CN115314922A - Method, apparatus and medium for real-time controlling network information - Google Patents

Method, apparatus and medium for real-time controlling network information Download PDF

Info

Publication number
CN115314922A
CN115314922A CN202110489662.XA CN202110489662A CN115314922A CN 115314922 A CN115314922 A CN 115314922A CN 202110489662 A CN202110489662 A CN 202110489662A CN 115314922 A CN115314922 A CN 115314922A
Authority
CN
China
Prior art keywords
information
network
function
data analysis
specific information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110489662.XA
Other languages
Chinese (zh)
Inventor
伍运珍
华竹轩
池炜成
张金娟
刘智琼
朱明英
陈娜
李舒婷
俞科峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202110489662.XA priority Critical patent/CN115314922A/en
Priority to PCT/CN2021/133872 priority patent/WO2022233127A1/en
Publication of CN115314922A publication Critical patent/CN115314922A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present disclosure relates to a method, apparatus, and medium for controlling network information in real time. The present disclosure provides a method for real-time controlling network information, comprising: acquiring network information in a communication network through an information acquisition module in a network data analysis function in the communication network; acquiring specific information to be controlled through a specific information acquisition interface in a network data analysis function; searching the network information containing the specific information in the acquired network information through an information analysis module in a network data analysis function; acquiring user information associated with the network information containing the specific information through an information analysis module in a network data analysis function, and generating a network control strategy; and providing, by an information analysis module in the network data analysis function, the network control policy to a policy control function in the communication network via a network policy control interface in the network data analysis module.

Description

Method, apparatus and medium for real-time controlling network information
Technical Field
The present disclosure relates generally to a method, apparatus, and medium for controlling network information in real time.
Background
In the network era, the information security of the network is related to the security of society and countries, and the security control of the network information is a requirement for social development. With the advent of 5G, how operators perform security control on network information is a new problem faced by operators.
Disclosure of Invention
The following presents a simplified summary of the disclosure in order to provide a basic understanding of some aspects of the disclosure. However, it should be understood that this summary is not an exhaustive overview of the disclosure. It is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. Its sole purpose is to present some concepts of the disclosure in a simplified form as a prelude to the more detailed description that is presented later.
According to an aspect of the present disclosure, there is provided a method of controlling network information in real time, including: acquiring network information in a communication network through an information acquisition module in a network data analysis function in the communication network; acquiring specific information to be controlled through a specific information acquisition interface in a network data analysis function; searching the network information containing the specific information in the acquired network information through an information analysis module in a network data analysis function; acquiring user information associated with the network information containing the specific information through an information analysis module in a network data analysis function, and generating a network control strategy; and providing, by an information analysis module in the network data analysis function, the network control policy to a policy control function in the communication network via a network policy control interface in the network data analysis module.
According to another aspect of the present disclosure, there is provided an apparatus for controlling network information in real time, including: a memory having instructions stored thereon; and a processor configured to execute instructions stored on the memory to perform the method as described above.
According to yet another aspect of the present disclosure, there is provided a computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform a method according to the above-mentioned aspect of the present disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
FIG. 1 shows a block diagram of an example of the composition of a network data analysis function according to one embodiment of the present disclosure;
FIG. 2 illustrates an exemplary configuration of a computing device in which embodiments in accordance with the present disclosure may be implemented.
Detailed Description
The following detailed description is made with reference to the accompanying drawings and is provided to assist in a comprehensive understanding of various exemplary embodiments of the disclosure. The following description includes various details to aid understanding, but these details are to be regarded as examples only and are not intended to limit the disclosure, which is defined by the appended claims and their equivalents. The words and phrases used in the following description are intended only to provide a clear and consistent understanding of the disclosure. In addition, descriptions of well-known structures, functions, and configurations may be omitted for clarity and conciseness. Those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the spirit and scope of the disclosure.
In the prior art, post-control is adopted for controlling the network information, such as information shielding, that is, the network information is controlled after being distributed to each server. In the mode, the control points are scattered, manual participation is high, flexibility is not enough, efficiency is low, and real-time performance of information control is poor.
In order to solve one or more of the above problems in the prior art, the present disclosure provides a method for controlling Network information, which extends a Network Data analysis Function (NWDAF) in a 5G Network from the perspective of a Network operator, so that the Network Data analysis Function includes not only an existing QoS (quality of service) mechanism signed by a Network channel and a user, but also an analysis, inspection and control mechanism for the Network-wide information, thereby effectively improving the efficiency of Network information control and realizing the real-time performance of Network information control.
"function" in this disclosure refers to a module in a network architecture, which may be a hardware module, a software module, a logic module of hardware or software, and may be carried on any network device or network element in a network. Further, although the present disclosure extends the network data analysis function in a 5G network, it is apparent that the technique of the present disclosure is not limited to a 5G network, but is applicable to any communication network that requires monitoring or control of specific information.
Fig. 1 shows a block diagram of a composition example of a network data analysis function according to one embodiment of the present disclosure. As shown in fig. 1, the network data analysis function may include a specific information acquisition interface, an information acquisition module, an information analysis module, and a network policy control interface. In one embodiment, the network data analysis function may further include an Operation Administration and Maintenance (OAM) module and a network information data module.
The specific information acquisition interface may be used to receive specific information that needs to be monitored or managed from an external system, such as an Application Function (AF) in a communication network. In one embodiment, for example, the specific information may be sensitive information to be regulated. In one embodiment, the particular information may be information of interest to an operator, government, social organization, business, merchant, military, individual, etc., such as information related to public opinion hotspots, business secrets, privacy, national secrets, disasters, intelligence, public health events, etc.
The information acquisition module may be configured to acquire network information from, for example, an Application Function (AF). The application function may include various services of an application layer in an architecture of a communication network (e.g., a 5G network), may be an application inside an operator (e.g., a Voice over Long-Term Evolution (VoLTE) AF), and may also be various AFs of a third party (e.g., a website server, a video server, a game server, etc.). An application function may include any network element or network device that stores, carries, transmits, receives, or manages information in a communication network.
In one embodiment, the present disclosure provides a method for controlling network information in real time, comprising: acquiring network information in a communication network through an information acquisition module in a network data analysis function in the communication network; acquiring specific information to be controlled through a specific information acquisition interface in a network data analysis function; searching the network information containing the specific information in the acquired network information through an information analysis module in a network data analysis function; acquiring user information associated with the network information containing the specific information through an information analysis module in a network data analysis function, and generating a network control strategy; and providing the network Control Policy to a Policy Control Function (PCF) in the communication network via a network Policy Control interface in the network data analysis module by an information analysis module in the network data analysis Function.
In one embodiment, the method may further include: and controlling the network equipment related to the network information containing the specific information according to the received network control strategy through the strategy control function.
In one embodiment, the method may further include: user information is obtained from a Unified Data Management (UDM) function in a communication network as shown in fig. 1, by an information analysis module in a network Data analysis function. The information analysis module in the network data analysis function can associate and compare the network information containing the specific information with the acquired user information to acquire the user information associated with the network information containing the specific information.
In one embodiment, the network information in the communication network may include information obtained by an application function in the communication network through Deep Packet Inspection (DPI).
In one embodiment, the network device associated with the network information comprising the specific information may be controlled by an access and mobility management function or a session management function in the communication network.
In one embodiment, the user information obtained from the unified data management function may include subscription information of the user. In this case, the information analysis module may generate the network control policy using the subscription information of the user.
In one embodiment, the method may further include: and acquiring the source information of the network information containing the specific information through an information acquisition module in a network data analysis function. The information analysis module may associate and compare the network information including the specific information with the obtained user information to obtain the user information associated with the network information including the specific information, using the source information.
In one embodiment, the information analysis module may generate the network control policy according to a level of the specific information and user information associated with network information including the specific information. The level of the specific information may for example represent its importance level, privacy level or severity index, etc. As described above, in generating the network control policy, the subscription information of the user may also be considered in consideration of the level of the specific information and the associated user information.
In one embodiment, the network information may include information obtained by deep packet parsing of information stored, carried, transmitted, received, or managed by various network elements or network devices on the network.
In one embodiment, the operations management and maintenance module may collect data related to various end devices, network devices, and network performance.
In one embodiment, the network information data module may collect service area information, terminal mobility status, session information, and the like.
In one embodiment, when the network information is controlled in real time, the information analysis module may search the information acquisition module for specific information, and analyze the searched specific information to obtain, for example, a distribution time, an IP address, a user name, and the like of the specific information. Then, the information analysis module may associate the specific information with the subscription information obtained from the unified data management function, and obtain user information associated with the specific information. The information analysis module may then form a network control policy based on the requirements associated with the particular information or the level of the particular information and the user information.
In one embodiment, the network policy control interface may send the formed network control policy to a policy control function for network control.
More specifically, the disclosure takes NWDAF as a main component, and the method for performing security control on network information may include:
1) An information acquisition module is added in the NWDAF, and the information acquisition module is used for acquiring or copying network information (including information obtained by deep packet analysis of various network elements on the network or various information and data stored, carried, transmitted, received or managed on the network by the application function in the network) from the application function.
2) A specific information acquisition interface is added in the NWDAF, and the specific information acquisition interface can acquire specific information needing to be controlled;
3) An information analysis module in the NWDAF searches the acquired network information for network information containing specific information. Optionally, the information analysis module may further analyze or obtain source information of the network information including the specific information;
4) Optionally, the information analysis module in the NWDAF may obtain the user information from the unified data management function;
5) An information analysis module in the NWDAF may obtain user information associated with network information that includes the particular information and generate a network control policy. Optionally, the information analysis module may associate and/or compare the obtained network information including the specific information with the user information obtained from the unified data management function, so as to analyze the user information associated with the network information including the specific information. After the associated user information is analyzed, the information analysis module can generate a network control strategy;
6) An information analysis module in the NWDAF provides the generated network control strategy to a strategy control function in the communication network through a network strategy control interface; and
7) The policy control function receives the network control policy so that security control can be performed on the network information containing the specific information and its information carrier (e.g., various network devices or network elements that store, carry, transmit, receive, or manage the network information containing the specific information). In one embodiment, the policy control function may control the network information including the specific information by an access and mobility management function (AMF) or a Session Management Function (SMF) in the communication network, including, for example, real-time or non-real-time control of network devices or network elements (e.g., various network devices or network elements that store, carry, transmit, receive, or manage the network information including the specific information) associated with the network information including the specific information.
The method and the device expand the function of the NWDAF in the 5G network, so that the NWDAF not only comprises the existing QoS mechanism for signing a network channel and a user, but also expands the analysis, check and control mechanism of the whole network information, effectively improves the efficiency of network information control, and realizes the real-time performance of the network information control.
Fig. 2 illustrates an exemplary configuration of a computing device 1200 capable of implementing embodiments in accordance with the present disclosure.
Computing device 1200 is an example of a hardware device to which the above-described aspects of the disclosure can be applied. Computing device 1200 may be any machine configured to perform processing and/or computing. Computing device 1200 may be, but is not limited to, a workstation, a server, a desktop computer, a laptop computer, a tablet computer, a Personal Data Assistant (PDA), a smart phone, an in-vehicle computer, or a combination thereof.
As shown in fig. 2, computing device 1200 may include one or more elements that may be connected to or communicate with bus 1202 via one or more interfaces. The bus 1202 may include, but is not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, a Video Electronics Standards Association (VESA) local bus, a Peripheral Component Interconnect (PCI) bus, and the like. Computing device 1200 may include, for example, one or more processors 1204, one or more input devices 1206, and one or more output devices 1208. The one or more processors 1204 may be any kind of processor and may include, but are not limited to, one or more general-purpose processors or special-purpose processors (such as special-purpose processing chips). The processor 1204 may be configured, for example, to implement a method of controlling network information in real time as described above. Input device 1206 may be any type of input device capable of inputting information to a computing device and may include, but is not limited to, a mouse, a keyboard, a touch screen, a microphone, and/or a remote control. Output device 1208 can be any type of device capable of presenting information and can include, but is not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer.
The computing device 1200 may also include or be connected to a non-transitory storage device 1214, which non-transitory storage device 1214 may be any non-transitory and may implement a data storage device, and may include, but is not limited to, disk drives, optical storage devicesSolid state memory, floppy disk, flexible disk, hard disk, magnetic tape, or any other magnetic medium, compact disk, or any other optical medium, cache memory, and/or any other memory chip or module, and/or any other medium from which a computer can read data, instructions, and/or code. Computing device 1200 may also include Random Access Memory (RAM) 1210 and Read Only Memory (ROM) 1212. The ROM 1212 may store programs, utilities or processes to be executed in a non-volatile manner. The RAM 1210 may provide volatile data storage, and stores instructions related to the operation of the computing device 1200. Computing device 1200 may also include a network/bus interface 1216 coupled to a data link 1218. The network/bus interface 1216 can be any kind of device or system capable of enabling communication with external apparatuses and/or networks, and can include, but is not limited to, a modem, a network card, an infrared communication device, a wireless communication device, and/or a chipset (such as bluetooth) TM Devices, 802.11 devices, wiFi devices, wiMax devices, cellular communications facilities, etc.).
The present disclosure may be implemented as any combination of devices, systems, integrated circuits, and computer programs on non-transitory computer readable media. One or more processors may be implemented as an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), or a large scale integrated circuit (LSI), a system LSI, or a super LSI, or as an ultra LSI package that performs some or all of the functions described in this disclosure.
The present disclosure includes the use of software, applications, computer programs or algorithms. Software, applications, computer programs, or algorithms may be stored on a non-transitory computer readable medium to cause a computer, such as one or more processors, to perform the steps described above and depicted in the figures. For example, one or more memories store software or algorithms in executable instructions and one or more processors may associate a set of instructions to execute the software or algorithms to provide various functionality in accordance with embodiments described in this disclosure.
Software and computer programs (which may also be referred to as programs, software applications, components, or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural, object-oriented, functional, logical, or assembly or machine language. The term "computer-readable medium" refers to any computer program product, apparatus or device, such as magnetic disks, optical disks, solid-state storage devices, memories, and Programmable Logic Devices (PLDs), used to provide machine instructions or data to a programmable data processor, including a computer-readable medium that receives machine instructions as a computer-readable signal.
By way of example, computer-readable media may comprise Dynamic Random Access Memory (DRAM), random Access Memory (RAM), read Only Memory (ROM), electrically erasable read only memory (EEPROM), compact disk read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to carry or store desired computer-readable program code in the form of instructions or data structures and which may be accessed by a general-purpose or special-purpose computer or a general-purpose or special-purpose processor. Disk or disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer-readable media.
The subject matter of the present disclosure is provided as examples of apparatus, systems, methods, and programs for performing the features described in the present disclosure. However, other features or variations are contemplated in addition to the above-described features. It is contemplated that the implementation of the components and functions of the present disclosure may be accomplished with any emerging technology that may replace the technology of any of the implementations described above.
Additionally, the above description provides examples, and does not limit the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various embodiments may omit, substitute, or add various procedures or components as appropriate. For example, features described with respect to certain embodiments may be combined in other embodiments.
In addition, in the description of the present disclosure, the terms "first," "second," "third," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or order.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous.

Claims (10)

1. A method of real-time control of network information, comprising:
acquiring network information in a communication network through an information acquisition module in a network data analysis function in the communication network;
acquiring specific information to be controlled through a specific information acquisition interface in a network data analysis function;
searching the network information containing the specific information in the acquired network information through an information analysis module in a network data analysis function;
acquiring user information associated with the network information containing the specific information through an information analysis module in a network data analysis function, and generating a network control strategy; and
and providing the network control strategy to a strategy control function in the communication network through a network strategy control interface in the network data analysis module by an information analysis module in the network data analysis function.
2. The method of claim 1, further comprising:
and controlling the network equipment related to the network information containing the specific information according to the received network control strategy through the strategy control function.
3. The method of claim 1, further comprising:
obtaining user information from a unified data management function in a communication network via an information analysis module in a network data analysis function, an
And the information analysis module in the network data analysis function is used for associating and comparing the network information containing the specific information with the acquired user information to acquire the user information associated with the network information containing the specific information.
4. The method of claim 1, wherein the network information in the communication network comprises information obtained by deep packet parsing by an application function in the communication network.
5. The method according to claim 2, wherein the network device related to the network information comprising the specific information is controlled by an access and mobility management function or a session management function in the communication network.
6. The method of claim 3, wherein the subscriber information obtained from the unified data management function comprises subscription information of the subscriber.
7. The method of claim 3, further comprising:
acquiring source information of the network information containing the specific information through an information acquisition module in a network data analysis function;
and associating and comparing the network information containing the specific information with the acquired user information by using the source information to acquire the user information associated with the network information containing the specific information.
8. The method of claim 3, wherein the network control policy is generated based on the level of the specific information and user information associated with network information containing the specific information.
9. An apparatus for real-time control of network information, comprising:
a memory having instructions stored thereon; and
a processor configured to execute instructions stored on the memory to perform the method of any of claims 1 to 8.
10. A computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of any one of claims 1-8.
CN202110489662.XA 2021-05-06 2021-05-06 Method, apparatus and medium for real-time controlling network information Pending CN115314922A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110489662.XA CN115314922A (en) 2021-05-06 2021-05-06 Method, apparatus and medium for real-time controlling network information
PCT/CN2021/133872 WO2022233127A1 (en) 2021-05-06 2021-11-29 Method and apparatus for performing real-time control on network information, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110489662.XA CN115314922A (en) 2021-05-06 2021-05-06 Method, apparatus and medium for real-time controlling network information

Publications (1)

Publication Number Publication Date
CN115314922A true CN115314922A (en) 2022-11-08

Family

ID=83853604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110489662.XA Pending CN115314922A (en) 2021-05-06 2021-05-06 Method, apparatus and medium for real-time controlling network information

Country Status (2)

Country Link
CN (1) CN115314922A (en)
WO (1) WO2022233127A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MX2007008052A (en) * 2006-06-29 2012-09-27 Superheat Fgh Technologies Inc Method and apparatus for remote controlling monitoring and/or servicing heat-treatment equipment via wireless communications.
CN101232643A (en) * 2008-02-25 2008-07-30 中国移动通信集团广东有限公司 Network information automatic monitoring system and method
CN101753333B (en) * 2008-11-28 2012-07-04 中华电信股份有限公司 Management system for integrated information security service and the protection method thereof
CN110740140A (en) * 2019-10-30 2020-01-31 南京茗淇信息科技有限公司 network information security supervision system based on cloud platform

Also Published As

Publication number Publication date
WO2022233127A1 (en) 2022-11-10

Similar Documents

Publication Publication Date Title
CN105701122A (en) Log collection method, apparatus and system
CN112487451B (en) Display method and device and electronic equipment
CN110909521A (en) Synchronous processing method and device for online document information and electronic equipment
US11758087B2 (en) Multimedia conference data processing method and apparatus, and electronic device
CN111881216A (en) Data acquisition method and device based on shared template
US20200213843A1 (en) 5g service compatible 4g sim
CN111756847A (en) Method and device for supporting https protocol by website
CN111600926B (en) Data processing method and device and electronic equipment
CN113543056B (en) 5G charging method and device for home routing scene
CN115314922A (en) Method, apparatus and medium for real-time controlling network information
CN110300222B (en) Short message display method, system, terminal equipment and computer readable storage medium
CN108345434B (en) Data writing method and device, computer equipment and readable storage medium
JP2014142872A (en) Testing device
US20190335327A1 (en) Partitioning network addresses in network cell data to address user privacy
CN114547040A (en) Data processing method, device, equipment and medium
CN114428737A (en) Communication method, device, equipment and storage medium based on micro service system
CN114916029A (en) Method, apparatus and medium for triggering user equipment policy update
CN115730324A (en) Business system access method and device, storage medium and electronic equipment
CN115442757A (en) Method for opening and realizing value added service after call, corresponding system and storage medium
WO2023093320A1 (en) Client autonomous analysis method and apparatus, and medium
US20190335326A1 (en) Aggregating network cell data to address user privacy
CN112445414A (en) Data processing method and device
CN115706976A (en) Method and apparatus for generating user equipment identity
CN105009543A (en) Delivery of a media item
CN115915042A (en) Automatic migration method, device, medium and system for abnormal charging message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination