CN116260770A - Policy determination method, policy determination device and storage medium - Google Patents

Policy determination method, policy determination device and storage medium Download PDF

Info

Publication number
CN116260770A
CN116260770A CN202310195497.6A CN202310195497A CN116260770A CN 116260770 A CN116260770 A CN 116260770A CN 202310195497 A CN202310195497 A CN 202310195497A CN 116260770 A CN116260770 A CN 116260770A
Authority
CN
China
Prior art keywords
target
user
type
service
bandwidth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310195497.6A
Other languages
Chinese (zh)
Inventor
于志光
郑明丽
崔萍
丁志永
刘瑞
周小艳
刘茂莲
张睿琦
卢福怀
单斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310195497.6A priority Critical patent/CN116260770A/en
Publication of CN116260770A publication Critical patent/CN116260770A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/29Flow control; Congestion control using a combination of thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/826Involving periods of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a method, a device and a storage medium for determining a policy, relates to the technical field of communication, and is used for solving the problem that resources cannot be allocated directionally. The method comprises the following steps: acquiring a service data packet and a user type of a target user, wherein the service data packet comprises: a target address, which is an address of a target application. And analyzing the service data packet to determine the target address. If the user type of the target user is the target type and the target address exists in the white list, determining first strategy information, wherein the first strategy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold. If the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold.

Description

Policy determination method, policy determination device and storage medium
Technical Field
The present invention relates to the field of communications, and in particular, to a method and apparatus for determining a policy, and a storage medium.
Background
With the development of the mobile internet, users are increasingly inclined to accomplish various things through electronic devices (such as mobile phones, computers, etc.). For example, various application programs (such as office application and game application) are installed in the mobile phone, and the user can complete work through the office application in the mobile phone, or the user can relax the mood through the game application.
Currently, more and more students need to use electronic devices in the learning process. When a user uses an application through the electronic device, the electronic device may send a service data packet to a user plane function (User Port Function, UPF) network element. The UPF network element may then allocate resources for the service. However, students may be entertained during learning with electronic devices due to their weaker homemade strength. Therefore, a strategy of how to allocate resources by the UPF network element is a technical problem to be solved.
Disclosure of Invention
The application provides a policy determination method, a policy determination device and a storage medium, which are used for solving the problem that resources cannot be allocated directionally.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, the present application provides a method for determining a policy. The method is applied to a user plane function UPF network element, the UPF network element stores a white list and a black list, the white list comprises addresses of learning applications, and the black list comprises addresses of entertainment applications. In the method, a service data packet and a user type of a target user are acquired, wherein the service data packet comprises: a target address, which is an address of a target application. And analyzing the service data packet to determine the target address. If the user type of the target user is the target type and the target address exists in the white list, determining first strategy information, wherein the first strategy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold. If the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold.
Based on the technical scheme, after the UPF network element obtains the service data packet, the service data packet can be analyzed to obtain the target address. And, the UPF network element may obtain the user type of the target user. And if the user type of the target user is the target type and the target address exists in the white list, determining first strategy information, wherein the first strategy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold. That is, the bandwidth of the target application can be adjusted to be greater than the bandwidth of the preset bandwidth threshold, so that the flow rate of the data flow used by the target application can be widened, the running speed of the target application is improved, and the use experience of a user is guaranteed. If the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold. That is, the bandwidth of the target application may be adjusted to a bandwidth smaller than the preset bandwidth threshold, and thus, the flow rate of the data traffic used by the target application may be limited, and the operation speed of the target application may be reduced to limit the operation of the target application.
In one possible design, the target application includes a plurality of first services. The method for determining the strategy can further comprise the following steps: if the user type of the target user is the target type and the target address exists in the white list, determining the service type of the second service based on the target address, wherein the second service is the service corresponding to the target address in the plurality of first services. And if the service type of the second service is the learning service, determining the first strategy information.
In one possible design, the method for determining a policy may further include: and when the user type of the target user is the target type and the target address exists in the white list, determining second strategy information if the service type of the second service is the entertainment service.
In one possible design, the service data packet further includes: target time and position information of a target user, wherein the target time is the time for the terminal to send the service data packet. The method for determining the strategy can further comprise the following steps: and if the position information of the target user is not in the target area and the target time is not in the preset time period, determining the first strategy information.
In one possible design, the method for determining a policy may further include: when the user type of the target user is the target type and the target address exists in the white list, if the position information of the target user is in the target area and/or the target time is in the preset time period, determining second strategy information. The target type is a student, and the target area is a school.
In a second aspect, the present application provides a policy determining device, where the policy determining device is applied to a user plane function UPF network element, where the UPF network element stores a white list and a black list, the white list includes addresses of learning applications, and the black list includes addresses of entertainment applications. The device comprises an acquisition unit and a processing unit.
The acquisition unit is used for acquiring a service data packet and a user type of a target user, wherein the service data packet comprises: a target address, which is an address of a target application. And the processing unit is used for analyzing the service data packet and determining the target address. The processing unit is further configured to determine first policy information if the user type of the target user is a target type and a target address exists in the white list, where the first policy information is used to indicate that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is greater than a preset bandwidth threshold. And the processing unit is further used for determining second strategy information if the user type of the target user is the target type and the target address exists in the blacklist, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold value.
In one possible design, the target application includes a plurality of first services. And the processing unit is further used for determining the service type of the second service based on the target address if the user type of the target user is the target type and the target address exists in the white list, wherein the second service is the service corresponding to the target address in the plurality of first services. And the processing unit is further used for determining the first strategy information if the service type of the second service is a learning service.
In one possible design, the processing unit is further configured to determine the second policy information if the service type of the second service is an entertainment service when the user type of the target user is a target type and the target address exists in the white list.
In one possible design, the service data packet further includes: target time and position information of a target user, wherein the target time is the time for the terminal to send the service data packet. The processing unit is further configured to determine the first policy information if the location information of the target user is not in the target area and the target time is not within a preset time period.
In one possible design, when the user type of the target user is the target type and the target address exists in the white list, if the location information of the target user is in the target area and/or the target time is within the preset time period, the second policy information is determined. The target type is a student, and the target area is a school.
In a third aspect, the present application provides a policy determining apparatus, including: a processor and a memory; the processor and the memory are coupled; the memory is configured to store one or more programs comprising computer-executable instructions that, when executed by the policy determination device, are executable by the processor to perform the policy determination method as described in the first aspect and any one of the possible implementations of the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the method of determining a policy described in any one of the possible implementations of the first aspect and the second aspect.
In a fifth aspect, the present application provides a chip comprising a processor and a communication interface, the communication interface and the processor being coupled, the processor being for running a computer program or instructions to implement a method of determining a policy as described in any one of the possible implementations of the first aspect and the first aspect.
In the above solution, the technical problems and the technical effects that can be solved by the policy determining device, the computer storage medium or the chip can be referred to the technical problems and the technical effects that can be solved by the first aspect, and are not described herein.
Drawings
Fig. 1 is a system architecture diagram of a communication system according to an embodiment of the present application;
fig. 2 is a flow chart of a method for determining a policy according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating another method for determining a policy according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating another method for determining a policy according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating another method for determining a policy according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a policy determining device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another policy determining device according to an embodiment of the present application;
fig. 8 is a conceptual partial view of a computer program product provided by embodiments of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The character "/" herein generally indicates that the associated object is an "or" relationship. For example, A/B may be understood as A or B.
The terms "first" and "second" in the description and in the claims of the present application are used for distinguishing between different objects and not for describing a particular sequential order of objects.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or modules is not limited to only those steps or modules but may include other steps or modules not listed or inherent to such process, method, article, or apparatus.
In addition, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as examples, illustrations, or descriptions. Any embodiment or design described herein as "exemplary" or "e.g." should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present concepts in a concrete fashion.
Before describing the policy determining method in detail, the implementation environment and application field Jing Jinhang of the embodiment of the present application will be described.
First, an application scenario of the embodiment of the present application will be described. With the development of the mobile internet, users are increasingly inclined to accomplish various things through electronic devices (such as mobile phones, computers, etc.). For example, various application programs (such as office application and game application) are installed in the mobile phone, and the user can complete work through the office application in the mobile phone, or the user can relax the mood through the game application.
Currently, more and more students need to use electronic devices in the learning process. When a user uses an application through the electronic device, the electronic device may send a service data packet to the UPF network element. The UPF network element may then allocate resources for the service. However, students may be entertained during learning with electronic devices due to their weaker homemade strength. Therefore, a strategy of how to allocate resources by the UPF network element is a technical problem to be solved.
At present, policy control and charging (Policy and Charging Control, PCC) is a framework scheme of dynamic policy and charging control defined by the third generation partnership project (3rd Generation Partnership Project,3GPP), which can monitor and reasonably allocate network resources, is convenient for a communication operator to provide differentiated services for users, and provides user service flow bearing resource guarantee and flow charging policy. However, PCC is not able to accurately formulate specific policies for different applications and services.
In order to solve the above-mentioned problems, an embodiment of the present application provides a method for determining a policy, where a UPF network element obtains a service data packet and a user type of a target user, where the service data packet includes: a target address, which is an address of a target application. And then, the UPF network element analyzes the service data packet to determine the target address. If the user type of the target user is the target type and the target address exists in the white list, determining first strategy information, wherein the first strategy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold. If the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold.
Based on the technical scheme, after the UPF network element obtains the service data packet, the service data packet can be analyzed to obtain the target address. And, the UPF network element may obtain the user type of the target user. And if the user type of the target user is the target type and the target address exists in the white list, determining first strategy information, wherein the first strategy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold. That is, the bandwidth of the target application can be adjusted to be greater than the bandwidth of the preset bandwidth threshold, so that the flow rate of the data flow used by the target application can be widened, the running speed of the target application is improved, and the use experience of a user is guaranteed. If the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold. That is, the bandwidth of the target application may be adjusted to a bandwidth smaller than the preset bandwidth threshold, and thus, the flow rate of the data traffic used by the target application may be limited, and the operation speed of the target application may be reduced to limit the operation of the target application.
The following describes an implementation environment of an embodiment of the present application.
As shown in fig. 1, a communication system according to an embodiment of the present application includes a network device 101 (e.g., a base station, a network element device (e.g., a UPF network element)), and a terminal 102.
The base station may include various forms of base stations, such as: macro base stations, micro base stations (also referred to as small stations), relay stations, access points, and the like. The method specifically comprises the following steps: an Access Point (AP) in a wireless local area network (Wireless Local Area Network, WLAN), a base station (Base Transceiver Station, BTS) in a global system for mobile communications (Global System for Mobile Communications, GSM) or code division multiple access (Code Division Multiple Access, CDMA), a base station (NodeB, NB) in wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), an Evolved base station (Evolved Node B, eNB or eNodeB) in LTE, a relay station or access point, or a vehicle device, a wearable device, and a next generation Node B (The Next Generation Node B, gNB) in a future 5G network or a base station in a future Evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
The terminal may be a device having a transceiving function. Terminals may be deployed on land, including indoors or outdoors, hand-held or vehicle-mounted; may also be deployed on the surface of water (e.g., a ship, etc.); but may also be deployed in the air (e.g., on aircraft, balloon, satellite, etc.). The terminal includes a handheld device, an in-vehicle device, a wearable device, or a computing device with wireless communication capabilities. The terminal may be a mobile phone, a tablet computer, or a computer with a wireless transceiving function, for example. The terminal device may also be a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control, a wireless terminal in unmanned, a wireless terminal in telemedicine, a wireless terminal in smart grid, a wireless terminal in smart city, a wireless terminal in smart home (smart home), etc.
Embodiments of the present application will be specifically described below with reference to the drawings attached to the specification.
As shown in fig. 2, a method for determining a policy according to an embodiment of the present application includes:
s201, the UPF network element acquires a service data packet.
Wherein, the service data packet includes: a target address, which is an address of a target application.
In one possible design, the target address may include: internet protocol (Internet Protocol, IP) addresses and/or uniform resource location system (uniform resource locator, URL) addresses.
For example, if the target application is a social application, the target address may be an IP address of a server of the social application. If the target application is a search engine (e.g., a browser), the target address may be the URL address of a web page accessed by the terminal.
In one possible design, the user information may include: and (5) identification of the terminal.
It should be noted that, in the embodiment of the present application, the identifier of the terminal is not limited. For example, the identity of the terminal may be an international mobile equipment identity (International Mobile Equipment Identity, IMEI). As another example, the identity of the terminal may be a media access control (english: media Access Control, MAC) address.
In one possible implementation, the terminal may receive an operation of a user and generate a service data packet. The terminal may then send the service data packet to the UPF network element. The UPF network element may receive service data packets from the terminal.
It should be noted that, specifically, for the process of sending the service data packet to the UPF network element by the terminal, reference may be made to a method of sending the service data packet to the UPF network element by the terminal through the network element device in the conventional technology, which is not described herein.
S202, the UPF network element analyzes the service data packet to determine a target address.
Illustratively, the UPF network element may parse the service data packet at the network layer to obtain an IP protocol. Alternatively, the UPF network element may parse the URL at the application layer of the service packet.
Optionally, the UPF network element parses the service data packet to obtain a transmission protocol.
Illustratively, the transmission protocol may include: file transfer protocol (File Transfer Protocol, FTP), simple file transfer protocol (Trivial File Transfer Protocol, TFTP), hypertext transfer protocol (Hyper Text Transfer Protocol, HTTP), and the like.
S203, the UPF network element acquires the user type of the target user.
In the embodiment of the application, the terminal can determine the target policy of the terminal through a foreground subscription mode. The terminal may send subscription information to a policy control function (Policy Control function, PCF) network element, which may include: target policy and user type of target user. The PCF network element may send the target policy and the user type of the target user to a session management function (Session Management function, SMF) network element. The SMF network element may then send the target policy and the user type of the target user to the UPF network element. The UPF network element may receive the target policy and the user type of the target user from the SMF network element.
In one possible design, the user type may be a student.
Alternatively, the user type may also be a corporate employee.
S204, the UPF network element determines whether the user type of the target user is the target type.
In some embodiments, if the user type of the target user is the target type, the UPF network element performs S205.
It should be noted that, if the user type of the target user is not the target type, the UPF network element may determine the bandwidth policy for the target user according to a conventional technology (e.g., determining the policy of the target user based on PCC).
S205, the UPF network element determines whether a target address exists in the white list.
In the embodiment of the application, the UPF network element stores a white list and a black list, the white list includes addresses of learning applications, and the black list includes addresses of entertainment applications.
Illustratively, the whitelist may include: the IP address of the conference application, the IP address of the reading application, the IP address of the science popularization application, etc. The blacklist may include: an IP address of a video application, an IP address of a game application, etc.
In some embodiments, if the target address is present in the whitelist, the UPF network element performs S206. If the target address exists in the blacklist, the UPF network element performs S207.
S206, the UPF network element determines first policy information.
The first policy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold.
It should be noted that, the preset bandwidth threshold is not limited in the embodiment of the present application. For example, the preset bandwidth threshold may be 0 megabits/second, 4 megabits/second, 10 megabits/second, etc.
In one possible implementation, if the user type of the target user is the target type and there is a target address in the white list, the UPF network element determines the first policy information.
It can be understood that the UPF network element adjusts the target application bandwidth to the first bandwidth, so that the transmission rate can be improved, further, the terminal can be ensured to smoothly use the target application, and the use experience of the user for using the learning application is improved.
S207, the UPF network element determines second strategy information.
The second policy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold.
In one possible implementation, if the user type of the target user is the target type and there is a target address in the blacklist, the UPF network element determines the second policy information.
It should be noted that, in the embodiment of the present application, the order of executing S204 and S205 by the UPF network element is not limited. For example, the UPF network element may perform S204 first and then S205. For another example, the UPF network element may perform S205 first and then S204. As another example, the UPF network element may perform S204 and S205 simultaneously.
In some embodiments, in the case where the UPF network element performs S205 first and then S204, in the case where the UPF network element determines whether the target address exists in the blacklist, the UPF network element determines whether the user type of the target user is the target type (i.e., S204). In case the UPF network element determines whether a target address is present in the whitelist, the UPF network element may determine the first policy information.
Based on the technical scheme, after the UPF network element obtains the service data packet, the service data packet can be analyzed to obtain the target address. And, the UPF network element may obtain the user type of the target user. And if the user type of the target user is the target type and the target address exists in the white list, determining first strategy information, wherein the first strategy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold. That is, the bandwidth of the target application can be adjusted to be greater than the bandwidth of the preset bandwidth threshold, so that the flow rate of the data flow used by the target application can be widened, the running speed of the target application is improved, and the use experience of a user is guaranteed. If the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold. That is, the bandwidth of the target application may be adjusted to a bandwidth smaller than the preset bandwidth threshold, and thus, the flow rate of the data traffic used by the target application may be limited, and the operation speed of the target application may be reduced to limit the operation of the target application.
As shown in fig. 3, in the method for determining a policy according to the embodiment of the present application, after S205, the method further includes:
s301, the UPF network element determines the service type of the second service based on the target address.
In an embodiment of the present application, the target application may include a plurality of first services.
It should be noted that the target application may have a plurality of services, such as a learning service (e.g., science popularization service, question and answer service, conference service, etc.), and an entertainment service (e.g., short video service, game service, etc.).
In one possible implementation, the UPF network element stores a correspondence between the destination address and the service type. If the user type of the target user is the target type and the target address exists in the white list, the UPF network element may determine the service type of the second service based on the target address. The second service is a service corresponding to the target address in the plurality of first services.
Illustratively, as shown in table 1, the correspondence between the target address and the traffic type is shown.
TABLE 1
Target address Service type
Address a Learning-class business
Address b Learning-class business
Address c Entertainment service
That is, when the address of the target application is address a, the service type of the service is a learning service. When the address of the target application is the address b, the service type of the service is learning service. When the address of the target application is the address c, the service type of the service is entertainment service.
In one possible design, the server of the target application may send content charging information of the target application to the UPF network element, where the content charging information includes: correspondence between target address and service type. The UPF network element stores the corresponding relation between the target address and the service type.
S302, the UPF network element determines whether the service type of the second service is a learning service.
In some embodiments, if the service type of the second service is a learning-class service, the UPF network element may perform S206.
That is, in the case that the user type of the target user is the target type and the target address exists in the white list, if the service type of the second service is the learning service, the UPF network element may determine the first policy information.
It will be appreciated that in case the address of the target application is on the white list, the service type of the second service may be determined. In case the service type of the second service is a learning-class service, the UPF network element may determine the first policy information. Therefore, the flow speed of the data flow used by the second service can be relaxed, the running speed of the second service is improved, and the use experience of a user is ensured.
In some embodiments, if the service type of the second service is an entertainment service, the UPF network element may perform S207.
That is, when the user type of the target user is the target type and the target address exists in the white list, if the service type of the second service is the entertainment service, the UPF network element may determine the second policy information.
It will be appreciated that in case the address of the target application is on the white list, the service type of the second service may be determined. In case the service type of the second service is an entertainment class service, the UPF network element may determine the second policy information. Thus, the flow rate of the data traffic used by the second service can be limited, and the operation speed of the second service can be reduced so as to limit the operation of the second service.
As shown in fig. 4, in the method for determining a policy according to the embodiment of the present application, after S205, the method further includes:
s401, the UPF network element determines whether the position information of the target user is in the target area.
In the embodiment of the present application, the service data packet further includes: target time and position information of a target user, wherein the target time is the time for the terminal to send the service data packet. The UPF network element can analyze the service data packet to determine the target time and the position information of the target user.
It should be noted that, the target area is not limited in the embodiment of the present application. For example, the target user is a student, and the target area may be a school. For another example, the target user may be a staff member and the target area may be a company.
In some embodiments, if the location information of the target user is not in the target area, the UPF network element may perform S206.
It will be appreciated that in situations where the location information of the target user is not in the target area (e.g., school), it is stated that the target user may not need to work or learn. The UPF network element can provide a first bandwidth for the target application and help the target application to normally operate.
In other embodiments, if the location information of the target user is not in the target area, the UPF network element may perform S402.
In other embodiments, if the location information of the target user is in the target area, the UPF network element may perform S207. Alternatively, if the location information of the target user is in the target area, the UPF network element may perform S402.
S402, the UPF network element determines whether the target time is within a preset time period.
It should be noted that, the embodiment of the present application does not limit the preset time period. For example, the preset time period may be an on-time (e.g., 08:00-18:00). For another example, the preset time period may include: 09:00-12:00, 14:00-18: 00. for another example, the preset time period may be: 00:00-08:00, 21:00-24:00.
In some embodiments, if the location information of the target user is not in the target area and the target time is not within the preset time period, the UPF performs S206.
It can be understood that if the location information of the target user is not in the target area and the target time is not within the preset time period, it is indicated that the target user is not in the working area and is not using the target application in the working time. Therefore, the UPF network element can provide a first bandwidth for the target application and ensure the operation of the target application.
In some embodiments, when the user type of the target user is the target type and the target address exists in the white list, if the location information of the target user is in the target area and/or the target time is within the preset period of time, the UPF network element executes S207.
That is, if the location information of the target user is in the target area, the UPF network element performs S207. Or if the target time is within the preset time period, the UPF network element executes S207. Or if the location information of the target user is in the target area and the target time is within the preset time period, the UPF network element executes S207.
In some embodiments, if the user type of the target user is a target type and the target address exists in the whitelist, if the location information of the target user is not in the target area, the target time is not in the preset time period, and the service type of the second service is a learning service, the UPF network element determines the first policy information.
Embodiments of the present application are described below in conjunction with specific examples. As shown in fig. 5, the UPF network element may perform three-layer parsing (or further perform four-layer parsing) on the service data packet to obtain an IP address, and perform seven-layer parsing on the service data packet to obtain a URL. Then, the UPF network element may determine the destination address based on the IP address or URL (i.e., destination address), the rule base (i.e., S204-S205), and execute a policy corresponding to the white list (i.e., first policy information) or a policy corresponding to the black list (i.e., second policy information).
The foregoing description of the solution provided by the embodiments of the present application has been presented mainly from the perspective of a computer device. It will be appreciated that the computer device, in order to carry out the functions described above, comprises corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the method steps of determining a policy for each of the examples described in connection with the embodiments disclosed herein may be implemented as hardware or a combination of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application also provides a strategy determining device. The policy determining device may be a computer device, a CPU in the computer device, a processing module in the computer device for determining a policy, or a client in the computer device for determining a policy.
The embodiment of the present application may perform division of functional modules or functional units according to the determination of the strategy in the above-described method example, for example, each functional module or functional unit may be divided corresponding to each function, or two or more functions may be integrated in one processing module. The integrated modules may be implemented in hardware, or in software functional modules or functional units. The division of the modules or units in the embodiments of the present application is merely a logic function division, and other division manners may be implemented in practice.
Fig. 6 is a schematic structural diagram of a policy determining device according to an embodiment of the present application. The policy determining device is configured to execute the policy determining method shown in fig. 2, 3 or 4. The determining means of the policy may comprise an obtaining unit 601 and a processing unit 602.
An obtaining unit 601, configured to obtain a service data packet and a user type of a target user, where the service data packet includes: a target address, which is an address of a target application. And the processing unit 602 is configured to parse the service data packet and determine a target address. The processing unit 602 is further configured to determine first policy information if the user type of the target user is a target type and the target address exists in the white list, where the first policy information is used to indicate that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is greater than a preset bandwidth threshold. The processing unit 602 is further configured to determine second policy information if the user type of the target user is the target type and the target address exists in the blacklist, where the second policy information is used to indicate that the bandwidth of the target application is adjusted to a second bandwidth, and the second bandwidth is smaller than a preset bandwidth threshold.
In one possible design, the target application includes a plurality of first services. The processing unit 602 is further configured to determine, based on the target address, a service type of a second service, where the second service is a service corresponding to the target address in the plurality of first services, if the user type of the target user is the target type and the target address exists in the white list. The processing unit 602 is further configured to determine the first policy information if the service type of the second service is a learning-class service.
In a possible design, the processing unit 602 is further configured to determine, when the user type of the target user is the target type and the target address exists in the white list, the second policy information if the service type of the second service is an entertainment service.
In one possible design, the service data packet further includes: target time and position information of a target user, wherein the target time is the time for the terminal to send the service data packet. The processing unit 602 is further configured to determine the first policy information if the location information of the target user is not in the target area and the target time is not within the preset time period.
In one possible design, when the user type of the target user is the target type and the target address exists in the white list, if the location information of the target user is in the target area and/or the target time is within the preset time period, the second policy information is determined. The target type is a student, and the target area is a school.
Fig. 7 is a schematic diagram showing a hardware configuration of a policy determination device according to an exemplary embodiment. The policy determining means may comprise a processor 702, the processor 702 being configured to execute application code, thereby implementing the policy determining method in the present application.
The processor 702 may be a central processing unit (central processing unit, CPU), microprocessor, application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs in accordance with aspects of the present application.
As shown in fig. 7, the policy determining device may further include a memory 703. The memory 703 is used for storing application program codes for executing the present application, and is controlled by the processor 702 for execution.
The memory 703 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc-only memory (compact disc read-only memory) or other optical disk storage, a compact disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 703 may be separate and coupled to the processor 702 via a bus 704. Memory 703 may also be integrated with processor 702.
As shown in fig. 7, the policy determining device may further comprise a communication interface 701, wherein the communication interface 701, the processor 702, and the memory 703 may be coupled to each other, for example, via a bus 704. The communication interface 701 is used for information interaction with other devices, for example, the information interaction of the determining device supporting the policy with other devices.
It should be noted that the apparatus structure shown in fig. 7 does not constitute a limitation of the determination means of the strategy, and the determination means of the strategy may include more or less components than those shown in fig. 7, or may combine some components, or may be arranged with different components.
In actual implementation, the functions implemented by the processing unit 602 may be implemented by the processor 702 illustrated in fig. 7 invoking program code in the memory 703.
The present application also provides a computer-readable storage medium having instructions stored thereon that, when executed by a processor of a computer device, enable the computer to perform the method of determining a policy provided by the above-described illustrated embodiments. For example, the computer readable storage medium may be a memory 703 comprising instructions executable by a processor 702 of a computer device to perform the methods described above. Alternatively, the computer readable storage medium may be a non-transitory computer readable storage medium, for example, a ROM, RAM, CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Fig. 8 schematically illustrates a conceptual partial view of a computer program product provided by an embodiment of the present application, the computer program product comprising a computer program for executing a computer process on a computing device.
In one embodiment, a computer program product is provided using signal bearing medium 800. Signal bearing medium 800 may include one or more program instructions that when executed by one or more processors may provide the functionality or portions of the functionality described above with respect to fig. 2, 3, 4, and 5. Thus, for example, referring to the embodiment shown in FIG. 2, one or more features of S201-S207 may be carried by one or more instructions associated with signal bearing medium 800. Further, the program instructions in fig. 8 also describe example instructions.
In some examples, signal bearing medium 800 may comprise a computer readable medium 801 such as, but not limited to, a hard disk drive, compact Disk (CD), digital Video Disk (DVD), digital tape, memory, read-only memory (ROM), or random access memory (random access memory, RAM), among others.
In some implementations, the signal bearing medium 800 may comprise a computer recordable medium 802 such as, but not limited to, memory, read/write (R/W) CD, R/W DVD, and the like.
In some implementations, the signal bearing medium 800 may include a communication medium 803 such as, but not limited to, a digital and/or analog communication medium (e.g., fiber optic cable, waveguide, wired communications link, wireless communications link, etc.).
The signal bearing medium 800 may be conveyed by a communication medium 803 in wireless form. The one or more program instructions may be, for example, computer-executable instructions or logic-implemented instructions.
In some examples, a determining device such as the policies described with respect to fig. 7 may be configured to provide various operations, functions, or actions in response to program instructions through one or more of computer readable medium 801, computer recordable medium 802, and/or communication medium 803.
It will be apparent to those skilled in the art from this description that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules, so as to perform all the above-described classification or part of the functions.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules or units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and the units shown as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. The purpose of the embodiment scheme can be achieved by selecting part or all of the classification part units according to actual needs.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or partly contributing to the prior art or the whole classification part or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform the whole classification part or part of the steps of the methods of the embodiments of the present application. The storage medium includes a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc. which can store the program codes.
The foregoing is merely a specific embodiment of the present application, but the protection scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered in the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. The method for determining the strategy is characterized by being applied to a user plane function UPF network element, wherein the UPF network element stores a white list and a black list, the white list comprises addresses of learning applications, and the black list comprises addresses of entertainment applications; the method comprises the following steps:
Acquiring a service data packet and a user type of a target user, wherein the service data packet comprises: a target address, the target address being an address of a target application;
analyzing the service data packet and determining the target address;
if the user type of the target user is a target type and the target address exists in the white list, determining first policy information, wherein the first policy information is used for indicating that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is larger than a preset bandwidth threshold;
and if the user type of the target user is the target type and the target address exists in the blacklist, determining second strategy information, wherein the second strategy information is used for indicating that the bandwidth of the target application is adjusted to be a second bandwidth, and the second bandwidth is smaller than the preset bandwidth threshold.
2. The method of claim 1, wherein the target application comprises a plurality of first services, and wherein determining the first policy information if the user type of the target user is a target type and the target address is present in the whitelist comprises
If the user type of the target user is a target type and the target address exists in the white list, determining the service type of a second service based on the target address, wherein the second service is a service corresponding to the target address in the plurality of first services;
And if the service type of the second service is a learning service, determining the first strategy information.
3. The method according to claim 2, wherein the method further comprises:
and when the user type of the target user is a target type and the target address exists in the white list, determining the second strategy information if the service type of the second service is an entertainment service.
4. The method according to claim 1 or 2, wherein the service data packet further comprises: the target time and the position information of the target user are obtained, wherein the target time is the time when the terminal transmits the service data packet;
and if the user type of the target user is a target type and the target address exists in the white list, determining first policy information includes:
and if the position information of the target user is not in the target area and the target time is not in the preset time period, determining the first strategy information.
5. The method according to claim 4, wherein the method further comprises:
when the user type of the target user is a target type and the target address exists in the white list, if the position information of the target user is in the target area and/or the target time is in a preset time period, determining the second strategy information;
The target type is a student, and the target area is a school.
6. The policy determining device is characterized by being applied to a user plane function UPF network element, wherein the UPF network element stores a white list and a black list, the white list comprises addresses of learning applications, and the black list comprises addresses of entertainment applications; the device comprises:
the acquiring unit is configured to acquire a service data packet and a user type of a target user, where the service data packet includes: a target address, the target address being an address of a target application;
the processing unit is used for analyzing the service data packet and determining the target address;
the processing unit is further configured to determine first policy information if the user type of the target user is a target type and the target address exists in the whitelist, where the first policy information is used to indicate that the target application bandwidth is adjusted to be a first bandwidth, and the first bandwidth is greater than a preset bandwidth threshold;
the processing unit is further configured to determine second policy information if the user type of the target user is the target type and the target address exists in the blacklist, where the second policy information is used to indicate that the bandwidth of the target application is adjusted to a second bandwidth, and the second bandwidth is smaller than the preset bandwidth threshold.
7. The apparatus of claim 6, wherein the target application comprises a plurality of first services;
the processing unit is further configured to determine, based on the target address, a service type of a second service, where the second service is a service corresponding to the target address in the plurality of first services, if the user type of the target user is a target type and the target address exists in the whitelist;
the processing unit is further configured to determine the first policy information if the service type of the second service is a learning service.
8. The apparatus of claim 7, wherein the device comprises a plurality of sensors,
and the processing unit is further configured to determine the second policy information if the service type of the second service is an entertainment service when the user type of the target user is a target type and the target address exists in the whitelist.
9. The apparatus according to claim 6 or 7, wherein the service data packet further comprises: the target time and the position information of the target user are obtained, wherein the target time is the time when the terminal transmits the service data packet;
the processing unit is further configured to determine the first policy information if the location information of the target user is not in the target area and the target time is not in a preset time period.
10. The apparatus of claim 9, wherein the device comprises a plurality of sensors,
when the user type of the target user is a target type and the target address exists in the white list, if the position information of the target user is in the target area and/or the target time is in a preset time period, determining the second strategy information;
the target type is a student, and the target area is a school.
11. A policy determination device, comprising: a processor and a memory; the processor and the memory are coupled; the memory is configured to store one or more programs, the one or more programs comprising computer-executable instructions that, when executed by the policy determination device, cause the policy determination device to perform the method of any of claims 1-5.
12. A computer readable storage medium having instructions stored therein, which when executed by a computer, performs the method of any of claims 1-5.
CN202310195497.6A 2023-02-24 2023-02-24 Policy determination method, policy determination device and storage medium Pending CN116260770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310195497.6A CN116260770A (en) 2023-02-24 2023-02-24 Policy determination method, policy determination device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310195497.6A CN116260770A (en) 2023-02-24 2023-02-24 Policy determination method, policy determination device and storage medium

Publications (1)

Publication Number Publication Date
CN116260770A true CN116260770A (en) 2023-06-13

Family

ID=86687737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310195497.6A Pending CN116260770A (en) 2023-02-24 2023-02-24 Policy determination method, policy determination device and storage medium

Country Status (1)

Country Link
CN (1) CN116260770A (en)

Similar Documents

Publication Publication Date Title
US11019512B2 (en) Providing easy access to radio networks
US10511669B2 (en) Programmable user plane function
US11297525B2 (en) Allocation of data radio bearers for quality of service flows
CN108353067B (en) Method, system and related equipment for realizing capability openness
EP3314845B1 (en) Learned roving authentication profiles
WO2017125025A1 (en) Call method, device, system, and storage medium
EP3621360A1 (en) System information transmission method and related device
EP3101966B1 (en) A network, a cloud-based server, and a method of registering for a service
CN114342332B (en) Communication method, device and system
EP4273698A1 (en) Information processing method and apparatus, device, and storage medium
US11265254B1 (en) Systems and methods for determining a policy that allocates traffic associated with a network protocol type to a network slice
US10972534B2 (en) Efficient un-allocation of cloud resources
CN113727331B (en) 5G base station deployment method and device
CN109417768A (en) Update method, terminal device and the network side equipment of system information
CN112383936A (en) Method and device for evaluating number of accessible users
US20230122913A1 (en) Systems and methods for network based dynamic network slice selection control and federation
CN116260770A (en) Policy determination method, policy determination device and storage medium
EP4258700A1 (en) Method and device for positioning on sidelink (sl), and terminal
CN108990039B (en) Data transmission method and related device
CN112449377A (en) Network data reporting method and device
US20230319678A1 (en) User equipment routing selection policy traffic categories
Yamanaka et al. Design and implementation of an edge computing testbed to simplify experimental environment setup
CN117222020A (en) Method, device and storage medium for determining resource information
CN115550372A (en) Method, device, equipment and storage medium for determining service transmission strategy
CN116419365A (en) Data transmission method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination