CN114071464B - Private network implementation method, device and equipment based on 5G message and storage medium - Google Patents

Private network implementation method, device and equipment based on 5G message and storage medium Download PDF

Info

Publication number
CN114071464B
CN114071464B CN202010781346.5A CN202010781346A CN114071464B CN 114071464 B CN114071464 B CN 114071464B CN 202010781346 A CN202010781346 A CN 202010781346A CN 114071464 B CN114071464 B CN 114071464B
Authority
CN
China
Prior art keywords
private network
application
message
pool
identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010781346.5A
Other languages
Chinese (zh)
Other versions
CN114071464A (en
Inventor
陈霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Shanghai Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Shanghai Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010781346.5A priority Critical patent/CN114071464B/en
Publication of CN114071464A publication Critical patent/CN114071464A/en
Application granted granted Critical
Publication of CN114071464B publication Critical patent/CN114071464B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application provides a private network implementation method, a private network implementation device, private network implementation equipment and a private network storage medium based on 5G messages. The private network implementation method based on the 5G message comprises the following steps: classifying applications in the large network application pool to obtain private network application pools of all classes; wherein each application in a single private network application pool has the same private network identification; identifying private network users of each category; and establishing a mapping relation between the private network application pools and the private network users in the same category. According to the private network implementation method, device and equipment based on the 5G message and the computer storage medium, the efficiency of limiting the user access to the application permission can be improved.

Description

Private network implementation method, device and equipment based on 5G message and storage medium
Technical Field
The application belongs to the technical field of private network implementation based on 5G messages, and particularly relates to a private network implementation method, device and equipment based on 5G messages and a computer storage medium.
Background
The 5G message is an upgrade of short message service, is a basic telecommunication service of an operator, realizes a leap of service experience based on the Internet protocol (Internet Protocol, IP) technology, supports more media formats and has a richer expression form.
At present, no private network mechanism and flow are realized in a 5G message system, and only a blacklist mechanism is defined to realize shielding of certain applications, wherein the blacklist mechanism is more suitable for the limitation of a small number of applications. However, the 5G messaging application (Chatbot) will be a hundred-fold list, covering all industries, the application types and the number will exceed the imagination of people, so for some private network applications, the efficiency will be extremely low and wasteful by using only such a blacklist mechanism to limit the access of users to application rights, and the blacklist mechanism may cause the problem of inexhaustible screening.
Therefore, how to improve the efficiency of restricting the user's access to the application rights is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The embodiment of the application provides a private network implementation method, a private network implementation device, private network implementation equipment and a computer storage medium based on 5G messages, which can improve the efficiency of limiting the access application permission of users.
In a first aspect, an embodiment of the present application provides a private network implementation method based on a 5G message, including:
classifying applications in the large network application pool to obtain private network application pools of all classes; wherein each application in a single private network application pool has the same private network identification;
identifying private network users of each category;
and establishing a mapping relation between the private network application pools and the private network users in the same category.
Optionally, identifying private network users of each category includes:
based on subscription information, code number segments or terminal capability identification, private network users of each category are identified.
Optionally, identifying private network users of each category based on subscription information includes:
acquiring a domain name and an internet protocol (Internet Protocol, IP) address of a mapping server (DM);
acquiring subscription information after the 5G message is registered based on the domain name and the IP address;
based on the subscription information, private network users of each category are identified.
Optionally, after identifying the private network users of each category based on the subscription information, the method further includes:
and receiving the updated configuration information sent by the DM.
Optionally, identifying private network users of each category based on the terminal capability identification includes:
acquiring an international mobile subscriber identity (International Mobile Subscriber Identity, IMSI) and an international mobile equipment identity (International Mobile Equipment Identity, IMEI) of the terminal;
and identifying private network users of various categories according to the IMSI and the IMEI.
Optionally, after identifying the private network subscribers of each category according to the IMSI and IMEI, the method further comprises:
and receiving the first configuration file sent by the server.
Optionally, the private network application pool is a learning private network application pool, and correspondingly, the private network user is a student user.
In a second aspect, an embodiment of the present application provides a private network implementation device based on a 5G message, where the device includes:
the first classification module is used for classifying the applications in the large network application pool to obtain private network application pools of all the categories; wherein each application in a single private network application pool has the same private network identification;
the first identification module is used for identifying private network users of various categories;
the first establishing module is used for establishing the mapping relation between the private network application pool and the private network users in the same category.
Optionally, the first identification module includes:
the first identifying unit is used for identifying private network users of various categories based on subscription information, code number segments or terminal capability identification.
Optionally, the first identifying unit includes:
a first obtaining subunit, configured to obtain a domain name and an internet protocol IP address of the mapping server DM;
the second acquisition subunit is used for acquiring subscription information after the 5G message is registered based on the domain name and the IP address;
and the first identification subunit is used for identifying private network users of various categories based on the subscription information.
Optionally, the apparatus further comprises:
and the first receiving module is used for receiving the updated configuration information sent by the DM.
Optionally, the first identifying unit includes:
a third obtaining subunit, configured to obtain an international mobile subscriber identity IMSI and an international mobile equipment identity IMEI of the terminal;
and the second identification subunit is used for identifying private network users of various categories according to the IMSI and the IMEI.
Optionally, the apparatus further comprises:
the second receiving module is used for receiving the first configuration file sent by the server.
Optionally, the private network application pool is a learning private network application pool, and correspondingly, the private network user is a student user.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the private network implementation method of the first aspect or any optional implementation manner of the first aspect based on the 5G message.
In a fourth aspect, embodiments of the present application provide a computer storage medium having stored thereon computer program instructions which, when executed by a processor, implement the private network implementation method according to the first aspect or any of the alternative implementations of the first aspect, based on 5G messages.
According to the private network implementation method, device and equipment based on the 5G message and the computer storage medium, the efficiency of limiting the user access application permission can be improved. The method classifies applications in the large network application pool to obtain private network application pools of various categories, namely a private network white list is established; after identifying private network users of each category, a mapping relationship between the private network application pool of the same category and the private network users is established, namely, a mapping relationship between a private network white list and the private network users is established. Due to the fact that the application types and the number are very large, the white list mechanism can improve the efficiency of limiting the user access to the application permission.
Drawings
In order to more clearly illustrate the technical solution of the embodiments of the present application, the drawings that are needed to be used in the embodiments of the present application will be briefly described, and it is possible for a person skilled in the art to obtain other drawings according to these drawings without inventive effort.
Fig. 1 is a schematic flow diagram of a private network implementation method based on a 5G message according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method for establishing a private network application pool according to an embodiment of the present application;
fig. 3 is a flowchart of a method for identifying private network users according to an embodiment of the present application;
fig. 4 is a flowchart of a method for identifying private network users according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a private network implementation device based on a 5G message according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail below with reference to the accompanying drawings and the detailed embodiments. It should be understood that the specific embodiments described herein are merely configured to illustrate the application and are not configured to limit the application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the application by showing examples of the application.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
At present, no private network mechanism and flow are realized in a 5G message system, and only a blacklist mechanism is defined to realize shielding of certain applications, wherein the blacklist mechanism is more suitable for the limitation of a small number of applications. However, the 5G messaging application (Chatbot) will be a hundred-fold list, covering all industries, the application types and the number will exceed the imagination of people, so for some private network applications, the efficiency will be extremely low and wasteful by using only such a blacklist mechanism to limit the access of users to application rights, and the blacklist mechanism may cause the problem of inexhaustible screening.
In order to solve the problems in the prior art, the embodiment of the application provides a private network implementation method, a private network implementation device, private network implementation equipment and a private network implementation computer storage medium based on 5G messages. The private network implementation method based on the 5G message provided by the embodiment of the present application is first described below.
Fig. 1 shows a flow diagram of a private network implementation method based on a 5G message according to an embodiment of the present application. As shown in fig. 1, the private network implementation method based on the 5G message may include the following steps:
s101, classifying applications in a large network application pool to obtain private network application pools of all classes; wherein each application in a single private network application pool has the same private network identity.
S102, identifying private network users of each category.
S103, establishing a mapping relation between the private network application pool and the private network users in the same category.
The method classifies applications in the large network application pool to obtain private network application pools of various categories, namely a private network white list is established; after identifying private network users of each category, a mapping relationship between the private network application pool of the same category and the private network users is established, namely, a mapping relationship between a private network white list and the private network users is established. Due to the fact that the application types and the number are very large, the white list mechanism can improve the efficiency of limiting the user access to the application permission.
In one embodiment, identifying individual categories of private network users includes: based on subscription information, code number segments or terminal capability identification, private network users of each category are identified.
In one embodiment, identifying individual categories of private network users based on subscription information includes: acquiring a domain name and an Internet Protocol (IP) address of a mapping server (DM); acquiring subscription information after the 5G message is registered based on the domain name and the IP address; based on the subscription information, private network users of each category are identified.
In one embodiment, after identifying the individual categories of private network users based on subscription information, the method further comprises: and receiving the updated configuration information sent by the DM.
In one embodiment, identifying individual categories of private network users based on terminal capability identification includes: acquiring an International Mobile Subscriber Identity (IMSI) and an International Mobile Equipment Identity (IMEI) of a terminal; and identifying private network users of various categories according to the IMSI and the IMEI.
In one embodiment, after identifying the individual categories of private network users based on the IMSI and IMEI, the method further comprises: and receiving the first configuration file sent by the server.
In one embodiment, the private network application pool is a learning private network application pool, and accordingly, the private network users are student users.
The embodiment of the application establishes the private network application pool or the private network white list aiming at specific industries and requirements, and then carries out closed-loop management on specific industry clients and corresponding private network application pools in a 5G message system, thereby shielding the application irrelevant to the private network requirements. The following private network users can only search and inquire Chatbot catalogs and view Chatbot information based on the private network application pool, and the application outside the private network application pool is not seen by the private network users.
Compared with the existing blacklist mechanism, the whitelist mechanism provided by the application is more efficient and safer. Because private network users are generally only interested in a certain class of applications, most of the applications need to be shielded if a blacklist mechanism is adopted, and the shielding is possibly unclean, obviously, the blacklist mechanism is relatively counteracted and unsafe, and is not suitable for realizing the 5G message private network.
And the embodiment of the application can conveniently realize a special network terminal in certain industries, including but not limited to: a student learns private network terminals, special duty industry terminals, etc. The industrial terminal realized by the embodiment of the application can conveniently control the access authority and the range, and the 5G message is used as the only entry of the terminal application service, so that the terminal function can be simplified, and the manufacturing cost of the industrial terminal can be reduced.
The following description of the application will be made in connection with an embodiment in which a learning private network for students is implemented through a 5G message portal.
With the increasing popularization and development of internet education, the study of teenagers and children is increasingly free from networks and intelligent terminals. But entertainment and bad information temptation of the internet and the intelligent terminal are also ubiquitous, and educational functions of the intelligent terminal and the internet are gradually eroded by the entertainment functions. Therefore, many parents and schools do not allow students to carry intelligent terminals at present. But in reality, with the development of internet education, there are many very good educational resources updated in real time on the network.
The embodiment of the application realizes the function of the learning private network, and students can only access the application pool of the learning private network which is checked through the 5G message entrance. If other portals are shielded on the intelligent terminal, and the 5G message is used as the only portal for internet information service and application, the intelligent terminal is a learning intelligent terminal which is safe for parents.
The embodiment mainly comprises the following processes:
1. establishment of private network application pool
The private network application pool is established mainly based on the application pool of the large network, and the application of the application pool of the large network is subjected to classified auditing, so that the categories belonging to the private network are additionally marked with private network labels. The private network subdirectory is established by dividing under the Chatbot directory, and the private networks of different industries divide different subdirectories, such as dividing the learning-type Chatbot application into a private network directory. The auditing and establishment of the private network application pool relate to a management module, a MaaP (Messaging as a Platform, message platform) platform, a service support system (business Operation support system, B0 SS) and the like, and the specific flow is as shown in fig. 2, and comprises the following steps:
s201, user information filling is completed on the BOSS. The application completes account opening information filling on the BOSS, namely the Chatbot code number and the details (such as names, introduction and the like) of the Chatbot;
s202, performing registration audit by the Chatbot. The MaaP platform management module carries out registration and audit on the Chatbot;
s203, the Chatbot related information is written into a Chatbot catalog and a Chatbot detail server. After the auditing is passed, writing the related information of the Chatbot into the Chatbot catalog and the details of the Chatbot, wherein S203 is the normal flow of the current 5G message;
s204, private network classification auditing. After the verification is passed, the MaaP platform management module additionally performs private network classification verification, such as verification on whether the private network is a learning private network or a certain internet of things private network.
S205, private network identification and mapping are carried out. The private network classification checking is passed, for example, if the private network classification checking belongs to the application of the learning private network, the application of the private network classification checking belongs to the application of the learning private network, and if the private network classification checking belongs to the application of the learning private network, the application of the private network classification checking belongs to the application of the learning private network. The private network identification can be text or digital, the system can identify and map itself, and the private network application pool identification and private network identification of private network user need to be correlated and corresponding.
S206, writing corresponding private network Chatbot sub-targets and detail functions. The application of the private network application pool additionally forms a private network Chatbot subdirectory function and a private network Chatbot detail function.
The private network Chatbot subdirectory server address and the private network Chatbot detail information server address suggest additional configurations.
2. Closed loop flow associated with private network user identification and private network application pool
Private network users can be identified through subscription information, can also be distinguished through code number segments, and can be identified even according to terminal capacity identifications such as IMEI of terminals. After the private network user is identified, all subsequent operations of the private network user are limited in the private network application pool, and the private network application pool forms a closed loop, including Chatbot catalogue, catalogue inquiry, information inquiry and the like. Other applications outside the private network application pool are not visible to the private network user. Two private network users and private network application pool association docking flows are exemplified below.
The scheme 1 is to identify private network users based on subscription information, and the specific flow is shown in the following figure 3, and comprises the following steps:
s301, terminal configuration service discovery: and deducing the domain name of the terminal configuration service DM according to the IMSI of the user card, and carrying out the same standard flow. Wherein, international mobile subscriber identity (English: IMSI, international Mobile Subscriber Identity)
S302, access service discovery: the DM server issues service entries (domain name and IP address) of each service function to the terminal through the terminal configuration flow.
The service portal includes: the addresses of the SIP access module, the http content server, the Chatbot directory server in the MaaP platform, the Chatbot detail server of the MaaP platform and the like in the 5G message are issued in the form of domain names through the BOTINFO FQDNROOT parameter in the MD issuing configuration file. The same as the standard flow.
S303, 5G message registration and subscription information acquisition. 5G message registration and private network user identification: after registration, the user subscription information is acquired, and the private network user is identified.
S304, private network user identification.
And S305, triggering the DM server to issue updating configuration after identifying the private network user. And updating the addresses of the original Chatbot directory server, the Chatbot detail server and the like into a Chatbot subdirectory (private network application pool) and a private network Chatbot detail server domain name respectively.
The Chatbot directory query, chatbot information query of the subsequent private network users will all be based on being within the scope of Chatbot subdirectories and private network Chatbot details.
Scheme 2: the specific process of identifying the terminal capability or IMEI is shown in fig. 4, and includes the following steps:
s401, terminal configuration service discovery: and the terminal acquires the latest configuration file from the server through the configuration flow. The terminal carries information parameters of the terminal when applying for configuration parameters, such as IMEI, IMSI and the like of the terminal.
S402, private network user identification: the configuration server judges whether the private network user is through IMEI or IMSI and other information.
S403, if the private network user is the private network user, the configuration server issues a special configuration file, and the configuration server updates addresses of a Chatbot directory server in the MaaP platform and a Chatbot detail server of the MaaP platform in the configuration file as follows: chatbot subdirectories (private network application pool) and private network Chatbot detail server domain name, then issued.
S404, if the private network user is not the private network user, the configuration server issues a conventional configuration file.
Fig. 5 is a schematic structural diagram of a private network implementation device based on a 5G message according to an embodiment of the present application. As shown in fig. 5, the private network implementing apparatus based on the 5G message may include a first classification module 501, a first identification module 502, and a first establishment module 503.
The first classification module 501 is configured to classify applications in the large network application pool to obtain private network application pools of each class; wherein each application in a single private network application pool has the same private network identification;
a first identifying module 502, configured to identify private network users of each category;
a first establishing module 503 is configured to establish a mapping relationship between the private network application pool and the private network users in the same class.
Optionally, the first identification module 502 includes:
the first identifying unit is used for identifying private network users of various categories based on subscription information, code number segments or terminal capability identification.
Optionally, the first identifying unit includes:
a first obtaining subunit, configured to obtain a domain name and an internet protocol IP address of the mapping server DM;
the second acquisition subunit is used for acquiring subscription information after the 5G message is registered based on the domain name and the IP address;
and the first identification subunit is used for identifying private network users of various categories based on the subscription information.
Optionally, the apparatus further comprises:
and the first receiving module is used for receiving the updated configuration information sent by the DM.
Optionally, the first identifying unit includes:
a third obtaining subunit, configured to obtain an international mobile subscriber identity IMSI and an international mobile equipment identity IMEI of the terminal;
and the second identification subunit is used for identifying private network users of various categories according to the IMSI and the IMEI.
Optionally, the apparatus further comprises:
the second receiving module is used for receiving the first configuration file sent by the server.
Optionally, the private network application pool is a learning private network application pool, and correspondingly, the private network user is a student user.
The modules/units in the apparatus shown in fig. 5 have functions of implementing the steps in fig. 1, and achieve corresponding technical effects, which are not described herein for brevity.
Fig. 6 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
The electronic device may include a processor 601 and a memory 602 storing computer program instructions.
In particular, the processor 601 may include a central processing unit (Central Processing Unit, CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured as one or more integrated circuits implementing embodiments of the present application.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the above. In one example, the memory 602 may include removable or non-removable (or fixed) media, or the memory 602 is a non-volatile solid state memory. The memory 602 may be internal or external to the electronic device.
In one example, memory 602 may be Read Only Memory (ROM). In one example, the ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory, or a combination of two or more of these.
The processor 601 reads and executes the computer program instructions stored in the memory 602 to implement the methods/steps S101 to S103 in the embodiment shown in fig. 1, and achieve the corresponding technical effects achieved by executing the methods/steps in the embodiment shown in fig. 1, which are not described herein for brevity.
In one example, the electronic device may also include a communication interface 603 and a bus 610. As shown in fig. 6, the processor 601, the memory 602, and the communication interface 603 are connected to each other through a bus 610 and perform communication with each other.
The communication interface 603 is mainly used for implementing communication between each module, apparatus, unit and/or device in the embodiment of the present application.
Bus 610 includes hardware, software, or both, that couple components of the electronic device to one another. By way of example, and not limitation, the buses may include an accelerated graphics port (Accelerated Graphics Port, AGP) or other graphics Bus, an enhanced industry standard architecture (Extended Industry Standard Architecture, EISA) Bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an industry standard architecture (Industry Standard Architecture, ISA) Bus, an infiniband interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a micro channel architecture (MCa) Bus, a Peripheral Component Interconnect (PCI) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a video electronics standards association local (VLB) Bus, or other suitable Bus, or a combination of two or more of the above. Bus 610 may include one or more buses, where appropriate. Although embodiments of the application have been described and illustrated with respect to a particular bus, the application contemplates any suitable bus or interconnect.
In addition, embodiments of the present application may be implemented by providing a computer storage medium. The computer storage medium has stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the private network implementation methods based on 5G messages in the above embodiments.
It should be understood that the application is not limited to the particular arrangements and instrumentality described above and shown in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and shown, and those skilled in the art can make various changes, modifications and additions, or change the order between steps, after appreciating the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented in hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine readable medium or transmitted over transmission media or communication links by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuitry, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and the like. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this disclosure describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, or may be performed in a different order from the order in the embodiments, or several steps may be performed simultaneously.
In the foregoing, only the specific embodiments of the present application are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present application is not limited thereto, and any equivalent modifications or substitutions can be easily made by those skilled in the art within the technical scope of the present application, and they should be included in the scope of the present application.

Claims (9)

1. The private network implementation method based on the 5G message is characterized by comprising the following steps:
classifying 5G message applications in the large network application pool to obtain private network application pools of all classes; wherein, each 5G message application in a single private network application pool has the same private network identification;
identifying private network users of each category;
establishing a mapping relation between the private network application pool and the private network users in the same category;
classifying the 5G message application in the large network application pool to obtain private network application pools of all classes, wherein the method comprises the following steps:
classifying and checking 5G message applications in a large network application pool, and marking a private network identifier of a private network application pool of a target class for the target 5G message application under the condition that the target 5G message application meets the preset classifying and checking condition of the private network application pool of the target class, wherein the target 5G message application is any 5G message application in the large network application pool;
determining private network application pools of all categories based on private network identifications of the target 5G message applications;
the private network users of each category are identified, which comprises:
and identifying the private network users of each category based on subscription information, code number segments or terminal capability identification.
2. The private network implementation method based on 5G messages according to claim 1, wherein identifying the private network users of each category based on the subscription information comprises:
acquiring a domain name and an Internet Protocol (IP) address of a mapping server (DM);
acquiring the subscription information after the registration of the 5G message is passed based on the domain name and the IP address;
and identifying the private network users of each category based on the subscription information.
3. The private network implementing method based on 5G message according to claim 2, wherein after the identifying the private network subscribers of respective categories based on the subscription information, the method further comprises:
and receiving the updated configuration information sent by the DM.
4. The private network implementation method based on 5G messages according to claim 1, wherein identifying the private network users of each category based on the terminal capability identification comprises:
acquiring an International Mobile Subscriber Identity (IMSI) and an International Mobile Equipment Identity (IMEI) of a terminal;
and identifying the private network users of each category according to the IMSI and the IMEI.
5. The private network implementation method based on 5G messages according to claim 4, wherein after said identifying the private network subscribers of respective categories based on the IMSI and the IMEI, the method further comprises:
and receiving the first configuration file sent by the server.
6. The private network implementation method based on 5G messages according to claim 1, wherein the private network application pool is a learning private network application pool, and correspondingly, the private network user is a student user.
7. A private network implementing apparatus based on 5G messages, the apparatus comprising:
the first classification module is used for classifying the 5G message application in the large network application pool to obtain a private network application pool of each category; wherein, each 5G message application in a single private network application pool has the same private network identification;
the first identification module is used for identifying private network users of various categories;
the first establishing module is used for establishing the mapping relation between the private network application pool and the private network users in the same category;
the first classification module is specifically configured to:
classifying and checking 5G message applications in a large network application pool, and marking a private network identifier of a private network application pool of a target class for the target 5G message application under the condition that the target 5G message application meets the preset classifying and checking condition of the private network application pool of the target class, wherein the target 5G message application is any 5G message application in the large network application pool;
determining private network application pools of all categories based on private network identifications of the target 5G message applications;
the first identification module is specifically configured to:
and identifying the private network users of each category based on subscription information, code number segments or terminal capability identification.
8. An electronic device, the electronic device comprising: a processor and a memory storing computer program instructions;
the processor reads and executes the computer program instructions to implement a private network implementation method based on 5G messages according to any of the claims 1-6.
9. A computer storage medium having stored thereon computer program instructions which, when executed by a processor, implement the private network implementation method based on 5G messages according to any of claims 1-6.
CN202010781346.5A 2020-08-06 2020-08-06 Private network implementation method, device and equipment based on 5G message and storage medium Active CN114071464B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010781346.5A CN114071464B (en) 2020-08-06 2020-08-06 Private network implementation method, device and equipment based on 5G message and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010781346.5A CN114071464B (en) 2020-08-06 2020-08-06 Private network implementation method, device and equipment based on 5G message and storage medium

Publications (2)

Publication Number Publication Date
CN114071464A CN114071464A (en) 2022-02-18
CN114071464B true CN114071464B (en) 2023-08-15

Family

ID=80232363

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010781346.5A Active CN114071464B (en) 2020-08-06 2020-08-06 Private network implementation method, device and equipment based on 5G message and storage medium

Country Status (1)

Country Link
CN (1) CN114071464B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114786047B (en) * 2022-04-24 2023-12-08 中国电信股份有限公司 Multi-screen interaction realization method and device, storage medium and electronic equipment

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9590935B2 (en) * 2014-03-26 2017-03-07 Verizon Patent And Licensing Inc. Cross-carrier device identification and policy application
WO2018113607A1 (en) * 2016-12-20 2018-06-28 中兴通讯股份有限公司 Method and apparatus for positioning ethernet layer-two virtual private network service
CN108513290A (en) * 2017-02-27 2018-09-07 华为技术有限公司 A kind of selection method and device of network slice
CN108924262A (en) * 2018-08-17 2018-11-30 嘉善力通信息科技股份有限公司 A kind of intelligence peace cell managing and control system based on cloud platform
CN109889499A (en) * 2019-01-17 2019-06-14 Oppo广东移动通信有限公司 File transmitting method and relevant apparatus
CN109996233A (en) * 2018-01-03 2019-07-09 大唐移动通信设备有限公司 A kind of communication management-control method and device
CN108156599B (en) * 2016-12-02 2019-09-17 电信科学技术研究院 A kind of position management method and device
CN110881014A (en) * 2018-09-05 2020-03-13 普天信息技术有限公司 Method and device for physically isolating services of wireless private network
CN111107503A (en) * 2019-12-30 2020-05-05 珠海市小源科技有限公司 Short message fallback method, device and system for converged communication message platform service
CN111131258A (en) * 2019-12-26 2020-05-08 中移(成都)信息通信科技有限公司 Safe private network architecture system based on 5G network slice
CN111343657A (en) * 2020-03-09 2020-06-26 中国联合网络通信集团有限公司 Mobility management method, device, terminal equipment and storage medium
CN111404975A (en) * 2019-01-02 2020-07-10 中国移动通信集团终端有限公司 Message transmission method, device, equipment and computer storage medium
CN111491032A (en) * 2020-04-26 2020-08-04 国网福建省电力有限公司信息通信分公司 Data transmission method and device between 5G core network and power service platform

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140006158A1 (en) * 2012-07-02 2014-01-02 Bradley Gregg COOPER Providing cross-channel opt-in, management and advertising
US20150154720A1 (en) * 2013-12-02 2015-06-04 Jonathan Matkowsky System and method for detecting and defending trademarks against serial cybersquatters
US20200245235A1 (en) * 2019-01-24 2020-07-30 Lg Electronics Inc. Method for selecting non-public network in wireless communication system and apparatus thereof

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9590935B2 (en) * 2014-03-26 2017-03-07 Verizon Patent And Licensing Inc. Cross-carrier device identification and policy application
CN108156599B (en) * 2016-12-02 2019-09-17 电信科学技术研究院 A kind of position management method and device
WO2018113607A1 (en) * 2016-12-20 2018-06-28 中兴通讯股份有限公司 Method and apparatus for positioning ethernet layer-two virtual private network service
CN108513290A (en) * 2017-02-27 2018-09-07 华为技术有限公司 A kind of selection method and device of network slice
CN109996233A (en) * 2018-01-03 2019-07-09 大唐移动通信设备有限公司 A kind of communication management-control method and device
CN108924262A (en) * 2018-08-17 2018-11-30 嘉善力通信息科技股份有限公司 A kind of intelligence peace cell managing and control system based on cloud platform
CN110881014A (en) * 2018-09-05 2020-03-13 普天信息技术有限公司 Method and device for physically isolating services of wireless private network
CN111404975A (en) * 2019-01-02 2020-07-10 中国移动通信集团终端有限公司 Message transmission method, device, equipment and computer storage medium
CN109889499A (en) * 2019-01-17 2019-06-14 Oppo广东移动通信有限公司 File transmitting method and relevant apparatus
CN111131258A (en) * 2019-12-26 2020-05-08 中移(成都)信息通信科技有限公司 Safe private network architecture system based on 5G network slice
CN111107503A (en) * 2019-12-30 2020-05-05 珠海市小源科技有限公司 Short message fallback method, device and system for converged communication message platform service
CN111343657A (en) * 2020-03-09 2020-06-26 中国联合网络通信集团有限公司 Mobility management method, device, terminal equipment and storage medium
CN111491032A (en) * 2020-04-26 2020-08-04 国网福建省电力有限公司信息通信分公司 Data transmission method and device between 5G core network and power service platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
5G micro-operator networks — A key enabler for new verticals and markets;Athul Prasad ect.;《2017 25th Telecommunication Forum (TELFOR)》;全文 *

Also Published As

Publication number Publication date
CN114071464A (en) 2022-02-18

Similar Documents

Publication Publication Date Title
US10009718B2 (en) Sign-in method and device, sign-in server, and storage medium
EP3197213B1 (en) Network access method and mobile communication terminal
CN102761856B (en) Terminal room shares the methods, devices and systems of software
CN108429739B (en) Method, system and terminal equipment for identifying honeypots
CN104092723A (en) File downloading method, device and system
CN104253869A (en) Blacklist sharing method, blacklist updating method, blacklist sharing device and blacklist updating device
CN114071464B (en) Private network implementation method, device and equipment based on 5G message and storage medium
CN104123313A (en) Method for obtaining visitor guiding information and server
CN103023684A (en) Method, device and system for network information management
CN104426816A (en) Virtual machine communication method and device
CN111901813A (en) Network configuration method and equipment for customer premises equipment
CN109587121B (en) Security policy control method and device
CN101212787A (en) Personalized information publishing method and system
US10762238B2 (en) Ascertaining network devices used with anonymous identifiers
CN102088401A (en) Addressing processing method and system thereof and network interface device
CN103415015A (en) Positioning method and device
CN110635994B (en) Heterogeneous interconnection system and method based on self-adaptive detection
CN114630287A (en) Method, device and equipment for sharing dynamic information of circle of friends and computer storage medium
CN104378329A (en) Safety verification method, device and system
CN113163331A (en) Service response method, device, equipment and storage medium
CN105682080A (en) Information updating method, information updating device and terminal
CN106713581A (en) Communication number identification method, terminal and system
CN114625299A (en) Method, device and equipment for sharing dynamic information of circle of friends and computer storage medium
CN107517182B (en) Vertical industry user system, equipment and method for distributing identity identification number
CN100531109C (en) Content providing system and information collecting device and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant