A1 (fr) Procédé de sauvegarde, dispositif de communication et système de communication
WO2023051631A1 (fr) Procédé et appareil d'appel de données
WO2023061207A1 (fr) Procédé de communication, appareil de communication et système de communication
WO2022206296A1 (fr) Procédé, appareil et système de commande de session

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23799164

Country of ref document: EP

Kind code of ref document: A1