CN116848870A - Information processing method and device, communication equipment and storage medium - Google Patents

Information processing method and device, communication equipment and storage medium Download PDF

Info

Publication number
CN116848870A
CN116848870A CN202380009045.2A CN202380009045A CN116848870A CN 116848870 A CN116848870 A CN 116848870A CN 202380009045 A CN202380009045 A CN 202380009045A CN 116848870 A CN116848870 A CN 116848870A
Authority
CN
China
Prior art keywords
pin
network element
identifier
information
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202380009045.2A
Other languages
Chinese (zh)
Inventor
梁浩然
陆伟
刘建宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN116848870A publication Critical patent/CN116848870A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides an information processing method and device, a communication device and a storage medium, wherein the information processing method is executed by a first network element and comprises the following steps: transmitting a first request to a second network element, the first request comprising a first identification of a PIN and a second identification of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.

Description

Information processing method and device, communication equipment and storage medium
Technical Field
The present disclosure relates to, but not limited to, the field of wireless communications technologies, and in particular, to a measurement method and apparatus, a communication device, and a storage medium.
Background
In the technical field of wireless communication, a personal internet of things network (Personal Internet of Things Network, PIN) supported by a 5G core network (5G Core Network,5GCN) may provide information through a third party, for example, may provide information through an entity such as an application function (Application Function, AF). However, from a security perspective, the third party may be a malicious third party, and the information provided may make the user experience in the PIN poor.
Disclosure of Invention
The embodiment of the disclosure provides an information processing method and device, a communication device and a storage medium.
According to a first aspect of embodiments of the present disclosure, there is provided an information processing method, performed by a first network element, including:
transmitting a first request to a second network element, the first request comprising a first identification of a PIN and a second identification of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
In some embodiments, before sending the first request to the second network element, further comprising:
and receiving first information sent by the first entity, wherein the first information at least comprises a first identifier and a second identifier.
In some embodiments, the first information further comprises at least one of:
the PIN is provided with a third identifier of the gateway function member (PIN Element with Gateway Capability, PEGC);
PIN related information.
In some embodiments, the authorization result indicates that the first entity has the right to provide the PIN related information for the PIN, which is used for the third network element service PEGC.
In some embodiments, the third identifier comprises one of:
a general public user identity (Generic Public Subscription Identifier, GPSI);
Subscriber permanent identity (Subscriber Permanent Identifier, SUPI).
In some embodiments, the method further comprises: and receiving a first response sent by the second network element, wherein the first response comprises an authorization result.
In some embodiments, the method further comprises: and based on the authorization result, indicating that the first entity has the right to provide PIN related information for the PIN, and sending second information to the third network element, wherein the second information comprises the PIN related information.
In some embodiments, the method further comprises: and receiving a second response sent by the third network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the first network element is a network open function (network exposure function, NEF); and/or the second network element is unified data management (Unified Data Management, UDM); and/or the first entity is AF; and/or the third network element is a unified data store (Unified Data Repository, UDR).
According to a second aspect of the embodiments of the present disclosure, there is provided an information processing method, performed by a second network element, including:
receiving a first request sent by a first network element, wherein the first request comprises a first identifier of a PIN and a second identifier of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
In some embodiments, the first request further comprises: and a third identification of PEGC in PIN.
In some embodiments, the method further comprises one of:
determining an authorization result based on subscription information corresponding to the first request and the third identifier; the subscription information includes at least: a second identifier and a first identifier corresponding to the second identifier;
determining an authorization result based on the first request and configuration information corresponding to the first identifier; the configuration information at least comprises: and a second identification.
In some embodiments, a method comprises: and determining that the PIN related information is used for the third network element service PEGC based on the determination that the first entity is authorized to provide the PIN related information for the PIN.
In some embodiments, a method comprises: and sending a first response to the first network element, wherein the first response comprises an authorization result.
In some embodiments, the first network element is a NEF; and/or the second network element is a UDM; and/or the first entity is an AF.
According to a third aspect of the embodiments of the present disclosure, there is provided an information processing method, performed by a first entity, including:
and sending the first information to the first network element, and the first identifier of the first information PIN and the second identifier of the first entity.
In some embodiments, the first information further comprises at least one of: a third identification of PEGC in PIN; PIN related information.
In some embodiments, the method further comprises: receiving a first response sent by a first network element, wherein the first response comprises an authorization result; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
In some embodiments, the method further comprises: and receiving a second response sent by the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the first network element is a NEF; and/or the first entity is AF; and/or, UDR.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an information processing method, performed by a third network element, including:
receiving second information sent by the first network element, wherein the second information comprises PIN related information, and the second information is sent after the first network element determines that the first entity is authorized to provide the PIN related information for the PIN;
and sending a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the method comprises one of:
determining a second response indicating successful configuration of the PIN related information based on the stored PIN related information;
based on the non-stored PIN related information, a second response is determined indicating that the PIN related information was not successfully configured.
In some embodiments, the first network element is a NEF; and/or the first entity is AF; and/or the third network element is a UDR.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an information processing method, which is executed by a network side device, including:
receiving first information sent by a first entity, wherein the first information comprises: a first identification of the PIN, a second identification of the first entity, and PIN related information;
transmitting a first response to the first entity, wherein the first response comprises an authorization result of the first entity; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
In some embodiments, a method comprises: and sending a second response to the first entity, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the network side device includes a first network element and a second network element; the method comprises the following steps:
the first network element sends a first request to the second network element, wherein the first request comprises a second identifier with a good first identifier; the first request is used for acquiring an authorization result;
the second network element determines an authorization result based on subscription information corresponding to the first request and the third identifier, or determines the authorization result based on configuration information corresponding to the first request and the first identifier; the subscription information at least comprises a second identifier and a first identifier corresponding to the second identifier; the configuration information at least comprises: a second identifier and a third identifier corresponding to the second identifier;
The second network element sends a first response to the first network element.
According to a sixth aspect of the embodiments of the present disclosure, there is provided an information processing apparatus configured at a first network element, including:
a first sending module configured to send a first request to a second network element, the first request comprising a first identification of a PIN and a second identification of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
In some embodiments, comprising: the first receiving module is configured to receive first information sent by a first entity, wherein the first information at least comprises a first identifier and a second identifier.
In some embodiments, the first information further comprises at least one of: and a third identification of the PEGC in the PIN and PIN related information.
In some embodiments, the first request further comprises: a third identifier; the authorization result is generated by the second network element based on subscription information corresponding to the third identifier; the subscription information includes at least: a second identifier and a first identifier corresponding to the second identifier;
or, determining the authorization result based on the configuration information corresponding to the first identifier; the configuration information at least comprises: the second mark and a third mark corresponding to the second mark.
In some embodiments, the authorization result indicates that the first entity has the right to provide the PIN related information for the PIN, which is used for the third network element service PEGC.
In some embodiments, the third identifier comprises one of: GPSI and SUPI.
In some embodiments, the first receiving module is configured to receive a first response sent by the second network element, where the first response includes an authorization result.
In some embodiments, the first sending module is configured to send, based on the authorization result, second information to the third network element, the second information including PIN related information, the second information indicating that the first entity has the right to provide PIN related information for the PIN.
In some embodiments, the first receiving module is configured to receive a second response sent by the third network element, where the second response is used to indicate whether the PIN related information is successfully configured.
In some embodiments, the first network element is a NEF; and/or the second network element is a UDM; and/or the first entity is AF; and/or, UDR.
According to a seventh aspect of the embodiments of the present disclosure, there is provided an information processing apparatus configured at a second network element, including:
a second receiving module configured to receive a first request sent by a first network element, where the first request includes a first identifier of a PIN and a second identifier of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
In some embodiments, the first request further comprises: and a third identification of PEGC in PIN.
In some embodiments, the second processing module is configured to determine an authorization result based on subscription information corresponding to the first request and the third identifier; the subscription information includes at least: the second mark and the first mark corresponding to the second mark.
In some embodiments, the second processing module is configured to determine an authorization result based on the first request and configuration information corresponding to the first identifier; the configuration information at least comprises: and a second identification.
In some embodiments, the second processing module is configured to determine that the PIN related information is for the third network element service PEGC based on determining that the first entity is entitled to provide the PIN related information for the PIN.
In some embodiments, an apparatus comprises: the second sending module is configured to send a first response to the first network element, wherein the first response comprises an authorization result.
In some embodiments, the first network element is a NEF; and/or the second network element is a UDM; and/or the first entity is an AF.
According to an eighth aspect of the embodiments of the present disclosure, there is provided an information processing apparatus configured to be disposed at a first entity, including:
and the third sending module is configured to send the first information, the first identifier of the first information PIN and the second identifier of the first entity to the first network element.
In some embodiments, the first information further comprises at least one of: a third identification of PEGC in PIN; PIN related information.
In some embodiments, the apparatus further comprises: the third receiving module is configured to receive a first response sent by the first network element, wherein the first response comprises an authorization result; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
In some embodiments, the third receiving module is configured to receive a second response sent by the first network element, where the second response is used to indicate whether the PIN related information is successfully configured.
In some embodiments, the first network element is a NEF; and/or the first entity is AF; and/or the third network element is a UDR.
According to a ninth aspect of the embodiments of the present disclosure, there is provided an information processing apparatus configured at a third network element, including:
the fourth receiving module is configured to receive second information sent by the first network element, wherein the second information comprises PIN related information, and the second information is sent after the first network element determines that the first entity is authorized to provide the PIN related information for the PIN;
and the fourth sending module is configured to send a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the apparatus further comprises: a third processing module configured to perform one of:
determining a second response indicating successful configuration of the PIN related information based on the stored PIN related information;
based on the non-stored PIN related information, a second response is determined indicating that the PIN related information was not successfully configured.
In some embodiments, the first network element is a NEF; and/or the first entity is AF; and/or the third network element is a UDR.
According to a tenth aspect of the embodiments of the present disclosure, there is provided an information processing apparatus configured to be configured by a network-side device, the network-side device including:
the first network element receives first information sent by a first entity and sends a first request to the second network element, wherein the first information comprises: a first identification of a personal networking network PIN, a second identification of a first entity; the first request comprises a first identifier and a second identifier, the first request is used for acquiring an authorization result related to the first entity, and the authorization result is used for indicating whether the first entity has the right to provide PIN related information for the PIN;
the second network element is configured to determine an authorization result based on subscription information corresponding to the first request and the third identifier, or determine the authorization result based on configuration information corresponding to the first request and the first identifier; the subscription information at least comprises a second identifier and a first identifier corresponding to the second identifier; the configuration information at least comprises: a second identifier and a third identifier corresponding to the second identifier;
The second network element is configured to send a first response to the first network element, wherein the first response comprises an authorization result of the first entity; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
An embodiment of the present disclosure provides an information processing apparatus configured at a network side device, the network side device including:
a first network element configured to indicate, based on the authorization result, that the first entity has the right to provide the PIN with PIN related information, send second information to a third network element, the second information including the PIN related information;
and the third network element is configured to send a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
An embodiment of the present disclosure provides an information processing apparatus configured at a network side device, the network side device including: the first network element is configured to send a second response to the first entity, wherein the second response is used for indicating whether the PIN related information is successfully configured.
According to an eleventh aspect of the disclosed embodiments there is provided a communication device comprising: a processor, a transceiver, a memory and an executable program stored on the memory and capable of being run by the processor, wherein the processor, when running the executable program, performs the measurement method as provided in the first or second or third or fourth aspect.
According to a twelfth aspect of the embodiments of the present disclosure, there is provided a computer storage medium storing an executable program; the executable program, when executed by the processor, enables the measurement method provided in the foregoing first aspect or second aspect or third aspect or fourth aspect to be implemented.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
in an embodiment of the present disclosure, a first network element sends a first request to a second network element, the first request including a first identification of a PIN and a second identification of a first entity; the first request is used for acquiring an authorization result about the first entity, and the authorization result is used for indicating whether the first entity has the right to provide PIN related information for the PIN; therefore, the first network element can be favorable for determining whether the first entity has the right to provide the PIN related information for the PIN through the second network element, and accordingly whether the first entity is a malicious third party can be determined, the security of providing the PIN related information for the PIN can be improved, and user experience can be improved when the PIN uses the PIN related information.
The technical solutions provided by the embodiments of the present disclosure, it should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the embodiments of the present disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the embodiments of the invention.
Fig. 1 is a schematic diagram illustrating a structure of a wireless communication system according to an exemplary embodiment.
Fig. 2 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 4 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 5 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 6 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 7 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 8 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 9 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 10 is a flow chart illustrating a method of information processing according to an exemplary embodiment.
Fig. 11 is a schematic structural view of an information processing apparatus according to an exemplary embodiment.
Fig. 12 is a schematic structural view of an information processing apparatus according to an exemplary embodiment.
Fig. 13 is a schematic structural view of an information processing apparatus according to an exemplary embodiment.
Fig. 14 is a schematic structural view of an information processing apparatus according to an exemplary embodiment.
Fig. 15 is a schematic structural view of an information processing apparatus according to an exemplary embodiment.
Fig. 16 is a schematic diagram illustrating a structure of a UE according to an exemplary embodiment.
Fig. 17 is a schematic diagram showing a configuration of a communication apparatus according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with embodiments of the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of embodiments of the invention.
The terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the embodiments of the disclosure. The singular expressions "a", "an", "the" and "the" of embodiments of the present disclosure also include plural expressions unless the context clearly indicates to the contrary. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items. In the presently disclosed embodiments, "plurality" refers to two or more. The prefix words "first", "second", etc. in the embodiments of the present disclosure are merely for distinguishing different description objects, and do not limit the location, order, priority, number, content, etc. of the description objects, and the statement of the description object refers to the claims or the description of the embodiment context, and should not constitute unnecessary limitations due to the use of the prefix words. For example, various information is described with "first", "second", "third", etc., but the information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of embodiments of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. In some embodiments, names of information and the like are not limited to the names described in the embodiments, and terms such as "information", "message", "signaling", "report", "indication", "configuration", "data", and the like may be replaced with each other.
In some embodiments of the present disclosure, "acquire," "obtain," "receive," "transmit (send and/or receive)" are interchangeable, which can be construed as receiving from other subjects, acquiring from a protocol, processing itself, etc. in various meanings.
In some embodiments of the present disclosure, "send," "report," "send," "transmit (send and/or receive)" may be interchangeable.
Referring to fig. 1, a schematic structural diagram of a wireless communication system according to an embodiment of the disclosure is shown. As shown in fig. 1, the wireless communication system is a communication system based on a cellular mobile communication technology, and may include: a number of UEs 11 and a number of access devices 12.
Wherein UE 11 may be a device that provides voice and/or data connectivity to a user. The UE 11 may communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and the UE 11 may be an internet of things UE such as a sensor device, a mobile phone (or "cellular" phone) and a computer with an internet of things UE, for example, a fixed, portable, pocket, hand-held, computer-built-in or vehicle-mounted device. Such as a Station (STA), subscriber unit (subscriber unit), subscriber Station (subscriber Station), mobile Station (mobile Station), mobile Station (mobile), remote Station (remote Station), access point, remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user agent (user agent), or User Equipment (UE). Alternatively, the UE 11 may be an unmanned aerial vehicle device. Alternatively, the UE 11 may be a vehicle-mounted device, for example, a laptop with a wireless communication function, or a wireless communication device externally connected to the laptop. Alternatively, the UE 11 may be a roadside device, for example, a street lamp, a signal lamp, or other roadside devices having a wireless communication function.
Access device 12 may be a network-side device in a wireless communication system. Wherein the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication,4G) system, also known as a long term evolution (Long Term Evolution, LTE) system; alternatively, the wireless communication system may be a 5G system, also known as a New Radio (NR) system or a 5G NR system. Alternatively, the wireless communication system may be a next generation system of the 5G system. Among them, the access network in the 5G system may be called a New Generation radio access network (NG-RAN). Or, an MTC system.
Wherein the access device 12 may be an evolved access device (eNB) employed in a 4G system. Alternatively, access device 12 may be an access device (gNB) in a 5G system that employs a centralized and distributed architecture. When the access device 12 employs a centralized and distributed architecture, it typically includes a Centralized Unit (CU) and at least two Distributed Units (DUs). A protocol stack of a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a medium access control (Media Access Control, MAC) layer is provided in the centralized unit; a Physical (PHY) layer protocol stack is provided in the distribution unit, and the specific implementation of the access device 12 is not limited by the embodiments of the present disclosure.
A wireless connection may be established between access device 12 and UE 11 over a wireless air interface. In various embodiments, the wireless air interface is a fourth generation mobile communication network technology (4G) standard-based wireless air interface; or, the wireless air interface is a wireless air interface based on a fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; alternatively, the wireless air interface may be a wireless air interface based on a 5G-based technology standard of a next generation mobile communication network.
In some embodiments, the above wireless communication system may further comprise a core network element 13.
Several access network elements 12 are connected to the core network element 13, respectively. The core network element 13 may be a core network device in a wireless communication system, for example, the core network element 13 may be a mobility management entity (Mobility Management Entity, MME) in an evolved packet core network (Evolved Packet Core, EPC). Alternatively, the core network device may be other core network devices, such as a Serving GateWay (SGW), a public data network GateWay (Public Data Network GateWay, PGW), a policy and charging rules function (Policy and Charging Rules Function, PCRF) or a home subscriber server (Home Subscriber Server, HSS), etc.; or the core network element 13 may be a core network device in 5G; such as a policy control function (Policy Control Function, PCF), or session management function (Session Management Function, SMF), access and mobility management function (Access and Mobility Management Function, AMF), unified data management (Unified Data Management, UDM), or user plane function (User Plane Function, UPF), etc. The embodiment of the present disclosure is not limited to the implementation form of the core network element 13.
In some embodiments, certain aspects of the 5GS supported PIN network may be configured by the AF through the 5G NEF. For example, to enable the 5GS to generate UE routing policy (UE Route Selection Policy, urs) rules related to a particular PEGC in a particular PIN, the AF may provide the 5GS with urs related information of the PEGC.
In some embodiments, the access or operating range granted to the AF needs to be limited to the PIN level from a security point of view and needs to be licensed and granted by the PEGC. Otherwise, a malicious AF may configure a PIN-related policy to a PIN that is not controlled by the AF. And the victim PIN may have a poor user experience due to the policies provided by the malicious AF.
A first aspect of an embodiment of the present disclosure provides an information processing method, performed by a first network element, including: a first request is sent to the second network element, the first request comprising a second identification of the first entity as well as the first identification of the PIN. Optionally, the first request is for requesting whether the first entity has the right to provide the authorization result of the PIN related information for the PIN.
As shown in fig. 2, a first aspect of an embodiment of the present disclosure provides an information processing method, which is executed by a first network element, including:
step S21: transmitting a first request to a second network element, the first request comprising a first identification of a PIN and a second identification of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
The first network element, the second network element and the third network element related in the embodiments of the present disclosure may be flexibly deployed logic nodes or functions in the core network. Optionally, the first network element is a NEF; and/or the second network element is a UDM; and/or the third network element is a UDR.
The first entity related to the embodiment of the disclosure may be a third party or a logical node or a function flexibly deployed outside the core network, etc. Optionally, the first entity is AF.
The PIN in the embodiments of the present disclosure includes at least one PIN network member (PIN), at least one PEGC, and at least one member with management functions (PIN Element with Management Capability, PEMC). The PINE, PEGC and PEMC may all be UEs. Alternatively, the UE may be any mobile terminal or fixed terminal; for example, the UE may be at least one of: the system comprises a mobile phone, a computer, a server, wearable equipment, a game control platform, road side equipment, vehicle-mounted equipment, multimedia equipment and industrial equipment; as another example, the UE may be at least one of: an eMBB terminal, a reduced capability UE (Reduced capability UE), a Redcap terminal, and an extended Redcap (eRedcap) terminal.
Optionally, whether the PIN is authorized to provide PIN related information may be: whether the PIN related information is authorized to be configured for the PIN.
Optionally, whether the PIN is authorized to provide PIN related information may be: whether it is authorized to provide the PEGC with PIN related information in the PIN.
In some embodiments, the first identifier may be any number or index, as long as the first identifier is available to identify the PIN. Alternatively, the first identification may be an identification configured by AF or UDM for PIN.
In some embodiments, the second identifier may be any number or index, as long as the second identifier is available to identify the first entity. Optionally, the second identifier is a string of at least one bit for identifying AF, etc.
In some embodiments, the authorization result includes: a first authorization result and a second authorization result; the first authorization result is used for indicating that the first entity has the right to provide PIN related information for the PIN; the second authorization result is used to indicate that the first entity does not have the right to provide the PIN with PIN related information. Optionally, the first authorization result is a first value, or the second authorization result is a second value.
In some embodiments, the PIN related information includes at least one of: a routing rule, a first identification of a PIN, a fourth identification of a PEMC, a fourth identification of at least one PIN, a third identification of at least one PEGC, and a quality of service QoS parameter.
Alternatively, the routing rule may be the aforementioned urs rule, or related information for determining urs rules. Illustratively, the routing rules may be used to indicate rules for selection of the PIN member at the core network path.
Alternatively, the third identifier and the fourth identifier may each be any number or index. The third identifier of the PEGC is illustratively GPSI or SUPI of the PEGC. Illustratively, the fourth identification of PINE is GPSI or SUPI of PINE. Illustratively, the fourth identification of the PEMC is GPSI or SUPI of the PEMC.
Optionally, the QoS parameters include at least one of: maximum throughput, delay, packet loss rate. Optionally, the QoS parameters may include at least one of: PDU set error rate (PDU Set Error Rate, PSER), PDU set delay budget (PDU Set Delay Budget, PSDB), and/or PDU set composite indication (PDU Set Integrated Indication, PSII).
In some embodiments, the first request is for requesting authorization results of the first entity from the second network element.
In an embodiment of the present disclosure, a first network element sends a first request to a second network element, the first request including a first identification of a PIN and a second identification of a first entity; the first request is used for acquiring an authorization result about the first entity, and the authorization result is used for indicating whether the first entity has the right to provide PIN related information for the PIN; therefore, the first network element can be favorable for determining whether the first entity has the right to provide the PIN related information for the PIN through the second network element, and accordingly whether the first entity is a malicious third party can be determined, the security of providing the PIN related information for the PIN can be improved, and user experience can be improved when the PIN uses the PIN related information.
A first aspect of an embodiment of the present disclosure provides an information processing method, performed by a first network element, including: and receiving a first response sent by the second network element, wherein the first response comprises an authorization result. Therefore, the first network element can accurately know whether the first entity is authorized to provide the PIN related information for the PIN, and is beneficial to providing the PIN related information provided by the first entity for the PIN.
A first aspect of an embodiment of the present disclosure provides an information processing method, performed by a first network element, including: a first response is sent to the first entity. In this way, the first network element may send the authorization result to the first entity so that the first entity knows whether it is authorized to provide the PIN with PIN related information.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
In some embodiments, before sending the first request to the second network element, further comprising: and receiving first information sent by the first entity, wherein the first information at least comprises a first identifier and a second identifier.
As shown in fig. 3, an embodiment of the present disclosure provides an information processing method, which is executed by a first network element, including:
Step S31: and receiving first information sent by the first entity, wherein the first information at least comprises a first identifier and a second identifier.
In some embodiments of the present disclosure, the first network element, the second network element, the first entity, and the third network element may be the first network element, the second network element, the first entity, and the third network element in the foregoing embodiments, respectively; the first information and the first request may be the first information and the first request in the above embodiments, respectively; the first identifier, the second identifier, and the third identifier may be the first identifier, the second identifier, and the third identifier in the above embodiments, respectively; the PIN related information may be PIN related information in the above embodiment; the authorization result may be the authorization result in the above embodiment.
In some embodiments, the first information further comprises at least one of: and a third identification of the PEGC in the PIN and PIN related information.
Optionally, the first request includes at least part of the first information.
Optionally, the first information is used to determine the first request. Illustratively, if the first information includes: the first identifier and the second identifier, the first request includes the first identifier and the second identifier. Illustratively, if the first information includes: the first identifier, the second identifier, and the third identifier, the first request includes the first identifier and the second identifier, or the first request includes the first identifier, the second identifier, and the third identifier. Illustratively, the first information includes a first identifier, a second identifier, a third identifier, and PIN related information, and the first request includes the first identifier and the second identifier, or the first request includes the first identifier, the second identifier, and the third identifier.
Optionally, the first information is used for triggering the first network element to send a first request to the second network element, and the first request is used for requesting the authorization result.
In this way, in the embodiment of the present disclosure, when the first network element obtains the first information sent by the first entity, the first request is sent to the second network element, so that the first network element can know whether the first entity has the right to provide the PIN related information for the PIN, thereby being beneficial for the first network element to decide whether to provide the PIN related information provided by the first entity for the PIN.
In some embodiments, the first request further comprises: a third identifier; the authorization result is determined by the second network element based on subscription information corresponding to the third identifier; the subscription information (subscription information) includes at least: the second mark and the first mark corresponding to the second mark. Optionally, the first identifier corresponding to the second identifier may be: the first entity to which the second identity corresponds allows the first identity of the PIN providing the PIN related information.
Optionally, the subscription information corresponding to the third identifier may be: the third identity indicates subscription information.
Optionally, the subscription information is pre-stored in the second network element, or the subscription information is configured by the network device to the second network element, or the subscription information is obtained from the third network element. Optionally, the network device is a core network device or an access network device, etc.
In this way, in the embodiment of the present disclosure, if the first request includes the third identifier, the second network element may accurately determine, according to subscription information corresponding to the third identifier, whether the first entity has the right to provide PIN related information for the PIN, or accurately determine whether the first entity has the right to provide PIN related information for PEGC corresponding to the third identifier in the PIN.
In some embodiments, the authorization result indicates that the first entity has the right to provide the PIN related information for the PIN, which is used for the third network element service PEGC.
Illustratively, the PIN-related information may be stored in the third network element when the authorization result indicates that the first entity has the right to provide the PIN-related information for the PIN; after the third network element stores the PIN related information, the PCF can acquire the PIN related information from the third network element for generating a strategy; the policy may be served in PIN related PDU sessions established by PEGC. In this way, PIN related information can be implemented to service PEGC. Of course, this example is merely an example, and the specific implementation of the PIN related information for the third network element service PEGC is not limited to this example.
In some embodiments, the authorization result is determined by the second network element based on the configuration information corresponding to the first identifier; the configuration information at least comprises: the second mark and a third mark corresponding to the second mark. Optionally, the third identifier corresponding to the second identifier may be: the first entity corresponding to the second identifier allows the third identifier corresponding to the PEGC providing the PIN related information.
Alternatively, the configuration information may be pre-stored in the second network element, or the configuration information is configured by the network device to the second network element, or the configuration information is obtained from the third network element.
Optionally, the configuration information is subscription information related to the first identity. Alternatively, the configuration information may be at least partially the same as subscription information corresponding to the third identity.
In this way, in the embodiment of the present disclosure, the second network element may accurately determine, according to the configuration information of the first identifier, whether the first entity has authority to provide PIN related information for the PIN, or whether the first entity has authority to provide PIN related information for PEGC in the PIN.
Of course, in other embodiments, if the first request includes the third identifier, the second network element may also be enabled to determine the authorization result based on the configuration information corresponding to the first identifier.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The embodiment of the disclosure provides an information processing method, which is executed by a first network element and comprises the following steps: and sending second information to the third network element, wherein the second information comprises PIN related information. Optionally, the first network element sends the second information to the third network element, after the first network element receives the first response sent by the second network element.
As shown in fig. 4, an embodiment of the present disclosure provides an information processing method, which is executed by a first network element, including:
step S41: and based on the authorization result, indicating that the first entity has the right to provide PIN related information for the PIN, and sending second information to the third network element, wherein the second information comprises the PIN related information.
In some embodiments of the present disclosure, the first network element, the second network element, the first entity, and the third network element may be the first network element, the second network element, the first entity, and the third network element in the foregoing embodiments, respectively; the PIN related information may be PIN related information in the above-described embodiment.
Thus, in the embodiment of the present disclosure, the first network element sends the PIN related information to the third network element only when it is determined that the first entity is authorized to provide the PIN related information for the PIN; therefore, the security of network communication can be improved, and the experience satisfaction of the user corresponding to the UE in the PIN can be improved.
The embodiment of the disclosure provides an information processing method, which is executed by a first network element and comprises the following steps: and receiving a second response sent by the third network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
Optionally, the second response includes: a first configuration result and a second configuration result; the first configuration result is used for indicating successful configuration of PIN related information; and a second configuration result, which is used for indicating that the PIN related information is not successfully configured. Optionally, the first configuration result is a third value, or the second configuration result is a fourth value.
In this way, in the embodiment of the present disclosure, the first network element may be enabled to accurately know whether to successfully provide or configure PIN related information for the PIN.
The embodiment of the disclosure provides an information processing method, which is executed by a first network element and comprises the following steps: the second response is sent to the first entity.
As such, in the embodiments of the present disclosure, the first entity may be made to know accurately whether to provide or configure PIN related information for the PIN successfully.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following information processing method is performed by the second network element, similar to the description of the information processing method performed by the first network element described above; for technical details not disclosed in the embodiment of the information processing method performed by the second network element, please refer to the description of the example of the information processing method performed by the first network element, and detailed description thereof will not be provided herein.
As shown in fig. 5, an embodiment of the present disclosure provides an information processing method, which is performed by a second network element, including:
step S51: receiving a first request sent by a first network element, wherein the first request comprises a first identifier of a PIN and a second identifier of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
In some embodiments of the present disclosure, the first network element, the second network element, the first entity, and the third network element may be the first network element, the second network element, the first entity, and the third network element in the foregoing embodiments, respectively; the first information and the first request may be the first information and the first request in the above embodiments, respectively; the first identifier, the second identifier, and the third identifier may be the first identifier, the second identifier, and the third identifier in the above embodiments, respectively; the PIN related information may be PIN related information in the above embodiment; the authorization result may be the authorization result in the above embodiment; the subscription information and the configuration information may be subscription information and configuration information in the above embodiments, respectively.
Optionally, the first network element is a NEF; and/or the second network element is a UDM; and/or the first entity is AF; and/or the third network element is a UDR.
Optionally, the first request further includes: and a third identification of PEGC in PIN. Optionally, the third identifier is SUPI or GPSI.
Optionally, whether the PIN is authorized to provide PIN related information may be: whether the PIN related information is authorized to be configured for the PIN.
Optionally, whether the PIN is authorized to provide PIN related information may be: whether it is authorized to provide the PEGC with PIN related information in the PIN.
Optionally, the first request includes a third identification.
The embodiment of the disclosure provides an information processing method, which is executed by a second network element and comprises the following steps: determining an authorization result based on subscription information corresponding to the first request and the third identifier; the subscription information includes at least: the second mark and the first mark corresponding to the second mark.
Exemplary 1, the first request comprises: and the third identifier, and the second network element determines an authorization result according to the first request and subscription information corresponding to the third identifier. The subscription information corresponding to the third identifier includes: a second identification (e.g., an AF ID), and a first identification (e.g., a PIN ID) corresponding to the second identification; the subscription information may be used to indicate that the PEGC allows the first entity to provide PIN related information for the PIN, i.e. the subscription information may indicate that the third identity (e.g. GPSI), the first identity (e.g. PIN ID) and the second identity (e.g. AF ID) have a correspondence. If the second network element determines that the first identifier and the second identifier included in the first request have a corresponding relation with the first identifier and the second identifier in the subscription information, determining that the first entity is authorized to provide PIN related information for PIN or PEGC; or if the first identifier and the second identifier included in the first request are determined to have no corresponding relation with the first identifier and the second identifier in the subscription information, determining that the first entity does not have the right to provide the related information for the PIN or the PEGC.
Alternatively, the correspondence relationship referred to in the embodiments of the present disclosure may be a binding relationship or a mapping relationship.
Thus, when the first request includes the third identifier, the second network element can accurately determine whether the first entity has the right to provide the PIN or PEGC with PIN related information based on subscription information corresponding to the third identifier.
The embodiment of the disclosure provides an information processing method, which is executed by a second network element and comprises the following steps: determining an authorization result based on the first request and configuration information corresponding to the first identifier; the configuration information at least comprises: and a second identification.
Optionally, the configuration information includes a third identifier corresponding to the second identifier.
Alternatively, the first identifier may include an internal identifier and an external identifier; the internal identity is PIN-configured for the second network element and/or the external identity is PIN-configured for the first entity. When the second network element obtains the external identifier of the PIN, the external identifier can be determined to be the corresponding internal identifier; and determining configuration information based on the internal identification. The configuration information determined by the internal identifier is the configuration information corresponding to the first identifier.
In some embodiments, determining the authorization result based on the first request and the configuration information corresponding to the first identifier includes: if the first request comprises the third identifier, determining an authorization result based on the first request and configuration information corresponding to the first identifier.
In example 2, the first request includes a third identifier, and the second network element determines the authorization result according to the first request and configuration information corresponding to the first identifier. The configuration information corresponding to the first identifier includes: a second identity (e.g., an AF ID), and a third identity (e.g., a GPSI) corresponding to the second identity; the configuration information may be used to indicate that the PIN allows the first entity to provide PIN related information for the PEGC, i.e. the configuration information may indicate that the third identity (e.g. GPSI), the first identity (e.g. PIN ID) and the second identity (e.g. AF ID) have a correspondence. If the second network element determines that the second identifier and the third identifier in the first request have corresponding relations with the second identifier and the third identifier in the configuration information, the first entity is determined to be authorized to provide PIN related information for the PEGC; or if the first request comprises the second identifier and the third identifier, and the corresponding relation with the second identifier and the third identifier in the configuration information is not included, the first entity is determined to be unauthorized to provide PIN related information for the PEGC.
In example 3, the first request includes a third identifier, and the second network element determines the authorization result according to the first request and configuration information corresponding to the first identifier. The configuration information corresponding to the first identifier includes: a second identification (e.g., AF ID); the configuration information may be used to indicate that the first identification (e.g., PIN ID) has a correspondence with the second identification (e.g., AF ID). If the second network element determines that the first identifier and the second identifier included in the first request have corresponding relations with the first identifier and the second identifier in the configuration information, determining that the first entity is authorized to provide PIN related information for the PIN or any PEGC in the PIN; or if the second network element determines that the first request comprises the first identifier and the second identifier, and does not have a corresponding relation with the first identifier and the second identifier in the configuration information, determining that the first entity does not have the right to provide PIN related information for the PIN or any PEGC in the PIN.
Thus, when the first request includes the third identifier, the second network element can accurately determine whether the first entity has the right to provide the PIN or PEGC with PIN related information based on the first request and configuration information corresponding to the first identifier.
In some embodiments, the determining the authorization result based on the first request and the configuration information corresponding to the first identifier includes: if the first request does not include the third identifier, determining an authorization result based on the first request and configuration information corresponding to the first identifier.
In example 4, the third identifier is not included in the first request, and the second network element determines the authorization result according to the first request and the configuration information corresponding to the first identifier. The first request does not include the third identifier (for example, GPSI), and the second network element cannot determine subscription information corresponding to the third identifier. The configuration information corresponding to the first identifier includes: a second identity (e.g., an AF ID), and a third identity (e.g., a GPSI) corresponding to the second identity; the configuration information may be used for the PIN to allow the first entity to provide PIN related information for the PIN, i.e. the configuration information may indicate that the first identification (e.g. PIN ID) and the second identification (e.g. AF ID) have a correspondence. If the second network element determines that the first identifier and the second identifier included in the first request have corresponding relations with the first identifier and the second identifier in the configuration information, determining that the first entity is authorized to provide PIN related information for the PIN or any PEGC in the PIN; or if the second network element determines that the first request comprises the first identifier and the second identifier, and does not have a corresponding relation with the first identifier and the second identifier in the configuration information, determining that the first entity does not have the right to provide PIN related information for the PIN or any PEGC in the PIN.
The third identifier corresponding to the third identifier corresponds to the third identifier, and when the first request does not include the third identifier, the second network element can accurately determine whether the first entity has the right to provide the PIN or any PEGC in the PIN with PIN related information based on the configuration information corresponding to the first identifier.
The embodiment of the disclosure provides an information processing method, which is executed by a second network element and comprises the following steps: and determining that the PIN related information is used for the third network element service PEGC based on the determination that the first entity is authorized to provide the PIN related information for the PIN. The second network element determines that the first entity is authorized to provide the PIN related information for the PIN, and may obtain the PIN related information from the third network element and provide the PIN related information for the PEGC, or trigger the third network element to provide the PIN related information for the PEGC in the PIN or a policy determined by the PIN related information, or the like.
The embodiment of the disclosure provides an information processing method, which is executed by a second network element and comprises the following steps: and sending a first response to the first network element, wherein the first response comprises an authorization result. Alternatively, the first response may be the first response in the above-described embodiment.
The above embodiments may be specifically referred to the first network element side, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following information processing method is performed by the first entity, similar to the description of the information processing method performed by the first network element and/or the second network element described above; for technical details not disclosed in the embodiment of the information processing method performed by the first entity, please refer to a description of an example of the information processing method performed by the first network element and/or the second network element, which is not described in detail herein.
As shown in fig. 6, an embodiment of the present disclosure provides an information processing method, which is performed by a first entity, including:
step S61: and sending the first information to the first network element, and the first identifier of the first information PIN and the second identifier of the first entity.
In some embodiments of the present disclosure, the first network element, the second network element, and the first entity may be the first network element, the second network element, and the first entity in the foregoing embodiments, respectively; the first information and the first request may be the first information and the first request in the above embodiments, respectively; the first identifier, the second identifier, and the third identifier may be the first identifier, the second identifier, and the third identifier in the above embodiments, respectively; the PIN related information may be PIN related information in the above embodiment.
Optionally, the first network element is a NEF; and/or the second network element is a UDM; and/or the first entity is AF; and/or the third network element is a UDR.
Optionally, the first information further comprises at least one of: a third identification of PEGC in PIN; PIN related information.
An embodiment of the present disclosure provides an information processing method, which is executed by a first entity, including: receiving a first response sent by a first network element, wherein the first response comprises an authorization result; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information. Alternatively, the first response may be the first response in the above-described embodiment.
An embodiment of the present disclosure provides an information processing method, which is executed by a first entity, including: and receiving a second response sent by the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured. Alternatively, the second response may be the second response in the above embodiment.
In the above embodiments, the description of the first network element side and/or the second network element side may be referred to specifically, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following information processing method is performed by the third network element, similar to the description of the information processing method performed by the first network element and/or the second network element and/or the first entity; for technical details not disclosed in the information processing method embodiment executed by the third network element, please refer to the description of the information processing method example executed by the first network element and/or the second network element and/or the first entity, and detailed description thereof will not be provided herein.
As shown in fig. 7, an embodiment of the present disclosure provides an information processing method, which is executed by a third network element, including:
step S71: receiving second information sent by the first network element, wherein the second information comprises PIN related information, and the second information is sent after the first network element determines that the first entity is authorized to provide the PIN related information for the PIN;
step S72: and sending a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments of the present disclosure, the first network element, the first entity, and the third network element may be the first network element, the first entity, and the third network element in the foregoing embodiments, respectively; the PIN related information may be PIN related information in the above-described embodiment.
Optionally, the first network element is a NEF; and/or the first entity is AF; and/or the third network element is a UDR.
The embodiment of the disclosure provides an information processing method, which is executed by a third network element and includes:
determining a second response indicating successful configuration of the PIN related information based on the stored PIN related information;
based on the non-stored PIN related information, a second response is determined indicating that the PIN related information was not successfully configured.
In the above embodiments, the description of the first network element side and/or the second network element side and/or the first entity side may be referred to specifically, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following information processing method is performed by the network side device, and is similar to the description of the information processing method performed by the first network element and/or the second network element and/or the first entity and/or the third network element; for technical details not disclosed in the embodiment of the information processing method performed by the network side device, please refer to the description of the information processing method performed by the first network element and/or the second network element and/or the first entity and/or the third network element, which are not described in detail herein.
As shown in fig. 8, an embodiment of the present disclosure provides an information processing method, which is executed by a network side device, and includes:
step S81: receiving first information sent by a first entity, wherein the first information comprises: a first identification of the PIN, a second identification of the first entity, and PIN related information;
step S82: transmitting a first response to the first entity, wherein the first response comprises an authorization result of the first entity; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
The first entity of the embodiment of the present disclosure may be the first entity in the foregoing embodiment; the first information and the second information may be the first information and the second information in the above embodiments, respectively; the PIN related information may be PIN related information in the above embodiment; the first response and the second response may be the first response and the second response in the above embodiment, respectively; the authorization result may be the authorization result in the above embodiment.
Optionally, the network side device is a core network device. Optionally, the core network device may comprise at least one of the following in the above embodiments: the first network element, the second network element and the third network element.
The embodiment of the disclosure provides an information processing method, which is executed by network side equipment and comprises the following steps: and sending a second response to the first entity, wherein the second response is used for indicating whether the PIN related information is successfully configured.
The embodiment of the disclosure provides an information processing method, which is executed by network side equipment, wherein the network side equipment comprises a first network element and a second network element; the method comprises the following steps:
the first network element sends a first request to the second network element, wherein the first request comprises a first identifier and a second identifier; the first request is used for acquiring an authorization result;
the second network element determines an authorization result based on subscription information corresponding to the first request and the third identifier, or determines the authorization result based on configuration information corresponding to the first request and the first identifier; the subscription information at least comprises a second identifier and a first identifier corresponding to the second identifier; the configuration information at least comprises: a second identifier and a third identifier corresponding to the second identifier;
The second network element sends a first response to the first network element.
The embodiment of the disclosure provides an information processing method, which is executed by network side equipment, wherein the network side equipment comprises a first network element and a second network element; the method comprises the following steps: the first network element indicates that the first entity has the right to provide PIN related information for the PIN based on the authorization result, and sends second information to the third network element, wherein the second information comprises the PIN related information; the third network element sends a second response to the first network element, the second response being used to indicate whether the PIN related information is successfully configured.
In the above embodiments, the description of the first network element side and/or the second network element side and/or the first entity side may be referred to specifically, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
To further explain any embodiments of the present disclosure, a specific embodiment is provided below.
Example one
As shown in fig. 9, the present disclosure implementation provides an information processing method performed by a communication device including AF, NEF, UDM and UDR; the information processing method includes one of the following:
Step S91: the AF sends first information to the NEF, the first information including GPSI and PIN ID of the PEGC. The first information also includes information that the AF needs to provide to the PIN. Optionally, the AF is PIN AF; in order to provide the PEGC with specific PIN related information, the PIN AF sends the first information to the NEF.
Optionally, the specific PIN related information is PIN related information in the above embodiment; the PIN ID may be the first identification of the PIN in the above embodiments.
Optionally, the AF is PIN AF.
Step S92: the NEF sends a first request to the UDM requesting authorization to provide specific PIN related information. Optionally, in order to authorize specific PIN related information with the PIN ID, the NEF sends a first request to the UDM, the first request comprising a third identification of the AF, the GPSI of the PEGC and the PIN ID.
Step S93: the UDM sends the authorization result to the NEF. Optionally, the UDM retrieves subscription information for the PEGC based on the GPSI of the PEGC; subscription information of the PEGC includes at least a mapping table between allowed AF identification and identification of PINs (e.g., PIN ID, PIN identifier, etc.) for which AF corresponding to this AF identification can provide information; the UDM checks, based on the mapping table, whether the AF can provide specific PIN related information with PIN ID; the UDM sends the authorization result to the NEF.
Step S94: the NEF sends specific PIN related information to the UDR. Optionally, if the AF is authorized to provide specific PIN related information, the NEF provides the specific PIN related information to the UDR; alternatively, if the AF is not authorized to provide the specific PIN related information, step S84 is skipped.
Step S95: the UDR sends a configuration result to the NEF indicating whether the specific PIN related information was successfully provided.
Step S96: the NEF sends a configuration result to the AF indicating whether the specific PIN related information was successfully provided.
In the above embodiments, the description of the first network element side and/or the second network element side and/or the first entity side and/or the third network element side may be referred to specifically, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
Example two
As shown in fig. 10, the implementation of the present disclosure provides an information processing method, which is performed by a communication device, where the communication device includes a first entity, a first network element, a first entity, and a third network element; the information processing method includes one of the following:
step S101: the first entity sends first information to a first network element, the first information comprising: the first identification of the PIN, the second identification of the first entity, and PIN related information. Optionally, the first information further includes: a third identity of the PEGC;
Step S102: the first network element sends a first request to the second network element, wherein the first request comprises a first identifier and a second identifier; the first request is for requesting whether the first entity has the right to provide the authorization result of the PIN related information for the PIN. Optionally, the first request further comprises a third identification.
Step S103: the second network element sends a first response to the first network element, the first response including the authorization result.
Step S104: the first network element sends a first response to the first entity, the first response comprising the authorization result.
Step S105: the first network element indicates that the first entity has the right to provide PIN related information for the PIN based on the authorization result, and the PIN related information is sent to the third network element.
Step S106: the third network element sends a second response to the first network element, the second response being used to indicate whether the PIN related information is successfully configured.
Step S107: the first network element sends a second response to the first entity, the second response being used to indicate whether the PIN related information is successfully configured.
In the above embodiments, the description of the first network element side and/or the second network element side and/or the first entity side and/or the third network element side may be referred to specifically, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
As shown in fig. 11, an embodiment of the present disclosure provides an information processing apparatus including:
a first sending module 31 configured to send a first request to the second network element, the first request comprising a first identity of the PIN and a second identity of the first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
The information processing apparatus provided by the embodiment of the present disclosure may be a first network element. Optionally, the first network element is a NEF.
An embodiment of the present disclosure provides an information processing apparatus including: the first receiving module is configured to receive first information sent by a first entity, wherein the first information at least comprises a first identifier and a second identifier.
In some embodiments, the first information further comprises at least one of: and a third identification of the PEGC in the PIN and PIN related information.
In some embodiments, the first request further comprises: a third identifier; the authorization result is generated by the second network element based on subscription information corresponding to the third identifier; the subscription information includes at least: a second identifier and a first identifier corresponding to the second identifier;
or, determining the authorization result based on the configuration information corresponding to the first identifier; the configuration information at least comprises: the second mark and a third mark corresponding to the second mark.
In some embodiments, the authorization result indicates that the first entity has the right to provide the PIN related information for the PIN, which is used for the third network element service PEGC.
In some embodiments, the third identifier comprises one of: GPSI and SUPI.
An embodiment of the present disclosure provides an information processing apparatus including: the first receiving module is configured to receive a first response sent by the second network element, wherein the first response comprises an authorization result.
An embodiment of the present disclosure provides an information processing apparatus including: the first sending module 31 is configured to send second information to the third network element, the second information comprising PIN related information, based on the authorization result indicating that the first entity has the right to provide the PIN with PIN related information.
An embodiment of the present disclosure provides an information processing apparatus including: the first receiving module is configured to receive a second response sent by the third network element, wherein the second response is used for indicating whether PIN related information is successfully configured.
An embodiment of the present disclosure provides an information processing apparatus including: the first sending module 31 is configured to send the second response to the first entity.
An embodiment of the present disclosure provides an information processing apparatus including: the first sending module 31 is configured to send a first response to the first entity.
In some embodiments, the second network element is a UDM; and/or the first entity is AF; and/or the third network element is a UDR.
As shown in fig. 12, an embodiment of the present disclosure provides an information processing apparatus including:
a second receiving module 41 configured to receive a first request sent by a first network element, the first request comprising a first identity of a PIN and a second identity of a first entity; the first request is for obtaining an authorization result for the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN related information for the PIN.
The information processing device provided by the embodiment of the disclosure is a second network element. Optionally, the second network element is a UDM.
In some embodiments, the first request further comprises: and a third identification of PEGC in PIN.
An embodiment of the present disclosure provides an information processing apparatus including: the second processing module is configured to determine an authorization result based on subscription information corresponding to the first request and the third identifier; the subscription information includes at least: the second mark and the first mark corresponding to the second mark.
An embodiment of the present disclosure provides an information processing apparatus including: the second processing module is configured to determine an authorization result based on the configuration information corresponding to the first identifier if the third identifier does not indicate subscription information; the configuration information at least comprises: and a second identification.
An embodiment of the present disclosure provides an information processing apparatus including: and a second processing module configured to determine that the PIN related information is for the third network element service PEGC based on determining that the first entity is entitled to provide the PIN related information for the PIN.
An embodiment of the present disclosure provides an information processing apparatus including: the second sending module is configured to send a first response to the first network element, wherein the first response comprises an authorization result.
In some embodiments, the first network element is a NEF; and/or the first entity is an AF.
As shown in fig. 13, an embodiment of the present disclosure provides an information processing apparatus including:
the third sending module 51 is configured to send the first information, the first identification of the first information PIN and the second identification of the first entity to the first network element.
The information processing apparatus provided by the embodiment of the present disclosure is a first entity. Optionally, the first entity is AF.
In some embodiments, the first information further comprises at least one of: a third identification of PEGC in PIN; PIN related information.
An embodiment of the present disclosure provides an information processing apparatus including: the third receiving module is configured to receive a first response sent by the first network element, wherein the first response comprises an authorization result; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
An embodiment of the present disclosure provides an information processing apparatus including: and the third receiving module is configured to receive a second response sent by the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the first entity is AF; and/or the third network element is a UDR.
As shown in fig. 14, an embodiment of the present disclosure provides an information processing apparatus including:
the fourth receiving module 61 is configured to receive second information sent by the first network element, where the second information includes PIN related information, and the second information is sent after the first network element determines that the first entity has authority to provide PIN related information for the PIN.
The information processing apparatus provided by the embodiment of the present disclosure may be a third network element. Optionally, the third network element is a UDR.
An embodiment of the present disclosure provides an information processing apparatus including: and the fourth sending module is configured to send a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
In some embodiments, the first network element is a NEF; and/or the first entity is an AF.
As shown in fig. 15, an embodiment of the present disclosure provides an information processing apparatus configured at a network-side device, the network-side device including:
The first network element 71 receives first information sent by the first entity, and sends a first request to the second network element, where the first information includes: a first identification of a personal networking network PIN, a second identification of a first entity; the first request comprises a first identifier and a second identifier, the first request is used for acquiring an authorization result related to the first entity, and the authorization result is used for indicating whether the first entity has the right to provide PIN related information for the PIN;
a second network element 72 configured to determine an authorization result based on the subscription information corresponding to the first request and the third identifier, or determine an authorization result based on the configuration information corresponding to the first request and the first identifier; the subscription information at least comprises a second identifier and a first identifier corresponding to the second identifier; the configuration information at least comprises: a second identifier and a third identifier corresponding to the second identifier;
a second network element 72 configured to send a first response to the first network element 71, the first response comprising an authorization result of the first entity; the authorization result is used to indicate whether the first entity has the right to provide the PIN with PIN related information.
The embodiment of the present disclosure provides an information processing apparatus configured at a network side device 71, the network side device including:
A first network element 71 configured to indicate, based on the authorization result, that the first entity has the right to provide the PIN with PIN related information, send second information to the third network element, the second information comprising PIN related information;
and the third network element is configured to send a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
The embodiment of the present disclosure provides an information processing apparatus configured at a network side device 71, the network side device including: the first network element 71 is configured to send a second response to the first entity, the second response being indicative of whether the PIN related information was successfully configured.
It should be noted that, as will be understood by those skilled in the art, the apparatus provided in the embodiments of the present disclosure may be implemented separately or together with some apparatuses in the embodiments of the present disclosure or some apparatuses in the related art.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The embodiment of the disclosure provides a communication device, which comprises a processor, a transceiver, a memory and an executable program stored on the memory and capable of being operated by the processor, wherein the processor executes the information processing method provided by the previous description when the executable program is operated by the processor.
In some embodiments, the processor may include various types of storage media, which are non-transitory computer storage media capable of continuing to memorize information stored thereon after a power down of the communication device.
In some embodiments, a communication device includes: the first network element, the second network element, the third network element and/or the first entity. Optionally, the first network element is a NEF. Optionally, the second network element is a UDM. Optionally, the third network element is a UDR. Optionally, the first entity is AF.
The processor may be coupled to the memory via a bus or the like for reading an executable program stored on the memory, for example, at least one of the methods shown in fig. 2-10.
The embodiment of the disclosure provides a computer storage medium, which stores an executable program; the executable program, when executed by the processor, can implement the information processing method provided above. For example, at least one of the methods shown in fig. 2 to 10.
Fig. 16 is a block diagram of a UE 800, according to an example embodiment. For example, the UE 800 may be a mobile phone, a computer, a digital broadcast user equipment, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 16, ue 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the UE 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to generate all or part of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interactions between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the UE 800. Examples of such data include instructions for any application or method operating on the UE 800, contact data, phonebook data, messages, pictures, videos, and the like. The memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 806 provides power to the various components of the UE 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the UE 800.
The multimedia component 808 includes a screen between the UE 800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data when the UE 800 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the UE 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 further includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor component 814 includes one or more sensors that provide status assessment of various aspects for the UE 800. For example, the sensor component 814 may detect an on/off state of the UE 800, a relative positioning of components such as a display and keypad of the UE 800, the sensor component 814 may also detect a change in position of the UE 800 or a component of the UE 800, the presence or absence of user contact with the UE 800, an orientation or acceleration/deceleration of the UE 800, and a change in temperature of the UE 800. The sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communication between the UE 800 and other devices, either wired or wireless. The UE 800 may access a wireless network based on a communication standard, such as WiFi,2G, or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the UE 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium is also provided, such as memory 804 including instructions executable by processor 820 of UE 800 to generate the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
As shown in fig. 17, an embodiment of the present disclosure shows a structure of a communication device. For example, the communication device 900 may be provided as a network-side device. The communication device may be the aforementioned first network element, second network element, third network element and/or first entity. Optionally, the first network element is a NEF. Optionally, the second network element is a UDM. Optionally, the third network element is a UDR. Optionally, the first entity is AF.
Referring to fig. 17, communication device 900 includes a processing component 922 that further includes one or more processors and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922. The application programs stored in memory 932 may include one or more modules that each correspond to a set of instructions. Further, processing component 922 is configured to execute instructions to perform any of the methods described above as applied to the access device.
The communication device 900 may also include a power supply component 926 configured to perform power management of the communication device 900, a wired or wireless network interface 950 configured to connect the communication device 900 to a network, and an input output (I/O) interface 958. The communication device 900 may operate based on an operating system stored in memory 932, such as Windows Server TM, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
Each step in a certain implementation manner or embodiment may be implemented as an independent embodiment, and the steps may be arbitrarily combined, for example, a scheme after removing part of the steps in a certain implementation manner or embodiment may be implemented as an independent embodiment, and the order of the steps in a certain implementation manner or embodiment may be arbitrarily exchanged, and further, an optional manner or optional embodiment in a certain implementation manner or embodiment may be arbitrarily combined; furthermore, various embodiments or examples may be arbitrarily combined, for example, some or all steps of different embodiments or examples may be arbitrarily combined, and a certain embodiment or example may be arbitrarily combined with alternative modes or alternative examples of other embodiments or examples.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (30)

1. An information processing method, wherein the method is performed by a first network element, comprising:
sending a first request to a second network element, wherein the first request comprises a first identifier of a personal internet of things (PIN) and a second identifier of a first entity; the first request is for obtaining an authorization result regarding the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN with PIN related information.
2. The method of claim 1, wherein prior to sending the first request to the second network element, further comprising:
and receiving first information sent by the first entity, wherein the first information at least comprises the first identifier and the second identifier.
3. The method of claim 2, wherein the first information further comprises at least one of:
the PIN is provided with a third identifier of the gateway function member PEGC;
the PIN related information.
4. A method according to any one of claims 1 to 3, wherein the authorization result indicates that the first entity has the right to provide the PIN with the PIN related information for a third network element service PEGC.
5. A method according to claim 3, wherein the third identity comprises one of:
a general public user identity GPSI;
the subscriber permanently identifies the SUPI.
6. The method of any one of claims 1 to 5, wherein the method further comprises:
and receiving a first response sent by the second network element, wherein the first response comprises the authorization result.
7. The method of claim 6, wherein the method further comprises:
and based on the authorization result, indicating that the first entity is authorized to provide the PIN related information for the PIN, sending second information to a third network element, wherein the second information comprises the PIN related information.
8. The method of claim 7, wherein the method further comprises:
and receiving a second response sent by the third network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
9. The method according to any of claims 1 to 8, wherein the first network element is a network open function, NEF; and/or the second network element is a unified data management function (UDM); and/or, the first entity is an application function AF; and/or the third network element is a unified data repository UDR.
10. An information processing method, wherein the method is performed by a second network element, comprising:
receiving a first request sent by a first network element, wherein the first request comprises a first identifier of a personal internet of things (PIN) and a second identifier of a first entity; the first request is for obtaining an authorization result regarding the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN with PIN related information.
11. The method of claim 10, the first request further comprising a third identification.
12. The method of claim 10, wherein the method further comprises:
determining the authorization result based on subscription information corresponding to the first request and the third identifier; the subscription information includes at least: the second identifier and the first identifier corresponding to the second identifier;
or alternatively, the process may be performed,
determining the authorization result based on the first request and configuration information corresponding to the first identifier; the configuration information at least comprises: the second identifier.
13. The method according to any one of claims 10 to 12, wherein the method comprises:
and determining that the PIN related information is used for a third network element service (PEGC) based on determining that the first entity is authorized to provide the PIN related information for the PIN.
14. The method according to any one of claims 10 to 13, wherein the method comprises:
and sending a first response to the first network element, wherein the first response comprises the authorization result.
15. An information processing method, wherein the method is performed by a first entity, comprising:
and sending first information to a first network element, wherein the first information is a first identifier of a personal internet of things (PIN) and a second identifier of a first entity.
16. The method of claim 15, wherein the first information further comprises at least one of:
the PIN is provided with a third identifier of the gateway function member PEGC;
the PIN related information.
17. The method according to claim 15 or 16, wherein the method further comprises:
receiving a first response sent by the first network element, wherein the first response comprises an authorization result; the authorization result is used to indicate whether the first entity has the right to provide the PIN with the PIN related information.
18. The method of claim 17, wherein the method further comprises:
and receiving a second response sent by the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
19. An information processing method, wherein the method is performed by a third network element, comprising:
Receiving second information sent by a first network element, wherein the second information comprises personal networking network PIN related information, and the second information is sent after the first network element determines that a first entity is authorized to provide PIN related information for the PIN;
and sending a second response to the first network element, wherein the second response is used for indicating whether the PIN related information is successfully configured.
20. The method of claim 19, wherein the method comprises one of:
determining, based on storing the PIN related information, the second response indicating successful configuration of the PIN related information;
based on not storing the PIN related information, the second response is determined indicating that the PIN related information was not successfully configured.
21. An information processing method, wherein the method is executed by a network side device and comprises the following steps:
receiving first information sent by a first entity, wherein the first information comprises: a first identification of personal networking network PIN, a second identification of the first entity, and PIN related information;
transmitting a first response to the first entity, wherein the first response comprises an authorization result of the first entity; the authorization result is used to indicate whether the first entity has the right to provide the PIN with the PIN related information.
22. The method of claim 21, wherein the method comprises:
and sending a second response to the first entity, wherein the second response is used for indicating whether the PIN related information is successfully configured.
23. The method of claim 21, wherein the network-side device comprises a first network element and a second network element; the method comprises the following steps:
the first network element sends a first request to the second network element, wherein the first request comprises the first identifier and the second identifier; the first request is used for acquiring the authorization result;
the second network element determines the authorization result based on subscription information corresponding to the first request and the third identifier, or determines the authorization result based on configuration information corresponding to the first request and the first identifier; the subscription information at least comprises the second identifier and the first identifier corresponding to the second identifier; the configuration information at least comprises: the second identifier and the third identifier corresponding to the second identifier;
the second network element sends the first response to the first network element.
24. An information processing apparatus, wherein the apparatus is configured at a first network element, comprising:
A first sending module configured to send a first request to a second network element, the first request including a first identification of a personal internet of things PIN and a second identification of a first entity; the first request is for obtaining an authorization result regarding the first entity, the authorization result being for indicating whether the first entity has the right to provide the PIN with PIN related information.
25. An information processing apparatus, wherein the apparatus is configured at a second network element, comprising:
the second receiving module is configured to receive a first request sent by a first network element, wherein the first request comprises a first identifier of a personal internet of things (PIN) and a second identifier of a first entity; the first request is used for obtaining an authorization result of the first entity, and the authorization result is used for indicating whether the first entity has the right to provide relevant information for the PIN.
26. An information processing apparatus, wherein the apparatus is configured at a first entity, comprising:
and the third sending module is configured to send first information to the first network element, wherein the first information is a first identifier of the personal internet of things (PIN) and a second identifier of the first entity.
27. An information processing apparatus, wherein the apparatus is configured at a third network element, comprising:
And the fourth receiving module is configured to receive second information sent by the first network element, wherein the second information comprises personal networking network PIN related information, and the second information is sent by the first network element by determining that the first entity is authorized to provide PIN related information for the PIN.
28. An information processing apparatus, wherein the apparatus is configured at a network-side device, the network-side device comprising:
the first network element receives first information sent by a first entity and sends a first request to the second network element; the first information includes: a first identification of a personal networking network PIN, a second identification of the first entity; the first request comprises the first identifier and the second identifier, and the first request is used for acquiring an authorization result about the first entity; the authorization result is used for indicating whether the first entity has the right to provide PIN related information for the PIN;
the second network element is configured to determine the authorization result based on subscription information corresponding to the first request and the third identifier, or determine the authorization result based on configuration information corresponding to the first request and the first identifier; the subscription information at least comprises the second identifier and the first identifier corresponding to the second identifier; the configuration information at least comprises: the second identifier and the third identifier corresponding to the second identifier;
A second network element configured to send a first response to the first network element, the first response comprising an authorization result of the first entity; the authorization result is used to indicate whether the first entity has the right to provide the PIN with the PIN related information.
29. A communication device, wherein the communication device comprises: a transceiver, a memory and an executable program stored on the memory and capable of being executed by the processor, wherein the processor executes the information processing method according to any one of claims 1 to 9, or claims 10 to 14, or claims 15 to 18, or claims 19 to 20, or claims 21 to 23 when executing the executable program.
30. A computer storage medium storing a computer executable program that, when executed by a processor, is capable of implementing the information processing method according to any one of claims 1 to 9, or claims 10 to 14, or claims 15 to 18, or claims 19 to 20, or claims 21 to 23.
CN202380009045.2A 2023-04-10 2023-04-10 Information processing method and device, communication equipment and storage medium Pending CN116848870A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2023087426 2023-04-10

Publications (1)

Publication Number Publication Date
CN116848870A true CN116848870A (en) 2023-10-03

Family

ID=88171126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202380009045.2A Pending CN116848870A (en) 2023-04-10 2023-04-10 Information processing method and device, communication equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116848870A (en)

Similar Documents

Publication Publication Date Title
CN110389738B (en) Screen projection method, device, terminal and storage medium
CN112640532A (en) Communication method and device, wireless access network, terminal and storage medium
CN113892282A (en) Method, device, communication equipment and storage medium for reporting information
CN110546974A (en) method and device for acquiring system message, communication equipment and storage medium
CN113228552B (en) Beam measurement method, device, communication equipment and storage medium
CN110651500B (en) Cell selection method and device, communication equipment and storage medium
CN116848870A (en) Information processing method and device, communication equipment and storage medium
WO2024031399A1 (en) Method and apparatus for ue to join pin, and communication device and storage medium
CN113489853B (en) Voice communication method and device, terminal and storage medium
WO2023151055A1 (en) Method and apparatus for sending configuration information, communication device, and storage medium
WO2024092801A1 (en) Authentication methods and apparatuses, communication device and storage medium
WO2023178703A1 (en) Method and apparatus for establishing personal iot network, network element, ue, and storage medium
WO2023184172A1 (en) Method and apparatus for creating pin, and communication device and storage medium
CN109005569B (en) Network connection method and device and routing equipment
WO2023070560A1 (en) Information transmission method and apparatus, and communication device and storage medium
WO2023245588A1 (en) Information processing method and apparatus, communication device, and storage medium
WO2024031392A1 (en) Personal iot network information updating method and apparatus, communication device and storage medium
WO2024031390A1 (en) Personal iot network information updating method and apparatus, communication device and storage medium
WO2022236611A1 (en) Quality of service indication and determination method and apparatus, communication device, and storage medium
CN116803188A (en) Data transmission control method, system and device, communication equipment and storage medium
CN116406513A (en) Subscription method and device of QoS monitoring result, communication equipment and storage medium
CN117917109A (en) Situation awareness processing method and device, communication equipment and storage medium
CN116250276A (en) QoS management method and device, communication equipment and storage medium
CN117859299A (en) Information processing method, system and device, communication equipment and storage medium
CN117882404A (en) Information processing method and device, communication equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination