CN116074202A - Slice information processing method, equipment and computer readable storage medium - Google Patents

Slice information processing method, equipment and computer readable storage medium Download PDF

Info

Publication number
CN116074202A
CN116074202A CN202111300832.1A CN202111300832A CN116074202A CN 116074202 A CN116074202 A CN 116074202A CN 202111300832 A CN202111300832 A CN 202111300832A CN 116074202 A CN116074202 A CN 116074202A
Authority
CN
China
Prior art keywords
slice
strategy
information
filtering
slicing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111300832.1A
Other languages
Chinese (zh)
Inventor
刘健
姜海燕
普加红
陈安林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile IoT Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202111300832.1A priority Critical patent/CN116074202A/en
Publication of CN116074202A publication Critical patent/CN116074202A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Abstract

The embodiment of the application discloses a slice information processing method, which comprises the following steps: acquiring first information for determining a first slicing filtering strategy associated with a target identifier, and installing the first slicing filtering strategy corresponding to the target identifier, which is acquired from a strategy control function PCF, based on the first information; wherein the target identifier has an association relationship with the slice to be processed; the first slice filtering strategy corresponds to a first slice behavior management strategy of the slice to be processed, which is customized by a user, and is used for processing the service access request in the slice to be processed. The embodiment of the application also discloses a slice information processing device and a computer readable storage medium.

Description

Slice information processing method, equipment and computer readable storage medium
Technical Field
The present invention relates to the field of communications, and in particular, to a slice information processing method, apparatus, and computer readable storage medium.
Background
In recent years, with the increase of differentiated demands of network resources, how to provide network resources meeting different service demands for different clients becomes more important; the fifth generation mobile communication technology (5th Generation Mobile Communication Technology,5G) has been developed in this context, wherein one of the key technical points in addressing the provision of differentiated network resources is in terms of slicing processing. However, at present, the user performs slice signing to provide the required slice for the user, however, the service of slice signing is basically managed by a entrusted operator, the operator pre-prepares slice processing rules in advance, and the safety behavior of the client in the use process of the slice is ensured to be basically in a blank state; therefore, there is a problem that the client cannot customize the slicing behavior processing scheme according to own needs.
Disclosure of Invention
In order to solve the technical problems, the embodiments of the present application expect to provide a slice information processing method, apparatus, and computer readable storage medium, which solve the problems that slice management and control cannot meet the actual demands of clients, and real-time detection and dynamic filtering of slices after signing up for slices cannot be ensured, so that communication security cannot be ensured, and implement a slice behavior management and control strategy customized by clients, so that the strategy of filtering slices completely meets the actual demands of clients.
In order to achieve the above purpose, the technical scheme of the application is realized as follows:
a slice information processing method, the method comprising:
acquiring first information for determining a first slicing filtering strategy associated with a target identifier, and installing the first slicing filtering strategy corresponding to the target identifier, which is acquired from a strategy control function PCF, based on the first information; wherein, the target mark has an association relation with the slice to be processed; the first slice filtering strategy corresponds to a first slice behavior management strategy of the slice to be processed, which is customized by a user, and is used for processing the service access request in the slice to be processed.
In the above solution, the obtaining first information for determining a first slice filtering policy associated with the target identifier, and installing, based on the first information, a first slice filtering policy corresponding to the target identifier obtained from a policy control function PCF, includes:
receiving a session establishment request carrying the target identifier sent by User Equipment (UE);
based on the session establishment request, sending a first request carrying the target identifier to the PCF;
and receiving the PCF, returning to the first slice filtering strategy and installing.
In the above solution, the obtaining first information for determining a first slice filtering policy associated with a target identifier, and installing, based on the first information, the first slice filtering policy corresponding to the target identifier, where the first slice filtering policy is obtained from a policy control function PCF, includes:
receiving change information of service data accessed by a user, and sending a second request carrying a target identifier to the PCF based on the change information;
receiving the first slice filtering strategy returned by the PCF;
deleting a second slice filtering strategy and installing the first slice filtering strategy when the second slice filtering strategy is not matched with the first slice filtering strategy; wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
In the above solution, the obtaining first information for determining a first slice filtering policy associated with a target identifier, and installing, based on the first information, the first slice filtering policy corresponding to the target identifier, where the first slice filtering policy is obtained from a policy control function PCF, includes:
receiving a third request carrying a first slice filtering strategy sent by the PCF;
deleting a second slice filtering strategy and installing the first slice filtering strategy based on the third request; wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
In the above scheme, the method further comprises:
receiving a message to be processed, which is sent by UE and carries the target identifier, and determining target information based on the message to be processed and the first slicing filtering strategy; the target information is information for determining a management and control strategy of the message to be processed;
sending a fourth request carrying the target identifier and the target information to a slice management platform;
receiving a control strategy returned by the slice management platform, and executing the control strategy on the message to be processed; the control strategy is based on information corresponding to the target identification and the target information, which is determined by the slice management platform.
A slice information processing method, the method comprising:
acquiring a first slice behavior management and control strategy aiming at a slice to be processed; wherein the first slicing behavior management and control strategy is customized by a user;
processing the first slicing behavior control strategy to obtain a second slicing behavior control strategy;
sending a fifth request carrying the second slicing behavior management and control strategy to the PCF; the second slicing behavior management and control strategy is used for generating a first slicing filtering strategy.
In the above scheme, the method further comprises:
receiving a fourth request carrying a target identifier and target information sent by a user plane gateway; the target information is information for determining a management and control strategy of the message to be processed;
and determining and returning the management and control strategy corresponding to the target identifier and the target information to a user plane gateway based on the fourth request and the second slicing behavior management and control strategy.
In the above scheme, the method further comprises:
based on the target identification, sending a slice event subscription request for the slice to be processed to a network function NF;
receiving the slice event sent by the NF; wherein the slice event is information related to the behavior of the slice detected by the NF;
Performing abnormal behavior analysis on the slice to be processed based on the slice event to obtain an analysis result;
and processing the slice to be processed based on the analysis result and the target slice abnormal behavior processing strategy.
A slice information processing method, the method comprising:
acquiring second information for determining a first slicing filtering strategy associated with a target identifier, and determining the first slicing filtering strategy corresponding to the target identifier based on the second information; wherein, the target mark has an association relation with the slice to be processed; the first slicing filtering strategy corresponds to a first slicing behavior management strategy defined by a user;
and sending the first slice filtering strategy to the user plane gateway.
In the above solution, before the obtaining the second information associated with the target identifier and used for determining the first slice filtering policy, and determining the first slice filtering policy corresponding to the target identifier based on the second information, the method further includes:
receiving a fifth request carrying a second slice behavior management and control strategy sent by a slice management platform; the second slicing behavior management and control strategy is generated based on the first slicing behavior management strategy defined by a client;
Generating a third slice filtering strategy based on the second slice behavior management strategy; the third slice filtering strategy and the second slice behavior management and control strategy correspond to the first slice behavior management and control strategy;
accordingly, the determining the first slice filtering policy corresponding to the target identifier based on the second information includes:
the first slice filtering policy is determined from the third slice filtering policy based on the second information.
The scheme comprises the following steps:
a user plane gateway, the user plane gateway comprising: a first processor, a first memory, and a first communication bus;
the first communication bus is used for realizing communication connection between the first processor and the first memory;
the first processor is configured to execute the slice information processing program in the first memory to implement the steps of the slice information processing method described above.
A slice management platform, the slice management platform comprising: a second processor, a second memory, and a second communication bus;
the second communication bus is used for realizing communication connection between the second processor and the second memory;
the second processor is configured to execute the slice information processing program in the second memory, so as to implement the steps of the slice information processing method described above.
A PCF, said PCF comprising: a third processor, a third memory, and a third communication bus;
the third communication bus is used for realizing communication connection between the third processor and the third memory;
the third processor is configured to execute the slice information processing program in the third memory to implement the steps of the slice information processing method described above.
A computer-readable storage medium storing one or more programs executable by one or more processors to implement the steps of the slice information processing method described above.
According to the slice information processing method, the slice information processing device and the computer-readable storage medium, the PCF generates the first slice filtering strategy based on the second slice behavior management strategy generated by the first slice behavior management strategy customized by the user, and then after subscription is completed, a session establishment request is initiated at the UE, or when the first slice filtering strategy is changed, the user plane gateway installs the latest first slice filtering strategy acquired from the PCF, so that the strategy of the user plane gateway for filtering slices is consistent with the slice behavior management strategy customized by the user, the problem that the management and control of the slices cannot meet the actual requirements of the client is solved, the practical requirements of the client on slice behavior management and control are met through the client customized slice behavior management and control strategy is realized; and the problem that communication safety cannot be guaranteed is avoided through the linkage of the user plane gateway and the PCF, so that the slice filtering strategy and the slice behavior can be detected and dynamically updated in real time, and the slice safety in the communication process is guaranteed.
Drawings
Fig. 1 is a block diagram of slice information processing according to an embodiment of the present application;
fig. 2 is a flow chart of a slice information processing method according to an embodiment of the present application;
fig. 3 is a flow chart of another slice information processing method according to an embodiment of the present application;
fig. 4 is a flow chart of another slice information processing method according to an embodiment of the present application;
fig. 5 is a flow chart of a slice information processing method according to another embodiment of the present application;
fig. 6 is a flowchart of another slice information processing method according to another embodiment of the present application;
fig. 7 is a schematic structural diagram of a user plane gateway according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a slice management platform according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a PCF according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
The following describes a general architecture for interaction of each node implementing slice information processing according to an embodiment of the present invention, which reflects the roles and interaction manners of each node in slice information processing, and referring to fig. 1, fig. 1 is an architecture diagram of slice information processing according to an embodiment of the present invention, and an exemplary architecture may include a client platform 11, a slice management platform 12, a policy control function (Policy Control Function, PCF) 13, a User plane gateway 14, and a User Equipment (UE) 15. Wherein, the functional description of the main node is referred to
Table 1:
Figure BDA0003338331740000061
/>
Figure BDA0003338331740000071
TABLE 1
In the embodiment of the application, a group client sets a first slicing behavior control policy on a signed slice at a client platform 11, after the setting, the client platform synchronizes the first slicing behavior control policy to a slice management platform (1), the slice management platform processes the first slicing behavior control policy to obtain a second slicing behavior control policy, and sends information of the second slicing behavior control policy to a PCF, and the PCF generates a slicing filtering policy in a package form based on the second slicing behavior control policy, and correlates the slicing filtering policy with the slice signed by the client to complete signing (2) of the slicing filtering policy.
The PCF issues a slice filtering strategy to a user plane gateway (2), when the user plane gateway obtains a request of a uniform resource locator (Uniform Resource Locator, URL) of an access network address of UE or an event (3) generated by flow, the user plane gateway interacts with a slice management platform to match the locally stored slice filtering strategy and access information of the UE with a second slice behavior management strategy stored by the slice management platform, if the access information of the UE is in a management range of the slice filtering strategy which is signed by a client and still takes effect, the slice management platform searches a classification identifier corresponding to the second slice behavior management strategy according to key word information in the access information, further determines a management strategy (4) corresponding to the classification identifier, and the user plane gateway executes the management strategy (5) on the access initiated by the UE based on the management strategy.
In the slice information processing architecture provided by the embodiment of the application, the client can customize the slice behavior management and control strategy through the third-party platform, the third-party platform synchronizes the slice behavior management and control strategy to the slice management platform, and then the slice management platform sends the slice behavior management and control strategy to the PCF to complete signing of the slice filtering strategy, so that the problem that the client cannot customize the slice behavior management and control strategy of the slice according to the self requirement, and the caused slice management and control cannot meet the actual requirement of the client is solved. Meanwhile, in the session process, the linkage between the user plane gateway, the slice management platform and the PCF is realized, so that the slice behavior can be detected and dynamically filtered in real time, and the problem that the communication safety cannot be ensured because the real-time detection and the dynamic filtering of the slices after the signing of the slices cannot be ensured is solved.
The embodiment of the application provides a slice information processing method, which is applied to a user plane gateway and shown with reference to fig. 2, and comprises the following steps:
step 201, obtaining first information for determining a first slice filtering policy associated with a target identity.
Wherein, the target mark has an association relation with the slice to be processed; the first slice filtering strategy corresponds to a first slice behavior management strategy of the to-be-processed slice customized by a user and is used for processing the service access request in the to-be-processed slice.
In the embodiment of the application, the first slicing filtering policy is generated based on a second slicing behavior management policy, and stored in a storage area corresponding to the PCF, the second slicing behavior management policy is generated based on a first slicing behavior management policy customized by a client, and the first slicing filtering policy and the second slicing behavior management policy are consistent with the first slicing behavior management policy. The first information may include a session establishment request initiated by the UE and information that the first slice filtering policy has changed.
It should be noted that, the network card may be an internet of things card, the target identifier is a card number of the internet of things card that is used to uniquely determine the target slice of the target client, and may be associated with the slice identifier of the target slice and the target slice, and in one possible implementation, the slice identifier is represented by the single network slice selection auxiliary information (Single Network Slice Selection Assistance Information, S-nsai).
Step 202, based on the first information, installing a first slice filtering strategy corresponding to the target identifier, which is acquired from the policy control function PCF.
In the embodiment of the application, after acquiring a session establishment request initiated by UE, a user plane gateway establishes a session, and in the process, a first slice filtering strategy stored in a PCF needs to be installed so as to manage and control interaction data in a slice to be processed based on the first slice filtering strategy; when the user plane gateway obtains the information of changing the first slice filtering strategy, the installed first slice filtering strategy needs to be updated to be the latest first slice filtering strategy.
According to the slice information processing method provided by the embodiment of the application, the strategy of filtering the slice by the user plane gateway is consistent with the user-defined slice behavior management and control strategy, so that the problem that the management and control of the slice cannot meet the actual demands of clients is solved, the user-defined slice behavior management and control strategy is realized, and the strategy of filtering the slice completely meets the actual demands of the clients; and the problem that communication safety cannot be ensured is avoided through the linkage of the user plane gateway and the PCF, so that the slicing behavior of the slicing filtering strategy can be detected in real time and updated dynamically, and the slicing safety in the communication process is ensured.
Based on the foregoing embodiments, an embodiment of the present application provides a slice information processing method, which is applied to a slice management platform, and is shown with reference to fig. 3, and includes the following steps:
step 301, a first slice behavior management and control strategy for a slice to be processed is obtained.
Wherein the first slicing behavior management policy is user-defined.
In the embodiment of the present application, the first slice behavior management and control policy is set by a client according to its own needs, where a first slice behavior management and control policy corresponds to a slice of a client, and may include management and control policies for multiple behaviors of the slice.
And 302, processing the first slicing behavior control strategy to obtain a second slicing behavior control strategy.
In the embodiment of the application, the slice management platform processes the acquired first slice behavior management and control strategy based on rules to obtain a second slice behavior management and control strategy, and stores the second slice behavior management and control strategy. The second slicing behavior management and control strategy is in one-to-one correspondence with the first slicing behavior management and control strategy. The processing of the first slicing behavior management and control policy to obtain the rule of the second slicing behavior management and control policy may include aggregating information in the first slicing behavior management and control policy according to key fields of the first slicing behavior management and control policy, and the like.
Step 303, send a fifth request carrying the second slicing behavior management policy to the PCF.
Wherein the second slice behavior management policy is used to generate the first slice filtering policy.
In the embodiment of the application, according to the interface information provided by the PCF, the slice management platform sends the second slice behavior management policy to the PCF in a form conforming to the PCF interface specification, so as to complete the subscription of the slice behavior management policy for the slice. The transmission form of the second slice behavior management and control policy sent to the PCF may be obtained by processing the transmission form of the second slice behavior management and control policy based on a custom rule on the basis of ensuring that the transmission form of the second slice behavior management and control policy meets the PCF interface specification.
In one possible implementation, according to interface information of the synchronous slice behavior management and control strategy provided by the PCF, the slice management platform aggregates information with the same slice identifier, card number, effective time and dead time in the second slice behavior management and control strategy to form aggregated slice behavior management and control strategy information corresponding to a slice package defined in the PCF, and sends the aggregated slice behavior management and control strategy information to the PCF. The slice package is a concept defined in PCF interface specification, and may be a slice behavior control policy processed based on user-defined rules.
According to the slice information processing method provided by the embodiment of the application, the slice management platform obtains the first slice behavior management and control strategy defined by a user, and obtains the second slice behavior management and control strategy by processing the first slice behavior management and control strategy, and then sends the second slice behavior management and control strategy to the PCF, so that subscription of the slice behavior management and control strategy of the slice is completed. Therefore, the problem that the control of the slice cannot meet the actual demands of the clients is solved by enabling the strategy for filtering the slice to be consistent with the user-defined slice behavior control strategy, the purpose that the user-defined slice behavior control strategy meets the actual demands of the clients completely is achieved, and the purpose that the slice filtering strategy meets the actual demands of the clients is achieved.
Based on the foregoing embodiments, an embodiment of the present application provides a slice information processing method, which is applied to a PCF, and is shown with reference to fig. 4, and includes the following steps:
step 401, obtaining second information for determining a first slicing filtering strategy associated with the target identifier, and determining the first slicing filtering strategy corresponding to the target identifier based on the second information.
Wherein, the target mark has an association relation with the slice to be processed; the first slicing-filtering policy corresponds to a user-defined first slicing-behavior-management policy.
In the embodiment of the application, the first slice filtering strategy is generated based on the acquired second slice behavior management strategy and stored in a storage area corresponding to the PCF, and the first slice filtering strategy corresponds to the target identifier one by one. The second information may include a request sent by the user plane gateway to initialize a session, a request for characterizing updating the slice filtering policy, and information for changing the first slice filtering policy, where the information for changing the first slice filtering policy may be information from the slice management platform characterizing changing the slice behavior management policy for subscription.
It should be noted that, the network card may be an internet of things card, the target identifier is a card number of the internet of things card that is used to uniquely determine the target slice of the target client and may be associated to the slice identifier of the target slice and the target slice, and in a possible implementation, the slice identifier is represented by S-nsai.
Step 402, a first slice filtering policy is sent to a user plane gateway.
In the embodiment of the application, the first slicing filtering strategy is sent to the user plane gateway, so that the first slicing filtering strategy installed at the user plane gateway is consistent with the latest first slicing behavior management strategy signed by the client.
According to the slice information processing method provided by the embodiment of the application, the PCF synchronizes the first time of the session needed in the slice to the user plane gateway through the first slice filtering strategy corresponding to the latest slice behavior management strategy defined by the client, so that the slice behaviors can be detected in real time and filtered dynamically, and the problem that communication safety cannot be ensured because the slice cannot be detected in real time and filtered dynamically after the signing of the slice is avoided. Meanwhile, the first slice filtering strategy is consistent with the client-defined slice behavior management and control strategy, so that the problem that the slice management and control cannot meet the actual demands of clients is solved, the client-defined slice behavior management and control strategy is realized, and the slice filtering strategy completely meets the actual demands of the clients.
Based on the foregoing embodiments, embodiments of the present application provide a slice information processing method, as shown in fig. 5, which may include the following steps:
Step 501, a slice management platform acquires a first slice behavior management policy for a slice to be processed.
Wherein the first slicing behavior management policy is user-defined.
In one possible implementation, the first slicing behavior management and control policy is set by the client on a client platform of a third party, and the client platform synchronizes the first slicing behavior management and control policy set by the client to the slicing management platform. The acquired first slice behavior management and control strategy for the slice to be processed at least comprises a slice identifier, a card number, a valid time (starttime), an invalid time (endtime), a keyword (keyword), a strategy action (policy_type), a prompt message (note) and an automatic safety guarantee identifier (automation). Wherein the slice identity is represented by a single network slice selection assistance information (Single Network Slice Selection Assistance Information, S-nsai), the card number is represented by a mobile subscriber international integrated services digital network/public switched telephone network number (Mobile Subscriber International ISDN/PSTN number, MSISDN), see in particular table 2:
Figure BDA0003338331740000121
TABLE 2
Step 502, the slice management platform processes the first slice behavior management and control strategy to obtain a second slice behavior management and control strategy.
In one possible implementation, the information with the same slice identifier, card number, policy action, effective time and failure time in the first slice behavior management and control policy is aggregated, a classification identifier is set for each piece of aggregated information, a second slice behavior management and control policy is obtained, and the second slice behavior management and control policy is stored. Exemplary, key fields of the second slicing behavior management policy, see table 3:
Figure BDA0003338331740000122
TABLE 3 Table 3
Step 503, the slice management platform sends a fifth request carrying the second slice behavior management policy to the PCF.
Wherein the second slice behavior management policy is used to generate the first slice filtering policy.
Step 504, the PCF receives a fifth request sent by the slice management platform.
The second slicing behavior management policy is generated based on the first slicing behavior management policy defined by the user.
Step 505, the PCF generates a third slice filtering policy based on the second slice behavior management policy.
The third slice filtering strategy and the second slice behavior control strategy correspond to the first slice behavior control strategy.
In the embodiment of the application, the second slice behavior management and control strategy is generated based on the first slice behavior management and control strategy defined by the client, and the third slice filtering strategy is generated based on the second slice behavior management and control strategy, and the second slice behavior management and control strategy and the third slice filtering strategy are consistent with the first slice behavior management and control strategy. The PCF aggregates the second slicing behavior management strategy in the form of a slicing set, such that one or more slicing sets may be included in the generated third slicing filtering strategy. After the third slice filtering policy is generated, the PCF stores the third slice filtering policy for transmission to the user plane gateway at a later time of use. It should be noted that, the slice package is a customized concept in the PCF, and when the concept of the slice package in the PCF changes, the corresponding concept in the application correspondingly changes.
It should be noted that the third slice filtering policy is substantially the same as the first slice filtering policy, and is generated based on the second slice behavior management policy, and since the first slice filtering policy used for sending to the user plane gateway in the subsequent step is determined from the third slice filtering policy, the first slice filtering policy and the third slice filtering policy are distinguished for clarity of description.
In one possible implementation, the third slice filtering policy generated by the PCF is stored in the form of one or more slice packages generated by aggregating information in the second slice behavior management policy having the same slice identification, card number, validation time, and expiration time. Exemplary, key fields in the third slice filtering policy, see table 4:
slice identification Classification identification Package label Package name
128-01FFFF 100 200 Package with unlimited slices
128-02FFFF 101 201 Redirecting package
128-03FFFF 102 202 High-risk flow monitoring package
TABLE 4 Table 4
Step 506, the user plane gateway receives a session establishment request carrying a target identifier sent by the UE.
In the embodiment of the application, the session establishment request carries the target identifier of specific information indicating the slice of the session to be established, and the target identifier can be uniquely determined by the card number of the internet of things and the slice identifier.
In one possible implementation, the user plane gateway receives a request sent by the UE to connect to an access network (Internet Protocol-Connectivity Access Network, IP-CAN) with an internetwork protocol carrying a target identity.
Step 507, the user plane gateway sends a first request carrying a target identifier to the PCF based on the session establishment request.
In the embodiment of the application, the user plane gateway sends a first request for initializing a slice filtering policy to the PCF, and for a slice in which data in the slice is required to be processed according to the slice filtering policy, the slice filtering policy corresponding to the target identifier is acquired before the session is established.
In one possible implementation, the user plane gateway sends a message carrying a credit control Initial request (Credit Control Request Initial, CCR Initial) with the target identification as a first request to the PCF.
Step 508, the PCF receives the first request sent by the user plane gateway, and determines, from the third slice filtering policies, a first slice filtering policy corresponding to the target identifier based on the first request.
In the embodiment of the application, the user plane gateway searches in the stored third slice filtering strategy according to the target identifier, and finds out the first slice filtering strategy corresponding to the target identifier.
Step 509, the PCF sends the first slice filtering policy to the user plane gateway.
In one possible implementation, the PCF sends a credit control Initial response (Credit Control Answer Initial, CCA Initial) message to the user plane gateway. Specifically, if the client signs up for the second SLICE filtering policy of the relevant SLICE filtering slicerter action, the Value of an Attribute Value Pair (AVP) carried by the CCA Initial message is the enable_slice_filter for characterizing the opening SLICE filtering function. Key fields of the second slice filtering strategy, see table 5:
package label Classification identification Time of effectiveness Time to failure
200 100 2021-5-20 2022-5-21
201 101 2021-5-20 2022-5-21
202 102 2021-5-20 2022-5-21
TABLE 5
Step 510, the user plane gateway receives and installs the first slice filtering policy returned by the PCF.
Step 511, the user plane gateway receives the change information of the service data accessed by the user, and sends a second request carrying the target identifier to the PCF based on the change information.
In this embodiment of the present application, in a session, the service data change information may include data that a network address URL visited by a user changes, and the second request is a request for obtaining, by the PCF, a latest first slice filtering policy corresponding to the target identifier.
In one possible implementation, during the session, the service data accessed by the user is changed, and the user plane gateway sends a message carrying a credit control Update request (Credit Control Request Update, CCR Update) with the target identifier as a second request to the PCF.
Step 512, the PCF receives the second request sent by the user plane gateway, and determines, from the third slice filtering policies, a first slice filtering policy corresponding to the target identifier based on the second request.
In the embodiment of the application, the user plane gateway searches in the stored third slice filtering strategy according to the target identifier, and finds out the first slice filtering strategy corresponding to the target identifier.
Step 513, the PCF sends the first slice filtering policy to the user plane gateway.
In one possible implementation, during the session, the PCF sends a credit control Update request (Credit Control Answer Update, CCA Update) message as a second request to the PCF.
Step 514, the user plane gateway receives the first slice filtering policy returned by the PCF.
Step 515, when the second slice filtering policy does not match the first slice filtering policy, the user plane gateway deletes the second slice filtering policy and installs the first slice filtering policy.
Wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
In the embodiment of the application, the user plane gateway compares the latest first slice filtering strategy corresponding to the target identifier with the installed second slice filtering strategy, and when the latest first slice filtering strategy and the installed second slice filtering strategy are different, the second slice filtering strategy is deleted, and the first slice filtering strategy is installed.
In a possible implementation manner, the user plane gateway generates information deletion, so that the second slice filtering strategy information corresponding to the target identifier is deleted, and if the second slice filtering strategy is different from the latest first slice filtering strategy, the second slice filtering strategy is updated to be the first slice filtering strategy.
Step 516, the PCF obtains modification information of the second slice filtering policy associated with the target identifier, and determines the first slice filtering policy corresponding to the target identifier from the third slice filtering policies.
In other embodiments of the present application, the second slice filtering policy is a slice filtering policy to be updated stored in a storage area corresponding to the PCF, and is also a slice filtering policy installed by the user plane gateway; the second slice filtering policy is different from the latest first slice filtering policy signed by the user. When the PCF detects that the stored second slice filtering strategy is different from the latest first slice filtering strategy signed by the user, the latest first slice filtering strategy signed by the user is determined, and the second slice filtering strategy to be updated is updated as the first slice filtering strategy.
Step 517, the PCF sends a third request carrying the first slice filtering policy to the user plane gateway.
In one possible implementation, during the session, the PCF sends a message to the PCF carrying a secondary authentication Request (RAR) of the latest first slice filtering policy corresponding to the target identity.
Step 518, the user plane gateway receives a third request carrying the first slice filtering policy sent by the PCF.
Step 519, the user plane gateway deletes the installed second slice filtering policy and installs the first slice filtering policy based on the third request.
In the embodiment of the application, the user plane gateway acquires the latest first slice filtering strategy signed by the user, updates the locally installed second slice filtering strategy to be the first slice filtering strategy, and returns a response such as a secondary authentication Response (RAA) to the PCF after completion.
It should be noted that, steps 506-510 are performed before steps 511-515 and steps 516-519, and the order of execution of steps 511-515 and steps 516-519 is not limited.
Step 520, the user plane gateway receives a message to be processed carrying a target identifier sent by the UE, and determines target information based on the message to be processed and the first slice filtering policy.
The target information is determined based on the message to be processed and the first slice filtering strategy.
In other embodiments of the present application, the target information may include a keyword in the message to be processed, such as URL information, a classification identifier in the first slice filtering policy, a package identifier, and a target identifier. Target information.
Step 521, the user plane gateway sends a fourth request carrying the target identifier and the target information to the slice management platform.
In the embodiment of the application, in the session process, the user plane gateway receives a message to be processed sent by a user, and when the message to be processed comes from a slice signed by the user, the user plane gateway needs to interact with the user plane gateway to determine a management and control strategy of the message to be processed.
In one possible implementation, the keyword may be obtained by deep packet inspection (Deep Packet Inspection, DPI) parsing the message to be processed. The user plane gateway sends a network content change protocol (Internet Content Adaptation Protocol, ICAP) request as a fourth request carrying the destination identification and destination information to the slice management platform.
Step 522, the slice management platform receives a fourth request sent by the user plane gateway.
The target information is used for determining information of a management and control strategy of the message to be processed.
Step 523, the slice management platform determines and returns the management policy corresponding to the target identifier and the target information to the user plane gateway based on the fourth request and the second slice behavior management policy.
In the embodiment of the application, the slice management platform acquires the target identifier and the target information from the fourth request, searches the stored second slice behavior management and control strategy corresponding to the target identifier, matches the second slice behavior management and control strategy with the target information, and if the matching is successful, indicates that the target information is in the management and control range of the first slice filtering strategy corresponding to the target identifier, which is still effective, the classification identifier matched with the keyword in the target information in the second slice behavior management and control strategy is obtained according to the target information, and further obtains the strategy action corresponding to the classification identifier, and the strategy action is used as the management and control strategy of the message to be processed to be returned to the user plane gateway.
Step 524, the user plane gateway receives the control policy returned by the slice management platform and executes the control policy on the message to be processed.
The control strategy is determined based on the slice management platform and corresponds to the target identification and the target information.
In one possible implementation, the rules governing policy enforcement include:
A. if a slice classification server in the slice management platform acquires the classification identification of the effective URL, returning to a management and control strategy matched with the first slice behavior management and control strategy:
a. if the URL accessed by the user belongs to the policy and is released, the user plane gateway sends the cached HTTP Get to the target Web Server.
b. If the URL accessed by the user belongs to blocking in the strategy, the user plane gateway discards the cached HTTP Get message and discards the subsequent message.
c. If the URL accessed by the user belongs to redirection in the policy, the user plane gateway sends an HTTP redirection message to the UE and discards the cached HTTP Get message.
B. If the slice classifying server in the slice management platform does not acquire the effective URL classifying identification or fails to match with the URL classifying strategy issued by the PCF, the user plane gateway executes the default strategy. Wherein, the default policy is issued to the user plane gateway by PCF preferentially, and then the local configuration of the user plane packet gateway is used.
Based on the foregoing embodiment, in other embodiments of the present application, referring to fig. 6, the method may further include the following steps:
Step 525, the slice management platform sends a slice event subscription request for the slice to be processed to the network function NF based on the target identifier.
In the embodiment of the application, in order to realize the safe control of the event occurring in the slice to be processed, the slice management platform subscribes to the slice event of the slice to be processed of the target identification to the required NF. Exemplary subscribed-to slice event information may include slice identification, start time of session within a slice, slice-related location information, URL access records, slice traffic information, and the like.
Step 526, the slice management platform receives the slice event sent by the NF.
Wherein slice events are information about the behavior of the slice detected by NF.
In the embodiment of the application, when the NF monitors that the slicing of the subscribed slicing event has information related to the subscribed slicing event, the information is sent to the slicing management platform, and the slicing management platform receives a message returned by the NF.
In one possible implementation, the NF monitors core information that affects slice billing, returning this information to the slice management platform.
And 527, analyzing abnormal behaviors of the slice to be processed based on the slice event by the slice management platform to obtain an analysis result.
In the embodiment of the application, the slice management platform analyzes the behavior of the received slice event to judge whether abnormal behavior is generated, wherein the abnormal behavior comprises but is not limited to high concurrency access to the same URL, the slice ordering is invalid, the URL access still exists, and unauthorized access information appears in the slice.
In step 528, the slice management platform processes the slice to be processed based on the analysis result and the target slice abnormal behavior processing policy.
In the embodiment of the application, the slice management platform stores slice abnormal behaviors, and executes a management and control strategy corresponding to the abnormal behaviors on the slice sending the abnormal behaviors according to the built-in processing strategy of the slice abnormal behaviors.
Therefore, abnormal behaviors in the slice are monitored in real time through the slice management platform, and timely processing is carried out on the abnormal behaviors, so that the communication safety in the slice is further guaranteed.
Based on the foregoing embodiment, when the user plane gateway receives a request for ending a session sent by the UE, such as an IP-CAN Termination request, and then sends an end session request, such as CCR-Termination, to the PCF, after receiving a response returned by the PCF to end the session, such as a CCA Termination response, the first slice filtering policy that has been installed is deleted, and then returns a response for ending the session, such as an IP-CAN Termination response, to the UE.
According to the slice information processing method provided by the embodiment of the application, the strategy of filtering the slice by the user plane gateway is consistent with the user-defined slice behavior management and control strategy, so that the problem that the management and control of the slice cannot meet the actual demands of clients is solved, the user-defined slice behavior management and control strategy is realized, and the strategy of filtering the slice completely meets the actual demands of the clients; and the problem that communication safety cannot be ensured is avoided through the linkage of the user plane gateway and the PCF, so that the slicing behavior of the slicing filtering strategy can be detected in real time and updated dynamically, and the slicing safety in the communication process is ensured.
Based on the foregoing embodiments, an embodiment of the present application provides a user plane gateway, which may be applied to the slice information processing methods provided in the corresponding embodiments of fig. 2 and 5, and referring to fig. 7, the user plane gateway includes: a first processor 61, a first memory 62 and a first communication bus 63;
the first communication bus 43 is used to implement a communication connection between the first processor 61 and the first memory 62;
the first processor 61 is configured to execute a slice information processing program stored in the first memory 62 to realize the steps of:
Acquiring first information for determining a first slicing filtering strategy associated with a target identifier, and installing the first slicing filtering strategy corresponding to the target identifier acquired from a policy control function PCF based on the first information; wherein, the target mark has an association relation with the slice to be processed; the first slice filtering strategy corresponds to a first slice behavior management strategy of the to-be-processed slice customized by a user and is used for processing the service access request in the to-be-processed slice.
In other embodiments of the present application, the first processor 61 is configured to perform the steps of obtaining first information in the first memory 62 for determining a first slice filtering policy associated with the target identifier, and installing the first slice filtering policy corresponding to the target identifier obtained from the policy control function PCF based on the first information to implement the steps of:
receiving a session establishment request carrying a target identifier sent by User Equipment (UE);
based on the session establishment request, a first request carrying a target identifier is sent to the PCF;
the receiving PCF returns to the first slice filtering policy and installs.
In other embodiments of the present application, the first processor 61 is configured to perform the steps of obtaining first information in the first memory 62 for determining a first slice filtering policy associated with the target identifier, and installing the first slice filtering policy corresponding to the target identifier obtained from the policy control function PCF based on the first information to implement the steps of:
Receiving change information of service data accessed by a user, and sending a second request carrying a target identifier to the PCF based on the change information;
receiving a first slice filtering strategy returned by the PCF;
deleting the second slice filtering strategy and installing the first slice filtering strategy when the second slice filtering strategy is not matched with the first slice filtering strategy; wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
In other embodiments of the present application, the first processor 61 is configured to perform the steps of obtaining first information in the first memory 62 for determining a first slice filtering policy associated with the target identifier, and installing the first slice filtering policy corresponding to the target identifier obtained from the policy control function PCF based on the first information to implement the steps of:
receiving a third request carrying a first slice filtering strategy sent by the PCF;
deleting the second slice filtering strategy and installing the first slice filtering strategy based on the third request; wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
In other embodiments of the present application, the first processor 61 is configured to execute the slice information processing program stored in the first memory 62, and the following steps may be further implemented:
Receiving a message to be processed, which is sent by UE and carries a target identifier, and determining target information based on the message to be processed and a first slice filtering strategy; the target information is information for determining a management and control strategy of the message to be processed;
sending a fourth request carrying the target identification and the target information to a slice management platform;
receiving a control strategy returned by the slice management platform, and executing the control strategy on the message to be processed; the control strategy is based on information corresponding to the target identification and the target information determined by the slice management platform.
It should be noted that, the specific description of the steps executed by the first processor may refer to the descriptions in the slice information processing method provided in the corresponding embodiment of fig. 2 and 5, and will not be repeated herein.
According to the user plane gateway provided by the embodiment of the application, the user plane gateway is enabled to be consistent with the user-defined slicing behavior management and control strategy for filtering slices, so that the problem that the management and control of the slices cannot meet the actual demands of clients is solved, the user-defined slicing behavior management and control strategy for filtering the slices is realized, and the actual demands of the clients are completely met by the strategy for filtering the slices; and the problem that communication safety cannot be ensured is avoided through the linkage of the user plane gateway and the PCF, so that the slicing behavior of the slicing filtering strategy can be detected in real time and updated dynamically, and the slicing safety in the communication process is ensured.
Based on the foregoing embodiments, an embodiment of the present application provides a slice management platform, which may be applied to the slice information processing methods provided in the corresponding embodiments of fig. 3, 5 and 6, and referring to fig. 8, the slice management platform includes: a second processor 71, a second memory 72, and a second communication bus 73;
a second communication bus 73 for enabling a communication connection between the second processor 71 and the second memory 72;
the second processor 71 is configured to execute the slice information processing program stored in the second memory 72 to realize the steps of:
acquiring a first slice behavior management and control strategy aiming at a slice to be processed; the first slicing behavior control strategy is customized by a user;
processing the first slicing behavior control strategy to obtain a second slicing behavior control strategy;
sending a fifth request carrying the second slicing behavior management and control strategy to the PCF; wherein the second slice behavior management policy is used to generate the first slice filtering policy.
In other embodiments of the present application, the second processor 71 is configured to execute the slice information processing program stored in the second memory 72, and the following steps may be further implemented:
receiving a fourth request carrying a target identifier and target information sent by a user plane gateway; the target information is information for determining a management and control strategy of the message to be processed;
And determining and returning the control strategy corresponding to the target identification and the target information to the user plane gateway based on the fourth request and the second slicing behavior control strategy.
In other embodiments of the present application, the second processor 71 is configured to execute the slice information processing program stored in the second memory 72, and the following steps may be further implemented:
based on the target identification, sending a slice event subscription request for the slice to be processed to a network function NF;
receiving a slice event sent by NF; wherein the slice event is information related to the behavior of the slice detected by the NF;
carrying out abnormal behavior analysis on the slice to be processed based on the slice event to obtain an analysis result;
and processing the slice to be processed based on the analysis result and the target slice abnormal behavior processing strategy.
It should be noted that, the specific description of the steps executed by the second processor may refer to descriptions in the slice information processing methods provided in the embodiments corresponding to fig. 3, 5 and 6, and are not repeated herein.
According to the slice management platform provided by the embodiment of the application, the strategy of filtering slices by the user plane gateway is consistent with the user-defined slice behavior management and control strategy, so that the problem that the management and control of the slices cannot meet the actual demands of clients is solved, the user-defined slice behavior management and control strategy is realized, and the strategy of filtering the slices completely meets the actual demands of the clients; and the problem that communication safety cannot be ensured is avoided through the linkage of the user plane gateway and the PCF, so that the slicing behavior of the slicing filtering strategy can be detected in real time and updated dynamically, and the slicing safety in the communication process is ensured.
Based on the foregoing embodiments, embodiments of the present application provide a PCF, which may be applied to the slice information processing method provided in the corresponding embodiments of fig. 4 and 5, and referring to fig. 9, the PCF includes: a third processor 81, a third memory 82, and a third communication bus 83;
acquiring second information for determining a first slicing filtering strategy associated with the target identifier, and determining the first slicing filtering strategy corresponding to the target identifier based on the second information; wherein, the target mark has an association relation with the slice to be processed; the first slicing filtering strategy corresponds to a first slicing behavior management strategy defined by a user;
and sending the first slice filtering strategy to the user plane gateway.
In other embodiments of the present application, before the third processor 81 is configured to obtain, in the third memory 82, second information associated with the target identifier for determining the first slice filtering policy, and determine, based on the second information, the first slice filtering policy corresponding to the target identifier, the following steps may be further implemented:
receiving a fifth request carrying a second slice behavior management and control strategy sent by a slice management platform; the second slicing behavior management strategy is generated based on the first slicing behavior management strategy defined by the client;
Generating a third slice filtering strategy based on the second slice behavior management strategy; the third slice filtering strategy and the second slice behavior control strategy correspond to the first slice behavior control strategy;
accordingly, determining a first slice filtering policy corresponding to the target identifier based on the second information includes:
based on the second information, a first slice filtering policy is determined from the third slice filtering policy.
It should be noted that, the specific description of the steps executed by the third processor may refer to descriptions in the slice information processing method provided in the corresponding embodiment of fig. 4 and 5, which are not repeated herein.
According to the PCF provided by the embodiment of the application, the policy of the user plane gateway for filtering the slice is consistent with the user-defined slice behavior management and control policy, so that the problem that the management and control of the slice cannot meet the actual demands of clients is solved, the user-defined slice behavior management and control policy of the clients is realized, and the policy of filtering the slice completely meets the actual demands of the clients; and the problem that communication safety cannot be ensured is avoided through the linkage of the user plane gateway and the PCF, so that the slicing behavior of the slicing filtering strategy can be detected in real time and updated dynamically, and the slicing safety in the communication process is ensured.
Based on the foregoing embodiments, embodiments of the present application provide a computer-readable storage medium storing one or more programs executable by one or more processors to implement steps in the slice information processing method provided by the corresponding embodiments of fig. 2 to 6.
The computer readable storage medium may be a Read Only Memory (ROM), a programmable Read Only Memory (Programmable Read-Only Memory, PROM), an erasable programmable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), an electrically erasable programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), a magnetic random access Memory (Ferromagnetic Random Access Memory, FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a compact disk Read Only Memory (Compact Disc Read-Only Memory, CD-ROM), or the like; but may be various electronic devices such as mobile phones, computers, tablet devices, personal digital assistants, etc., that include one or any combination of the above-mentioned memories.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data acquisition device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data acquisition device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data acquisition device to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable terminal to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (14)

1. A slice information processing method, the method comprising:
acquiring first information for determining a first slicing filtering strategy associated with a target identifier, and installing the first slicing filtering strategy corresponding to the target identifier, which is acquired from a strategy control function PCF, based on the first information; wherein, the target mark has an association relation with the slice to be processed; the first slice filtering strategy corresponds to a first slice behavior management strategy of the slice to be processed, which is customized by a user, and is used for processing the service access request in the slice to be processed.
2. The method of claim 1, wherein the obtaining first information for determining a first slice filtering policy associated with the target identifier, and installing the first slice filtering policy corresponding to the target identifier obtained from the policy control function PCF based on the first information, comprises:
receiving a session establishment request carrying the target identifier sent by User Equipment (UE);
based on the session establishment request, sending a first request carrying the target identifier to the PCF;
and receiving the PCF, returning to the first slice filtering strategy and installing.
3. The method of claim 1, wherein the obtaining first information for determining a first slice filtering policy associated with the target identifier, and installing the first slice filtering policy corresponding to the target identifier obtained from a policy control function PCF based on the first information, comprises:
receiving change information of service data accessed by a user, and sending a second request carrying a target identifier to the PCF based on the change information;
receiving a first slice filtering strategy corresponding to the target identifier returned by the PCF;
deleting a second slice filtering strategy and installing the first slice filtering strategy when the second slice filtering strategy is not matched with the first slice filtering strategy; wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
4. The method of claim 1, wherein the obtaining first information for determining a first slice filtering policy associated with the target identifier, and installing the first slice filtering policy corresponding to the target identifier obtained from a policy control function PCF based on the first information, comprises:
receiving a third request carrying a first slice filtering strategy sent by the PCF;
Deleting a second slice filtering strategy and installing the first slice filtering strategy based on the third request; wherein the second slice filtering policy is a user plane gateway installed slice filtering policy.
5. The method according to claim 1, wherein the method further comprises:
receiving a message to be processed, which is sent by UE and carries the target identifier, and determining target information based on the message to be processed and the first slicing filtering strategy;
sending a fourth request carrying the target identifier and the target information to a slice management platform; the target information is information for determining a management and control strategy of the message to be processed;
receiving a control strategy returned by the slice management platform, and executing the control strategy on the message to be processed; the control strategy is based on information corresponding to the target identification and the target information, which is determined by the slice management platform.
6. A slice information processing method, the method comprising:
acquiring a first slice behavior management and control strategy aiming at a slice to be processed; wherein the first slicing behavior management and control strategy is customized by a user;
Processing the first slicing behavior control strategy to obtain a second slicing behavior control strategy;
sending a fifth request carrying the second slicing behavior management and control strategy to the PCF; the second slicing behavior management and control strategy is used for generating a first slicing filtering strategy.
7. The method of claim 6, wherein the method further comprises:
receiving a fourth request carrying a target identifier and target information sent by a user plane gateway; the target information is information for determining a management and control strategy of the message to be processed;
and determining and returning the management and control strategy corresponding to the target identifier and the target information to a user plane gateway based on the fourth request and the second slicing behavior management and control strategy.
8. The method of claim 6, wherein the method further comprises:
based on the target identification, sending a slice event subscription request for the slice to be processed to a network function NF;
receiving the slice event sent by the NF; wherein the slice event is information related to the behavior of the slice detected by the NF;
performing abnormal behavior analysis on the slice to be processed based on the slice event to obtain an analysis result;
And processing the slice to be processed based on the analysis result and the target slice abnormal behavior processing strategy.
9. A slice information processing method, the method comprising:
acquiring second information for determining a first slicing filtering strategy associated with a target identifier, and determining the first slicing filtering strategy corresponding to the target identifier based on the second information; wherein, the target mark has an association relation with the slice to be processed; the first slicing filtering strategy corresponds to a first slicing behavior management strategy defined by a user;
and sending the first slice filtering strategy to the user plane gateway.
10. The method of claim 9, wherein the obtaining second information associated with a target identifier for determining a first slicing filtering policy, and determining the first slicing filtering policy corresponding to the target identifier based on the second information, further comprises:
receiving a fifth request carrying a second slice behavior management and control strategy sent by a slice management platform; the second slicing behavior management and control strategy is generated based on the first slicing behavior management strategy customized by a user;
Generating a third slice filtering strategy based on the second slice behavior management strategy; the third slice filtering strategy and the second slice behavior management and control strategy correspond to the first slice behavior management and control strategy;
accordingly, the determining the first slice filtering policy corresponding to the target identifier based on the second information includes:
the first slice filtering policy is determined from the third slice filtering policy based on the second information.
11. A user plane gateway, the user plane gateway comprising: a first processor, a first memory, and a first communication bus;
the first communication bus is used for realizing communication connection between the first processor and the first memory;
the first processor is configured to execute a slice information processing program in the first memory to implement the steps of any one of claims 1 to 4.
12. A slice management platform, the slice management platform comprising: a second processor, a second memory, and a second communication bus;
the second communication bus is used for realizing communication connection between the second processor and the second memory;
The second processor is configured to execute a slice information processing program in the second memory to implement the steps of any one of claims 5 to 8.
13. A PCF, comprising: a third processor, a third memory, and a third communication bus;
the third communication bus is used for realizing communication connection between the third processor and the third memory;
the third processor is configured to execute a slice information processing program in a third memory to implement the steps of any of claims 9 to 10.
14. A computer-readable storage medium storing one or more programs executable by one or more processors to implement the steps of the slice information processing method of claims 1-4 or 5-8 or 9-10.
CN202111300832.1A 2021-11-04 2021-11-04 Slice information processing method, equipment and computer readable storage medium Pending CN116074202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111300832.1A CN116074202A (en) 2021-11-04 2021-11-04 Slice information processing method, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111300832.1A CN116074202A (en) 2021-11-04 2021-11-04 Slice information processing method, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116074202A true CN116074202A (en) 2023-05-05

Family

ID=86172152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111300832.1A Pending CN116074202A (en) 2021-11-04 2021-11-04 Slice information processing method, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116074202A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017075757A1 (en) * 2015-11-03 2017-05-11 华为技术有限公司 Method, device and system for selecting network function service
CN109951877A (en) * 2017-12-20 2019-06-28 华为技术有限公司 A kind of slice information update method and device
CN110380887A (en) * 2018-04-13 2019-10-25 华为技术有限公司 Communication means and device
CN110650503A (en) * 2018-06-27 2020-01-03 中国电信股份有限公司 Network access method, device, system and computer readable storage medium
WO2020035000A1 (en) * 2018-08-14 2020-02-20 华为技术有限公司 Method for acquiring network configuration information, and related device
CN110996303A (en) * 2017-01-05 2020-04-10 华为技术有限公司 System and method for application friendly protocol data unit session management
US20200336935A1 (en) * 2017-11-20 2020-10-22 Sharp Kabushiki Kaisha Ue and communication control method for ue
CN111885519A (en) * 2019-05-03 2020-11-03 三星电子株式会社 Method and apparatus for session configuration of terminal according to time or service area in wireless communication system
CN112243228A (en) * 2020-07-31 2021-01-19 国网浙江省电力有限公司培训中心 Energy Internet terminal access system and method based on 5G access network slice
US20210058297A1 (en) * 2018-01-19 2021-02-25 Koninklijke Kpn N.V. Network slice usage
CN113132132A (en) * 2019-12-30 2021-07-16 华为技术有限公司 Slicing control method and device
CN113259355A (en) * 2021-05-20 2021-08-13 江苏省未来网络创新研究院 Industrial Internet identification slice management system based on SDN

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017075757A1 (en) * 2015-11-03 2017-05-11 华为技术有限公司 Method, device and system for selecting network function service
CN110996303A (en) * 2017-01-05 2020-04-10 华为技术有限公司 System and method for application friendly protocol data unit session management
US20200336935A1 (en) * 2017-11-20 2020-10-22 Sharp Kabushiki Kaisha Ue and communication control method for ue
CN109951877A (en) * 2017-12-20 2019-06-28 华为技术有限公司 A kind of slice information update method and device
US20210058297A1 (en) * 2018-01-19 2021-02-25 Koninklijke Kpn N.V. Network slice usage
CN110380887A (en) * 2018-04-13 2019-10-25 华为技术有限公司 Communication means and device
CN110650503A (en) * 2018-06-27 2020-01-03 中国电信股份有限公司 Network access method, device, system and computer readable storage medium
WO2020035000A1 (en) * 2018-08-14 2020-02-20 华为技术有限公司 Method for acquiring network configuration information, and related device
CN111885519A (en) * 2019-05-03 2020-11-03 三星电子株式会社 Method and apparatus for session configuration of terminal according to time or service area in wireless communication system
CN113132132A (en) * 2019-12-30 2021-07-16 华为技术有限公司 Slicing control method and device
CN112243228A (en) * 2020-07-31 2021-01-19 国网浙江省电力有限公司培训中心 Energy Internet terminal access system and method based on 5G access network slice
CN113259355A (en) * 2021-05-20 2021-08-13 江苏省未来网络创新研究院 Industrial Internet identification slice management system based on SDN

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SYED HUSAIN等: "Mobile edge computing with network resource slicing for Internet-of-Things", 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS, 7 May 2018 (2018-05-07) *
方琰崴;陈亚权;李立平;周俊超;: "5G网络切片解决方案和关键技术", 邮电设计技术, no. 03, 20 March 2020 (2020-03-20) *

Similar Documents

Publication Publication Date Title
CN110798472B (en) Data leakage detection method and device
CN109951289B (en) Identification method, device, equipment and readable storage medium
US9654480B2 (en) Systems and methods for profiling client devices
CN108183950B (en) Method and device for establishing connection of network equipment
CN107251528B (en) Method and apparatus for providing data originating within a service provider network
EP3656156A1 (en) Network slice selection in a mobile network based on device characteristic
CN109495467B (en) Method and device for updating interception rule and computer readable storage medium
US20130077534A1 (en) Method and apparatus for dynamic service provisioning for machine to machine (m2m) devices in a communications network
CN105553920A (en) Data interaction method, apparatus, and system
CN112231168A (en) Micro server control method, device, equipment and storage medium
CN111224831B (en) Method and system for generating call ticket
EP2625630A1 (en) Data model pattern updating in a data collecting system
CN111901317B (en) Access control policy processing method, system and equipment
CN114124490A (en) Method and device for releasing new media content, storage medium and electronic equipment
WO2020073538A1 (en) Message sending method, device and system
CN115001967A (en) Data acquisition method and device, electronic equipment and storage medium
CN107592299B (en) Proxy internet access identification method, computer device and computer readable storage medium
CN113259429A (en) Session keeping control method, device, computer equipment and medium
EP1687934B1 (en) Apparatus for mediating in management orders
CN116074202A (en) Slice information processing method, equipment and computer readable storage medium
WO2009153402A1 (en) Method, arrangement and computer program for authentication data management
CN107086978B (en) Method and device for identifying Trojan horse virus
CN108768987B (en) Data interaction method, device and system
CN105991465B (en) Method, device and system for processing application program service
CN112004228B (en) Real person authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination