CN114760619A - User information analysis result feedback method and device - Google Patents

User information analysis result feedback method and device Download PDF

Info

Publication number
CN114760619A
CN114760619A CN202110026412.2A CN202110026412A CN114760619A CN 114760619 A CN114760619 A CN 114760619A CN 202110026412 A CN202110026412 A CN 202110026412A CN 114760619 A CN114760619 A CN 114760619A
Authority
CN
China
Prior art keywords
network element
target terminal
user information
information
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110026412.2A
Other languages
Chinese (zh)
Inventor
毕晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Mobile Communications Equipment Co Ltd
Original Assignee
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Mobile Communications Equipment Co Ltd filed Critical Datang Mobile Communications Equipment Co Ltd
Priority to CN202110026412.2A priority Critical patent/CN114760619A/en
Priority to PCT/CN2021/141266 priority patent/WO2022148254A1/en
Publication of CN114760619A publication Critical patent/CN114760619A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer

Abstract

The application discloses a user information analysis result feedback method and a device thereof. In the application, a first network element receives a first user information analysis request from a second network element; the first network element acquires permission allowing analysis of the user information of the target terminal; and after obtaining the permission, the first network element sends an analysis result of the user information of the target terminal to the second network element. By the method and the device, the user information safety can be improved.

Description

User information analysis result feedback method and device
Technical Field
The present application relates to the field of wireless communication technologies, and in particular, to a method and an apparatus for feeding back a user information analysis result.
Background
The 5G Network defines an intelligent Network Data analysis Function (NWDAF) Network element, which can collect and analyze information of a Network Function and User Equipment (UE, also called a terminal), and provide an analysis result to a Network Function (NF) Network element. An NWDAF network element may interact with different network elements for different purposes:
(1) the NWDAF Network element collects Data based on events provided by an Access and Mobility Management (AMF) Network element, a Session Management Function (SMF) Network element, a Policy Control Function (PCF) Network element, a Unified Data Manager (UDM) Network element, an Application Function (AF) Network element, and an Operation and Maintenance (OAM) Network element, wherein the NWDAF Network element may directly interact with the AF Network element or interact with the AF Network element through a Network open Function (Network expose Function, f) Network element;
(2) the NWDAF network element retrieves information from a Data Repository, e.g., by the UDM network element obtaining subscriber-related information from a UDR (Unified Data Repository) network element;
(3) the NWDAF network element retrieves information about the NF network element, e.g., obtains information related to the NF network element from a network storage Function (NRF) network element;
(4) the NWDAF network element provides the consumer with the analysis as needed. The NWDAF network element provides UE-related analysis including mobility analysis, analysis of UE communications, analysis of expected behavioral parameters and abnormal behavioral of the UE in relation to network data analysis. The analysis of UE communication, abnormal behavior analysis and the like can enable the network to know the operation states of the UE and the network through a data analysis function. Whereas for UE mobility analysis, belonging to information related to the privacy of the user, data analysis is performed to provide UE mobility statistics or predictions.
The information of UE mobility provided by the 5G network relates to the privacy of the UE, and the information needs to be known and granted by the user, otherwise the problem of disclosure of the privacy of the user may be caused, especially if an attacker acquires the information, the UE may be tracked, and the current method for obtaining the UE permission is lacking.
Disclosure of Invention
The embodiment of the application provides a user information analysis result feedback method and a device thereof, which are used for improving the user information safety.
In a first aspect, a method for feeding back a user information analysis result is provided, including:
the first network element receives a first user information analysis request from a second network element;
the first network element acquires permission allowing analysis of the user information of the target terminal;
and after obtaining the permission, the first network element sends an analysis result of the user information of the target terminal to the second network element.
Optionally, after obtaining the permission, the first network element sends an analysis result of the user information of the target terminal to the second network element, where the analysis result includes:
after the first network element obtains the permission, analyzing the user information of the target terminal to obtain an analysis result, and sending the analysis result to the second network element; or, the first network element obtains the user information of the target terminal, analyzes the user information of the target terminal to obtain an analysis result, and sends the analysis result to the second network element after obtaining the permission.
Optionally, the first network element is an NWDAF network element; the obtaining, by the first network element, a permission to analyze the user information of the target terminal includes:
the NWDAF network element sends a first query request to the UDM network element;
and the NWDAF network element receives a first query response sent by the UDM network element, wherein the first query response is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
Further, the first query response carries permission indication information, where the permission indication information is obtained by the UDM network element indicating the AMF network element from the target terminal through the RAN; the permission indication information is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
Further, the second network element is an NF network element.
Optionally, the first query response carries permission indication information, where the permission indication information is obtained by the UDM network element indicating that the second network element is obtained from the target terminal through an AF network element, and the permission indication information is used to indicate whether the target terminal allows a network to analyze user information of the target terminal.
Further, the second network element is an NEF network element, and the first user information analysis request is sent by the NEF network element according to a second user information analysis request from the AF network element.
Optionally, the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate a validity period during which the target terminal allows the network to analyze the user information of the target terminal.
Optionally, the first network element is an NWDAF network element, and the first user information analysis request carries permission indication information of the target terminal; the obtaining, by the first network element, a permission to analyze the user information of the target terminal includes: the NWDAF network element sends a verification request to a UDM network element, wherein the verification request carries the permission indication information; and the NWDAF network element receives a verification response sent by the UDM network element, wherein the verification response carries a verification result.
Further, the permission indication message is sent by the AF network element to the second network element, and the permission indication information is obtained by negotiation between the AF network element and the target terminal.
Optionally, the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is sent by the NEF network element according to a second user information analysis request from the AF network element.
Optionally, the verification response carries validity information, where the validity information is used to indicate a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
Optionally, the method further includes: after the NWDAF network element obtains the updated user information of the target terminal, if the validity period is judged to be expired according to the validity period information, a second query request is sent to the UDM network element;
the NWDAF network element receives a second query response sent by the UDM network element;
and if the second query response indicates that the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed, the NWDAF network element analyzes the updated user information and sends an analysis result to the second network element.
Optionally, the method further includes: and if the first network element does not obtain the permission that the target terminal allows the network to analyze the user of the target terminal, sending a first user information analysis response to the second network element, wherein the first user information analysis response is used for indicating that the first user information analysis request is rejected.
Optionally, the user information includes mobility-related information and/or communication-related information.
Optionally, the analyzing the user information of the target terminal to obtain an analysis result includes at least one of the following:
analyzing the user information of the target terminal to obtain the mobility statistical information and/or mobility prediction information of the target terminal;
analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
and analyzing the user information of the target terminal to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
In a second aspect, a method for feeding back a user information analysis result is provided, including:
the method comprises the steps that a UDM network element receives a first request from an NWDAF network element, wherein the first request is used for requesting whether a target terminal allows to analyze user information of the target terminal;
and the UDM network element sends a first response to the NWDAF network element, wherein the first response is used for indicating whether the analysis of the user information of the target terminal is allowed or not.
Optionally, the first request is a first query request, where the first query request is used to request to query whether the target terminal allows the network to analyze subscription information of the user information of the target terminal;
the UDM network element sending a first response to the NWDAF network element, including:
the UDM network element acquires subscription information whether the target terminal allows a network to analyze the user information of the target terminal or not according to the first query request;
and the UDM network element sends a first query response to the NWDAF network element, wherein the first query response carries permission indication information indicating whether the target terminal allows the network to analyze the user information of the target terminal.
Further, the method further comprises: if the UDM network element does not acquire the subscription information, sending a first permission indication acquisition request to an AMF network element so that the AMF network element acquires permission indication information from the target terminal; and the UDM network element receives a first permission indication acquisition response sent by the AMF network element, wherein the first permission indication acquisition response carries permission indication information of the target terminal.
Further, the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, where the second permission indication acquisition response carries permission indication information of the target terminal, and the second permission indication acquisition request and the second permission indication acquisition response are NAS messages; or, the AMF network element sends a third admission indication acquisition request to a radio access network RAN, so that the RAN acquires admission indication information from the target terminal.
Further, the first permission indication obtaining request and the third permission indication obtaining request carry an identifier of the target terminal, and the RAN sends an RRC reconfiguration message to a corresponding terminal according to the identifier of the target terminal, so that the corresponding terminal sends permission indication information to the RAN; or, the first permission indication acquisition request and the third permission indication acquisition request carry a group identifier of a target terminal group, and the RAN sends a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends permission indication information to the RAN.
Optionally, the first query request is sent by the NWDAF network element receiving a first user information analysis request from an NEF network element, where the first user information analysis request is sent by the NEF network element receiving a second user information analysis request from an AF network element;
the method further comprises the following steps:
the UDM network element sends a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded to the AF network element by the NEF network element, so that the AF network element obtains permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows a network to analyze user information of the target terminal;
and the UDM network element receives a fourth permission indication acquisition response sent by the NEF network element, wherein the fourth permission indication acquisition response carries permission indication information of the target terminal.
Optionally, the first query response carries validity information, where the validity information is used to indicate a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
Optionally, the first request is a verification request, where the verification request carries permission indication information of the target terminal;
the method further comprises the following steps:
the UDM network element verifies the permission indication information of the target terminal to obtain a verification result, wherein the verification result is used for indicating whether the permission indication information passes verification or not, or indicating whether the target terminal allows a network to analyze the user information of the target terminal or not;
and the UDM network element sends a verification response to the NWDAF network element, wherein the verification response carries the verification result.
Further, the verification response carries validity information, and the validity information is used for indicating a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
Optionally, the method further includes:
the UDM network element receives a second query request sent by the NWDAF network element, wherein the second query request is sent by the NWDAF network element after the NWDAF network element obtains updated user information of the target terminal and determines that the validity period of the target terminal is over;
and the UDM network element sends a second query response to the NWDAF network element, wherein the second query response is used for indicating whether the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed or not.
Optionally, the user information includes mobility related information and/or communication related information.
Optionally, the analyzing the user information of the target terminal to obtain an analysis result includes at least one of the following:
analyzing the user information of the target terminal to obtain the mobility statistical information and/or mobility prediction information of the target terminal;
analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
and analyzing the user information of the target terminal to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
In a third aspect, a network device is provided, including:
a receiving unit, configured to receive a first user information analysis request from a second network element;
a processing unit for acquiring a permission allowing analysis of user information of the target terminal;
and a sending unit, configured to send an analysis result of the user information of the target terminal to the second network element after obtaining the permission.
In a fourth aspect, a network device is provided, comprising:
a receiving unit, configured to receive a first request from a network data analysis function NWDAF network element, where the first request is used to request to acquire whether a target terminal allows analyzing user information of the target terminal;
a sending unit, configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow analysis of the user information of the target terminal.
In a fifth aspect, a communication apparatus is provided, including: a processor, a memory;
the memory storing computer instructions;
the processor is configured to read the computer instructions to perform the method according to any one of the above first aspects.
In a sixth aspect, a communication apparatus is provided, including: a processor, a memory;
the memory storing computer instructions;
the processor is configured to read the computer instructions to execute the method according to any one of the second aspect.
In a seventh aspect, there is provided a computer-readable storage medium having stored thereon computer-executable instructions for causing a computer to perform the method of any one of the first or second aspects described above.
In an eighth aspect, there is provided a computer program product which, when invoked by a computer, causes the computer to perform the method of any of the first or second aspects above.
In the embodiment of the present application, after receiving a user information analysis request from a second network element, a first network element sends an analysis result of user information of a target terminal to the second network element after obtaining permission to allow analysis of the user information of the target terminal, so that user privacy can be protected, and user information security is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a user information analysis result feedback method according to an embodiment of the present disclosure;
fig. 2a and fig. 2b are schematic flow diagrams of a user information analysis result feedback method provided in the embodiment of the present application, respectively;
fig. 3 to fig. 7 are schematic signaling interaction diagrams of a user information analysis result feedback method provided in the embodiment of the present application, respectively;
fig. 8 is a schematic structural diagram of a network device (a first network element) according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a network device (second network element) according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a communication device according to another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Some terms in the embodiments of the present application are explained below to facilitate understanding by those skilled in the art.
(1) In the embodiments of the present application, the terms "network" and "system" are often used interchangeably, but those skilled in the art can understand the meaning.
(2) In the embodiments of the present application, the term "plurality" means two or more, and other terms are similar thereto.
(3) "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
(4) A terminal is a device that can provide voice and/or data connectivity to a user. For example, the terminal device includes a handheld device, an in-vehicle device, and the like having a wireless connection function. Currently, the terminal device may be: a mobile phone (mobile phone), a tablet computer, a notebook computer, a palm top computer, a Mobile Internet Device (MID), a wearable device, a Virtual Reality (VR) device, an Augmented Reality (AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in self-driving (self-driving), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation safety (transportation safety), a wireless terminal in smart city (smart city), or a wireless terminal in smart home (smart home), etc.
At present, an NWDAF network element in a 5G network may collect information of a network function and a UE, analyze the information, and provide an analysis result to an NF network element or an AF network element, where the information needs to be known and granted by a user, otherwise, a problem of disclosure of user privacy may be caused.
In order to reduce or avoid the problem of user privacy disclosure, embodiments of the present application provide a method and an apparatus for feeding back user information analysis results.
It should be understood that, in this embodiment of the present application, the "permission of the user" may also be understood as "permission of the UE" or "user context", which means that the terminal allows the network to collect and/or analyze the user information of the terminal. A user of a terminal (UE) is called a subscriber, and a SIM card (subscriber identity module) or other devices for realizing communication are usually arranged in the terminal (UE), and the device is configured with a subscriber identity, so that the "terminal (UE)" and the "user (user)" of the terminal have a corresponding relationship. In some descriptions of the embodiments of the present application, "terminal (UE)" and user (user) may be replaced with each other, and should not affect the essence of the present application.
The embodiment of the application can be applied to a 5G system and a subsequent evolution system thereof.
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic flow chart of a user information analysis result feedback method provided in the embodiment of the present application is shown, where as shown in the drawing, the flow chart may include:
s101: and the second network element sends a first user information analysis request to the first network element, wherein the first user information analysis request is used for requesting to analyze the user information of the target terminal.
The first network element and the second network element may be core network elements in a 5G system. Specifically, the first network element may be an NWDAF network element, and the second network element may be an NF network element or an NEF network element.
Optionally, the indication information of the target terminal carried in the first user information analysis request may be used to indicate a target terminal, for example, the indication information may be identification information of a terminal; the indication information of the target terminal may also be used to indicate a plurality of target terminals, such as a group of target terminals, and the indication information may be identification information of each target terminal in the plurality of target terminals, or may be a group identification of a terminal group (used to indicate a group of target terminals).
Optionally, the second network element may further carry information, such as filtering information of an interested area and the like, an analysis target time period or a prediction time period, a maximum number of analysis objects, and a target address notified in the subscription, in the request.
S102: and after receiving the first user information analysis request, the first network element acquires permission for analyzing the user information of the target terminal.
In this step, the first network element may interact with the UDM network element to obtain a permission allowing analysis of the user information of the target terminal.
Optionally, in some embodiments, the first network element may query, from the UDM network element, whether the target terminal allows the network to analyze the user information of the target terminal, or query, from the subscription information of the target terminal, where the subscription information is used to indicate whether the network is allowed to analyze the user information of the target terminal.
Specifically, a first network element (e.g., an NWDAF network element) sends a first query request to a UDM network element, where the first query request is used to request a query of whether a target terminal allows a network to analyze user information of the target terminal, or is used to request a query of whether subscription information allowing the network to analyze user information of the target terminal exists; and the UDM network element returns a first query response to the first network element (such as an NWDAF network element), wherein the first query response is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal. A specific implementation of the above process can be seen in the process shown in fig. 3 or fig. 4.
The UDM network element may store subscription information of whether the target terminal is allowed to analyze the user information of the target terminal by the network, and the UDM network element may determine whether the target terminal is allowed to analyze the user information of the target terminal by the network according to the subscription information, and return the first query response to the first network element (e.g., NWDAF network element). The UDM network element may also send a first permission indication obtaining request to the AMF network element (for example, when the UDM network element does not store subscription information of the target terminal about whether the network is allowed to analyze the user information of the target terminal, or does not inquire the subscription information), so that the AMF network element obtains the permission indication information from the target terminal, the AMF network element obtains the permission indication information of the target terminal from the target terminal through a Radio Access Network (RAN), and then sends the permission indication information to the UDM network element, and the UDM network element returns a first inquiry response to the first network element (for example, an NWDAF network element) according to the permission indication information.
Optionally, the AMF network element may obtain, from the target terminal, permission indication information indicating whether the target terminal allows the network to analyze the user information of the target terminal through a non-access stratum (NAS). Specifically, the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, where the second permission indication acquisition response carries permission indication information of the target terminal. Wherein the second permission indication acquisition request and the second permission indication acquisition response are NAS messages. One specific implementation of this process can be seen in the flow chart shown in fig. 4.
Optionally, the AMF network element may also send a third admission indication obtaining request to the RAN, so as to trigger the RAN to obtain, from the target terminal, admission indication information used for indicating whether the target terminal allows the network to analyze the user information of the target terminal. Specifically, a first permission indication obtaining request sent by the UDM network element to the AMF network element, and a third permission indication obtaining request sent by the AMF network element to the RAN carry an identifier of a target terminal, and the RAN sends a Radio Resource Control (RRC) reconfiguration message to a corresponding terminal according to the identifier of the target terminal, so that the corresponding terminal sends permission indication information to the RAN. If the first permission indication acquisition request and the third permission indication acquisition request carry the group identifier of the target terminal group, the RAN may send a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends permission indication information to the RAN. One specific implementation of this process can be seen in the flow chart shown in fig. 3.
Optionally, in some embodiments, after the first network element (e.g., an NWDAF network element) sends the first query request to the UDM network element, the UDM network element may instruct the second network element (e.g., a NEF network element) to obtain, through the AF network element, permission indication information used for instructing the target terminal whether to allow the network to analyze the user information of the target terminal, from the target terminal, and send the permission indication information to the first network element (e.g., an NWDAF network element) with the first query response.
Specifically, the AF network element sends a second user information analysis request to the NEF network element, the NEF network element sends a first user information analysis request to the NWDAF network element after receiving the second user information analysis request, and the NWDAF network element sends a first query request to the UDM network element after receiving the first user information analysis request. The UDM sends a fourth permission indication acquisition request to the NEF network element (for example, the UDM network element sends the fourth permission indication acquisition request when not acquiring the subscription information of the target terminal, which is used for indicating whether the target terminal allows user information analysis on the target terminal); after receiving the fourth permission indication acquisition request, the NEF network element forwards the fourth permission indication acquisition request to the AF network element, so that the AF network element obtains permission indication information of the target terminal from the target terminal, and forwards the obtained permission indication information to the UDM network element through the NEF network element; and the UDM network element receives a fourth permission indication acquisition response sent by the NEF network element, wherein the fourth permission indication acquisition response carries permission indication information of the target terminal. A specific implementation of the process of the UDM network element indicating the AMF network element to obtain the user permission indication information may refer to the process shown in fig. 5.
Optionally, in other embodiments, the first user information analysis request sent by the second network element to the first network element carries permission indication information (e.g., token) of the target terminal, the first network element requests the UDM network element to verify the permission indication information (e.g., perform validity verification), if the verification passes, it is determined that analysis of the user information of the target terminal is allowed, otherwise, it is determined that analysis of the user information of the target terminal is not allowed.
Specifically, a first network element (e.g., an NWDAF network element) sends a verification request to a UDM network element, where the verification request carries the permission indication information (the permission indication information is from a first user information analysis request sent by a second network element); and the UDM network element verifies the permission indication information and sends a verification response to the first network element (such as an NWDAF network element), where the verification response carries a verification result, and the verification result is used to indicate whether the permission indication information passes verification or not, or to indicate whether the target terminal allows the network to analyze the user information of the target terminal. And the first network element (such as an NWDAF network element) determines whether the target terminal allows the analysis of the user information of the target terminal according to the received verification response. The specific implementation can be seen in the flow shown in fig. 6 or fig. 7.
S103: and after obtaining the permission, the first network element sends an analysis result of the user information of the target terminal to the second network element.
After the first network element obtains the user information of the target terminal, the user information is analyzed to obtain an analysis result.
Optionally, the user information may include at least one of the following information:
(1) mobility-related information of the user, such as user location information and the like;
(2) the communication-related information of the user may include: slice information of communication, data network name, application ID and area of interest, information at a certain time period (end time of communication), traffic, etc.
Optionally, analyzing the user information of the target terminal to obtain an analysis result may include at least one of the following:
(1) analyzing the user information of the target terminal to obtain at least one of mobility statistical information and mobility prediction information of the target terminal;
for example, the user information of the target terminal collected by the first network element is used to support the analysis of the mobility data of the target terminal. After the first network element takes the information as input, the analysis result may be provided to the NF network element or the AF network element. The analysis result may represent mobility analysis data of the target terminal, such as data including an identity, time information and an address of a UE or UE mobility prediction data of a group of UEs or a certain UE, identity information of the UE and a probability (probability) that the UE is in a given location group at a given time.
(2) Analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
(3) and analyzing the user information of the target terminal to obtain at least one of expected behaviors and abnormal behaviors of the target terminal related to the network data.
Further, if the first network element does not obtain the permission that the target terminal allows analyzing the user information of the target terminal, the first network element refuses to obtain the user information of the target terminal, or refuses to analyze the user information of the target terminal. Specifically, if the first network element does not obtain permission that the target terminal allows the network to analyze the user information of the target terminal, a first user information analysis response is sent to the second network element, where the first user information analysis response is used to indicate that a response to the first user information analysis request received by the first network element is rejected.
In the embodiment of the present application, after receiving a user information analysis request from a second network element, a first network element sends an analysis result of user information of a target terminal to the second network element after obtaining permission to allow analysis of the user information of the target terminal, so that user privacy can be protected, and user information security is improved.
In some embodiments, the permission indication information of the target terminal acquired by the first network element (e.g., an NWDAF network element) may further include validity period information, where the validity period information indicates a validity period that the target terminal allows the network to analyze the user information of the target terminal. In further embodiments, the validity period information may be carried in a first query response or validation response sent by the UDM network element to the first network element.
Optionally, after the first network element (e.g., an NWDAF network element) acquires the updated user information of the target terminal, if the validity period is determined to be expired according to the validity period information of the target terminal, analysis of the updated user information of the target terminal is rejected.
Optionally, after the first network element (e.g., NWDAF network element) acquires updated user information of the target terminal, if the validity period is determined to be expired according to the validity period information of the target terminal, sending a second query request to the UDM network element, where the second query request is used to request whether to change a validity period during which the target terminal allows the network to analyze the user information of the target terminal; and after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates that the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed, analyzing the updated user information of the target terminal, and sending an analysis result to the second network element. Through the process, the permission of the target terminal can be requested to be obtained again after the permission of the target terminal is expired, so that the safety of the user information is improved.
Optionally, after receiving the second query request, the UDM network element may determine whether to change the validity period of the target terminal according to the validity period change policy, for example, if the validity period change policy allows the validity period of the target terminal to be extended, a new validity period of the target terminal may be generated according to the policy. Optionally, the UDM network element may also instruct the AMF network element to request, from the target terminal, to acquire instruction information on whether to change the validity period of the target terminal, so as to determine whether to change the validity period of the target terminal according to the instruction of the target terminal. The process of the UDM network element instructing the AMF network element to request to acquire the indication information of whether to change the validity period of the target terminal from the target terminal is similar to the above process of the UDM network element instructing the AMF network element to acquire the permission indication information from the target terminal, and therefore, details thereof are not described here.
In some embodiments, the first network element may analyze the user information of the target terminal after obtaining the permission of the target terminal, and provide an analysis result to the second network element, which may be specifically shown in fig. 2 a; in other embodiments, the first network element may also analyze the user information of the target terminal and obtain an analysis result, then obtain a permission of the target terminal, and after obtaining the permission, send the analysis result to the second network element, which may be specifically described in fig. 2 b.
Referring to fig. 2a, a schematic flow chart of a user information analysis result feedback method provided in the embodiment of the present application is shown, where as shown in the drawing, the flow chart may include:
s201: and the second network element sends a first user information analysis request to the first network element.
And the first user information analysis request carries indication information of a target terminal. The first user information analysis request is used for requesting to analyze the user information of the target terminal.
S202: the first network element analyzes the user information of the target terminal to obtain an analysis result.
S203: the first network element obtains a permission allowing an analysis of the user information of the target terminal.
S204: and the first network element sends the analysis result to the second network element.
The detailed implementation of the steps in the flow shown in fig. 2a is basically the same as the related steps in fig. 1.
In the process shown in fig. 2a, after receiving the user information analysis request from the second network element, the first network element analyzes the user information of the target terminal after obtaining the permission allowing the user information of the target terminal to be analyzed, and sends the analysis result to the second network element, so that the user privacy can be protected, and the user information security can be improved.
Referring to fig. 2b, a schematic flow chart of a user information analysis result feedback method provided in the embodiment of the present application is shown, where as shown in the drawing, the flow chart may include:
s210: and the second network element sends a first user information analysis request to the first network element.
And the first user information analysis request carries indication information of a target terminal. The first user information analysis request is used for requesting to analyze the user information of the target terminal.
S211: the first network element analyzes the user information of the target terminal to obtain an analysis result.
S212: the first network element obtains a permission allowing an analysis of the user information of the target terminal.
S213: and the first network element sends the analysis result to the second network element.
The detailed implementation of the steps in the flow shown in fig. 2b is basically the same as the related steps in fig. 1.
In the process shown in fig. 2b, after receiving the user information analysis request from the second network element, the first network element first analyzes the user information of the target terminal, and then obtains a permission to allow analysis of the user information of the target terminal, and if the permission of the target terminal is obtained, sends an analysis result to the second network element, so that the user privacy can be protected, and the user information security is improved.
Based on the user information analysis result feedback method shown in fig. 1, the following describes an embodiment of the present application by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
Referring to fig. 3, a signaling interaction diagram of a user information analysis result feedback method provided in the embodiment of the present application is shown. As shown, the process may include:
step 1: and the NF network element sends a first user information analysis request to the NWDAF network element.
In this step, the NF network element may send a first user information analysis request to the NWDAF network element using the NWDAF _ analytics info service or the NWDAF _ analytics description service, so as to analyze the user information of the target UE or a group of target UEs. The first user information analysis Request may be an nsvidaf _ analytics info _ Request message or an nwdaf _ analytics _ description _ describe message.
The NF network element may request to obtain mobility statistical information of the target UE by analyzing the user information of the target UE, may request to obtain mobility prediction information of the target UE, and may request to obtain mobility statistical information and mobility prediction information of the target UE. The request message may carry indication information of an analysis type, and the analysis type may be set as UE mobility information (type of analysis). The request message may also carry indication information of the target UE, where the indication information of the target UE may be a UE identity (UE ID) or a group identity (group ID) of a UE group.
Step 2: after receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, where the first query request is used to request whether the target UE allows the network to analyze the user information of the target UE, or is used to request to query subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
In this step, the first query request carries indication information of the target UE.
Step 3 a: and after receiving the first query request, the UDM network element sends a first permission indication acquisition request to the AMF network element, wherein the first permission indication acquisition request carries indication information of the target UE, and the first query request is used for requesting whether the target UE is allowed to analyze user information of the target UE by a network.
Optionally, the UDM network element may first locally query subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), and if the subscription information of the target UE is queried, may return a first query response to the NWDAF network element according to the subscription information (step 4) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 3a to 3f do not need to be performed. And if the UDM network element does not inquire the subscription information, executing the step 3a to the step 3 f.
And step 3 b: and after receiving the first permission indication acquisition request, the AMF network element sends a third permission indication acquisition request to the RAN, wherein the third permission indication acquisition request carries the indication information of the target UE.
The third permission indication acquisition request is used for indicating the RAN to request the target UE to report a policy of whether the network is allowed to analyze the user information of the target UE.
Alternatively, the third permission indication get request may be sent through an N2 interface, i.e. the message may be an N2 interface message.
And step 3 c: and after receiving the third permission indication acquisition request, the RAN sends an RRC reconfiguration message to the target UE, wherein the RRC reconfiguration message carries a strategy acquisition request and is used for requesting to acquire a strategy for whether the target UE allows the network to analyze the user information of the target UE.
In this step, the RAN may send the policy acquisition request to the target UE in a unicast manner, or may send the policy acquisition request to a group of target UEs in a broadcast manner or a multicast manner.
And step 3 d: the target UE sends policy information of the target UE (i.e. permission indication information of the target UE) to the RAN to indicate whether the target UE allows the network to analyze the user information of the target UE.
The permission indication information sent by the target UE may carry permission validity period information, which is used to indicate the validity period that the target UE permits the network to analyze the user information of the target UE.
Step 3 e: and the RAN returns the permission indication information of the target UE to the AMF network element.
And step 3 f: and the AMF network element returns the permission indication information of the target UE to the UDM network element.
And 4, step 4: and after receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, and the first query response is used for indicating whether the target UE allows the network to analyze the user information of the target UE.
Optionally, the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze the user information of the target UE.
Optionally, if the UDM network element queries subscription information of the target UE (where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information may also be carried in the first query response and sent to the NWDAF network element.
It should be noted that, in step 4, if the first query response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a first user information analysis response to the NF network element to notify the NF network element to reject to analyze the user information of the target UE, and subsequent steps 5 to 11 are not performed.
And 5: and the NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the first query response, and then acquires the user information of the target UE.
In this step, the NWDAF network element may obtain the user information of the target UE from at least one of the AMF network element and the AF network element.
Optionally, the implementation process of the NWDAF network element obtaining the user information of the target UE from the AMF network element may include: the NWDAF network element sends a subscription request (such as Namf _ eventeExpo _ Subscribe) to the AMF network element to request to Subscribe to the user information of the target UE; the AMF network element may send a notification message (e.g., Namf _ EventExposure _ Notify) to the NWDAF network element according to the subscription request, where the notification message carries user information of the target UE. The user information acquired by the NWDAF network element from the AMF is information related to mobility of the UE, and may include: the identity of the user, the location of the user, the Tracking Area (TA) or cell that the UE enters, the timestamp when the AMF network element detects that the UE enters the location, the type of the location code, the frequency of mobile registration update, and the like.
Optionally, the implementation process of the NWDAF network element obtaining the user information of the target UE from the AF network element may include: the NWDAF network element sends a subscription request (such as Naf _ evendexposure _ Subscribe) to the AF network element to request to Subscribe to the user information of the target UE; the AF network element may send a notification message (e.g., Naf _ EventExposure _ Notify) to the NWDAF network element according to the subscription request, where the notification message carries user information of the target UE.
Optionally, the NWDAF network element may further obtain user information of the target UE from the SMF network element.
The user information obtained by the NWDAF network element from the AF network element or the SMF network element is information related to UE communication, and may include: the user's identity, group ID, network slice information, data network name for establishing Packet Data Unit (PDU) sessions, application ID, expected user behavior parameters, uplink and downlink data rates, traffic, etc.
Step 6: and the NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
For the content of the user information of the target UE and the analysis result obtained by analyzing the user information, reference may be made to the related description of the foregoing embodiment. For example, if the NF network element requests analysis of mobility of the target UE, the user information acquired by the NWDAF network element at least includes mobility-related information of the target UE, and a result obtained by analyzing the user information includes at least one of mobility statistical information of the target UE and mobility prediction information of the target UE.
And 7: and the NWDAF network element sends a first user information analysis response to the NF network element, wherein the first user information analysis response carries an analysis result aiming at the target UE.
Further, the above process may further include the following steps:
and 8: and the NWDAF network element acquires the updated user information of the target UE.
If the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element sends the updated user information to the NWDAF network element according to the subscription request when the user information of the target UE is updated. For example, the AMF network element may send the updated user information of the target UE to the NWDAF network element through a notification message (e.g., Namf _ EventExposure _ Notify); for another example, the AF network element may send the updated user information of the target UE to the NWDAF network element through a notification message (e.g., Naf _ EventExposure _ Notify).
And step 9: the NWDAF network element determines whether the validity period of the target UE (i.e. the validity period during which the target UE allows the network to analyze the user information of the target UE) expires, and if so, queries the UDM network element whether to change the validity period during which the target UE allows the network to analyze the user information of the target UE.
Optionally, after the NWDAF network element obtains the updated user information of the target UE, if the validity period is determined to expire or expire according to the validity period information of the target UE, a second query request is sent to the UDM network element, where the second query request is used to request to query whether to change the validity period during which the target UE allows the network to analyze the user information of the target UE. The UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request, from the target UE, to acquire instruction information whether to change the validity period of the target terminal.
It should be noted that step 9 is an optional step. In another embodiment, if the NWDAF network element determines that the validity period of the target UE expires or expires, the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to notify the NF network element of rejecting to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not performed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
Step 10: and the NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
In this step, after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates that the validity period of the target UE for allowing the network to analyze the user information of the target UE is changed, the NWDAF network element analyzes the updated user information of the target UE; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and does not perform the subsequent step 11, may further notify the AF network element to refuse to analyze the user information of the target UE, and may further indicate that the reason for the refusal is that the permission validity period of the target UE expires.
Step 11: and the NWDAF network element sends the analysis result to the NF network element.
It should be noted that, in some embodiments, if the NWDAF network element subscribes to the user information of the target UE from the AMF network element and/or the AF network element, the AMF network element and/or the AF network element may send updated user information of the target UE to the NWDAF network element multiple times. After receiving the updated user information of the target UE, the NWDAF network element determines whether the validity period of the target UE expires or expires, if not, analyzes the updated user information, and if it determines that the validity period of the target UE expires or expires, performs the step 9 or rejects analyzing the updated user information of the target UE.
Based on the user information analysis result feedback method shown in fig. 1, the following describes an embodiment of the present application by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
Referring to fig. 4, a signaling interaction diagram of another method for feeding back a user information analysis result provided in the embodiment of the present application is shown. The flow shown in fig. 4 is substantially the same as the flow shown in fig. 3, except that: in fig. 4, step 3b to step 3c in fig. 3 are replaced with step 3 b; in fig. 4, step 3d to step 3e in fig. 3 are replaced with step 3 d.
Specifically, in step 3b of fig. 4, the AMF network element sends a second permission indication acquisition request, where the second permission indication acquisition request carries indication information (such as UE ID or UE group ID) of the target UE, and the message is an NAS message and may be transparently transmitted to the target UE by the RAN. In step 3d of fig. 4, the target UE sends a second grant indication acquiring response to the AMF network element, where the second grant indication acquiring response may carry grant indication information of the target UE, and the message is an NAS message and may be transparently passed to the AMF network element by the RAN.
Optionally, in step 9 in fig. 4, the UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request, from the target UE, to acquire the indication information whether to change the validity period of the target terminal. The process of the UDM network element instructing the AMF network element to request to acquire the indication information of whether to change the validity period of the target terminal from the target terminal is similar to the process of the UDM network element instructing the AMF network element to acquire the permission indication information from the target terminal in fig. 4, and details thereof are not described here.
The remaining steps in fig. 4 are substantially the same as the flow shown in fig. 3 and will not be repeated here.
Based on the user information analysis result feedback method shown in fig. 1, the following describes an embodiment of the present application by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
Referring to fig. 5, a signaling interaction diagram of a user information analysis result feedback method provided in the embodiment of the present application is shown. As shown, the process may include:
step 1: and the AF network element sends a second user information analysis request to the NEF network element, and the second user information analysis request is used for requesting to analyze the user information of the target UE.
In this step, the AF network element may send a second user information analysis request to the NEF network element using the Nnef _ analysis expose service, so as to analyze the user information of the target UE or a group of target UEs. Wherein the second user information analysis request may be a Nnef _ analyticexposition _ Fetch message.
The AF network element may request to obtain mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain mobility prediction information of the target UE, and may also request to obtain mobility statistics information and mobility prediction information of the target UE. The request message may carry indication information of an analysis type, and the analysis type may be set as UE mobility information (type of mobility information). The request message may also carry identification information of the target UE, where the indication information of the target UE may be a UE identity (UE ID) or a group identity (group ID) of a UE group.
Step 2: and after receiving the second user information analysis request, the NEF network element sends a first user information analysis request to the NWDAF network element.
In this step, the NF network element may send a first user information analysis request to the NWDAF _ analytics info service to analyze the user information of the target UE or a group of target UEs. The first user information analysis Request may be an Nswdaf _ analyticlnfo _ Request message.
The NF network element may request to obtain mobility statistical information of the target UE by analyzing the user information of the target UE, may also request to obtain mobility prediction information of the target UE, and may also request to obtain mobility statistical information and mobility prediction information of the target UE. The request message may carry indication information of an analysis type, and the analysis type may be set as UE mobility information (type of mobility information). The request message may also carry identification information of the target UE, where the indication information of the target UE may be a UE identity (UE ID) or a group identity (group ID) of a UE group.
And 3, step 3: after receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, where the first query request is used to request query whether the target UE allows the network to analyze the user information of the target UE, or is used to request query about subscription information of the target UE, and the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
In this step, the first query request carries indication information of the target UE.
Step 4 a: and after receiving the first query request, the UDM network element sends a fourth permission indication acquisition request to the NEF network element, wherein the fourth permission indication acquisition request carries indication information of the target UE and can also carry an AF identifier.
Optionally, the UDM network element may first locally query subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), and if the subscription information of the target UE is queried, may return a first query response to the NWDAF network element according to the subscription information (step 5) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 4a to 4d do not need to be performed. And if the UDM network element does not inquire the subscription information, executing the step 4a to the step 4 d.
And 4 b: and after receiving the fourth permission indication acquisition request, the NEF network element forwards the request to the corresponding AF network element.
And 4 c: the AF network element provides the user of the target UE with a permitted option (such as "allow analysis of user information" and "disallow analysis of user information") through the user interface, so as to obtain the user's selection.
And 4 d: after acquiring the selection of the user for the option, the AF network element sends a fourth permission indication acquisition response to the NEF network element according to the selection of the user, where the fourth permission indication acquisition response carries permission indication information of the target UE obtained according to the selection of the user (the permission indication information is used to indicate whether the target UE allows the network to analyze the user information of the target UE).
Optionally, the permission indication information of the target UE may carry permission validity period information, which is used to indicate a validity period that the target UE permits the network to analyze the user information of the target UE.
And 4 e: the NEF network element forwards the fourth admission indication acquisition response to the UDM network element.
And 5: and after receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, and the first query response is used for indicating whether the target UE allows the network to analyze the user information of the target UE.
Optionally, the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze the user information of the target UE.
Optionally, if the UDM network element queries subscription information of the target UE (where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information may also be carried in the first query response and sent to the NWDAF network element.
It should be noted that, in step 5, if the first query response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send, to the NEF network element, a first user information analysis response for indicating that the user information analysis of the target UE is rejected, and the NEF network element notifies the AF network element of rejecting the analysis of the user information of the target UE, and the subsequent steps 6 to 14 are not performed.
Step 6: and the NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the first query response, and then acquires the user information of the target UE.
Optionally, the specific implementation manner of this step is the same as that of the relevant step in the flow of fig. 3.
And 7: and the NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
For the content of the user information of the target UE and the analysis result obtained by analyzing the user information, reference may be made to the related description of the foregoing embodiment. For example, if the NF network element requests analysis of mobility of the target UE, the user information acquired by the NWDAF network element at least includes mobility-related information of the target UE, and a result obtained by analyzing the user information includes at least one of mobility statistical information of the target UE and mobility prediction information of the target UE.
And 8: and the NWDAF network element sends a first user information analysis response to the NEF network element, wherein the first user information analysis response carries an analysis result aiming at the target UE.
And step 9: and the NEF network element sends a second user information analysis response to the AF network element, wherein the second user information analysis response carries an analysis result aiming at the target UE.
Further, the above process may further include the following steps:
step 10: and the NWDAF network element acquires the updated user information of the target UE.
Optionally, the specific implementation manner of this step is the same as that of the relevant step in the flow of fig. 3.
Step 11: the NWDAF network element determines whether the validity period of the target UE (i.e. the validity period during which the target UE allows the network to analyze the user information of the target UE) expires, and if so, queries the UDM network element whether to change the validity period during which the target UE allows the network to analyze the user information of the target UE.
Optionally, after the NWDAF network element obtains the updated user information of the target UE, if the validity period is determined to expire or expire according to the validity period information of the target UE, a second query request is sent to the UDM network element, where the second query request is used to request to query whether to change the validity period during which the target UE allows the network to analyze the user information of the target UE. The UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the NEF network element to trigger the AF network element to negotiate with the target UE, so as to obtain the instruction information whether to change the validity period of the target terminal.
Optionally, the process of instructing, by the UDM network element, the NEF network element to trigger the AF network element to negotiate with the target UE is basically the same as the process of step 4a to step 4e in this flow.
It should be noted that step 11 is an optional step. In another embodiment, if the NWDAF network element determines that the validity period of the target UE expires or expires, the analysis of the user information of the target UE may be rejected, and a first user information analysis response may be further sent to the NEF network element, and the NEF network element notifies the AF network element of rejecting the analysis of the user information of the target UE, and the subsequent steps 12 to 14 are not performed. Further, the NWDAF network element may also send a request to cancel subscription of the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
Step 12: and the NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
In this step, after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates that the validity period of the target UE for allowing the network to analyze the user information of the target UE is changed, the NWDAF network element analyzes the updated user information of the target UE; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and does not perform step 12 to step 14, and may further notify the AF network element to refuse to analyze the user information of the target UE through the NEF network element, and may further indicate that the reason for the refusal is that the permission validity period of the target UE expires.
Step 13: and the NWDAF network element sends the analysis result to the NEF network element.
Step 14: and the NEF network element sends the analysis result to the AF network element.
It should be noted that, in some embodiments, if the NWDAF network element subscribes to the user information of the target UE from the AMF network element and/or the AF network element, the AMF network element and/or the AF network element may send updated user information of the target UE to the NWDAF network element multiple times. After receiving the updated user information of the target UE, the NWDAF network element determines whether the validity period of the target UE expires or expires each time, and if not, analyzes the updated user information, and if it determines that the validity period of the target UE expires or expires, performs step 11 above.
It should be noted that steps 4a to 4e in the flow shown in fig. 4 are only an example, and the UDM network element may also obtain the permission indication information of the target UE in other manners, which is not limited in this embodiment of the present application.
Based on the user information analysis result feedback method shown in fig. 1, the following describes an embodiment of the present application by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
Referring to fig. 6, a schematic signaling interaction diagram of a user information analysis result feedback method provided in the embodiment of the present application is shown. As shown, the process may include:
step 1: and the NF network element sends a first user information analysis request to the NWDAF network element.
In this step, the NF network element may send a first user information analysis request to the NWDAF network element using the NWDAF _ analytics info service or the NWDAF _ analytics description service, so as to analyze the user information of the target UE or a group of target UEs. The first user information analysis Request may be an nsvidaf _ analytics info _ Request message or an nwdaf _ analytics _ description _ describe message.
The NF network element may request to obtain mobility statistical information of the target UE by analyzing the user information of the target UE, may request to obtain mobility prediction information of the target UE, and may request to obtain mobility statistical information and mobility prediction information of the target UE. The request message may carry indication information of an analysis type, which may be set as UE mobility information (type of analysis). The request message may also carry identification information of the target UE, where the indication information of the target UE may be a UE identity (UE ID) or a group identity (group ID) of a UE group.
The request message also carries permission indication information of the target UE, where the permission indication information may be a token (token) of the target UE, and is used to indicate whether the target UE allows the network to analyze the user information of the target UE. The permission indication information (e.g., token) may be obtained through negotiation with the target UE.
And 2, step: after receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, where the verification request carries permission indication information (such as token) of the target UE, and the verification request is used to request verification of the permission indication information of the target UE.
And 3, step 3: and after receiving the verification request, the UDM network element verifies the validity of the permission indication information (such as token) of the target UE to obtain a verification result, wherein the verification result is used for indicating whether the permission indication information of the target UE passes the verification.
Optionally, the UDM network element may compare the received permission indication information (e.g., token) of the target UE with the permission indication information of the target UE stored by the UDM network element, and if the permission indication information is consistent, the verification is passed, otherwise, the verification fails. By verifying the permission indication information (e.g., token) of the target UE, security may be improved.
And 4, step 4: and the UDM network element returns a verification response to the NWDAF network element, wherein the verification response is used for indicating whether the permission indication information of the target UE passes the verification or not, or indicating whether the target UE allows the network to analyze the user information of the target UE.
Optionally, in some embodiments, the verification result may be carried in the verification response; in other embodiments, the NWDAF network element may also determine, according to the verification result, whether the target UE allows the network to collect or analyze the user information of the target UE, and notify, to the NWDAF network element, that the determined result passes the verification response.
It should be noted that, in step 4, if the verification response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send, to the NF network element, a first user information analysis response for indicating that the analysis of the user information of the target UE is rejected, so as to notify the NF network element to reject the analysis of the user information of the target UE, and subsequent steps 5 to 11 are not performed.
And 5: and the NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then acquires the user information of the target UE.
The specific implementation of this step is basically the same as the relevant step in fig. 3, and is not repeated here.
Step 6: and the NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
For the content of the user information of the target UE and the analysis result obtained by analyzing the user information, reference may be made to the related description of the foregoing embodiment. For example, if the NF network element requests analysis of mobility of the target UE, the user information acquired by the NWDAF network element at least includes mobility-related information of the target UE, and a result obtained by analyzing the user information includes at least one of mobility statistical information of the target UE and mobility prediction information of the target UE.
And 7: and the NWDAF network element sends a first user information analysis response to the NF network element, wherein the first user information analysis response carries an analysis result aiming at the target UE.
Further, the above process may further include the following steps:
and 8: and the NWDAF network element acquires the updated user information of the target UE.
If the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element sends the updated user information to the NWDAF network element according to the subscription request when the user information of the target UE is updated. For example, the AMF network element may send the updated user information of the target UE to the NWDAF network element through a notification message (e.g., Namf _ EventExposure _ Notify); for another example, the AF network element may send the updated user information of the target UE to the NWDAF network element through a notification message (e.g., Naf _ EventExposure _ Notify).
And step 9: the NWDAF network element determines whether the validity period of the target UE (i.e. the validity period during which the target UE allows the network to analyze the user information of the target UE) expires, and if so, queries the UDM network element whether to change the validity period during which the target UE allows the network to analyze the user information of the target UE.
The specific implementation of this step is basically the same as the related step in fig. 3, and is not repeated here.
It should be noted that step 9 is an optional step. In another embodiment, if the NWDAF network element determines that the validity period of the target UE expires or expires, the user information of the target UE may be rejected from being analyzed, and a first user information analysis response may be further sent to the NF network element to notify the NF network element of rejecting to analyze the user information of the target UE, and subsequent steps 10 to 11 are not performed. Further, the NWDAF network element may also send a request to cancel subscription of the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
Step 10: and the NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
In this step, after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates that the validity period of the target UE for allowing the network to analyze the user information of the target UE is changed, the NWDAF network element analyzes the updated user information of the target UE; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and does not perform the subsequent step 11, may further notify the AF network element to refuse to analyze the user information of the target UE, and may further indicate that the reason for the refusal is that the permission validity period of the target UE expires.
Step 11: and the NWDAF network element sends the analysis result to the NF network element.
It should be noted that, in some embodiments, if the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element may send updated user information of the target UE to the NWDAF network element multiple times. After receiving the updated user information of the target UE, the NWDAF network element determines whether the validity period of the target UE expires or expires, if not, analyzes the updated user information, and if determining that the validity period of the target UE expires or expires, executes step 9.
Based on the user information analysis result feedback method shown in fig. 1, the following describes an embodiment of the present application by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
Referring to fig. 7, a signaling interaction diagram of another method for feeding back a user information analysis result provided in the embodiment of the present application is shown, where the process may include:
step 0: the AF network element negotiates permission indication information of the target UE with the target UE through an application layer, namely whether the target UE allows the network to analyze user information of the target UE.
Optionally, the AF network element and the target UE may negotiate, in a network key exchange protocol (IKE) manner, whether the target UE allows the network to analyze the user information of the target UE, and the AF network element may generate a token (token) of the target UE according to a negotiation result, where the token is used as shared information of the target UE and the AF network element to indicate whether the target UE allows the network to analyze the user information of the target UE. Optionally, the information may be stored in the UDM network element as subscription information of the target UE.
Step 1: the AF network element sends a second user information analysis request to the NEF network element, where the second user information analysis request is used to request to analyze user information of the target UE, and the request carries permission indication information (e.g., token) of the target UE.
In this step, the AF network element may send a second user information analysis request to the NEF network element using the Nnef _ analysis expose service, so as to analyze the user information of the target UE or a group of target UEs. Wherein the second user information analysis request may be a Nnef _ analyticexposition _ Fetch message.
The AF network element may request to obtain mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain mobility prediction information of the target UE, and may also request to obtain mobility statistics information and mobility prediction information of the target UE. The request message may carry indication information of an analysis type, which may be set as UE mobility information (type of mobility information). The request message may also carry identification information of the target UE, where the indication information of the target UE may be a UE identity (UE ID) or a group identity (group ID) of a UE group.
Step 2: and after receiving the second user information analysis request, the NEF network element sends a first user information analysis request to the NWDAF network element.
And step 3: after receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, where the verification request carries permission indication information (e.g., token) of the target UE, and the verification request is used to request verification of the permission indication information of the target UE.
And 4, step 4: and after receiving the verification request, the UDM network element verifies the validity of the permission indication information (such as token) of the target UE to obtain a verification result, wherein the verification result is used for indicating whether the permission indication information of the target UE passes the verification.
And 5: and the UDM network element returns a verification response to the NWDAF network element, wherein the verification response is used for indicating whether the permission indication information of the target UE passes the verification or not, or indicating whether the target UE allows the network to analyze the user information of the target UE.
Step 6: and the NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then acquires the user information of the target UE.
And 7: and the NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
And step 8: and the NWDAF network element sends a first user information analysis response to the NEF network element, wherein the first user information analysis response carries an analysis result aiming at the target UE.
And step 9: and the NEF network element sends the analysis result to the AF network element.
The specific implementation of the above steps 1 to 8 is basically the same as that in fig. 6, and is not repeated here.
Further, the above process may further include the following steps:
step 10: and the NWDAF network element acquires the updated user information of the target UE.
Step 11: the NWDAF network element determines whether the validity period of the target UE (i.e., the validity period during which the target UE allows the network to analyze the user information of the target UE) expires, and if the validity period of the target UE expires or expires, queries the UDM network element whether to change the validity period during which the target UE allows the network to analyze the user information of the target UE.
Step 12: and the NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
Step 13: and the NWDAF network element sends the analysis result to the NF network element.
Step 14: and the NEF network element sends the analysis result to the AF network element.
The specific implementation of the above steps 10 to 13 is basically the same as that in fig. 6, and is not repeated here.
Based on the same technical concept, embodiments of the present application further provide a network device, where the network device may implement the function of the first network element (e.g., an NWDAF network element) in the foregoing embodiments.
Referring to fig. 8, a schematic structural diagram of a network device provided in the embodiment of the present application is shown, where the network device may include: receiving section 801, processing section 802, and transmitting section 803.
A receiving unit 801, configured to receive a first user information analysis request from a second network element;
a processing unit 802, configured to obtain a permission allowing analysis of user information of the target terminal;
a sending unit 803, configured to send, after obtaining the permission, an analysis result of the user information of the target terminal to the second network element.
Optionally, the processing unit 802 is specifically configured to: after the permission is obtained, analyzing the user information of the target terminal to obtain an analysis result, and sending the analysis result to the second network element; or, acquiring the user information of the target terminal, analyzing the user information of the target terminal to obtain an analysis result, and sending the analysis result to the second network element after the permission is obtained.
Optionally, the processing unit 802 may be specifically configured to: sending a first query request to a UDM network element; and receiving a first query response sent by the UDM network element, wherein the first query response is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
Optionally, the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate a validity period during which the target terminal allows the network to analyze the user information of the target terminal.
Optionally, the first user information analysis request carries permission indication information of the target terminal; the processing unit 802 is specifically configured to: sending a verification request to a UDM network element, wherein the verification request carries the permission indication information; and receiving a verification response sent by the UDM network element, wherein the verification response carries a verification result. Optionally, the verification result is used to indicate whether the permission indication information is verified, or to indicate whether the target terminal allows the network to analyze the user information of the target terminal, where the permission indication information is verified to indicate that the target terminal allows the network to analyze the user information of the target terminal.
Optionally, the verification response carries validity information, where the validity information is used to indicate a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
Optionally, the processing unit 802 is further configured to: after the updated user information of the target terminal is obtained, if the validity period is judged to be expired according to the validity period information, sending a second query request to the UDM network element, wherein the second query request is used for requesting whether the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed; receiving a second query response sent by the UDM network element; and if the second query response indicates that the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed, analyzing the updated user information and sending an analysis result to the second network element.
It should be noted that, the network device provided in the embodiment of the present application can implement all the method steps implemented by the first network element in the method embodiment, and can achieve the same technical effect, and details of the same parts and beneficial effects as those in the method embodiment are not described herein again.
Based on the same technical concept, the embodiment of the present application further provides a network device, where the network device may implement the function of the second network element (e.g., the UDM network element) in the foregoing embodiment.
Referring to fig. 9, a schematic structural diagram of a network device provided in the embodiment of the present application is shown, where the network device may include: receiving section 901, processing section 902, and transmitting section 903.
A receiving unit 901, configured to receive a first request from an NWDAF network element, where the first request is used to request to acquire whether to allow analysis of user information of a target terminal;
a sending unit 903, configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow analysis of the user information of the target terminal.
Optionally, the first request is a first query request, where the first query request is used to request whether the target terminal allows the network to analyze the user information of the target terminal, or is used to request whether the target terminal has subscription information that allows the network to analyze the user information of the target terminal. The processing unit 902 is configured to: acquiring subscription information that whether the target terminal allows a network to analyze the user information of the target terminal or not according to the first query request; determining whether the target terminal allows a network to analyze the user information of the target terminal according to the subscription information; the sending unit 903 is specifically configured to: and sending a first query response to the NWDAF network element, wherein the first query response is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
Optionally, the processing unit 902 is further configured to: if the subscription information is not acquired, instructing the sending unit 903 to send a first permission instruction acquisition request to an AMF network element, so that the AMF network element acquires permission instruction information to the target terminal, where the permission instruction information is used to instruct the target terminal whether to allow a network to analyze user information of the target terminal; the receiving unit 901 is further configured to: and receiving a first permission indication acquisition response sent by the AMF network element, wherein the first permission indication acquisition response carries permission indication information of the target terminal.
Optionally, the first query request is sent by the NWDAF network element receiving a first user information analysis request from an NEF network element, and the first user information analysis request is sent by the NEF network element receiving a second user information analysis request from an AF network element. The sending unit 903 is further configured to: sending a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded to the AF network element by the NEF network element, so that the AF network element obtains permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows a network to analyze user information of the target terminal; the receiving unit 901 is further configured to: and receiving a fourth permission indication acquisition response sent by the NEF network element, wherein the fourth permission indication acquisition response carries permission indication information of the target terminal.
Optionally, the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate a validity period during which the target terminal allows the network to analyze the user information of the target terminal.
Optionally, the first request is a verification request, and the verification request carries permission indication information of the target terminal. The processing unit 902 is further configured to: verifying permission indication information of the target terminal to obtain a verification result, wherein the verification result is used for indicating whether the permission indication information passes verification or indicating whether the target terminal allows a network to analyze user information of the target terminal, and the permission indication information passes verification and indicates that the target terminal allows the network to analyze the user information of the target terminal; the sending unit 903 is further configured to: and sending a verification response to the NWDAF network element, wherein the verification response carries the verification result.
Optionally, the verification response carries validity information, where the validity information is used to indicate a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
Optionally, the receiving unit 901 is further configured to: receiving a second query request sent by the NWDAF network element, where the second query request is sent by the NWDAF network element after acquiring updated user information of the target terminal and determining that the validity period of the target terminal expires, and the second query request is used to request to query whether to change the validity period during which the target terminal allows the network to analyze the user information of the target terminal; the sending unit 903 is further configured to: and sending a second query response to the NWDAF network element, wherein the second query response is used for indicating whether to change the validity period of the target terminal for allowing the network to analyze the user information of the target terminal.
It should be noted that, the network device provided in the embodiment of the present application can implement all the method steps implemented by the second network element in the above method embodiment, and can achieve the same technical effect, and details of the same parts and beneficial effects as those in the method embodiment are not described herein again.
Based on the same technical concept, the embodiment of the application also provides a communication device. The communication device may implement the functionality of the first network element (e.g., an NWDAF network element) in the foregoing embodiments.
Referring to fig. 10, a schematic structural diagram of a communication device according to an embodiment of the present application is provided. As shown, the communication device may include: a processor 1001, a memory 1002, a communication interface 1003, and a bus interface 1004.
The processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations. Communication interface 1003 is used for receiving and transmitting data under the control of processor 1001.
The bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by the processor 1001, and various circuits, represented by the memory 1002, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations.
The processes disclosed in the embodiments of the present application may be applied to the processor 1001, or implemented by the processor 1001. In implementation, the steps of the signal processing flow may be implemented by integrated logic circuits of hardware or instructions in software form in the processor 1001. The processor 1001 may be a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1002, and the processor 1001 reads the information in the memory 1002 and completes the steps of the signal processing flow in combination with the hardware thereof.
Specifically, the processor 1001 is configured to read the computer instructions in the memory 1002 and execute the functions implemented by the first network element (e.g., NWDAF network element) in the embodiment of the present application.
It should be noted that, the communication apparatus provided in the embodiment of the present invention can implement all the method steps implemented by the first network element (e.g., NWDAF network element) in the above method embodiment, and can achieve the same technical effect, and details of the same parts and beneficial effects as those of the method embodiment in this embodiment are not described herein again.
Based on the same technical concept, the embodiment of the application also provides a communication device. The communication device may implement the functionality of the second network element (e.g., UDM network element) in the foregoing embodiments.
Referring to fig. 11, a schematic structural diagram of a communication device according to an embodiment of the present application is provided. As shown, the communication device may include: a processor 1101, a memory 1102, a communication interface 1103, and a bus interface 1104.
The processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations. The communication interface 1103 is used to receive and transmit data under the control of the processor 1101.
The bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by processor 1101, and various circuits of memory, represented by memory 1102, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations.
The processes disclosed in the embodiments of the present application may be implemented in the processor 1101 or implemented by the processor 1101. In implementation, the steps of the signal processing flow may be performed by instructions in the form of hardware, integrated logic circuits, or software in the processor 1101. The processor 1101 may be a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like that may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1102, and the processor 1101 reads the information in the memory 1102 and completes the steps of the signal processing flow in combination with the hardware thereof.
Specifically, the processor 1101 is configured to read the computer instructions in the memory 1102 and execute the functions implemented by the second network element (e.g., UDM network element) in the embodiment of the present application.
It should be noted that, the communication apparatus provided in the embodiment of the present invention can implement all the method steps implemented by the second network element (e.g., a UDM network element) in the above method embodiment, and can achieve the same technical effects, and detailed descriptions of the same parts and beneficial effects as those in the method embodiment in this embodiment are omitted here.
Embodiments of the present application further provide a computer-readable storage medium storing computer-executable instructions for causing a computer to perform the method performed by the first network element (e.g., NWDAF network element) in the foregoing embodiments.
Embodiments of the present application further provide a computer-readable storage medium, where computer-executable instructions are stored, and the computer-executable instructions are configured to enable a computer to perform the method performed by the second network element (e.g., UDM network element) in the foregoing embodiments.
Based on the same concept as the above method embodiments, the present application also provides a computer program product, which when called by a computer can perform the method as referred to in the method embodiments and any possible design of the above method embodiments.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (59)

1. A user information analysis result feedback method is characterized by comprising the following steps:
the first network element receives a first user information analysis request from a second network element;
the first network element acquires permission allowing analysis of the user information of the target terminal;
and after obtaining the permission, the first network element sends an analysis result of the user information of the target terminal to the second network element.
2. The method of claim 1, wherein sending, after the first network element obtains the permission, an analysis result of the user information of the target terminal to the second network element comprises:
after the first network element obtains the permission, analyzing the user information of the target terminal to obtain an analysis result, and sending the analysis result to the second network element; alternatively, the first and second liquid crystal display panels may be,
and the first network element acquires the user information of the target terminal, analyzes the user information of the target terminal to obtain an analysis result, and sends the analysis result to the second network element after the permission is obtained.
3. The method of claim 1 or 2, wherein the first network element is a network data analysis function (NWDAF) network element;
the obtaining, by the first network element, a permission to analyze the user information of the target terminal includes:
the NWDAF network element sends a first query request to a Unified Data Management (UDM) network element;
and the NWDAF network element receives a first query response sent by the UDM network element, wherein the first query response is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
4. The method of claim 3, wherein the first query response carries permission indication information, the permission indication information being obtained by the UDM network element indicating an access and mobility management function (AMF) network element from the target terminal through a Radio Access Network (RAN); the permission indication information is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
5. The method of claim 4, wherein the second network element is a Network Function (NF) network element.
6. The method of claim 3, wherein the first query response carries permission indication information, the permission indication information is obtained by the UDM network element indicating that the second network element is obtained from the target terminal through an Application Function (AF) network element, and the permission indication information is used for indicating whether the target terminal allows a network to analyze user information of the target terminal.
7. The method of claim 6, wherein the second network element is a network open function (NEF) network element, and wherein the first user information analysis request is sent by the NEF network element according to a second user information analysis request from the AF network element.
8. The method of claim 3, wherein the first query response carries permission indication information, and wherein the permission indication information includes validity period information, and the validity period information is used for indicating a validity period for the target terminal to allow a network to analyze user information of the target terminal.
9. The method of claim 1 or 2, wherein the first network element is an NWDAF network element, and the first user information analysis request carries permission indication information of the target terminal;
the obtaining, by the first network element, a permission to analyze the user information of the target terminal includes:
the NWDAF network element sends a verification request to a UDM network element, wherein the verification request carries the permission indication information;
and the NWDAF network element receives a verification response sent by the UDM network element, wherein the verification response carries a verification result.
10. The method of claim 9, wherein the permission indication message is sent by an AF network element to the second network element, and wherein the permission indication message is negotiated between the AF network element and the target terminal.
11. The method of claim 9, wherein the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is sent by the NEF network element according to a second user information analysis request from the AF network element.
12. The method of claim 9, wherein the verification response carries validity period information indicating a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
13. The method of claim 8 or 12, wherein the method further comprises:
after the NWDAF network element obtains the updated user information of the target terminal, if the validity period is judged to be expired according to the validity period information, a second query request is sent to the UDM network element;
the NWDAF network element receives a second query response sent by the UDM network element;
and if the second query response indicates that the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed, the NWDAF network element analyzes the updated user information and sends an analysis result to the second network element.
14. The method of claim 1 or 2, wherein the method further comprises:
and if the first network element does not obtain the permission that the target terminal allows the network to analyze the user of the target terminal, sending a first user information analysis response to the second network element, wherein the first user information analysis response is used for indicating that the first user information analysis request is rejected.
15. The method according to claim 1 or 2, wherein the user information comprises mobility related information and/or communication related information.
16. The method according to claim 1 or 2, wherein the analyzing the user information of the target terminal to obtain an analysis result comprises at least one of:
analyzing the user information of the target terminal to obtain the mobility statistical information and/or mobility prediction information of the target terminal;
analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
and analyzing the user information of the target terminal to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
17. A user information analysis result feedback method is characterized by comprising the following steps:
a Unified Data Management (UDM) network element receives a first request from a network data analysis function (NWDAF) network element, wherein the first request is used for requesting to acquire whether a target terminal allows analyzing user information of the target terminal;
and the UDM network element sends a first response to the NWDAF network element, wherein the first response is used for indicating whether the analysis of the user information of the target terminal is allowed or not.
18. The method of claim 17, wherein the first request is a first query request, and the first query request is used to request a query on whether the target terminal allows a network to analyze subscription information of the target terminal;
the UDM network element sending a first response to the NWDAF network element, including:
the UDM network element acquires subscription information whether the target terminal allows a network to analyze the user information of the target terminal or not according to the first query request;
and the UDM network element sends a first query response to the NWDAF network element, wherein the first query response carries permission indication information indicating whether the target terminal allows the network to analyze the user information of the target terminal.
19. The method of claim 18, wherein the method further comprises:
if the UDM network element does not acquire the subscription information, sending a first permission indication acquisition request to an access and mobility management AMF network element so that the AMF network element acquires permission indication information to the target terminal;
and the UDM network element receives a first permission indication acquisition response sent by the AMF network element, wherein the first permission indication acquisition response carries permission indication information of the target terminal.
20. The method of claim 19, wherein the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, where the second permission indication acquisition response carries permission indication information of the target terminal, and the second permission indication acquisition request and the second permission indication acquisition response are NAS messages; alternatively, the first and second electrodes may be,
and the AMF network element sends a third permission indication acquisition request to a Radio Access Network (RAN) so that the RAN acquires permission indication information from the target terminal.
21. The method of claim 20, wherein the first grant indication acquisition request and the third grant indication acquisition request carry an identifier of the target terminal, and the RAN sends a radio resource control RRC reconfiguration message to a corresponding terminal according to the identifier of the target terminal, so that the corresponding terminal sends grant indication information to the RAN; alternatively, the first and second electrodes may be,
the first permission indication acquisition request and the third permission indication acquisition request carry a group identifier of a target terminal group, and the RAN sends a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends permission indication information to the RAN.
22. The method of claim 18, wherein the first query request is sent by the NWDAF network element receiving a first user information analysis request from a NEF network element, the first user information analysis request being sent by the NEF network element receiving a second user information analysis request from an AF network element;
the method further comprises the following steps:
the UDM network element sends a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded to the AF network element by the NEF network element, so that the AF network element obtains permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows a network to analyze user information of the target terminal;
and the UDM network element receives a fourth permission indication acquisition response sent by the NEF network element, wherein the fourth permission indication acquisition response carries permission indication information of the target terminal.
23. The method of claim 18, wherein the first query response carries validity period information indicating a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
24. The method of claim 17, wherein the first request is an authentication request, and the authentication request carries permission indication information of the target terminal;
the method further comprises the following steps:
the UDM network element verifies the permission indication information of the target terminal to obtain a verification result, wherein the verification result is used for indicating whether the permission indication information passes verification or not, or indicating whether the target terminal allows a network to analyze the user information of the target terminal or not;
and the UDM network element sends a verification response to the NWDAF network element, wherein the verification response carries the verification result.
25. The method of claim 24, wherein the verification response carries validity period information indicating a validity period for the target terminal to allow the network to analyze the user information of the target terminal.
26. The method of claim 23 or 25, wherein the method further comprises:
the UDM network element receives a second query request sent by the NWDAF network element, wherein the second query request is sent by the NWDAF network element after the NWDAF network element obtains updated user information of the target terminal and determines that the validity period of the target terminal is over;
and the UDM network element sends a second query response to the NWDAF network element, wherein the second query response is used for indicating whether the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed or not.
27. The method according to any of claims 17-22, 24-25, wherein the user information comprises mobility related information and/or communication related information.
28. The method according to any of claims 17-22 and 24-25, wherein the analyzing the user information of the target terminal results in an analysis result, comprising at least one of:
analyzing the user information of the target terminal to obtain the mobility statistical information and/or mobility prediction information of the target terminal;
analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
and analyzing the user information of the target terminal to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
29. A network device, comprising:
a receiving unit, configured to receive a first user information analysis request from a second network element;
a processing unit for acquiring a permission allowing analysis of user information of the target terminal;
and a sending unit, configured to send an analysis result of the user information of the target terminal to the second network element after obtaining the permission.
30. A network device, comprising:
a receiving unit, configured to receive a first request from a network data analysis function NWDAF network element, where the first request is used to request to acquire whether a target terminal allows analyzing user information of the target terminal;
a sending unit, configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow analysis of the user information of the target terminal.
31. A communications apparatus, comprising: a processor, a memory;
the memory storing computer instructions;
the processor is used for reading the computer instructions and executing the following operations:
receiving a first user information analysis request from a second network element;
obtaining permission for allowing analysis of user information of the target terminal;
and after the permission is obtained, sending an analysis result of the user information of the target terminal to the second network element.
32. The communications apparatus of claim 31, wherein the sending, by the first network element after obtaining the permission, the analysis result of the user information of the target terminal to the second network element comprises:
after the first network element obtains the permission, analyzing the user information of the target terminal to obtain an analysis result, and sending the analysis result to the second network element; alternatively, the first and second liquid crystal display panels may be,
and the first network element acquires the user information of the target terminal, analyzes the user information of the target terminal to obtain an analysis result, and sends the analysis result to the second network element after the permission is obtained.
33. The communications apparatus according to claim 31 or 32, wherein the obtaining permission to allow analysis of the user information of the target terminal includes:
sending a first query request to a Unified Data Management (UDM) network element;
and receiving a first query response sent by the UDM network element, wherein the first query response is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
34. The communications apparatus of claim 33, wherein the first query response carries permission indication information, the permission indication information being obtained by the UDM element indicating access and mobility management function, AMF, element from the target terminal over a radio access network, RAN; the permission indication information is used for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
35. The communications apparatus of claim 34, wherein the second network element is a Network Function (NF) network element.
36. The communications apparatus of claim 33, wherein the first query response carries permission indication information, the permission indication information is obtained by the UDM network element indicating that the second network element is obtained from the target terminal through an application function, AF, network element, and the permission indication information is used to indicate whether the target terminal allows a network to analyze user information of the target terminal.
37. The communications apparatus as claimed in claim 36, wherein the second network element is a network open function (NEF) network element, and the first user information analysis request is sent by the NEF network element according to a second user information analysis request from the AF network element.
38. The communications apparatus of claim 33, wherein the first query response carries validity period information indicating a validity period for the target terminal to allow a network to analyze user information of the target terminal.
39. The communications apparatus of claim 32, wherein the first user information analysis request carries permission indication information of the target terminal;
the obtaining of the permission allowing the analysis of the user information of the target terminal includes:
sending a verification request to a UDM network element, wherein the verification request carries the permission indication information;
and receiving a verification response sent by the UDM network element, wherein the verification response carries a verification result.
40. The communications apparatus of claim 39, wherein the permission indication message is sent by an AF network element to the second network element, and wherein the permission indication information is negotiated between the AF network element and the target terminal.
41. The communications apparatus of claim 39, wherein the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is sent by the NEF network element according to a second user information analysis request from the AF network element.
42. The communications apparatus of claim 39, wherein the validation response carries validity period information that indicates a validity period for the target terminal to allow a network to analyze user information of the target terminal.
43. The communication apparatus of claim 38 or 42, wherein the operations further comprise:
after the updated user information of the target terminal is obtained, if the validity period is judged to be expired according to the validity period information, a second query request is sent to the UDM network element;
receiving a second query response sent by the UDM network element;
and if the second query response indicates that the validity period of the target terminal for allowing the network to analyze the user information of the target terminal is changed, analyzing the updated user information and sending an analysis result to the second network element.
44. The communication apparatus of claim 31 or 32, wherein the operations further comprise:
and if the permission that the target terminal allows the network to analyze the user of the target terminal is not obtained, sending a first user information analysis response to the second network element, wherein the first user information analysis response is used for indicating that the first user information analysis request is rejected.
45. The communication apparatus according to claim 31 or 32, wherein the user information comprises mobility related information and/or communication related information.
46. The communication apparatus according to claim 31 or 32, wherein the analyzing the user information of the target terminal results in an analysis result, which includes at least one of:
analyzing the user information of the target terminal to obtain the mobility statistical information and/or mobility prediction information of the target terminal;
analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
and analyzing the user information of the target terminal to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
47. The method of claim 31 or 32, wherein the communication device is a network data analysis function, NWDAF, network element.
48. A communications apparatus, comprising: a processor, a memory;
the memory storing computer instructions;
the processor is used for reading the computer instructions and executing the following operations:
receiving a first request from a network data analysis function (NWDAF) network element, wherein the first request is used for requesting whether a target terminal allows analyzing user information of the target terminal or not;
and sending a first response to the NWDAF network element, wherein the first response is used for indicating whether the analysis of the user information of the target terminal is allowed or not.
49. The communications apparatus as claimed in claim 48, wherein the first request is a first query request requesting query of subscription information whether the target terminal allows a network to analyze user information of the target terminal;
the sending a first response to the NWDAF network element includes:
acquiring subscription information whether the target terminal allows a network to analyze the user information of the target terminal or not according to the first query request;
and sending a first query response to the NWDAF network element, where the first query response carries permission indication information indicating whether the target terminal allows the network to analyze the user information of the target terminal.
50. The communications apparatus of claim 49, the operations further comprising:
if the subscription information is not acquired, sending a first permission indication acquisition request to an access and mobility management (AMF) network element so that the AMF network element acquires permission indication information from the target terminal;
and receiving a first permission indication acquisition response sent by the AMF network element, wherein the first permission indication acquisition response carries permission indication information of the target terminal.
51. The communications apparatus of claim 49, wherein the first query request is sent by the NWDAF network element receiving a first user information analysis request from a NEF network element, the first user information analysis request being sent by the NEF network element receiving a second user information analysis request from an AF network element;
the operations further include:
sending a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded to the AF network element by the NEF network element, so that the AF network element obtains permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows a network to analyze user information of the target terminal;
and receiving a fourth permission indication acquisition response sent by the NEF network element, wherein the fourth permission indication acquisition response carries permission indication information of the target terminal.
52. The communications apparatus of claim 49, wherein the first query response carries validity period information indicating a validity period for the target terminal to allow a network to analyze user information of the target terminal.
53. The communications apparatus of claim 48, wherein the first request is an authentication request, the authentication request carrying permission indication information of the target terminal;
the operations further include:
verifying permission indication information of the target terminal to obtain a verification result, wherein the verification result is used for indicating whether the permission indication information passes verification or not, or indicating whether the target terminal allows a network to analyze user information of the target terminal, and the permission indication information passes verification and indicates that the target terminal allows the network to analyze the user information of the target terminal;
and sending a verification response to the NWDAF network element, wherein the verification response carries the verification result.
54. The communications apparatus of claim 53, wherein the validation response carries validity period information indicating a validity period for the target terminal to allow a network to analyze user information of the target terminal.
55. The communication apparatus of claim 52 or 54, wherein the operations further comprise:
receiving a second query request sent by the NWDAF network element, where the second query request is sent by the NWDAF network element after acquiring updated user information of the target terminal and determining that the validity period of the target terminal has expired;
and sending a second query response to the NWDAF network element, wherein the second query response is used for indicating whether to change the validity period of the target terminal for allowing the network to analyze the user information of the target terminal.
56. The communication apparatus according to any of claims 48-51, 53-54, wherein said user information comprises mobility related information and/or communication related information.
57. The communication device according to any of claims 48-51, 53-54, wherein the communication device is a unified data management, UDM, network element.
58. A computer-readable storage medium having stored thereon computer-executable instructions for causing a computer to perform the method of any one of claims 1-28.
59. A computer program product, which, when called by a computer, causes the computer to perform the method of any one of claims 1 to 28.
CN202110026412.2A 2021-01-08 2021-01-08 User information analysis result feedback method and device Pending CN114760619A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110026412.2A CN114760619A (en) 2021-01-08 2021-01-08 User information analysis result feedback method and device
PCT/CN2021/141266 WO2022148254A1 (en) 2021-01-08 2021-12-24 User information analysis result feedback method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110026412.2A CN114760619A (en) 2021-01-08 2021-01-08 User information analysis result feedback method and device

Publications (1)

Publication Number Publication Date
CN114760619A true CN114760619A (en) 2022-07-15

Family

ID=82325601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110026412.2A Pending CN114760619A (en) 2021-01-08 2021-01-08 User information analysis result feedback method and device

Country Status (2)

Country Link
CN (1) CN114760619A (en)
WO (1) WO2022148254A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116599862A (en) * 2023-07-18 2023-08-15 中国电信股份有限公司 Communication method, analysis network element and communication system
WO2023201733A1 (en) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Wireless communication method and device
WO2024031702A1 (en) * 2022-08-12 2024-02-15 北京小米移动软件有限公司 Information processing method and apparatus, and communication device and storage medium
WO2024032588A1 (en) * 2022-08-12 2024-02-15 维沃移动通信有限公司 User will verification method and apparatus, and network-side device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020145030A1 (en) * 2019-01-09 2020-07-16 Nec Corporation Core network node and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3861680A1 (en) * 2018-10-05 2021-08-11 Telefonaktiebolaget LM Ericsson (publ) Methods and apparatus for analytics function discovery

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020145030A1 (en) * 2019-01-09 2020-07-16 Nec Corporation Core network node and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for 5G System (5GS) to support network data analytics services; (Release 16)", 《3GPP》, pages 29 - 31 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023201733A1 (en) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Wireless communication method and device
WO2024031702A1 (en) * 2022-08-12 2024-02-15 北京小米移动软件有限公司 Information processing method and apparatus, and communication device and storage medium
WO2024032588A1 (en) * 2022-08-12 2024-02-15 维沃移动通信有限公司 User will verification method and apparatus, and network-side device
CN116599862A (en) * 2023-07-18 2023-08-15 中国电信股份有限公司 Communication method, analysis network element and communication system
CN116599862B (en) * 2023-07-18 2023-09-29 中国电信股份有限公司 Communication method, analysis network element and communication system

Also Published As

Publication number Publication date
WO2022148254A1 (en) 2022-07-14

Similar Documents

Publication Publication Date Title
CN114760619A (en) User information analysis result feedback method and device
EP3780702B1 (en) Method and device for monitoring network data
US20200120580A1 (en) Communication method, network device, terminal device, and system
EP3813304A1 (en) Information processing method and device
CN110214459A (en) The method and apparatus of business processing
CN110493184B (en) Method and device for processing login page in client and electronic device
CN111885585B (en) Communication service opening method and communication device
CN111698734B (en) Access method of non-public network, terminal and base station
CN110383896A (en) Method for network access, terminal, access net and core net
RU2006114719A (en) METHOD FOR SECURITY MANAGEMENT OF APPLICATIONS USING THE SECURITY MODULE
US20230319734A1 (en) Method for computing power sharing and related devices
EP3837805B1 (en) Methods, apparatus and computer-readable mediums supporting subscriptions to events in a core network
CN110049031B (en) Interface security authentication method, server and authentication center server
US20110295992A1 (en) Server and method for providing device management service and device receiving the device management service
CN114980034A (en) Method and device for realizing raw computing power service, network equipment and terminal
US20220264357A1 (en) Network entities for managing distribution of slice service level agreement information in a communication network
CN108243631B (en) Network access method and equipment
US20060040677A1 (en) Data protection for position-dependent services
US20240089735A1 (en) Roaming in cellular communication networks
CN113709729B (en) Data processing method, device, network equipment and terminal
CN114025349B (en) Network service method, device, system and storage medium
WO2017103680A1 (en) Method and apparatus for realizing mtc group message delivery
WO2012173528A1 (en) Handling of operator connection offers in a communication network
CN115915174B (en) Network state information acquisition method and device
CN107211479B (en) Method and device for selecting access network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination