CN117062069A - Information opening method, device, related equipment and storage medium - Google Patents

Information opening method, device, related equipment and storage medium Download PDF

Info

Publication number
CN117062069A
CN117062069A CN202210487973.7A CN202210487973A CN117062069A CN 117062069 A CN117062069 A CN 117062069A CN 202210487973 A CN202210487973 A CN 202210487973A CN 117062069 A CN117062069 A CN 117062069A
Authority
CN
China
Prior art keywords
information
function
upf
request
opening
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210487973.7A
Other languages
Chinese (zh)
Inventor
孙滔
王晓云
段晓东
陆璐
刘超
王丹
韩琰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210487973.7A priority Critical patent/CN117062069A/en
Priority to PCT/CN2023/092509 priority patent/WO2023213323A1/en
Publication of CN117062069A publication Critical patent/CN117062069A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an information opening method, an information opening device, a User Plane Function (UPF), a first function, a second function, a third function, a fourth function and a storage medium. The method comprises the following steps: the UPF receives a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF; and opening second information to the first function.

Description

Information opening method, device, related equipment and storage medium
Technical Field
The present application relates to the field of mobile communications, and in particular, to an information opening method, an information opening device, a related device, and a storage medium.
Background
The fifth generation mobile communication technology (5G) network reselection defines a network architecture relative to the fourth generation mobile communication technology (4G) network. In this Network architecture, a core Network adopts a service architecture, and a service interface (SBI) is adopted between each Network Function (NF).
In the related art, a service architecture is adopted between the control plane network elements, and a partial service architecture is adopted between the control plane network elements and the user plane network elements. How to implement a service architecture between a control plane network element and a user plane network element is a problem to be solved at present.
Disclosure of Invention
In order to solve the related technical problems, the embodiment of the application provides an information development method, an information development device, related equipment and a storage medium.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides an information opening method, which is applied to a user plane function (UPF, user Plane Function), and comprises the following steps:
receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF;
and opening second information to the first function.
In the above solution, the opening the second information to the first function includes:
and opening the second information directly to the second function.
In the above solution, before the second information is opened to the first function, the method further includes:
sending a second request to a second function, the second request being for requesting the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF;
receiving third information sent by the second function, wherein the third information indicates one of the following contents:
Opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
In the above scheme, the method further comprises:
and sending a response to the first function.
In the above aspect, the opening the second information to the first function includes at least one of:
opening second information to the first function in an event-triggered manner;
and periodically opening second information to the first function.
In the above scheme, the request further includes at least one of the following:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
The embodiment of the application also provides an information opening method which is applied to the first function and comprises the following steps:
sending a first request to a UPF, wherein the first request is used for requesting to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
In the above scheme, the method further comprises:
and receiving the response sent by the UPF.
In the above solution, the first request further includes at least one of the following:
an open mode;
the effective duration of the opening;
User and/or session related information;
network and/or network function related information.
The embodiment of the application also provides an information opening method which is applied to the second function and comprises the following steps:
receiving a second request sent by the UPF, wherein the second request is used for requesting the UPF to open first information to a first function; the second request contains an identification of the first function and/or an identification of a UPF;
transmitting third information to the UPF, the third information indicating one of:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
In the above solution, the second request further includes at least one of the following:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
The embodiment of the application also provides an information opening method which is applied to a third function and comprises the following steps:
receiving a third request sent by a fourth function, wherein the third request is used for requesting fifth information of an open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF;
and sending sixth information to the UPF, wherein the sixth information indicates that the UPF opens seventh information to the fourth function.
In the above aspect, the sixth information indicates one of:
opening seventh information to the fourth function;
disallowing opening eighth information to the fourth function;
indicating that the opening is allowed.
In the above scheme, the method further comprises:
and sending a response to the fourth function.
In the above aspect, the sixth information includes at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
In the above solution, the third request further includes at least one of the following:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
The embodiment of the application also provides an information opening method which is applied to a fourth function and comprises the following steps:
sending a third request to a third function, the third request being for requesting fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
In the above scheme, the method further comprises:
and receiving a response sent by the third function.
In the above solution, the third request further includes at least one of the following:
An open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
The embodiment of the application also provides an information opening method which is applied to UPF and comprises the following steps:
receiving sixth information sent by a third function, wherein the sixth information indicates that the UPF opens seventh information to a fourth function;
and opening seventh information to the fourth function.
In the above aspect, the sixth information indicates one of:
opening seventh information to the fourth function;
disallowing opening eighth information to the fourth function;
indicating that the opening is allowed.
In the above aspect, the sixth information includes at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
In the above aspect, the opening the seventh information to the fourth function includes at least one of:
opening seventh information to the fourth function in an event-triggered manner;
and periodically opening seventh information to the fourth function.
The embodiment of the application also provides an information opening device, which is arranged on the UPF and comprises:
the first receiving unit is used for receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF;
And a first opening unit for opening the second information to the first function.
The embodiment of the application also provides an information opening device, which is arranged at the first function and comprises:
a first sending unit, configured to send a first request to a UPF, where the first request is used to request to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
The embodiment of the application also provides an information opening device, which is arranged at the second function and comprises:
a second receiving unit, configured to receive a second request sent by a UPF, where the second request is used to request the UPF to open first information to a first function; the second request contains an identification of the first function and/or an identification of a UPF;
a second transmitting unit, configured to transmit third information to the UPF, where the third information indicates one of the following:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
The embodiment of the application also provides an information opening device, which is arranged at a third function and comprises:
a third receiving unit, configured to receive a third request sent by the fourth function, where the third request is used to request fifth information of an open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF;
And a third transmitting unit configured to transmit sixth information to the UPF, the sixth information indicating that the UPF opens seventh information to the fourth function.
The embodiment of the application also provides an information opening device, which is arranged at the fourth function and comprises:
a fourth transmitting unit configured to transmit a third request to a third function, the third request being for requesting fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
The embodiment of the application also provides an information opening device, which is arranged on the UPF and comprises:
a fourth receiving unit, configured to receive sixth information sent by the third function, where the sixth information indicates that the UPF opens seventh information to the fourth function;
and a second opening unit configured to open seventh information to the fourth function.
The embodiment of the application also provides a UPF, which comprises the following steps: a first processor and a first communication interface; wherein,
the first communication interface is used for receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF; the first processor is configured to open second information to the first function through the first communication interface;
Or,
the first communication interface is configured to receive sixth information sent by the third function, where the sixth information indicates that the UPF opens seventh information to the fourth function; the first processor is configured to open seventh information to the fourth function through the first communication interface.
The embodiment of the application also provides a first function, which comprises the following steps: a second processor and a second communication interface; wherein,
the second communication interface is configured to send a first request to the UPF, where the first request is used to request to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
The embodiment of the application also provides a second function, which comprises the following steps: a third processor and a third communication interface; wherein,
the third communication interface is configured to receive a second request sent by the UPF, where the second request is used to request the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF; and transmitting third information to the UPF, the third information indicating one of:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
Indicating that the opening is allowed.
The embodiment of the application also provides a third function, which comprises the following steps: a fourth processor and a fourth communication interface; wherein,
the fourth communication interface is configured to receive a third request sent by the fourth function, where the third request is used to request fifth information of the open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF; and sending sixth information to the UPF, the sixth information indicating that the UPF opens seventh information to the fourth function.
The embodiment of the application also provides a fourth function, which comprises the following steps: a fifth processor and a fifth communication interface; wherein,
the fifth communication interface is configured to send a third request to a third function, where the third request is used to request fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
The embodiment of the application also provides a UPF, which comprises the following steps: a first processor and a first memory for storing a computer program capable of running on the processor,
the first processor is configured to execute any one of the steps of the method on the UPF side when running the computer program.
The embodiment of the application also provides a first function, which comprises the following steps: a second processor and a second memory for storing a computer program capable of running on the processor,
The second processor is configured to execute any one of the steps of the method on the first function side when running the computer program.
The embodiment of the application also provides a second function, which comprises the following steps: a third processor and a third memory for storing a computer program capable of running on the processor,
wherein the third processor is configured to execute the steps of any one of the methods on the second functional side when running the computer program.
The embodiment of the application also provides a third function, which comprises the following steps: a fourth processor and a fourth memory for storing a computer program capable of running on the processor,
wherein the fourth processor is configured to execute the steps of any of the methods on the third functional side when running the computer program.
The embodiment of the application also provides a fourth function, which comprises the following steps: a fifth processor and a fifth memory for storing a computer program capable of running on the processor,
wherein the fifth processor is configured to execute the steps of any of the methods on the fourth functional side when running the computer program.
The embodiment of the present application further provides a storage medium, on which a computer program is stored, where the computer program when executed by a processor implements a step of any one of the methods on the UPF side, or implements a step of any one of the methods on the first function side, or implements a step of any one of the methods on the second function side, or implements a step of any one of the methods on the third function side, or implements a step of any one of the methods on the fourth function side.
According to the information opening method, the information opening device, the related equipment and the storage medium provided by the embodiment of the application, on one hand, a first function sends a first request to a UPF, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF; the UPF opens second information to the first function. According to the scheme provided by the embodiment of the application, the information of opening the UPF is authorized by the user plane, so that the security of opening the UPF capability can be improved. On the other hand, the fourth function sends a third request to the third function, the third request being for requesting fifth information of the open UPF; the third request at least comprises an identifier of the fourth function and/or an identifier of the UPF, and after the third request is received by the third function, sixth information is sent to the UPF, and the sixth information indicates that the UPF opens seventh information to the fourth function; and after the UPF receives the sixth information, opening seventh information to the fourth function. According to the scheme provided by the embodiment of the application, the control plane authorizes the information of the open UPF, so that the security of the open UPF capability can be improved.
Drawings
FIG. 1 is a schematic diagram of a related art 5G network architecture;
FIG. 2 is a schematic flow chart of a method for opening information according to an embodiment of the present application;
FIG. 3 is a flowchart of a second method for information opening according to an embodiment of the present application;
FIG. 4 is a flowchart of a third information opening method according to an embodiment of the present application;
FIG. 5 is a flowchart of a fourth method for information opening according to an embodiment of the present application;
fig. 6 is a schematic flow chart of information opening of a control plane authorized user plane according to an embodiment of the present application;
fig. 7 is a schematic flow chart of information opening of a user plane authorized by the user plane according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a first information opening device according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a second information opening device according to an embodiment of the present application;
FIG. 10 is a schematic diagram of a third information opening device according to an embodiment of the present application;
FIG. 11 is a schematic diagram of a fourth information opening device according to an embodiment of the present application;
FIG. 12 is a schematic diagram of a fifth information opening device according to an embodiment of the present application;
FIG. 13 is a schematic structural diagram of a sixth information opening device according to an embodiment of the present application;
FIG. 14 is a schematic view of a UPF structure according to an embodiment of the present application;
FIG. 15 is a schematic view of a first functional structure according to an embodiment of the present application;
FIG. 16 is a schematic diagram of a second functional structure according to an embodiment of the present application;
FIG. 17 is a schematic diagram of a third functional structure according to an embodiment of the present application;
FIG. 18 is a schematic diagram of a fourth functional structure according to an embodiment of the present application;
FIG. 19 is a schematic diagram of an information open system architecture according to an embodiment of the present application;
fig. 20 is a schematic diagram of a second information open system structure according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the accompanying drawings and examples.
As shown in fig. 1, the network functions of the 5G network mainly include: unified database (UDM, unified Data Management), authentication server function (AUSF, authentication Server Function), policy control function (PCF, policy Control function), access and mobility management function (AMF, core Access and Mobility Management Function), session management function (SMF, session Management Function), user plane function (UPF, user plane Function), capability open function (NEF, network Exposure Function), network function registration function (NRF, NF Repository Function), application function (AF, application Function). Wherein,
the functions of UDM mainly include: subscription information management and user authentication;
the functions of the AUSF mainly include: generating an authentication vector;
The PCF mainly comprises the following functions: application and traffic data flow detection, quality of service (QoS) control, credit management, flow-based charging, background data (Background data) delivery policy negotiation, management of packet filter descriptors (PFD, packet Filter Descriptor) configured from third party Application Services (AS) via NEF and packet filter descriptor functions (PFDF, packet Filter Descriptor Function), data flow splitting management (different Data Networks (DN)), provision of unified data store (UDR, user Data Repository) front end functions to provide User subscription information, provision of network selection and mobility management related policies such AS frequency selection priority (RFSP) retrieval, configuration of User Equipment (UE) policies (network side has to support provision of policy information to UEs such AS network discovery and selection policies, session and traffic continuity (SSC, session and Service Continuity) mode selection policies, network slice selection policies);
the functions of the AMF mainly include: NG2 interface termination, NG1 interface termination, mobility management, routing of Session Management (SM) messages, access authentication, security anchor (SEA) functionality, security Context Management (SCM) functionality;
The functions of SMF mainly include: session management, UP selection and control, SM non-access stratum (NAS) message termination, downlink data notification;
the functions of the UPF mainly include: anchor point of wireless access technology internal (Intra-RAT) mobile, data message routing and forwarding, qoS processing of data message, detection of data message and QoS policy execution, traffic statistics and reporting;
the functions of the NEF mainly include: collecting, analyzing and reorganizing network capability, and opening the network capability;
the functions of NRF mainly include: service discovery; specifically, a NF discovery request is received from the NF instance and information of the NF instance that is discovered is provided to the NF instance.
In the network architecture, a service architecture is adopted between the control plane network elements, a partial service architecture is adopted between the control plane network elements and the user plane network elements (namely UPF), and communication protocols, interaction flows and the like between the control plane network elements and the user plane network elements are not service. In order to better integrate UPF into SBA system architecture of 5G core network (5 GC), in the related art, it is desirable to enhance the capability of UPF for the purpose of UPF servitization, the enhanced capability may be represented in the following aspects:
first, avoiding duplicate data transmissions, reducing transmission paths, for example, considering whether PCF service can be directly subscribed or unsubscribed from UPF service to obtain QoS monitoring delay report (english may be expressed as QoS monitoring latency report);
Second, retrieving raw state or real-time traffic flow information from the UPF, such as network data analysis function (NWDAF, network Data Analytics Function) services may subscribe/unsubscribe to the UPF service to retrieve real-time service flow information (english may be expressed as real-time service flow information), e.g., considering the effective sampling interval of different services to facilitate data collection and analysis (english may be expressed as e.g., to facilitate data collection and analysis considering efficient sampling intervals for the different services).
A third UPF event exposure, such as a 5G internet of things solution, requires that the UPF be connected to a NEF (which may also be referred to as a local NEF) in order to expose network information to the application server.
However, since much of the data in UPF is relatively sensitive, it may involve privacy of the user and the network, and this data is also a core asset for the operator. Therefore, it is necessary to open up the information of the UPF from the viewpoint of security. Specifically, for which other NFs the data in the UPF can be opened, specific time for which NFs are opened, which information can be opened, and so on, there is preferably corresponding authorization management, for example, only opening to a specific NF, opening to a specific NF specific information, and so on, whether the UPF is allowed to directly open to the specific NF, or indirectly open to the specific NF through NFs of other control planes, and so on.
Based on this, in various embodiments of the present application, the information of the open UPF is authorized by the user plane or the information of the open UPF is authorized by the control plane.
According to the scheme provided by the embodiment of the application, the information of the UPF is authorized to be opened, so that the security of opening the UPF capability can be improved.
First, a flow of information for opening the UPF by user plane authorization will be described.
The embodiment of the application provides an information opening method, which is applied to UPF, as shown in figure 2, and comprises the following steps:
step 201: receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF;
step 202: and opening second information to the first function.
In practical application, the first request may be referred to as a subscription request (the english expression may be subscribe request), or may be referred to as an authentication request, or may be an authorization request (the english expression may be Authorization request), or may be an authentication request, or may be an authorization subscription request, etc., which is not limited in this embodiment of the present application, so long as the function thereof is implemented.
The first request is used for requesting to open the information of the UPF; accordingly, the information opened to the first function is the information of the UPF.
Wherein the first request may further comprise at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
Wherein, the opening mode comprises periodic opening and/or event triggering opening (namely opening after meeting a certain condition). When the manner of opening includes periodic opening, the first request may also include a specific period of opening. The open manner may also be referred to as open frequency, and the embodiment of the present application is not limited thereto, as long as the function thereof is realized.
The user and/or session related information, and network and/or network function related information may be referred to as information desired to be opened. Here, in actual application, the information desired to be opened may contain various information, which forms a list.
The user related information may include location information of the user, and the session related information may include specific rate, bandwidth information of a certain session, which is not limited in the embodiment of the present application.
The network related information may include load information of a network, and the network function related information may include load information of a UPF, which is not limited in the embodiment of the present application.
It will be appreciated that the first function refers to NF that needs to obtain the information of the UPF, such as AF, PCF, NWDAF, NEF, or charging function (CF, charging Function), which is not limited by the embodiment of the present application.
In practical application, the identifier of the first function may include at least one of a name of the first function (english may be expressed as name), a type of the first function (english may be expressed as type), an Internet Protocol (IP) address, a Fully Qualified Domain Name (FQDN), etc., which is not limited in the embodiment of the present application, so long as the first function can be identified.
The identification of the UPF may include at least one of an IP address, a FQDN, etc. of the UPF, which is not limited in the embodiment of the present application, so long as the UPF can be identified.
The first information and the second information may be the same, and illustratively, it is assumed that the UPF openable information includes: the method comprises the steps that a first function requests to open five types of information, namely a QoS monitoring delay report, real-time service flow information, information related to internet of things (IoT) equipment, charging information and load information of a UPF, and when the five types of information are authorized to be open, the UPF opens the five types of information to the first function;
The first information and the second information may also be different, and it is assumed that the UPF openable information includes: qoS monitoring delay report, real-time service flow information, ioT device related information, charging information, etc., and UPF load information, when the first function requests to open the five types of information and authorizes three types of information in the five types of information to be able to be opened (such as QoS monitoring delay report, real-time service flow information, ioT device related information), the UPF opens the three types of information to the first function, that is, the UPF opens the authorized three types of information to the first function; when the first function requests to open the location information (which may be understood as a type of location information) of the user in the UPF, and authorizes to open only a specific location information (which may be understood as a specific instance of a type of location information) of the requested location information, the UPF opens the specific user location information to the first function.
In practical application, the first information may include: at least one of QoS monitoring delay reports, real-time service flow information, ioT device-related information, billing information, UPF loading information, etc.; accordingly, the second information may include: qoS monitoring delay reports, real-time service flow information, ioT device related information, billing information, UPF loading information, and/or the like. The embodiment of the application does not limit the specific content of the first information and the second information.
When the UPF has authorization decision rights, the UPF judges which information in the first information is allowed to be opened by itself; accordingly, in step 202, the UPF directly opens the second information to the second function.
Wherein, the UPF may determine which information is allowed to be opened based on the first request and a local policy (i.e., a preconfigured policy, such as which information may be opened, which NF is opened with information, etc.). Here, in actual application, when determining which information is allowed to be opened, the UPF may further acquire subscription information of the user from the UDM, and determine whether to open corresponding information of the UPF to the first function based on the first request, the local policy, and the subscription information of the user.
When the UPF determines that the first function cannot be authorized to open information, the UPF may send a response to the first function, where the response may indicate that the request of the first request is failed; the response may also carry a reject cause value (i.e., no openness allowed).
When the UPF has no decision rights, the method may further include, before the UPF opens the second information to the first function in step 202:
Sending a second request to a second function, the second request being for requesting the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF;
receiving third information sent by the second function, wherein the third information indicates one of the following contents:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
It is understood that the second function refers to NF having authority to make decisions, such as PCF, NEF, or SMF, which is not limited by the embodiment of the present application.
In practical application, the second request may be referred to as a subscription request, or may be referred to as an authorization request, or may be an access authorization request, or may be an authorization subscription request, or may be an open authorization request, etc., which is not limited in this embodiment of the present application, so long as the function thereof is implemented.
Wherein the second request may further comprise at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
Wherein, the opening mode comprises periodic opening and/or event triggering opening (namely opening after meeting a certain condition). When the manner of opening includes periodic opening, the first request may also include a specific period of opening. The open manner may also be referred to as open frequency, and the embodiment of the present application is not limited thereto, as long as the function thereof is realized.
The user and/or session related information, and network and/or network function related information may be referred to as information desired to be opened. Here, in actual application, the information desired to be opened may contain various information, which forms a list.
The user related information may include location information of the user, and the session related information may include specific rate, bandwidth information of a certain session, which is not limited in the embodiment of the present application.
The network related information may include load information of a network, and the network function related information may include load information of a UPF, which is not limited in the embodiment of the present application.
The content indicated by the third information may further include that opening is not allowed, and when the third information indicates that opening is not allowed, the information sent by the second function may be disagreeable (english may be expressed as no), and the UPF may send a response to the first function, where the response may indicate that the request of the first request is failed; the response may also carry a reject cause value (i.e., no openness allowed).
In the case where the third information indicates second information of an open UPF to the first function, the information transmitted by the second function may be specific content of the second information. Specifically, the third information may include at least one of:
An open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
Wherein the user and/or session related information, and network and/or network function related information may be referred to as authorization open information. Here, in actual application, the information for opening authorization may contain various kinds of information, which form a list.
In case the third information indicates that opening fourth information to the first function is not allowed, the fourth information is associated with the first information and the second information. Illustratively, assuming that the first information includes QoS monitoring delay reports, real-time service flow information, ioT device-related information, charging information, and UPF load information, the fourth information includes charging information and UPF load information, the second information includes QoS monitoring delay reports, real-time service flow information, ioT device-related information.
In case the third information indicates that opening is allowed, the information sent by the second function may be consent (english may be expressed as yes).
In actual application, for the first request, the UPF may send a response to the first function, where the purpose of sending the response is to answer the request of the first function, and the response may indicate whether to subscribe to open information content that is successful and/or subscribed successfully, and so on. Specifically, as previously described, when the UPF cannot open information to the first function, the response may indicate that the request of the first request is failed; the response may also carry a reject cause value; when the UPF opens the second information to the first function, the response may indicate how to open the information, which aspects of the information to open, which information to open, and so on.
In an embodiment, according to the different open information, the UPF may open the second information to the first function in an event-triggered manner, or may open the second information to the first function periodically.
Correspondingly, the embodiment of the application also provides an information opening method which is applied to the first function and comprises the following steps:
sending a first request to a UPF, wherein the first request is used for requesting to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
Wherein, in an embodiment, the method may further comprise:
and receiving the response sent by the UPF.
The embodiment of the application also provides an information opening method applied to the second function, as shown in fig. 3, comprising the following steps:
step 301: receiving a second request sent by the UPF, wherein the second request is used for requesting the UPF to open first information to a first function; the second request contains an identification of the first function and/or an identification of a UPF;
step 302: transmitting third information to the UPF, the third information indicating one of:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
Indicating that the opening is allowed.
In step 301, the second function determines which information is allowed to be opened based on the second request and a local policy (i.e., a preconfigured policy, such as which information can be opened, which NF open information, etc.). Here, in actual application, when determining which information is allowed to be opened, the second function may further acquire subscription information of the user from the UDM, and determine whether to authorize (may also be referred to as allowing) the UPF to open corresponding information of the UPF to the first function based on the second request, the local policy, and the subscription information of the user.
According to the information opening method provided by the embodiment of the application, a first function sends a first request to a UPF, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF; the UPF opens second information to the first function. According to the scheme provided by the embodiment of the application, the information of opening the UPF is authorized by the user plane, so that the security of opening the UPF capability can be improved.
Next, a flow of information for opening the UPF by the control plane authorization will be described.
The embodiment of the application provides an information opening method, which is applied to a third function, as shown in fig. 4, and comprises the following steps:
Step 401: receiving a third request sent by a fourth function, wherein the third request is used for requesting fifth information of an open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF;
step 402: and sending sixth information to the UPF, wherein the sixth information indicates that the UPF opens seventh information to the fourth function.
It is understood that the third function refers to NF having authority to make decisions, such as PCF, NEF, or SMF, which is not limited by the embodiment of the present application. Accordingly, the fourth function refers to NF, such as AF, PCF, NWDAF, NEF, CHF, etc., that needs to obtain the information of the UPF, which is not limited by the embodiment of the present application.
The third request is used for requesting to open the information of the UPF; accordingly, the information opened to the fourth function is the information of the UPF.
In practical application, the third request may be referred to as a subscription request, or may be referred to as an authorization request, or be an access authorization request, or be an authorization subscription request, or be an open authorization request, etc., which is not limited in this embodiment of the present application, so long as the function thereof is implemented.
The third request may further comprise at least one of:
An open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
Wherein, the opening mode comprises periodic opening and/or event triggering opening (namely opening after meeting a certain condition). When the manner of opening includes periodic opening, the first request may also include a specific period of opening. The open manner may also be referred to as open frequency, and the embodiment of the present application is not limited thereto, as long as the function thereof is realized.
The user and/or session related information, and network and/or network function related information may be referred to as information desired to be opened. Here, in actual application, the information desired to be opened may contain various information, which forms a list.
The user related information may include location information of the user, and the session related information may include specific rate, bandwidth information of a certain session, which is not limited in the embodiment of the present application.
The network related information may include load information of a network, and the network function related information may include load information of a UPF, which is not limited in the embodiment of the present application.
The identifier of the fourth function may include at least one of a name of the fourth function (english may be expressed as name), a type of the fourth function, an IP address, a FQDN, etc., which is not limited in the embodiment of the present application, so long as the fourth function can be identified.
The identification of the UPF may include at least one of an IP address, a FQDN, etc. of the UPF, which is not limited in the embodiment of the present application, so long as the UPF can be identified.
In actual application, the third function determines which information is allowed to be opened based on the third request and a local policy (i.e., a preconfigured policy, such as which information can be opened, which NF open information, etc.). Here, in actual application, when determining which information is allowed to be opened, the third function may further acquire subscription information of the user from the UDM, and determine whether to authorize (may also be referred to as allowing) the UPF to open corresponding information of the UPF to the fourth function based on the third request, the local policy, and the subscription information of the user.
The fifth information and the seventh information may be the same, and exemplarily, it is assumed that the UPF openable information includes: the fourth function requests to open the five types of information, and when the five types of information can be authorized to be opened, the UPF opens the five types of information to the fourth function;
The fifth information and the seventh information may also be different, and it is exemplarily assumed that the UPF openable information includes: qoS monitoring delay report, real-time service flow information, ioT device related information, charging information, etc., and UPF load information, when the fourth function requests to open the five types of information and authorizes three types of information in the five types of information to be able to be opened (such as QoS monitoring delay report, real-time service flow information, ioT device related information), the UPF opens the three types of information to the fourth function, that is, the UPF opens the authorized three types of information to the first function; when the fourth function requests to open the location information (which may be understood as a type of location information) of the user in the UPF, and authorizes to open only a specific location information (which may be understood as a specific instance of a type of location information) of the requested location information, the UPF opens the specific user location information to the fourth function.
In practical application, the fifth information may include: at least one of QoS monitoring delay reports, real-time service flow information, ioT device-related information, billing information, UPF loading information, etc.; accordingly, the seventh information may include: qoS monitoring delay reports, real-time service flow information, ioT device related information, billing information, UPF loading information, and/or the like. The embodiment of the present application is not limited to the specific contents of the fifth information and the seventh information.
In an embodiment, the sixth information may indicate one of:
opening seventh information to the fourth function;
disallowing opening eighth information to the fourth function;
indicating that the opening is allowed.
Wherein, the content indicated by the sixth information may further include disallowing opening, and when the sixth information indicates that opening is disallowed, the information sent by the third function to the UPF may be disagreeable, and the third function may send a response to the fourth function, where the response may indicate that the request of the third request is failed; the response may also carry a reject cause value (i.e., no openness allowed). In the case where the sixth information indicates that no opening is allowed, the UPF does not open information to the fourth function.
In the case where the sixth information indicates seventh information of the open UPF to the fourth function, the information transmitted by the third function may be a specific content of the seventh information.
In the case where the sixth information indicates that opening eighth information to the fourth function is not allowed, the eighth information is associated with the fifth information and seventh information. Illustratively, assuming that the fifth information includes QoS monitoring delay reports, real-time service flow information, ioT device-related information, charging information, and UPF load information, the eighth information includes charging information and UPF load information, the seventh information includes QoS monitoring delay reports, real-time service flow information, ioT device-related information.
In the case where the sixth information indicates that opening is permitted, the information transmitted by the third function may be consent.
In practical application, for the third request, the third function may send a response to the fourth function, where the purpose of sending the response is to answer the request of the fourth function, and the response may indicate whether to subscribe to open information content successfully and/or successfully subscribed to, and so on. Specifically, as previously described, when the third function does not authorize the UPF to open information to the fourth function, the request in the response may indicate that the request of the third request is a failure; the response may also carry a reject cause value; when the third function authorizes the UPF to open the seventh information to the fourth function, the response may indicate how to open the information, which aspects of the information to open, which information to open, and so on.
Wherein the operations of the third function sending a response to the fourth function and sending sixth information to the UPF are not sequentially ordered in execution.
In an embodiment, in a case of the seventh information indicating that the UPF is opened to the fourth function, the sixth information may include at least one of:
An open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
Wherein the user and/or session related information, and network and/or network function related information may be referred to as authorization open information. Here, in actual application, the information for opening authorization may contain various kinds of information, which form a list.
Correspondingly, the embodiment of the application also provides an information opening method which is applied to the fourth function and comprises the following steps:
sending a third request to a third function, the third request being for requesting fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
Wherein, in an embodiment, the method may further comprise:
and receiving a response sent by the fourth function.
The embodiment of the application also provides an information opening method which is applied to UPF, as shown in figure 5, and comprises the following steps:
step 501: receiving sixth information sent by a third function, wherein the sixth information indicates that the UPF opens seventh information to a fourth function;
step 502: and opening seventh information to the fourth function.
And after receiving the sixth information sent by the third function, the UPF opens the seventh information to the fourth function according to the instruction of the sixth information.
In an embodiment, according to the different open information, the UPF may open seventh information to the fourth function in an event-triggered manner, or may open seventh information to the fourth function periodically.
According to the information opening method provided by the embodiment of the application, the fourth function sends a third request to the third function, wherein the third request is used for requesting to open fifth information of UPF; the third request at least comprises an identifier of the fourth function and/or an identifier of the UPF, and after the third request is received by the third function, sixth information is sent to the UPF, and the sixth information indicates that the UPF opens seventh information to the fourth function; and after the UPF receives the sixth information, opening seventh information to the fourth function. According to the scheme provided by the embodiment of the application, the control plane authorizes the information of the open UPF, so that the security of the open UPF capability can be improved.
The present application will be described in further detail with reference to examples of application.
Application example one
In this embodiment of the application, the information of the user plane is authorized through the control plane.
The application embodiment authorizes the information opening process of the user plane through the control plane, as shown in fig. 6, and comprises the following steps:
step 601: NF1 calls a first service of NF 2, and requests to open UPF information to NF 1;
here, the first service request message carries UPF identification information (such as an IP address, FQDN, etc.), and NF1 identification information (such as NF name, NF type, IP address, FQDN, etc.).
The first service request may also carry a manner of opening the UPF (such as event triggered opening and period opening; where, if the period is opened, a specific period may be carried), and an effective duration of opening, that is, how long, information that is not opened and is expected to be opened.
Among them, for information that is desired to be opened, since NF1 may request information of a UPF open session level or information of an open network element level to NF1, the following two cases are divided:
in the first case, the information of the open session level is requested, and the first service request message may carry a user related identifier, such as an ID (e.g., IP, flow ID, mobile phone number, general public user identifier (GPSI), session ID, etc. of the user), and may also carry a list of information (e.g., bandwidth of the session, user location, etc.) that is desired to be opened.
In the second case, information of the network element level is requested to be opened, and the first service request only carries an information list (such as a load of a UPF and the like) which is expected to be opened.
Step 602: after the NF2 receives the request, authorizing UPF opening information to NF1, and sending the opening request information to UPF;
here, NF2 determines whether to allow the UPF open information to NF 1; specifically, NF2 may combine the identification of NF1 and the content of the request according to the local policy, and may also combine subscription information related to the user obtained from the UDM, and combine these factors to comprehensively determine whether to authorize (may also be referred to as allow) NF1 to be opened by the information of the UPF, and which information to open.
NF2 sends a message to the UPF, i.e. NF2 sends authorization information to the UPF to indicate how the UPF is open (e.g. event-triggered open, period open, if period open, the message may carry a specific period, openable duration), who is open (open user session or network element related), and which information is open to NF 1.
NF2 may send messages directly to the UPF or may relay messages to the UPF through one or more intermediate NFs, such as SMF, NEF, etc.).
Here, when NF2 does not allow the information of the UPF to be opened to NF1, NF2 directly replies the NF1 with the first service response, carrying the reject cause value. .
When NF1 is AF and NF 2 is PCF, the PCF sends an open request message to the UPF through the SMF in step 602.
Step 603: NF 2 sends a first service response to NF 1;
here, it should be noted that the timing of the response message may be before or after step 602, that is, steps 602 and 603 are not sequentially performed. The response message indicates that the request of the first service request message was successful or failed. If it fails, then the reject cause value is carried. If successful, the response message may carry how the UPF is opened (e.g., event-triggered opening, periodic opening, if periodic opening, specific periods may be carried in the message, and the duration of the openable), who is opened (to which the user session or network element is associated), and which information is opened to NF1.
Step 604: the UPF defines a service through a Nupf_EventExposure_Notify service, and opens the information of the UPF to NF1.
Here, the open information may include one or more of QoS monitoring delay reports, real-time service flow information, ioT device-related information, billing information, UPF loading information, and the like.
Application example II
In this embodiment of the present application, the information of the user plane is authorized to be opened through the user plane.
In the application embodiment, a service operation nupf_eventExposure_ Subscribe service operation, namely a second service, is added in the UPF;
here, the purpose of adding this service operation is to have other NFs subscribe to the UPF message.
The application embodiment authorizes the information opening process of the user plane through the user plane, as shown in fig. 7, and comprises the following steps:
step 701: NF1 calls Nupf_EventExposure_ Subscribe service operation of the UPF, namely a second service, and requests to open UPF information to NF1;
here, the second service request message carries UPF identification information (such as an IP address, FQDN, etc.), and NF1 identification information (such as NF name, NF type, IP address, FQDN, etc.).
The second service request may also carry a manner of opening the UPF (such as event triggered opening and period opening; where, if the period is opened, a specific period may be carried), and an effective duration of opening, that is, how long, information that is not opened and is expected to be opened.
Among them, for information that is desired to be opened, since NF1 may request information of a UPF open session level or information of an open network element level to NF1, the following two cases are divided:
in the first case, the information of the open session level is requested, and the first service request message may carry a user related identifier, such as an ID (e.g., IP, flow ID, handset number, GPSI, session ID, etc. of the user), and may also carry a list of information (e.g., bandwidth of the session, user location, etc.) that is desired to be opened.
In the second case, information of the network element level is requested to be opened, and the first service request only carries an information list (such as a load of a UPF and the like) which is expected to be opened.
When NF1 is NWDAF and NF 2 is SMF, NWDAF sends the second service request, which is the open request message, to UPF through SMF.
Step 702: the UPF may or may not have decision rights, and when the UPF has decision rights, the UPF directly replies a response to the NF1 after receiving the request. When the UPF has no decision right, the NF 2 is requested to make a decision, after the NF 2 makes a decision, the UPF sends a decision result to the NF1;
here, NF 2 with decision authority may be SMF (UPF and SMF are directly connected, through N4 interface), or PCF (UPF goes through SMF to PCF). NF 2 judges whether to allow UPF open information to NF1; specifically, NF 2 may combine the identification of NF1 and the content of the request according to the local policy, and may also combine subscription information related to the user obtained from the UDM, and combine these factors to comprehensively determine whether to authorize (may also be referred to as allow) NF1 to be opened by the information of the UPF, and which information to open.
Step 703: the UPF sends a second service response to the NF1;
here, the response message indicates that the request of the second service request message is successful or failed. If it fails, then the reject cause value is carried. If successful, the response message may carry how the UPF is opened (e.g., event-triggered opening, periodic opening, if periodic opening, specific periods may be carried in the message, and the duration of the openable), who is opened (to which the user session or network element is associated), and which information is opened to NF 1.
Step 704: the UPF opens the UPF information to NF1 through the Nupf_EventExposure_Notify service.
Here, the open information may include one or more of QoS monitoring delay reports, real-time service flow information, ioT device-related information, billing information, UPF loading information, and the like.
From the above description, it can be seen that the scheme of the embodiment of the present application is an authorized user plane opening scheme, and by authorizing the user plane, it can be clear which NFs can be opened to data in the UPF, and which information can be opened when the data is opened, so that the security of UPF capability opening can be improved.
In order to implement the method of the embodiment of the present application, the embodiment of the present application further provides an information opening device, which is disposed on a UPF, as shown in fig. 8, and the device includes:
a first receiving unit 801, configured to receive a first request sent by a first function, where the first request is used to request to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF;
a first opening unit 802 for opening the second information to the first function.
Wherein, in an embodiment, the first opening unit 802 is configured to directly open the second information to the second function.
In an embodiment, the apparatus may further include:
a fifth sending unit, configured to send a second request to a second function, where the second request is used to request the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF;
the first receiving unit 801 is further configured to receive third information sent by the second function, where the third information indicates one of the following:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
In an embodiment, the fifth sending unit is further configured to send a response to the first function.
In an embodiment, the apparatus may further include:
and the first decision unit is used for judging whether the information is allowed to be opened to the first function.
In an embodiment, the first open unit 802 is configured to:
opening second information to the first function in an event-triggered manner; and/or the number of the groups of groups,
and periodically opening second information to the first function.
In practical application, the first receiving unit 801 and the fifth sending unit may be implemented by a communication interface in the information opening device, and the first opening unit 802 and the first decision unit may be implemented by a processor in the information opening device in combination with an interface.
In order to implement the method of the first function side in the embodiment of the present application, the embodiment of the present application further provides an information opening device, which is disposed on the first function, as shown in fig. 9, and the device includes:
a first sending unit 901, configured to send a first request to a UPF, where the first request is used to request to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
In one embodiment, as shown in fig. 9, the apparatus may further include:
a fifth receiving unit 902, configured to receive the response sent by the UPF.
In practical application, the first sending unit 901 and the fifth receiving unit 902 may be implemented by a communication interface in the information opening device.
In order to implement the method of the second function side in the embodiment of the present application, the embodiment of the present application further provides an information opening device, which is disposed on the second function, as shown in fig. 10, and the device includes:
a second receiving unit 1001, configured to receive a second request sent by a UPF, where the second request is used to request the UPF to open first information to a first function; the second request contains an identification of the first function and/or an identification of a UPF;
a second transmitting unit 1002, configured to transmit third information to the UPF, where the third information indicates one of the following:
Opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
Wherein, in an embodiment, the device may further comprise: and the second decision unit is used for judging whether the information of the UPF is allowed to be opened to the first function.
In practical applications, the second receiving unit 1001 and the second sending unit 1002 may be implemented by a communication interface in the information opening device, and the second decision unit may be implemented by a processor in the information opening device in combination with an interface.
In order to implement the method of the third function side in the embodiment of the present application, the embodiment of the present application further provides an information opening device, which is disposed on the third function, as shown in fig. 11, and the device includes:
a third receiving unit 1101, configured to receive a third request sent by the fourth function, where the third request is used to request fifth information of an open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF;
the third sending unit 1102 sends sixth information to the UPF, where the sixth information indicates that the UPF opens seventh information to the fourth function.
Wherein, in an embodiment, the device may further comprise:
And a third decision unit, configured to determine whether to allow opening of the information of the UPF to the fourth function.
In an embodiment, the third sending unit 1102 is further configured to send a response to the fourth function.
In practical applications, the third receiving unit 1101 and the third sending unit 1102 may be implemented by a communication interface in the information opening device, and the third decision unit may be implemented by a processor in the information opening device in combination with the interface.
In order to implement the method of the fourth function side in the embodiment of the present application, the embodiment of the present application further provides an information opening device, which is disposed on the fourth function, as shown in fig. 12, and the device includes:
a fourth transmitting unit 1201 configured to transmit a third request to a third function, the third request being for requesting fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
In one embodiment, as shown in fig. 12, the apparatus may further include:
a sixth receiving unit 1202, configured to receive a response sent by the third function.
In practical application, the fourth transmitting unit 1201 and the sixth receiving unit 1202 may be implemented by a communication interface in an information opening device.
In order to implement the method on the UPF side in the embodiment of the present application, the embodiment of the present application further provides an information opening device, which is disposed on the UPF, as shown in fig. 13, and the device includes:
a fourth receiving unit 1301 configured to receive sixth information sent by the third function, where the sixth information indicates that the UPF opens seventh information to the fourth function;
a second opening unit 1302 for opening the seventh information to the fourth function.
Wherein, in an embodiment, the second open unit 1302 is configured to:
opening seventh information to the fourth function in an event-triggered manner; and/or the number of the groups of groups,
and periodically opening seventh information to the fourth function.
In practical applications, the fourth receiving unit 1301 may be implemented by a communication interface in an information opening device, and the second opening unit 1302 may be implemented by a processor in the information opening device in combination with an interface.
It should be noted that: in the information opening device provided in the above embodiment, only the division of each program module is used for illustration, and in practical application, the processing allocation may be performed by different program modules according to needs, that is, the internal structure of the device is divided into different program modules, so as to complete all or part of the processing described above. In addition, the information opening device and the information opening method embodiment provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the information opening device and the information opening method embodiment are detailed in the method embodiment, which is not repeated herein.
Based on the hardware implementation of the program module, and in order to implement the method on the UPF side in the embodiment of the present application, the embodiment of the present application further provides a UPF, as shown in fig. 14, where the UPF 1400 includes:
a first communication interface 1401, capable of interacting with other NFs;
a first processor 1402, connected to the first communication interface 1401, to implement information interaction with other NFs, for executing the methods provided by one or more technical solutions on the UPF side when running a computer program;
a first memory 1403, the computer program being stored on the first memory 1403.
Specifically, in the scheme of authorizing the opening of the information of the UPF through the user plane, the first communication interface 1401 is configured to receive a first request sent by a first function, where the first request is used to request the opening of the first information; the first request at least comprises an identification of the first function and/or an identification of a UPF; the first processor 1402 is configured to open second information to the first function through the first communication interface 1401.
Wherein, in an embodiment, the first processor 1402 is configured to open the second information directly to the second function through the first communication interface 1401.
In an embodiment, the first communication interface 1401 is further configured to send a second request to a second function, where the second request is configured to request the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF; and receiving third information sent by the second function, the third information indicating one of:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
In an embodiment, the first communication interface 1401 is further configured to send a response to the first function.
In an embodiment, the first processor 1402 is further configured to determine whether to allow information to be opened to the first function.
In an embodiment, the first processor 1402 is configured to:
opening second information to the first function in an event-triggered manner; and/or the number of the groups of groups,
and periodically opening second information to the first function.
In the scheme that the control plane grants the information of opening the UPF, the first communication interface 1401 is configured to receive sixth information sent by the third function, where the sixth information indicates that the UPF opens seventh information to the fourth function; the first processor 1402 is configured to open seventh information to the fourth function through the first communication interface 1401.
Wherein, in an embodiment, the first processor 1402 is configured to:
opening seventh information to the fourth function in an event-triggered manner; and/or the number of the groups of groups,
and periodically opening seventh information to the fourth function.
It should be noted that: the specific processing of the first processor 1402 and the first communication interface 1401 may be understood with reference to the methods described above.
Of course, in actual practice, the various components in the UPF1400 are coupled together via the bus system 1404. It is appreciated that the bus system 1404 is used to enable connected communications between these components. The bus system 1404 includes a power bus, a control bus, and a status signal bus in addition to the data bus. The various buses are labeled as bus system 1404 in fig. 14 for clarity of illustration.
The first memory 1403 in embodiments of the present application is used to store various types of data to support the operation of the UPF 1400. Examples of such data include: any computer program for operating on the UPF 1400.
The method disclosed in the above embodiment of the present application may be applied to the first processor 1402 or implemented by the first processor 1402. The first processor 1402 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the method may be implemented by an integrated logic circuit of hardware in the first processor 1402 or an instruction in a software form. The first processor 1402 may be a general purpose processor, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The first processor 1402 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the application can be directly embodied in the hardware of the decoding processor or can be implemented by combining hardware and software modules in the decoding processor. The software module may be located in a storage medium located in the first memory 1403, said first processor 1402 reading the information in the first memory 1403, in combination with its hardware performing the steps of the method as described above.
In an exemplary embodiment, the UPF 1400 can be implemented by one or more application specific integrated circuits (ASICs, application Specific Integrated Circuit), DSPs, programmable logic devices (PLDs, programmable Logic Device), complex programmable logic devices (CPLDs, complex Programmable Logic Device), field-programmable gate arrays (FPGAs, field-Programmable Gate Array), general purpose processors, controllers, microcontrollers (MCUs, micro Controller Unit), microprocessors (microprocessors), or other electronic components for performing the aforementioned methods.
Based on the hardware implementation of the program modules, and in order to implement the method of the first function side in the embodiment of the present application, the embodiment of the present application further provides a first function, as shown in fig. 15, where the first function 1500 includes:
the second communication interface 1501 is capable of information interaction with other NFs;
a second processor 1502, connected to the second communication interface 1501, for implementing information interaction with other NFs, configured to execute, when executing a computer program, a method provided by one or more technical solutions on the first functional side;
a second memory 1503, said computer program being stored on said second memory 1503.
Specifically, the second communication interface 1501 is configured to send a first request to the UPF, where the first request is for requesting first information of an open UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
Wherein, in an embodiment, the second communication interface 1501 is further configured to receive a response sent by the UPF.
It should be noted that: the specific processing of the second communication interface 1501 can be understood with reference to the methods described above.
Of course, in actual practice, the various components in first function 1500 would be coupled together by bus system 1504. It is to be appreciated that bus system 1504 is used to facilitate connection communications between these components. The bus system 1504 includes a power bus, a control bus, and a status signal bus in addition to the data bus. But for clarity of illustration, the various buses are labeled as bus system 1504 in fig. 15.
The second memory 1503 in the embodiment of the present application is used to store various types of data to support the operation of the first function 1500. Examples of such data include: any computer program for operating on the first functionality 1500.
The method disclosed in the above embodiment of the present application may be applied to the second processor 1502 or implemented by the second processor 1502. The second processor 1502 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the method may be implemented by an integrated logic circuit of hardware or an instruction in software form in the second processor 1502. The second processor 1502 described above may be a general purpose processor, DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The second processor 1502 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the application can be directly embodied in the hardware of the decoding processor or can be implemented by combining hardware and software modules in the decoding processor. The software module may be located in a storage medium located in the second memory 1503, said second processor 1502 reading the information in the second memory 1503, in combination with its hardware performing the steps of the method described above.
In an exemplary embodiment, the first functionality 1500 can be implemented by one or more ASIC, DSP, PLD, CPLD, FPGA, general purpose processors, controllers, MCU, microprocessor, or other electronic elements for performing the aforementioned methods.
Based on the hardware implementation of the program modules, and in order to implement the method of the second function side in the embodiment of the present application, the embodiment of the present application further provides a second function, as shown in fig. 16, where the second function 1600 includes:
the third communication interface 1601 is capable of performing information interaction with other NFs;
a third processor 1602, connected to the third communication interface 1601, for implementing information interaction with other NFs, and configured to execute the method provided by one or more technical solutions on the second functional side when running a computer program;
a third memory 1603, said computer program being stored on said third memory 1603.
Specifically, the third communication interface 1601 is configured to receive a second request sent by the UPF, where the second request is configured to request the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF; and transmitting third information to the UPF, the third information indicating one of:
Opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
Wherein, in an embodiment, the third processor 1602 is configured to determine whether to allow opening of the UPF information to the first function.
It should be noted that: the specific processing procedure of the third processor 1602 and the third communication interface 1601 can be understood with reference to the above-described method.
Of course, in actual practice, the various components of second function 1600 are coupled together by bus system 1604. It is appreciated that the bus system 1604 is used to enable connected communications between these components. The bus system 1604 includes a power bus, a control bus, and a status signal bus in addition to the data bus. But for clarity of illustration, the various buses are labeled as bus system 1604 in fig. 16.
The third memory 1603 in the embodiment of the present application is used to store various types of data to support the operation of the second function 1600. Examples of such data include: any computer program for operating on second function 1600.
The method disclosed in the above embodiment of the present application may be applied to the third processor 1602, or implemented by the third processor 1602. The third processor 1602 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the method may be implemented by an integrated logic circuit of hardware or an instruction in software form in the third processor 1602. The third processor 1602 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The third processor 1602 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the application can be directly embodied in the hardware of the decoding processor or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the third memory 1603 and the third processor 1602 reads information in the third memory 1603, in combination with hardware, to perform the steps of the methods described above.
In an exemplary embodiment, the second function 1600 may be implemented by one or more ASIC, DSP, PLD, CPLD, FPGA, general purpose processors, controllers, MCU, microprocessor, or other electronic elements for performing the foregoing methods.
Based on the hardware implementation of the program modules, and in order to implement the method of the third functional side in the embodiment of the present application, the embodiment of the present application further provides a third function, as shown in fig. 17, where the third function 1700 includes:
a fourth communication interface 1701, capable of information interaction with other NFs;
the fourth processor 1702 is connected to the fourth communication interface 1701 to implement information interaction with other NFs, and is configured to execute the method provided by one or more technical solutions on the third functional side when running a computer program;
a fourth memory 1703, the computer program being stored on the fourth memory 1703.
Specifically, the fourth communication interface 1701 is configured to receive a third request sent by the fourth function, where the third request is used to request the fifth information of the open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF; and sending sixth information to the UPF, the sixth information indicating that the UPF opens seventh information to the fourth function.
In one embodiment, the fourth processor 1702 is configured to determine whether to allow opening up the UPF information to the fourth function.
In an embodiment, the fourth communication interface 1701 is further configured to send a response to the fourth function.
It should be noted that: the specific processing of the fourth processor 1702 and the fourth communication interface 1701 may be understood with reference to the methods described above.
Of course, in actual practice, the various components of third function 1700 are coupled together via bus system 1704. It is appreciated that the bus system 1704 is used to implement a connected communication between these components. The bus system 1704 includes a power bus, a control bus, and a status signal bus in addition to the data bus. But for clarity of illustration, the various buses are labeled as bus system 1704 in fig. 17.
The fourth memory 1703 in an embodiment of the present application is used to store various types of data to support third function 1700 operations. Examples of such data include: any computer program for operating on third function 1700.
The method disclosed in the above embodiment of the present application may be applied to the fourth processor 1702 or implemented by the fourth processor 1702. The fourth processor 1702 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the method described above may be performed by instructions in the form of integrated logic circuits or software in hardware in the fourth processor 1702. The fourth processor 1702 described above may be a general purpose processor, DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The fourth processor 1702 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the application can be directly embodied in the hardware of the decoding processor or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the fourth memory 1703 and the fourth processor 1702 reads information from the fourth memory 1703, in combination with hardware, to perform the steps of the methods described above.
In an exemplary embodiment, third function 1700 may be implemented by one or more ASIC, DSP, PLD, CPLD, FPGA, general purpose processors, controllers, MCU, microprocessor, or other electronic elements for performing the foregoing methods.
Based on the hardware implementation of the program modules, and in order to implement the method of the fourth function side in the embodiment of the present application, the embodiment of the present application further provides a fourth function, as shown in fig. 18, where the fourth function 1800 includes:
a fifth communication interface 1801, capable of information interaction with other NFs;
a fifth processor 1802, connected to the fifth communication interface 1801, for implementing information interaction with other NFs, and configured to execute, when executing a computer program, a method provided by one or more technical solutions on the fourth function side;
a fifth memory 1803, said computer program being stored on said fifth memory 1803.
Specifically, the fifth communication interface 1801 is configured to send a third request to a third function, where the third request is used to request fifth information of an open UPF; the third request contains at least an identification of the fourth function 1800 and/or an identification of a UPF.
Wherein, in an embodiment, the fifth communication interface 1801 is further configured to receive a response sent by the fourth function.
It should be noted that: the specific processing procedure of the fifth communication interface 1801 can be understood with reference to the above method.
Of course, in actual practice, the various components of the fourth function 1800 are coupled together by the bus system 1804. It is appreciated that the bus system 1804 is employed to facilitate connected communications between these components. The bus system 1804 includes a power bus, a control bus, and a status signal bus in addition to the data bus. The various buses are labeled as bus system 1804 in fig. 18 for clarity of illustration.
The fifth memory 1803 in the embodiment of the present application is used to store various types of data to support the fourth function 1800 operation. Examples of such data include: any computer program for operating on the fourth function 1800.
The method disclosed in the above embodiment of the present application may be applied to the fifth processor 1802 or implemented by the fifth processor 1802. The fifth processor 1802 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the method described above may be performed by instructions in the form of integrated logic circuits or software in hardware in the fifth processor 1802. The fifth processor 1802 described above may be a general purpose processor, DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The fifth processor 1802 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiment of the application can be directly embodied in the hardware of the decoding processor or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the fifth memory 1803 and the fifth processor 1802 reads information in the fifth memory 1803 to perform the steps of the method as described above in connection with the hardware thereof.
In an exemplary embodiment, the fourth functionality 1800 may be implemented by one or more ASIC, DSP, PLD, CPLD, FPGA, general-purpose processors, controllers, MCU, microprocessor, or other electronic elements for performing the foregoing methods.
It is to be understood that the memories (the first memory 1403, the second memory 1503, the third memory 1603, the fourth memory 1703, the fifth memory 1803) of the embodiments of the present application may be volatile memories or nonvolatile memories, and may include both volatile and nonvolatile memories. Wherein the nonvolatile Memory may be Read Only Memory (ROM), programmable Read Only Memory (PROM, programmable Read-Only Memory), erasable programmable Read Only Memory (EPROM, erasable Programmable Read-Only Memory), electrically erasable programmable Read Only Memory (EEPROM, electrically Erasable Programmable Read-Only Memory), magnetic random access Memory (FRAM, ferromagnetic random access Memory), flash Memory (Flash Memory), magnetic surface Memory, optical disk, or compact disk Read Only Memory (CD-ROM, compact Disc Read-Only Memory); the magnetic surface memory may be a disk memory or a tape memory. The volatile memory may be random access memory (RAM, random Access Memory), which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (SRAM, static Random Access Memory), synchronous static random access memory (SSRAM, synchronous Static Random Access Memory), dynamic random access memory (DRAM, dynamic Random Access Memory), synchronous dynamic random access memory (SDRAM, synchronous Dynamic Random Access Memory), double data rate synchronous dynamic random access memory (ddr SDRAM, double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random access memory (ESDRAM, enhanced Synchronous Dynamic Random Access Memory), synchronous link dynamic random access memory (SLDRAM, syncLink Dynamic Random Access Memory), direct memory bus random access memory (DRRAM, direct Rambus Random Access Memory). The memory described by embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
In order to implement the method of the embodiment of the present application, the embodiment of the present application further provides an information opening system, as shown in fig. 19, where the system includes: a first function 1901, a second function 1902, and a UPF 1903; alternatively, as shown in fig. 20, the system includes: third function 2001, fourth function 2002, and UPF 2003.
It should be noted that, the specific processing procedure of the above functions is described in detail above, and will not be repeated here.
In an exemplary embodiment, a storage medium, i.e. a computer storage medium, is provided, in particular, a computer readable storage medium, for example, including a first memory 1403 storing a computer program, where the computer program may be executed by a first processor 1402 storing the computer program to perform the steps of the aforementioned UPF-side method, further including a second memory 1503 storing the computer program, where the computer program may be executed by a second processor 1502 storing the first function 1500 to perform the steps of the aforementioned first function-side method, further including a third memory 1603 storing the computer program, where the computer program may be executed by a third processor 1602 storing the second function 1600 to perform the steps of the aforementioned second function-side method, further including a fourth memory 1703 storing the computer program, where the computer program may be executed by a fourth processor 1702 storing the third function, to perform the steps of the aforementioned third function-side method, further including a fifth memory 1803 storing the computer program, where the computer program may be executed by a fourth processor 1700 executing the steps of the fourth function-side method 1800. The computer readable storage medium may be FRAM, ROM, PROM, EPROM, EEPROM, flash Memory, magnetic surface Memory, optical disk, or CD-ROM.
It should be noted that: "first," "second," etc. are used to distinguish similar objects and not necessarily to describe a particular order or sequence.
In addition, the embodiments of the present application may be arbitrarily combined without any collision.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the present application.

Claims (40)

1. An information opening method, applied to a user plane function UPF, comprising:
receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF;
and opening second information to the first function.
2. The method of claim 1, wherein the opening the second information to the first function comprises:
and opening the second information directly to the second function.
3. The method of claim 1, wherein prior to opening the second information to the first function, the method further comprises:
sending a second request to a second function, the second request being for requesting the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF;
Receiving third information sent by the second function, wherein the third information indicates one of the following contents:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
4. The method according to claim 1, wherein the method further comprises:
and sending a response to the first function.
5. The method of claim 1, wherein the opening of the second information to the first function comprises at least one of:
opening second information to the first function in an event-triggered manner;
and periodically opening second information to the first function.
6. The method of any one of claims 1 to 5, wherein the request further comprises at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
7. An information opening method, applied to a first function, comprising:
sending a first request to a UPF, wherein the first request is used for requesting to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
8. The method of claim 7, wherein the method further comprises:
and receiving the response sent by the UPF.
9. The method of claim 7 or 8, wherein the first request further comprises at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
10. An information opening method, applied to a second function, comprising:
receiving a second request sent by the UPF, wherein the second request is used for requesting the UPF to open first information to a first function; the second request contains an identification of the first function and/or an identification of a UPF;
transmitting third information to the UPF, the third information indicating one of:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
11. The method of claim 10, wherein the second request further comprises at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
12. An information opening method, applied to a third function, comprising:
receiving a third request sent by a fourth function, wherein the third request is used for requesting fifth information of an open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF;
and sending sixth information to the UPF, wherein the sixth information indicates that the UPF opens seventh information to the fourth function.
13. The method of claim 12, wherein the sixth information indicates one of:
opening seventh information to the fourth function;
disallowing opening eighth information to the fourth function;
indicating that the opening is allowed.
14. The method according to claim 12, wherein the method further comprises:
and sending a response to the fourth function.
15. The method of claim 12, wherein the sixth information comprises at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
16. The method according to any one of claims 12 to 15, wherein the third request further comprises at least one of:
An open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
17. An information opening method applied to a fourth function, comprising:
sending a third request to a third function, the third request being for requesting fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
18. The method of claim 17, wherein the method further comprises:
and receiving a response sent by the third function.
19. The method of claim 17 or 18, wherein the third request further comprises at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
20. An information opening method, applied to a UPF, comprising:
receiving sixth information sent by a third function, wherein the sixth information indicates that the UPF opens seventh information to a fourth function;
and opening seventh information to the fourth function.
21. The method of claim 20, wherein the sixth information indicates one of:
Opening seventh information to the fourth function;
disallowing opening eighth information to the fourth function;
indicating that the opening is allowed.
22. The method of claim 20, wherein the sixth information comprises at least one of:
an open mode;
the effective duration of the opening;
user and/or session related information;
network and/or network function related information.
23. The method according to any of claims 20 to 22, wherein said opening seventh information to said fourth function comprises at least one of:
opening seventh information to the fourth function in an event-triggered manner;
and periodically opening seventh information to the fourth function.
24. An information opening device provided in a UPF, comprising:
the first receiving unit is used for receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF;
and a first opening unit for opening the second information to the first function.
25. An information opening device, characterized by being provided in a first function, comprising:
A first sending unit, configured to send a first request to a UPF, where the first request is used to request to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
26. An information opening device, characterized by being provided in a second function, comprising:
a second receiving unit, configured to receive a second request sent by a UPF, where the second request is used to request the UPF to open first information to a first function; the second request contains an identification of the first function and/or an identification of a UPF;
a second transmitting unit, configured to transmit third information to the UPF, where the third information indicates one of the following:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
27. An information opening device provided in a third function, comprising:
a third receiving unit, configured to receive a third request sent by the fourth function, where the third request is used to request fifth information of an open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF;
and a third transmitting unit configured to transmit sixth information to the UPF, the sixth information indicating that the UPF opens seventh information to the fourth function.
28. An information opening device provided in a fourth function, comprising:
a fourth transmitting unit configured to transmit a third request to a third function, the third request being for requesting fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
29. An information opening device provided in a UPF, comprising:
a fourth receiving unit, configured to receive sixth information sent by the third function, where the sixth information indicates that the UPF opens seventh information to the fourth function;
and a second opening unit configured to open seventh information to the fourth function.
30. A UPF, comprising: a first processor and a first communication interface; wherein,
the first communication interface is used for receiving a first request sent by a first function, wherein the first request is used for requesting to open first information; the first request at least comprises an identification of the first function and/or an identification of a UPF; the first processor is configured to open second information to the first function through the first communication interface;
or,
the first communication interface is configured to receive sixth information sent by the third function, where the sixth information indicates that the UPF opens seventh information to the fourth function; the first processor is configured to open seventh information to the fourth function through the first communication interface.
31. A first function, comprising: a second processor and a second communication interface; wherein,
the second communication interface is configured to send a first request to the UPF, where the first request is used to request to open first information of the UPF; the first request contains at least an identification of the first function and/or an identification of a UPF.
32. A second function, comprising: a third processor and a third communication interface; wherein,
the third communication interface is configured to receive a second request sent by the UPF, where the second request is used to request the UPF to open first information to the first function; the second request contains an identification of the first function and/or an identification of a UPF; and transmitting third information to the UPF, the third information indicating one of:
opening second information of a UPF to the first function;
disallowing opening fourth information to the first function;
indicating that the opening is allowed.
33. A third function, comprising: a fourth processor and a fourth communication interface; wherein,
the fourth communication interface is configured to receive a third request sent by the fourth function, where the third request is used to request fifth information of the open UPF; the third request at least comprises an identification of the fourth function and/or an identification of a UPF; and sending sixth information to the UPF, the sixth information indicating that the UPF opens seventh information to the fourth function.
34. A fourth function, comprising: a fifth processor and a fifth communication interface; wherein,
the fifth communication interface is configured to send a third request to a third function, where the third request is used to request fifth information of an open UPF; the third request contains at least an identification of the fourth function and/or an identification of a UPF.
35. A UPF, comprising: a first processor and a first memory for storing a computer program capable of running on the processor,
wherein the first processor is adapted to perform the steps of the method of any of claims 1 to 6 or to perform the steps of the method of any of claims 20 to 23 when the computer program is run.
36. A first function, comprising: a second processor and a second memory for storing a computer program capable of running on the processor,
wherein the second processor is adapted to perform the steps of the method of any of claims 7 to 9 when the computer program is run.
37. A second function, comprising: a third processor and a third memory for storing a computer program capable of running on the processor,
Wherein the third processor is adapted to perform the steps of the method of claim 10 or 11 when the computer program is run.
38. A third function, comprising: a fourth processor and a fourth memory for storing a computer program capable of running on the processor,
wherein the fourth processor is adapted to perform the steps of the method of any of claims 12 to 16 when the computer program is run.
39. A fourth function, comprising: a fifth processor and a fifth memory for storing a computer program capable of running on the processor,
wherein the fifth processor is adapted to perform the steps of the method of any of claims 17 to 19 when the computer program is run.
40. A storage medium having stored thereon a computer program, which when executed by a processor, performs the steps of the method of any one of claims 1 to 6, or performs the steps of the method of any one of claims 7 to 9, or performs the steps of the method of claim 10 or 11, or performs the steps of the method of any one of claims 12 to 16, or performs the steps of the method of any one of claims 17 to 19, or performs the steps of the method of any one of claims 20 to 23.
CN202210487973.7A 2022-05-06 2022-05-06 Information opening method, device, related equipment and storage medium Pending CN117062069A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210487973.7A CN117062069A (en) 2022-05-06 2022-05-06 Information opening method, device, related equipment and storage medium
PCT/CN2023/092509 WO2023213323A1 (en) 2022-05-06 2023-05-06 Information opening method and apparatus, and related device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210487973.7A CN117062069A (en) 2022-05-06 2022-05-06 Information opening method, device, related equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117062069A true CN117062069A (en) 2023-11-14

Family

ID=88646305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210487973.7A Pending CN117062069A (en) 2022-05-06 2022-05-06 Information opening method, device, related equipment and storage medium

Country Status (2)

Country Link
CN (1) CN117062069A (en)
WO (1) WO2023213323A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112218272A (en) * 2019-07-10 2021-01-12 大唐移动通信设备有限公司 Event subscription method, device and equipment
CN113498215A (en) * 2020-04-08 2021-10-12 中国移动通信有限公司研究院 Method and equipment for opening network information
CN113973322A (en) * 2020-07-24 2022-01-25 华为技术有限公司 Communication method and device
EP4191972A4 (en) * 2020-08-13 2023-09-27 Huawei Technologies Co., Ltd. Network capability opening method, apparatus and system

Also Published As

Publication number Publication date
WO2023213323A1 (en) 2023-11-09

Similar Documents

Publication Publication Date Title
CN111918271B (en) Information configuration method and device
US9106603B2 (en) Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content
CN111865888B (en) Proxy subscription authorization method and device
MX2009001847A (en) Selective control of user equipment capabilities.
CN116057924A (en) Methods, systems, and computer readable media for providing network function discovery service enhancements
CN110519825B (en) Routing strategy processing method, device, related equipment and storage medium
US20220329492A1 (en) Data collection method and apparatus
CN112153678B (en) Session management method, session management device, related equipment and storage medium
EP4295600A1 (en) Roaming in cellular communication networks
CN116097691A (en) Service request handling
CN113055342B (en) Information processing method and communication device
CN114727361A (en) Processing method and device for network function selection and network equipment
WO2023236497A1 (en) Authentication method and apparatus, storage medium, and electronic device
CN117062069A (en) Information opening method, device, related equipment and storage medium
US11888721B2 (en) Network monitoring
EP3183865A1 (en) A method, system and device for accessing data storage in a telecommunications network.
WO2023213321A1 (en) Communication method and apparatus, and network function and storage medium
WO2023169206A1 (en) Authorization verification method and device
WO2024114356A1 (en) Information transmission method and apparatus, and related device and storage medium
WO2023051631A1 (en) Data call method and apparatus
WO2024032270A1 (en) Strategy determination method and apparatus, and storage medium
CN117676490A (en) Communication method, device, related equipment and storage medium
CN116419142A (en) Information processing method, device, functional body and storage medium
US20240070125A1 (en) Data Management in a Network Function
US11356891B2 (en) Control method for data transmission and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination