WO2020192622A1 - 一种终端的管控方法、装置及系统 - Google Patents
一种终端的管控方法、装置及系统 Download PDFInfo
- Publication number
- WO2020192622A1 WO2020192622A1 PCT/CN2020/080639 CN2020080639W WO2020192622A1 WO 2020192622 A1 WO2020192622 A1 WO 2020192622A1 CN 2020080639 W CN2020080639 W CN 2020080639W WO 2020192622 A1 WO2020192622 A1 WO 2020192622A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- network element
- information
- communication information
- data
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 112
- 238000004891 communication Methods 0.000 claims abstract description 352
- 238000012545 processing Methods 0.000 claims description 88
- 238000013475 authorization Methods 0.000 claims description 2
- 230000006399 behavior Effects 0.000 abstract description 15
- 238000007726 management method Methods 0.000 description 124
- 230000006870 function Effects 0.000 description 53
- 238000013461 design Methods 0.000 description 24
- 230000015654 memory Effects 0.000 description 14
- 230000002159 abnormal effect Effects 0.000 description 11
- 238000013523 data management Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000004044 response Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- CNQCVBJFEGMYDW-UHFFFAOYSA-N lawrencium atom Chemical compound [Lr] CNQCVBJFEGMYDW-UHFFFAOYSA-N 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 101150119040 Nsmf gene Proteins 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/0816—Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
Definitions
- This application relates to the field of communication technology, and in particular to a method, device and system for terminal management and control.
- the 5th generation (5G) communication system fully supports vertical industry fields, such as transportation, energy, video entertainment, industry, smart cities, healthcare, agriculture, finance, education, etc.
- new technologies such as sensors, artificial intelligence, and the Internet of Things have greatly improved industry efficiency and brought unlimited business opportunities.
- Application scenarios related to these new technologies include ports, hospitals, railways, factories, etc.
- the business needs of vertical industries are that mobile networks provide data connections (including reliability, speed, etc.) that meet business needs, and the network's ability to open to vertical industries.
- a large number of terminals are scattered, such as mobile robots, automated guided vehicles (AGVs), vehicles, equipment on trains, sensors, and control equipment. Wait. There is no corresponding method in the prior art for how to control the communication behavior of these terminals.
- this application provides a terminal management and control method, device and system.
- this application provides a terminal management and control method, including: a session management network element obtains authorized communication information of a first terminal or a terminal group, where the authorized communication information includes the permission of the first terminal or the terminal group Information of the communication device; when the first terminal or the second terminal in the terminal group communicates with a device other than the authorized communication information, the session management network element learns that it needs to contact the first terminal or the second terminal The communication of the second terminal implements management and control measures; the session management network element implements the management and control measures.
- the session management network element obtains the authorized communication information of the first terminal or the terminal group.
- the first terminal or the second terminal in the terminal group communicates with devices other than the authorized communication information, it knows that the first terminal or terminal needs to be
- the second terminal in the group implements control measures.
- the method enables the terminal to communicate with the equipment in the authorized communication information, manages and monitors the communication behavior of the terminal, and ensures the stability and security of terminal communication.
- the management and control measures include any one or more of the following: packet loss processing on data, the data being other than the first terminal or the second terminal and the authorized communication information
- the data communicated by the device when the number of times the first terminal or the second terminal in the terminal group communicates with devices other than the authorized communication information exceeds a preset value, perform packet loss processing on the data;
- the third-party device reports, and the third-party device is a device that manages the first terminal or the terminal group; when the first terminal or a second terminal in the terminal group communicates with other than the authorized communication information After the number of device communications exceeds a preset value, report to the third-party device.
- the management and control measures include packet loss processing on the data
- the session management network element executing the management and control measures includes: the session management network element sends a notification to the user plane network element, so The notification is used to instruct to delete the data.
- the user plane network element receives the notification, it deletes the data of the first terminal or the second terminal communicating with devices other than the authorized communication information, so that the terminal can communicate with, manage, and monitor the devices in the authorized communication information.
- the communication behavior of the terminal is improved, and the stability and security of the terminal communication are ensured.
- the management and control measure includes performing packet loss processing on the data
- the execution of the management and control measure by the session management network element includes: the session management network element deletes the data.
- the session management network element deletes the data of the first terminal or the second terminal communicating with the device other than the authorized communication information, so that the terminal communicates with the device in the authorized communication information, and manages and monitors the communication behavior of the terminal , To ensure the stability and security of terminal communication.
- the management and control measures include reporting to the third-party device, and then the session management network element executing the management and control measures includes: the session management network element generates report information, and sends the report information Sent to the third-party device, where the report information is used to instruct the first terminal or the second terminal to communicate with a device other than the authorized communication information; or the session management network element receives from the user plane And sending the report information to the third-party device.
- the third-party device learns the abnormal situation, it can take corresponding measures, such as returning to the factory for maintenance, so that the terminal can communicate with the device in the authorized communication information, manage and monitor the communication behavior of the terminal, and ensure the stability of the terminal communication And security.
- the learning that the session management network element needs to perform the management and control measures on the first terminal or the second terminal includes: the session management network element receives a report from a user plane network element Information, learned that the management and control measures need to be performed on the first terminal or the second terminal, and the report information is used to instruct the first terminal or the second terminal to communicate with a device other than the authorized communication information .
- the knowledge that the session management network element needs to perform the management and control measures on the first terminal or the second terminal includes: the session management network element receives data and learns that the The first terminal or the second terminal executes the management and control measures, and the data is data for the first terminal or the second terminal to communicate with a device other than the authorized communication information, and the data carries the authorization Information about equipment other than communication information.
- the session management network element receives indication information from a third-party device, and the indication information is used to indicate when the first terminal or the second terminal communicates with other than the authorized communication information Execute the control measures when the device communicates.
- the execution of the management and control measures by the session management network element includes: the session management network element executes the management and control measures according to the instruction information.
- the session management network element acquiring the authorized communication information of the first terminal or the terminal group includes: the session management network element acquiring the first terminal from a third-party device Or the authorized communication information of the terminal group; or the session management network element obtains the authorized communication information of the first terminal or the terminal group locally.
- this application provides a terminal management and control method, including: a user plane network element obtains authorized communication information of a first terminal or a terminal group, where the authorized communication information includes the permission of the first terminal or the terminal group The information of the communication device; the user plane network element detects that the first terminal or the second terminal in the terminal group communicates with the device other than the authorized communication information; the user plane network element responds to the first terminal The communication of a terminal or the second terminal implements management and control measures.
- the user plane network element obtains the authorized communication information of the first terminal or the terminal group, and when it is detected that the first terminal or the second terminal in the terminal group communicates with a device other than the authorized communication information, Implement control measures.
- the method enables the terminal to communicate with the equipment in the authorized communication information, manages and monitors the communication behavior of the terminal, and ensures the stability and security of terminal communication.
- the user plane network element detecting that the first terminal or the second terminal communicates with a device other than the authorized communication information includes: the user plane network element receives data, the The data is data for the first terminal or the second terminal to communicate with devices other than the authorized communication information, and the data carries information about the devices other than the authorized communication information; the user plane network element is based on the Information of a device other than the authorized communication information, and it is detected that the first terminal or the second terminal communicates with a device other than the authorized communication information.
- control measures include any one or more of the following: packet loss processing on the data; when the first terminal or the second terminal in the terminal group communicates with the authorized When the number of times of communication with devices other than information exceeds a preset value, the data is packet-dropped; it is reported to a third-party device, and the third-party device is a device that manages the first terminal or the terminal group; when After the number of times the first terminal or the second terminal in the terminal group communicates with a device other than the authorized communication information exceeds a preset value, report to the third-party device.
- the user plane network element executing the management and control measures includes: the user plane network element sends report information to the session management network element, and the report information is used to indicate The first terminal or the second terminal communicates with a device other than the authorized communication information; the user plane network element receives a notification from the session management network element, and the notification is used to instruct to delete the data; The user plane network element deletes the data according to the notification. In this way, after the user plane network element receives the notification, it deletes the data of the first terminal or the second terminal communicating with devices other than the authorized communication information, so that the terminal can communicate with, manage, and monitor the devices in the authorized communication information. The communication behavior of the terminal is improved, and the stability and security of the terminal communication are ensured.
- the user-plane network element performing the management and control measures includes: the user-plane network element sends report information to the third-party device, and the report information is used for Instruct the first terminal or the second terminal to communicate with a device other than the authorized communication information.
- the third-party device learns the abnormal situation, it can take corresponding measures, such as returning to the factory for maintenance, so that the terminal can communicate with the device in the authorized communication information, manage and monitor the communication behavior of the terminal, and ensure the stability of the terminal communication And security.
- the user plane network element acquiring the authorized communication information of the first terminal or the terminal group includes: the user plane network element acquiring the first terminal from a third-party device Or the authorized communication information of the terminal group; or the user plane network element obtains the authorized communication information of the first terminal or the terminal group locally.
- the user plane network element also receives indication information from a third-party device, and the indication information is used to indicate when the first terminal or the second terminal communicates with the authorized communication information other than Execute the control measures when communicating with the device.
- the execution of the management and control measure by the user plane network element includes: the user plane network element executes the management and control measure according to the instruction information.
- the authorized communication information of the first aspect or the second aspect includes any one or more of the following: the identification of the device that the first terminal or the terminal group allows communication; The Internet Protocol IP address of a terminal or a device in the terminal group that allows communication; the media access control MAC address of the first terminal or a device in the terminal group that allows communication; the first terminal or the terminal group allows The identifier of the communicating application; the server network address of the application allowed to communicate with the first terminal or the terminal group.
- the present application provides a session management network element, the session management network element having the function of implementing the method in the first aspect.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware and software include one or more modules corresponding to the above functions.
- the structure of the session management network element includes a processing unit and a communication unit, and the processing unit is configured to support the session management network element to execute the method described in the first aspect, so
- the communication unit is used to support communication between the session management network element and other devices.
- the session management network element may further include a storage unit, the storage unit is configured to be coupled with the processing unit, and stores the program instructions and data necessary for the session management network element.
- the processing unit may be a processor
- the communication unit may be a transceiver
- the storage unit may be a memory.
- the communication unit includes a receiving unit and a sending unit, and these units can execute the method described in the first aspect above.
- these units can execute the method described in the first aspect above.
- the present application provides a device (for example, the device may be a chip system).
- the device includes a processor and can execute the method described in the first aspect.
- the device also includes a memory for storing necessary program instructions and data.
- the present application provides a computer program product, which when running on a computer, enables the computer to execute the method described in the first aspect.
- a computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute the method described in the first aspect.
- the present application provides a user plane network element, the user plane network element having a function of implementing the method in the second aspect.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware and software include one or more modules corresponding to the above functions.
- the structure of the user plane network element includes a processing unit and a communication unit, and the processing unit is configured to support the user plane network element to execute the method described in the above second aspect, the The communication unit is used to support communication between the user plane network element and other devices.
- the user plane network element may further include a storage unit, the storage unit is configured to be coupled with the processing unit, and stores the necessary program instructions and data of the user plane network element.
- the processing unit may be a processor
- the communication unit may be a transceiver
- the storage unit may be a memory.
- the communication unit includes a receiving unit and a sending unit, and these units can execute the method described in the second aspect above.
- these units can execute the method described in the second aspect above.
- the present application provides a device (for example, the device may be a chip system).
- the device includes a processor and can execute the method described in the second aspect.
- the device also includes a memory for storing necessary program instructions and data.
- the present application provides a computer program product, which when running on a computer, enables the computer to execute the method described in the second aspect.
- a computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute the method described in the second aspect.
- this application provides a communication system, which includes one or more of the session management network elements involved in the first aspect and the user plane network elements involved in the second aspect.
- the communication system may also include other devices, such as third-party devices, terminals, etc., that interact with the session management network element and the user plane network element in the solution provided in the embodiment of the present application.
- devices such as third-party devices, terminals, etc., that interact with the session management network element and the user plane network element in the solution provided in the embodiment of the present application.
- FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of this application.
- Figure 2 is a schematic diagram of a 5G network architecture provided by an embodiment of the application.
- FIG. 3 is a flowchart of a terminal management and control method provided by an embodiment of the application.
- FIG. 5 is a flowchart of another terminal management and control method provided by an embodiment of the application.
- FIG. 6 is a flowchart of another terminal management and control method provided by an embodiment of the application.
- FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of this application.
- FIG. 7a is a schematic structural diagram of a session management network element provided by an embodiment of this application.
- FIG. 7b is a schematic structural diagram of a user plane network element provided by an embodiment of this application.
- FIG. 8 is a schematic structural diagram of another communication device provided by an embodiment of this application.
- At least one item (item) is under or similar expressions refers to any combination of these items, including any combination of single item (item) or plural items (item).
- at least one item (a) of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
- words such as “first” and “second” are used to distinguish functions and effects. Those skilled in the art can understand that words such as “first” and “second” do not limit the quantity and order of execution, and words such as “first” and “second” do not limit the difference.
- GSM global system for mobile communications
- CDMA code division multiple access
- WCDMA broadband code division multiple access
- GPRS general packet radio service
- LTE long term evolution
- FDD frequency division duplex
- TDD LTE Time division duplex
- UMTS universal mobile telecommunication system
- WiMAX worldwide interoperability for microwave access
- the network architecture includes terminal equipment 101, access network equipment 102, user plane network element 103, data network network element 104, authentication service network element 105, mobility management network element 106, session management network element 107, and capability opening network element 108 , Network storage network element 109, policy control network element 110, data management network element 111, and third-party equipment 112, respectively, as follows:
- Terminal device (TD) 101 Referred to as terminal for short, it is a device with wireless transceiver function, which can include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or connected to Other processing equipment of wireless modems, as well as various forms of terminals, mobile stations (mobile stations, MS), terminals (terminals), user equipment (UE), soft terminals, and so on. Terminals can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; they can also be deployed on the water (such as ships, etc.); they can also be deployed in the air (such as airplanes, balloons, and satellites, etc.).
- mobile phones, tablets, computers with wireless transceiver functions virtual reality (VR) terminals, augmented reality (AR) terminals, industrial control (industrial control) wireless Terminals, wireless terminals in self-driving (self-driving), wireless terminals in remote medical (remote medical), wireless terminals in smart grid (smart grid), wireless terminals in transportation safety, smart cities ( Wireless terminals in smart city, wireless terminals in smart home, etc.
- VR virtual reality
- AR augmented reality
- industrial control industrial control
- wireless Terminals wireless terminals in self-driving
- wireless terminals in remote medical remote medical
- wireless terminals in smart grid smart grid
- wireless terminals in transportation safety smart cities
- smart cities Wireless terminals in smart city, wireless terminals in smart home, etc.
- (Wireless) access network equipment (radio access network, (R)AN) 102 is a device that provides wireless communication functions for terminals, including but not limited to: next-generation base stations (gnodeB, gNB) in 5G , Evolved node B (evolved node B, eNB), radio network controller (RNC), node B (node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (BBU), transmission point (TRP), transmission point (TP) )Wait.
- next-generation base stations evolved node B, eNB
- RNC radio network controller
- node B node B
- BSC base station controller
- BTS base transceiver station
- BTS home base station
- home base station for example, home evolved nodeB, or home node B, HNB
- BBU baseband
- User plane network element 103 used for packet routing and forwarding, and quality of service (QoS) processing of user plane data, etc.
- the user plane network element may be a user plane function (UPF) network element.
- the user plane network element may still be a UPF network element, or may also have other names, which is not limited in this application.
- Data network network element 104 used to provide a network for transmitting data.
- the data network element may be a data network (DN) network element.
- the data network network element may still be a DN network element, or may also have other names, which is not limited in this application.
- Authentication service network element 105 used to implement authentication and authentication of users.
- the authentication service network element may be an authentication server function (authentication server function, AUSF) network element.
- the authentication service network element may still be an AUSF network element, or may also have other names, which is not limited in this application.
- Mobility management network element 106 mainly used for terminal access and mobility management.
- the mobility management network element may be a mobility management entity (MME), and in a 5G network, the mobility management network element may be an access management function (access and mobility management function, AMF) network yuan.
- the mobility management network element may still be an AMF network element, or may also have other names, which are not limited in this application.
- Session management network element 107 Mainly used for session management, terminal equipment Internet Protocol (IP) address allocation and management, selection of end points that can manage user plane functions, policy control and charging function interfaces, and downlink Data notification, etc.
- the session management network element may be a session management function (Session Management Function, SMF) network element.
- SMF Session Management Function
- the session management network element may still be an SMF network element, or may also have other names, which is not limited in this application.
- Capability opening network element 108 used to safely open services and capabilities provided by 3GPP network function network elements to the outside.
- the network opening network element may be a service capability exposure function (SCEF) network element.
- SCEF service capability exposure function
- NEF network exposure function
- the network open network element may still be a NEF network element, or may also have other names, which is not limited by this application.
- Network storage network element 109 Used to store information about network functions deployed in the core network, and provide network functions and service discovery.
- the network storage network element can be a network storage function (network repository function, NRF) network element.
- NRF network repository function
- the network storage network element can still be an NRF network element, and it can also have other names. The application is not limited.
- Policy control network element 110 a unified policy framework used to guide network behavior, and provide policy rule information for control plane function network elements (such as AMF, SMF network elements, etc.).
- the policy control network element may be a policy control function (PCF) network element.
- PCF policy control function
- the policy control network element may still be a PCF network element, or may also have other names, which is not limited in this application.
- Data management network element 111 used to process user identification, access authentication, registration, and mobility management.
- the data management network element may be a home subscriber server (HSS)
- the data management network element may be a unified data management (UDM) network element.
- unified data management may still be UDM network elements, or may also have other names, which are not limited by this application.
- the third-party device 112 a device used to manage the terminal 101, and the third-party device 112 stores attribute information of the managed terminal, such as location information and type of the terminal.
- the network architecture of this application includes a terminal 101 as an example. In actual applications, the network architecture may include multiple terminals. Accordingly, the multiple terminals can be managed by the third-party device 112. Of course The multiple terminals can also be managed by different third-party devices.
- the third-party device 112 connects to the capability opening network element through an application interface provided by the capability opening network element, and manages the terminal 101 through the capability opening network element.
- the third-party device 112 may be a server device or an application function (AF) network element of a vertical industry control center.
- AF application function
- a mobility management network element can also be referred to as a mobility management function or a mobility management functional entity
- a data management network element can also be referred to as It is a data management function or a data management function entity, etc.
- the name of each network element is not limited in this application, and those skilled in the art can change the name of the above-mentioned network element to another name to perform the same function, which all fall within the protection scope of this application
- network elements or functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
- FIG. 2 it is a schematic diagram of another possible network architecture applicable to this application.
- Figure 2 takes the 5G network architecture as an example.
- the network architecture includes: terminal equipment 101, (R) AN202, UPF network element 203, DN network element 204, AUSF network element 205, AMF network element 206, SMF network element 207, NEF network element 208, NRF network element 209, PCF
- the network element 120, the UDM network element 211, and the AF network element 212 The network element 120, the UDM network element 211, and the AF network element 212.
- UPF network element 203 UPF network element 203, DN network element 204, AUSF network element 205, AMF network element 206, SMF network element 207, NEF network element 208, NRF network element 209, PCF network element 120, UDM network element 211, and AF network
- the element 212 is abbreviated as UPF203, DN204, AUSF205, AMF206, SMF207, NEF208, NRF209, PCF120, UDM211, and AF212.
- the access network device in the network architecture shown in FIG. 1 may be the (R)AN 202 in the network architecture shown in FIG. 2.
- the user plane network element 103 in the network architecture shown in FIG. 1 may be the UPF 203 in the network architecture shown in FIG. 2.
- the data network element 104 in the network architecture shown in FIG. 1 may be the DN 204 in the network architecture shown in FIG. 2.
- the authentication service network element 105 in the network architecture shown in FIG. 1 may be AUSF 205 in the network architecture shown in FIG. 2.
- the mobility management network element 106 in the network architecture shown in FIG. 1 may be the AMF 206 in the network architecture shown in FIG. 2.
- the session management network element 107 in the network architecture shown in FIG. 1 may be the SMF 207 in the network architecture shown in FIG. 2.
- the capability opening network element 108 in the network architecture shown in FIG. 1 may be the NEF 208 in the network architecture shown in FIG. 2.
- the network storage network element 109 in the network architecture shown in FIG. 1 may be the NRF 209 in the network architecture shown in FIG. 2.
- the policy control network element 110 in the network architecture shown in FIG. 1 may be the PCF 210 in the network architecture shown in FIG. 2.
- the data management network element 111 in the network architecture shown in FIG. 1 may be UDM 211 in the network architecture shown in FIG. 2.
- the third-party device 112 in the network architecture shown in FIG. 1 may be the AF 212 in the network architecture shown in FIG. 2.
- the function of each network element can be referred to the description in Figure 1, and will not be repeated here.
- Nausf is the service-based interface displayed by AUSF105
- Namf is the service-based interface displayed by AMF106
- Nsmf is the service-based interface displayed by SMF107
- Nnef is the service-based interface displayed by NEF108
- Nnrf is displayed by NRF109.
- Npcf is the service-based interface displayed by PCF110
- Nudm is the service-based interface displayed by UDM111
- Naf is the service-based interface displayed by AF112.
- N1 is the reference point between UE101 and AMF106
- N2 is the reference point of (R)AN102 and AMF106, used for non-access stratum (NAS) message transmission, etc.
- N3 is (R)AN102 and UPF103 The reference point between is used to transmit user plane data, etc.
- N4 is the reference point between SMF107 and UPF103, used to transmit information such as tunnel identification information of the N3 connection, data buffer indication information, and downlink data notification messages
- the N6 interface is the reference point between UPF103 and DN104, used to transmit user plane data.
- the following takes the network architecture shown in FIG. 2 as an example to describe the terminal monitoring method provided in the embodiment of the present application. That is, taking the session management network element as the SMF, the policy control network element as the PCF, the data management network element as the UDM, the capability opening network element as the NEF, and the user plane network element as the UPF as an example, a schematic description is given.
- a terminal management and control method provided by this embodiment of the application includes the following steps:
- the SMF obtains authorized communication information (authorized communication information) of a terminal (for example, the first terminal) or a terminal group.
- the authorized communication information when the SMF obtains the authorized communication information of the first terminal, includes the identification of the first terminal and the information of the devices that the first terminal allows communication.
- the information of the devices that the first terminal allows communication may be, for example, that the first terminal allows communication.
- the authorized communication information may include a list of information of devices that the first terminal allows to communicate.
- the list of information of devices that the first terminal allows to communicate may be, for example, a list of identities and IP addresses of devices that the first terminal allows to communicate.
- the authorized communication information includes the group identifier (group ID) of the terminal group and the information of the devices allowed to communicate in the terminal group.
- the information of the devices allowed to communicate in the terminal group can be, for example, the terminal group allows communication.
- the authorized communication information may include a list of information about the devices allowed to communicate in the terminal group.
- the list of information about the devices allowed to communicate in the terminal group may be, for example, a list of identities, a list of IP addresses, and One or more of a list of MAC addresses, a list of application identifiers, or a list of application server network addresses.
- the embodiments of this application do not limit how the SMF obtains the authorized communication information of the first terminal or terminal group.
- the following describes two methods for SMF to obtain the authorized communication information of the first terminal or terminal group.
- Method 1 The PCF sends the authorized communication information of the first terminal or terminal group to the SMF, so that the SMF receives the authorized communication information of the first terminal or terminal group from the PCF.
- the PCF generates a session control policy (session management policy, SM policy) from the authorized communication information, and sends the authorized communication information to the SMF through the SM policy control update notification (Npcf_SM policy control_update notify) message.
- SM policy session management policy
- Npcf_SM policy control_update notify SM policy control update notification
- the PCF can also send authorized communication information to the SMF through other messages or new messages, which is not limited in this application.
- Method 2 SMF obtains authorized communication information locally according to the identity of the first terminal or the identity of the terminal group.
- the authorized communication information stored locally in the SMF may be pre-configured by the PCF for the SMF through the SM policy control update notification message.
- the authorized communication information stored locally in the SMF may also be configured by the PCF for the SMF in advance through other messages or new messages, which is not limited in this application.
- the SMF also obtains indication information.
- the SMF can obtain the indication information while obtaining the authorized communication information.
- the indication information is used to instruct to perform management and control when the first terminal or the second terminal communicates with a device other than the authorized communication information. Measures. Among them, the description of the control measures is detailed in the following S302.
- the control measures are aimed at the communication of the first terminal or the second terminal.
- the communication of the first terminal or the second terminal specifically refers to the first terminal or the second terminal to access other devices (that is, to send data) or to receive access from other devices ( That is, the behavior of receiving data.
- the control measures can specifically include any one or more of the following: packet loss processing on data; when the number of times the first terminal or the second terminal in the terminal group communicates with devices other than authorized communication information exceeds a preset value, the data Perform packet loss processing; report to a third-party device; report to the third-party device when the number of times the first terminal or a second terminal in the terminal group communicates with devices other than authorized communication information exceeds a preset value.
- the data is data for the first terminal or the second terminal to communicate with devices other than authorized communication information
- the third-party device manages the first terminal or terminal group. SMF can obtain the preset value while obtaining the authorized communication information.
- the embodiment of this application does not limit how the SMF learns that the first terminal or the second terminal needs to perform management and control measures.
- the following introduces three methods for the SMF to learn that the first terminal or the second terminal needs to execute the management and control measures:
- Method 1 UPF detects that the first terminal or the second terminal communicates with a device other than authorized communication information, and reports report information to the SMF, so that the SMF receives the report information from the UPF.
- UPF detects that the first terminal or the second terminal communicates with a device other than the authorized communication information, and generates report information.
- the report information is used to instruct the first terminal or the second terminal to communicate with a device other than the authorized communication information, including for abnormal events.
- the description information (event report description information) and the identity of the first terminal or the second terminal.
- it also includes the location information (Location Information) of the first terminal or the second terminal, and information about devices other than authorized communication information (for example, IP addresses, MAC addresses, application identifiers, or application server network addresses other than authorized communication information) ), any one or more of the type of the first terminal or the second terminal, and the reference point session ID (for example, N4session ID).
- the description information of the abnormal event is, for example, information describing the first terminal or the second terminal to communicate with a device other than the authorized communication information, and optionally, it also includes the number of occurrences of the abnormal event.
- the report information indicates that the second terminal communicates with a device other than the authorized communication information, the report information may also include the identity of the group where the second terminal is located.
- UPF detects data communicated by the first terminal or the second terminal with devices other than authorized communication information, matches the data with authorized communication information, and finds that the data carries information about devices other than authorized communication information, such as authorized communication information
- the identification, IP address, MAC address, application identification, or network address of the application server other than the device so as to detect that the first terminal or the second terminal communicates with the device other than the authorized communication information.
- the UPF also determines the authorized communication information of the terminal group according to the identification of the terminal group carried in the data.
- the SMF learns according to the indication information that it is necessary to perform management and control measures on the first terminal or the second terminal.
- Method 2 UPF detects that the first terminal or the second terminal communicates with a device other than the authorized communication information, and sends a management control request to the SMF, so that the SMF receives the management control request from the UPF.
- the management and control request is used to indicate that a management and control measure needs to be performed on the first terminal or the second terminal. Specifically, for how the UPF detects that the first terminal or the second terminal communicates with a device other than the authorized communication information, see the description in Method 1 for details.
- Method 3 SMF detects that the first terminal or the second terminal communicates with a device other than authorized communication information. For details, see the embodiment shown in Fig. 6, which will not be repeated here.
- SMF detects the data communicated by the first terminal or the second terminal with devices other than the authorized communication information, matches the information of the device carried in the data with the authorized communication information, and finds that the data carries the information of the device other than the authorized communication information.
- Information such as the identification, IP address, MAC address, application identification, or application server network address of the device other than the authorized communication information, so as to detect that the first terminal or the second terminal communicates with the device other than the authorized communication information.
- the SMF detects that the second terminal communicates with a device other than the authorized communication information
- the SMF also determines the authorized communication information of the terminal group according to the identification of the terminal group carried in the data.
- the SMF receives the instruction information in S301, after the SMF detects that the first terminal or the second terminal communicates with a device other than the authorized communication information, it learns according to the instruction information that it needs to contact the first terminal or the second terminal. 2.
- the terminal implements control measures.
- S303 SMF implements control measures.
- the data is data communication data between the first terminal or the second terminal and devices other than authorized communication information.
- the embodiments of this application do not limit how SMF performs packet loss processing on data.
- the following describes two methods for SMF to perform data packet loss processing:
- Method 1 After receiving the report information or management request from the UPF, the SMF notifies the UPF to delete the data of the data communication between the first terminal or the second terminal and the device other than the authorized communication information. After UPF receives the SMF notification, it deletes the data.
- the method one corresponds to the method one and the method two in which the SMF learns that the first terminal or the second terminal needs to perform management and control measures in S302.
- Method 2 SMF deletes data communicated by the first terminal or the second terminal with devices other than authorized communication information.
- the second method corresponds to the third method in S302 where the SMF learns that it is necessary to perform management and control measures on the first terminal or the second terminal.
- control measures include reporting to a third-party device (including reporting to a third-party device more than the preset number of times)
- the embodiment of this application does not limit how the SMF can be reported to the third-party device.
- the following describes two SMF execution data packet loss processing Methods:
- Method 1 SMF forwards the report information received from UPF to the third-party device. Specifically, SMF sends the report information to NEF, and NEF forwards the report information to the third-party device.
- method one corresponds to method one in S302 where the SMF learns that it is necessary to perform management and control measures on the first terminal or the second terminal.
- Method 2 SMF generates report information and sends the report information to a third-party device. Specifically, SMF sends the report information to NEF, and NEF forwards the report information to the third-party device.
- method one corresponds to method two and method three in S302 where the SMF learns that it is necessary to perform management and control measures on the first terminal or the second terminal.
- SMF obtains the authorized communication information of the first terminal or terminal group.
- the first terminal or the second terminal in the terminal group communicates with devices other than the authorized communication information, it learns that it needs to contact the first terminal or terminal group.
- the second terminal implements control measures.
- the method enables the terminal to communicate with the equipment in the authorized communication information, manages and monitors the communication behavior of the terminal, and ensures the stability and security of terminal communication.
- FIG. 4 provides a terminal management and control method, so that SMF and UPF obtain authorized communication information of a first terminal or a terminal group.
- the method includes the following steps:
- the third-party device provides the NEF with authorized communication information of the first terminal or terminal group that needs to be configured, so that the NEF receives the authorized communication information of the first terminal or terminal group from the third-party device.
- authorized communication information can refer to S301, which is not repeated here.
- the third-party device also provides instructions to NEF.
- the indication information may include a first indication (action1) and/or a second indication (action2).
- the first indication is used to indicate when the first terminal or the second terminal in the terminal group communicates with equipment other than the authorized communication information to perform packet loss processing
- the second indication is used to indicate when the first terminal or the second terminal in the terminal group
- the first indication and the second indication can be the same indication, that is, one indication can be used to indicate that the first terminal or the second terminal in the terminal group communicates with a device other than the authorized communication information.
- Packet loss processing can also be used to indicate to report to a third-party device when the first terminal or a second terminal in a terminal group communicates with a device other than authorized communication information.
- the following first and second instructions can also be The same instruction is explained here in a unified manner without repeating it.
- the third-party device provides the NEF with authorized communication information of the first terminal or terminal group through a Nnef_parameter provision_update request message.
- the NEF stores the authorized communication information of the first terminal or terminal group that needs to be configured into the UDM.
- the authorized communication information of the first terminal or the terminal group is stored in UDM as a part of user subscription data or user group subscription data.
- the NEF also stores the instruction information in the UDM, or stores the instruction information in the UDM as a part of user subscription data or user group subscription data.
- the indication information may include the first indication and/or the second indication.
- the UDM may store the authorized communication information of the first terminal or terminal group in the UDR.
- NEF replies a response message to the third-party device.
- the response message is used to reply to the third-party device, indicating that the operation of configuring authorized communication information is completed.
- the NEF replies a response message to the third-party device through a prescribed parameter update response (Nnef_parameter provision_update request response) message.
- Nnef_parameter provision_update request response a prescribed parameter update response
- the UDM sends the authorized communication information of the first terminal or terminal group to the PCF, so that the PCF receives the authorized communication information of the first terminal or terminal group from the UDM.
- the UDM sends the authorized communication information of the first terminal or the terminal group as the user subscription data or user group subscription data of the first terminal to the PCF.
- the UDM also sends the instruction information to the PCF, or sends it to the PCF as user subscription data or user group subscription data of the first terminal.
- the indication information may include the first indication and/or the second indication.
- the UDM sends the authorized communication information of the first terminal or terminal group to the PCF through a Nudm_SDM_get service operation (Nudm_SDM_get service operation) message.
- Nudm_SDM_get service operation Nudm_SDM_get service operation
- the PCF sends the authorized communication information of the first terminal or terminal group to the SMF, so that the SMF receives the authorized communication information of the first terminal or terminal group from the PCF.
- the PCF generates a session management policy (session management policy, SM policy) according to the authorized communication information of the first terminal or terminal group, and sends the SM policy to the SMF.
- SM policy includes authorized communication information of the first terminal or terminal group.
- the PCF also generates an SM policy according to the instruction information, and sends the SM policy to the SMF.
- the SM policy includes authorized communication information and instruction information of the first terminal or terminal group.
- the PCF sends the authorized communication information to the SMF through the SM policy control update notification (Npcf_SM policy control_update notify) message.
- Npcf_SM policy control_update notify SM policy control update notification
- the SMF saves the authorized communication information of the first terminal or the terminal group, and optionally, also saves the indication information.
- the indication information may include the first indication and/or the second indication.
- the SMF sends the authorized communication information of the first terminal or terminal group to the UPF, so that the UPF receives the authorized communication information of the first terminal or terminal group from the SMF.
- SMF sends SM policy to UPF.
- the UPF saves the authorized communication information of the first terminal or the terminal group, and optionally, also saves the indication information.
- the indication information may include the first indication and/or the second indication.
- the third-party device provides the authorized communication information of the first terminal or terminal group, so that the SMF and UPF can obtain the information of the devices allowed to communicate with the first terminal or the terminal in the terminal group, so that the subsequent first terminal or second terminal can communicate with the authorized communication information.
- equipment other than communication information communicates, it can implement control measures.
- Figure 5 provides a terminal management and control method, in which UPF detects that the first terminal or the second terminal communicates with a device other than authorized communication information, so that UPF and SMF perform data Packet loss processing and reporting to third-party equipment.
- the method includes the following steps:
- the UPF detects that the first terminal or the second terminal communicates with a device other than authorized communication information.
- the UPF when the UPF receives the uplink data from the first terminal or the second terminal, it matches the information of the device carried in the uplink data with the authorized communication information, and finds that the uplink data carries the information of the device other than the authorized communication information, for example The identification, IP address, MAC address, application identification, or application server network address of the device other than the authorized communication information, so as to detect that the first terminal or the second terminal accesses the device other than the authorized communication information.
- the uplink data also carries the identification of the terminal group, and UPF determines the authorized communication information of the terminal group according to the identification of the terminal group.
- UPF When UPF receives the downlink data sent by a device to the first terminal or the second terminal, it matches the information of the device carried in the downlink data with the authorized communication information, and finds that the downlink data carries the information of the device other than the authorized communication information For example, the identification, IP address, MAC address, application identification, or application server network address of the device other than the authorized communication information, so as to detect that the first terminal or the second terminal accepts the access of the device other than the authorized communication information.
- the downlink data also carries the identification of the terminal group, and the UPF determines the authorized communication information of the terminal group according to the identification of the terminal group.
- UPF reports the report information to the SMF, so that the SMF receives the report information from the UPF.
- the report information is used to instruct the first terminal or the second terminal to communicate with a device other than the authorized communication information.
- For the report information refer to the description of method 1 in S302, which is not repeated here.
- the UPF reports to the third-party device according to the second instruction. Specifically, the UPF sends report information to the SMF according to the second instruction, the SMF sends the report information to the NEF according to the second instruction, and the NEF forwards the report information to the third-party device.
- the UPF reports the report information to the SMF through a session event report (session event report) message.
- session event report session event report
- the SMF confirms the report information to the UPF, and replies a response message to the UPF, so that the UPF receives the response message from the SMF.
- the UPF confirms the report information to the UPF through a session event response (session event response) message.
- session event response session event response
- S504 After the SMF confirms the report information, perform packet loss processing of the data, the data being the data of the first terminal or the second terminal communicating with a device other than the authorized communication information.
- the SMF sends a notification to the UPF, and after receiving the SMF notification, the UPF deletes the data of the first terminal or the second terminal communicating with the device other than the authorized communication information.
- performing packet loss processing on data includes SMF notifying UPF to delete the data communicated by the first terminal or the second terminal with devices other than authorized communication information, as well as UPF deletion. The action of the data.
- the SMF performs packet loss processing on the data according to the first instruction.
- S505 The SMF sends the report information to the NEF, so that the NEF receives the report information from the SMF.
- the SMF reports the report information to the third-party device according to the second instruction.
- the SMF sends the report information to the NEF through an event report (Nsmf_event_report) message.
- Nsmf_event_report an event report
- S506 The NEF sends the report information to the third-party device, so that the third-party device receives the report information from the NEF.
- NEF sends the report information to the third-party device through an event report (Nnef_event_report) message.
- UPF detects that the first terminal or the second terminal is communicating with a device other than authorized communication information. Further, SMF and UPF perform packet loss processing on abnormal data and report the abnormal situation to a third-party device.
- This method enables the terminal to communicate with the equipment in the authorized communication information, manages and monitors the communication behavior of the terminal, and takes corresponding measures (such as returning to the factory for maintenance) after the third-party equipment learns the abnormal situation, thereby ensuring the terminal communication Stability and security.
- Figure 6 provides a terminal management and control method, in which SMF detects that the first terminal or the second terminal communicates with a device other than authorized communication information, and performs packet loss processing on the data And report to third-party equipment.
- this method transmits data through the control plane through non-access stratum (NAS) signaling.
- the transmission path of the uplink data is specifically: the data uploaded by the terminal is transmitted to the AMF through the RAN, then transmitted to the NEF through the SMF, and finally transmitted to the third-party device through the NEF.
- This method can be specifically applied to IoT scenarios.
- the data sent or received by the terminal is relatively small.
- the data can be sent or received through the control plane through NAS signaling, avoiding the establishment of special packet data unit sessions (packet data). unit session, PDU session) to save resources and shorten communication response time.
- the transmission path of the downlink data transmission is specifically: the data sent to the terminal is transmitted to the NEF through a third-party device, and then transmitted to the SMF through the NEF.
- the method includes the following steps:
- S601 SMF detects that the first terminal or the second terminal communicates with a device other than authorized communication information.
- the SMF when the SMF receives the uplink data from the first terminal or the second terminal, it matches the information of the device carried in the uplink data with the authorized communication information, and finds that the uplink data carries the information of the device other than the authorized communication information, such as The identification, IP address, MAC address, application identification, or application server network address of the device other than the authorized communication information, so as to detect that the first terminal or the second terminal accesses the device other than the authorized communication information.
- the uplink data also carries the identification of the terminal group, and the SMF determines the authorized communication information of the terminal group according to the identification of the terminal group.
- SMF When SMF receives the downlink data sent by a certain device to the first terminal or the second terminal, it matches the information of the device carried in the downlink data with the authorized communication information, and finds that the downlink data carries the information of the device other than the authorized communication information For example, the identification, IP address, MAC address, application identification, or application server network address of the device other than the authorized communication information, so as to detect that the first terminal or the second terminal accepts the access of the device other than the authorized communication information.
- the downlink data also carries the identification of the terminal group, and UPF determines the authorized communication information of the terminal group according to the identification of the terminal group.
- the SMF performs packet loss processing of data, which is data for the first terminal or the second terminal to communicate with devices other than authorized communication information.
- the SMF deletes the data that the first terminal or the second terminal communicates with devices other than authorized communication information.
- the SMF performs packet loss processing on the data according to the first instruction.
- S603 The SMF sends the report information to the NEF, so that the NEF receives the report information from the SMF.
- the NEF receives the report information from the SMF.
- the report information is used to instruct the first terminal or the second terminal to communicate with a device other than the authorized communication information.
- For the report information refer to the description of method 1 in S302, which is not repeated here.
- NEF sends the report information to the third-party device, so that the third-party device receives the report information from NEF.
- NEF sends the report information to the third-party device, so that the third-party device receives the report information from NEF.
- the SMF detects that the first terminal or the second terminal communicates with a device other than the authorized communication information, and further performs packet loss processing on abnormal data and reports the abnormal situation to a third-party device.
- This method enables the terminal to communicate with the equipment in the authorized communication information, manages and monitors the communication behavior of the terminal, and takes corresponding measures (such as returning to the factory for maintenance) after the third-party equipment learns the abnormal situation, thereby ensuring the stability of terminal communication Sex and safety.
- the session management network element, user plane network element, or third-party device includes execution The hardware structure and/or software module corresponding to each function.
- the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but this implementation should not exceed the scope of this application.
- the embodiment of the present application can divide the session management network element, the user plane network element, or the third-party device into functional modules according to the foregoing method examples.
- each functional module can be divided corresponding to each function, or two or more
- the functions are integrated in one processing module, and the above-mentioned integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- the aforementioned network elements or functions can be implemented by the communication device in FIG. 7.
- the communication device 700 may be a session management network element, a user plane network element, or a third-party device.
- the communication device includes a processing unit 701, a communication unit 702, and optionally, a storage unit 703. Further, the communication unit 702 can be divided into a receiving unit and a sending unit, and respectively perform functions of receiving information and sending information.
- the processing unit 701 is configured to control the actions of the foregoing network elements, for example, to support the foregoing network elements to execute the methods and steps provided in the embodiments of the present application.
- the sending unit 702 is configured to support the foregoing network element to send information to other network entities.
- the foregoing network element sends information to other network entities.
- the receiving unit 703 is configured to support the foregoing network element to receive information sent by another network entity.
- the foregoing network element receives information sent by another network entity.
- the storage unit 703 is used to store the data and codes of the aforementioned network elements.
- the communication device 700 may be a session management network element.
- FIG. 7a shows a schematic structural diagram of a session management network element 710.
- the session management network element includes a processing unit 711, a communication unit 712, and optionally, a storage unit 713.
- the session management network element 710 may be used to perform operations of the session management network element in the foregoing method embodiment, for example:
- the processing unit 711 is configured to obtain authorized communication information of the first terminal or terminal group through the communication unit 712, where the authorized communication information includes information of the devices that the first terminal or terminal group allows communication. For details, refer to S301 in FIG. 3.
- session management network element can be used to perform the corresponding steps in Figures 3, 4, 5 or 6.
- the session management network element can be used to perform the corresponding steps in Figures 3, 4, 5 or 6.
- the processing unit 711 may be used to execute S504, S601, and S602. For details, refer to the description in the foregoing steps.
- the communication unit 712 may be used to execute S405, S406, S502, S503, S505, and S603. For details, please refer to the description in the above steps.
- the communication device 700 may also be a user plane network element.
- FIG. 7b shows a schematic structural diagram of a user plane network element 720.
- the user plane network element includes a processing unit 721, a communication unit 722, and optionally, a storage unit 723. .
- the user plane network element 720 may be used to perform operations of the user plane network element in the foregoing method embodiment, for example:
- the processing unit 721 is configured to obtain the authorized communication information of the first terminal or the terminal group through the communication unit 722, where the authorized communication information includes information of the devices allowed to communicate with the first terminal or the terminal group. For details, refer to S406 in FIG. 4.
- the user plane network element can be used to perform the corresponding steps in Figures 3, 4, 5 or 6.
- the user plane network element can be used to perform the corresponding steps in Figures 3, 4, 5 or 6.
- the processing unit 721 may be used to perform S504, and for details, refer to the description in the foregoing steps.
- the communication unit 722 may be used to execute S502, S503, and S504. For details, please refer to the description in the foregoing steps.
- the processing unit 701, 711, or 721 can be one or more processors
- the communication unit 702, 712, or 722 can be one or more transceivers
- one or more of the storage units 703, 713, 723 can be memories
- the session management network element, user plane network element, or third-party device involved in the embodiment of the present application may have the structure shown in FIG. 8.
- the communication device 800 includes a processor 801, a transceiver 802, and optionally, a memory 803 and a bus 804.
- the processor 801, the transceiver 802, and the memory 803 are connected through a bus 804.
- the processor 801 may be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application-specific integrated circuit (ASIC), which can be used on site.
- the processor may also be a combination that implements computing functions, for example, including a combination of one or more microprocessors, a combination of DSP and microprocessor, and so on.
- the bus 804 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in FIG. 8 to represent, but it does not mean that there is only one bus or one type of bus.
- An embodiment of the present application also provides a chip system 900, which includes at least one processor 901 and an interface circuit 902, and the processor 901 is connected to the interface circuit 902.
- the processor 901 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 901 or instructions in the form of software.
- the aforementioned processor 901 may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware Components.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA off-the-shelf programmable gate array
- the methods and steps disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the interface circuit 902 can complete the sending or receiving of data, instructions or information.
- the processor 901 can use the data, instructions or other information received by the interface circuit 902 to perform processing, and can send processing completion information through the interface circuit 902.
- the chip system further includes a memory 903.
- the memory 903 may include a read-only memory and a random access memory, and provides operation instructions and data to the processor.
- a part of the memory 903 may also include non-volatile random access memory (NVRAM).
- NVRAM non-volatile random access memory
- the memory 903 stores an executable software module or data structure, and the processor 903 can execute corresponding operations by calling an operation instruction stored in the memory (the operation instruction may be stored in an operating system).
- the chip system may be used in the session management network element, user plane network element, or third-party device involved in the embodiment of the present application.
- the interface circuit 902 is configured to perform the receiving and sending steps of the session management network element, the user plane network element, or the third-party device in the embodiments shown in FIG. 3 to FIG. 6.
- the processor 901 is configured to execute the processing steps of the session management network element, the user plane network element, or the third-party device in the embodiments shown in FIG. 3 to FIG. 6.
- the memory 903 is used to store data and instructions of the session management network element, the user plane network element, or the third-party device in the embodiments shown in FIG. 3 to FIG. 6.
- the embodiment of the present application also provides a computer-readable storage medium.
- the methods described in the foregoing method embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. If implemented in software, the functions can be stored as one or more instructions or codes on a computer-readable medium or transmitted on the computer-readable medium.
- Computer-readable media may include computer storage media and communication media, and may also include any media that can transfer a computer program from one place to another.
- the storage medium may be any available medium that can be accessed by a computer.
- the computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used for carrying or with instructions or data structures
- the required program code is stored in the form of and can be accessed by the computer.
- any connection is properly termed a computer-readable medium.
- coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL) or wireless technology such as infrared, radio and microwave
- coaxial cable, fiber optic cable , Twisted pair, DSL or wireless technologies such as infrared, radio, and microwave are included in the definition of the medium.
- Magnetic disks and optical disks as used herein include compact disks (CDs), laser disks, optical disks, digital versatile disks (DVDs), floppy disks and blu-ray disks, where disks usually reproduce data magnetically, and optical disks reproduce data optically using lasers. Combinations of the above should also be included in the scope of computer-readable media.
- the embodiment of the present application also provides a computer program product.
- the methods described in the foregoing method embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. If it is implemented in software, it can be fully or partially implemented in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the above computer program instructions are loaded and executed on the computer, the processes or functions described in the above method embodiments are generated in whole or in part.
- the above-mentioned computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Alarm Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (29)
- 一种终端的管控方法,其特征在于,包括:会话管理网元获取第一终端或者终端组的授权通信信息,所述授权通信信息包括所述第一终端或所述终端组允许通信的设备的信息;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信时,所述会话管理网元获知需要对所述第一终端或所述第二终端的通信执行管控措施;所述会话管理网元执行所述管控措施。
- 如权利要求1所述的方法,其特征在于,所述管控措施包括以下任意一项或多项:对数据进行丢包处理,所述数据为所述第一终端或所述第二终端与所述授权通信信息以外的设备通信的数据;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,对所述数据进行丢包处理;向第三方设备进行上报,所述第三方设备为管理所述第一终端或所述终端组的设备;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,向所述第三方设备进行上报。
- 如权利要求2所述的方法,其特征在于,所述管控措施包括对所述数据进行丢包处理,则所述会话管理网元执行所述管控措施包括:所述会话管理网元向用户面网元发送通知,所述通知用于指示删除所述数据;或者所述会话管理网元删除所述数据。
- 如权利要求2或3所述的方法,其特征在于,所述管控措施包括向所述第三方设备上报,则所述会话管理网元执行所述管控措施包括:所述会话管理网元生成报告信息,并将所述报告信息发送给所述第三方设备,其中,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信;或者所述会话管理网元接收来自用户面网元的所述报告信息,并将所述报告信息发送给所述第三方设备。
- 如权利要求1-4任一项所述的方法,其特征在于,所述会话管理网元获知需要对所述第一终端或所述第二终端执行所述管控措施包括:所述会话管理网元通过接收来自用户面网元的报告信息,获知需要对所述第一终端或所述第二终端执行所述管控措施,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信;或者所述会话管理网元通过接收数据,获知需要对所述第一终端或所述第二终端执行所述管控措施,所述数据为所述第一终端或所述第二终端与所述授权通信信息以外的设备通信的数据,所述数据携带所述授权通信信息以外的设备的信息。
- 如权利要求1-5任一项所述的方法,其特征在于,所述会话管理网元执行所述管控措施包括:所述会话管理网元接收来自第三方设备的指示信息,所述指示信息用于指示当所述第一终端或所述第二终端与所述授权通信信息以外的设备通信时执行所述管控措施;所述会话管理网元根据所述指示信息,执行所述管控措施。
- 如权利要求1-6任一项所述的方法,其特征在于,所述会话管理网元获取所述第一终端或者所述终端组的所述授权通信信息包括:所述会话管理网元获取来自第三方设备的所述第一终端或者所述终端组的所述授权通信信息;或者所述会话管理网元从本地获取所述第一终端或者所述终端组的所述授权通信信息。
- 一种终端的管控方法,其特征在于,包括:用户面网元获取第一终端或者终端组的授权通信信息,所述授权通信信息包括所述第一终端或所述终端组允许通信的设备的信息;所述用户面网元检测到所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信;所述用户面网元对所述第一终端或所述第二终端的通信执行管控措施。
- 如权利要求8所述的方法,其特征在于,所述用户面网元检测到所述第一终端或所述第二终端与所述授权通信信息以外的设备通信包括:所述用户面网元接收数据,所述数据为所述第一终端或所述第二终端与所述授权通信信息以外的设备通信的数据,所述数据携带所述授权通信信息以外的设备的信息;所述用户面网元根据所述授权通信信息以外的设备的信息,检测到所述第一终端或所述第二终端与所述授权通信信息以外的设备通信。
- 如权利要求9所述的方法,其特征在于,所述管控措施包括以下任意一项或多项:对所述数据进行丢包处理;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,对所述数据进行丢包处理;向第三方设备进行上报,所述第三方设备为管理所述第一终端或所述终端组的设备;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,向所述第三方设备进行上报。
- 如权利要求10所述的方法,其特征在于,所述管控措施包括对所述数据进行丢包处理时,则所述用户面网元执行管控措施包括:所述用户面网元向会话管理网元发送报告信息,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信;所述用户面网元接收所述会话管理网元的通知,所述通知用于指示删除所述数据;所述用户面网元根据所述通知,删除所述数据。
- 如权利要求10或11所述的方法,其特征在于,所述管控措施包括向所述第三方设备进行上报时,则所述用户面网元执行管控措施包括:所述用户面网元向所述第三方设备发送报告信息,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信。
- 如权利要求8-12任一项所述的方法,其特征在于,所述用户面网元获取所述第一终端或者所述终端组的所述授权通信信息包括:所述用户面网元获取来自第三方设备的所述第一终端或者所述终端组的所述授权通信信息;或者所述用户面网元从本地获取所述第一终端或者所述终端组的所述授权通信信息。
- 一种会话管理网元,其特征在于,包括:处理单元和通信单元;所述处理单元用于通过所述通信单元,获取第一终端或者终端组的授权通信信息,所述授权通信信息包括所述第一终端或所述终端组允许通信的设备的信息;以及当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信时,获知需要对所述第一终端或所述第二终端的通信执行管控措施;以及执行所述管控措施。
- 如权利要求14所述的会话管理网元,其特征在于,所述管控措施包括以下任意一项或多项:对数据进行丢包处理,所述数据为所述第一终端或所述第二终端与所述授权通信信息以外的设备通信的数据;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,对所述数据进行丢包处理;向第三方设备进行上报,所述第三方设备为管理所述第一终端或所述终端组的设备;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,向所述第三方设备进行上报。
- 如权利要求15所述的会话管理网元,其特征在于,所述管控措施包括对所述数据进行丢包处理,则所述处理单元用于执行所述管控措施包括:所述处理单元用于通过所述通信单元,向用户面网元发送通知,所述通知用于指示删除所述数据;或者所述处理单元用于删除所述数据。
- 如权利要求15或16所述的会话管理网元,其特征在于,所述管控措施包括向所述第三方设备上报,则所述处理单元用于执行所述管控措施包括:所述处理单元用于生成报告信息,以及通过所述通信单元,将所述报告信息发送给所述第三方设备,其中,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信;或者所述处理单元用于通过所述通信单元接收来自用户面网元的所述报告信息,以及将所述报告信息发送给所述第三方设备。
- 如权利要求14-17任一项所述的会话管理网元,其特征在于,所述处理单元用于获知需要对所述第一终端或所述第二终端执行所述管控措施包括:所述处理单元用于通过所述通信单元,接收来自用户面网元的报告信息,获知需要对所述第一终端或所述第二终端执行所述管控措施,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信;或者所述处理单元用于通过所述通信单元,接收数据,获知需要对所述第一终端或所述第二终端执行所述管控措施,所述数据为所述第一终端或所述第二终端与所述授权通信信息以外的设备通信的数据,所述数据携带所述授权通信信息以外的设备的信息。
- 如权利要求14-18任一项所述的会话管理网元,其特征在于,所述处理单元用于执行所述管控措施包括:所述处理单元用于通过所述通信单元接收来自第三方设备的指示信息,所述指示信息用于指示当所述第一终端或所述第二终端与所述授权通信信息以外的设备通信时执行所述管控措施。所述处理单元用于根据所述指示信息,执行所述管控措施。
- 如权利要求14-19任一项所述的会话管理网元,其特征在于,所述处理单元用于通过所述通信单元获取第一终端或者终端组的授权通信信息包括:所述处理单元用于通过所述通信单元,获取来自第三方设备的所述第一终端或者所述终端组的所述授权通信信息。
- 一种用户面网元,其特征在于,包括:处理单元和通信单元;所述处理单元,用于通过所述通信单元,获取第一终端或者终端组的授权通信信息,所述授权通信信息包括所述第一终端或所述终端组允许通信的设备的信息;以及检测到所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信;以及对所述第一终端或所述第二终端的通信执行管控措施。
- 如权利要求21所述的用户面网元,其特征在于,所述处理单元用于检测到所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信包括:所述处理单元用于通过所述通信单元,接收数据,所述数据为所述第一终端或所述第二终端与所述授权通信信息以外的设备通信的数据,所述数据携带所述授权通信信息以外的设备的信息;所述处理单元用于根据所述授权通信信息以外的设备的信息,检测到所述第一终端或所述第二终端与所述授权通信信息以外的设备通信。
- 如权利要求22所述的用户面网元,其特征在于,所述管控措施包括以下任意一项或多项:对所述数据进行丢包处理;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,对所述数据进行丢包处理;向第三方设备进行上报,所述第三方设备为管理所述第一终端或所述终端组的设备;当所述第一终端或所述终端组内的第二终端与所述授权通信信息以外的设备通信的次数超过预设值后,向所述第三方设备进行上报。
- 如权利要求23所述的用户面网元,其特征在于,所述管控措施包括对所述数据进行丢包处理时,则所述处理单元用于执行管控措施包括:所述处理单元用于通过所述通信单元,向会话管理网元发送报告信息,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信;所述处理单元用于通过所述通信单元,接收所述会话管理网元的通知,所述通知用于指示删除所述数据;所述处理单元用于根据所述通知,删除所述数据。
- 如权利要求23或24所述的用户面网元,其特征在于,所述管控措施包括向所述第三方设备进行上报时,则所述处理单元用于执行管控措施包括:所述处理单元用于通过所述通信单元,向所述第三方设备发送报告信息,所述报告信息用于指示所述第一终端或所述第二终端与所述授权通信信息以外的设备通信。
- 如权利要求21-25任一项所述的用户面网元,其特征在于,所述处理单元用于通过所述通信单元获取第一终端或者终端组的授权通信信息包括:所述用户面网元用于通过所述通信单元获取来自第三方设备的所述第一终端或者所 述终端组的所述授权通信信息。
- 如权利要求1所述的方法、8所述的方法、14所述的会话管理网元或者21所述的用户面网元,其特征在于,所述授权通信信息包括以下任意一项或多项:所述第一终端或所述终端组允许通信的设备的标识;所述第一终端或所述终端组允许通信的设备的互联网协议IP地址;所述第一终端或所述终端组允许通信的设备的媒体接入控制MAC地址;所述第一终端或所述终端组允许通信的应用的标识;所述第一终端或所述终端组允许通信的应用的服务器网络地址。
- 一种终端的管控系统,其特征在于,包括权利要求14至20任一项所述的会话管理网元和权利要求21至26任一项所述的用户面网元。
- 一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行如权利要求1至13任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20777019.9A EP3934174A4 (en) | 2019-03-22 | 2020-03-23 | METHOD, APPARATUS AND SYSTEM FOR MANAGING AND CONTROLLING A TERMINAL |
BR112021018699A BR112021018699A2 (pt) | 2019-03-22 | 2020-03-23 | Método, dispositivos e sistema de gerenciamento e controle de terminal |
AU2020246484A AU2020246484B2 (en) | 2019-03-22 | 2020-03-23 | Terminal management and control method, apparatus, and system |
US17/481,921 US20220006816A1 (en) | 2019-03-22 | 2021-09-22 | Terminal management and control method, apparatus, and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910224183.8A CN111726240B (zh) | 2019-03-22 | 2019-03-22 | 一种终端的管控方法、装置及系统 |
CN201910224183.8 | 2019-03-22 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/481,921 Continuation US20220006816A1 (en) | 2019-03-22 | 2021-09-22 | Terminal management and control method, apparatus, and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020192622A1 true WO2020192622A1 (zh) | 2020-10-01 |
Family
ID=72563633
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/080639 WO2020192622A1 (zh) | 2019-03-22 | 2020-03-23 | 一种终端的管控方法、装置及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20220006816A1 (zh) |
EP (1) | EP3934174A4 (zh) |
CN (2) | CN111726240B (zh) |
AU (1) | AU2020246484B2 (zh) |
BR (1) | BR112021018699A2 (zh) |
WO (1) | WO2020192622A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114430592A (zh) * | 2020-10-29 | 2022-05-03 | 华为技术有限公司 | 一种通信方法及对应装置 |
CN118056433A (zh) * | 2022-09-16 | 2024-05-17 | 北京小米移动软件有限公司 | 信息处理方法以及装置、通信设备及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118836A (zh) * | 2009-12-31 | 2011-07-06 | 华为技术有限公司 | 网络管控实现方法及系统、管控通信装置 |
CN105142142A (zh) * | 2015-08-25 | 2015-12-09 | 中国科学院信息工程研究所 | 全制式手机终端管控方法及装置 |
CN107332639A (zh) * | 2017-06-12 | 2017-11-07 | 京信通信系统(中国)有限公司 | 一种专网通信的实现方法及系统 |
CN107948966A (zh) * | 2018-01-09 | 2018-04-20 | 博威通(厦门)科技有限公司 | 具备智能通信管控的基站及智能通信管控的方法 |
CN108289318A (zh) * | 2018-01-26 | 2018-07-17 | 重庆邮电大学 | 一种基于信令流程的lte终端管控方法 |
US20180376279A1 (en) * | 2017-06-23 | 2018-12-27 | Microsoft Technology Licensing, Llc | Use Condition for a Geographic Phone Number |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101917483B (zh) * | 2010-08-18 | 2015-11-25 | 中国电信股份有限公司 | 物联网终端通信管控的实现方法、系统和设备 |
US9125013B1 (en) * | 2013-02-21 | 2015-09-01 | Sprint Spectrum L.P. | Methods and systems for modifying a preferred roaming list (PRL) of a wireless communication device |
CN203872191U (zh) * | 2014-04-03 | 2014-10-08 | 英斯泰特(北京)技术有限公司 | Td-lte区域通讯网络分布式智能管理系统 |
US10841808B2 (en) * | 2017-10-16 | 2020-11-17 | Apple Inc. | Apparatus and medium for enabling multi-carrier operation |
WO2019158973A1 (en) * | 2018-02-15 | 2019-08-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for providing a breakout pdu session for local ip access |
CN109275145B (zh) * | 2018-09-21 | 2022-04-12 | 腾讯科技(深圳)有限公司 | 设备行为检测及阻隔处理方法、介质及电子设备 |
US12004257B2 (en) * | 2018-10-08 | 2024-06-04 | Interdigital Patent Holdings, Inc. | Device discovery and connectivity in a cellular network |
US11706617B2 (en) * | 2019-01-03 | 2023-07-18 | Cisco Technology, Inc. | Authenticating radio access network components using distributed ledger technology |
-
2019
- 2019-03-22 CN CN201910224183.8A patent/CN111726240B/zh active Active
- 2019-03-22 CN CN202210039070.2A patent/CN114422320A/zh active Pending
-
2020
- 2020-03-23 BR BR112021018699A patent/BR112021018699A2/pt unknown
- 2020-03-23 WO PCT/CN2020/080639 patent/WO2020192622A1/zh unknown
- 2020-03-23 EP EP20777019.9A patent/EP3934174A4/en active Pending
- 2020-03-23 AU AU2020246484A patent/AU2020246484B2/en active Active
-
2021
- 2021-09-22 US US17/481,921 patent/US20220006816A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118836A (zh) * | 2009-12-31 | 2011-07-06 | 华为技术有限公司 | 网络管控实现方法及系统、管控通信装置 |
CN105142142A (zh) * | 2015-08-25 | 2015-12-09 | 中国科学院信息工程研究所 | 全制式手机终端管控方法及装置 |
CN107332639A (zh) * | 2017-06-12 | 2017-11-07 | 京信通信系统(中国)有限公司 | 一种专网通信的实现方法及系统 |
US20180376279A1 (en) * | 2017-06-23 | 2018-12-27 | Microsoft Technology Licensing, Llc | Use Condition for a Geographic Phone Number |
CN107948966A (zh) * | 2018-01-09 | 2018-04-20 | 博威通(厦门)科技有限公司 | 具备智能通信管控的基站及智能通信管控的方法 |
CN108289318A (zh) * | 2018-01-26 | 2018-07-17 | 重庆邮电大学 | 一种基于信令流程的lte终端管控方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3934174A4 |
Also Published As
Publication number | Publication date |
---|---|
EP3934174A4 (en) | 2022-04-06 |
AU2020246484A1 (en) | 2021-10-14 |
US20220006816A1 (en) | 2022-01-06 |
CN111726240B (zh) | 2022-01-21 |
CN114422320A (zh) | 2022-04-29 |
EP3934174A1 (en) | 2022-01-05 |
BR112021018699A2 (pt) | 2021-11-23 |
CN111726240A (zh) | 2020-09-29 |
AU2020246484B2 (en) | 2023-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11812496B2 (en) | User group session management method and apparatus | |
US20220060935A1 (en) | Communications Method and Apparatus | |
EP3713372A1 (en) | Method and device for creating user group | |
EP3790308B1 (en) | Business service quality monitoring method, device and system | |
US20220345932A1 (en) | Reporting Information Sending Method, Apparatus, and System | |
WO2020169039A1 (zh) | 一种策略管理的方法及装置 | |
US20220006816A1 (en) | Terminal management and control method, apparatus, and system | |
US20220150784A1 (en) | Handover method and apparatus | |
US20220312517A1 (en) | D2d communication method, apparatus, and system | |
US20230164523A1 (en) | Communication Method, Device, and System | |
WO2023213177A1 (zh) | 一种通信方法及装置 | |
WO2021163894A1 (zh) | 一种基于中继的通信方法及装置 | |
WO2021056703A1 (zh) | 信息更新方法、设备及系统 | |
US20220225463A1 (en) | Communications method, apparatus, and system | |
WO2021159415A1 (zh) | 通信方法、装置及系统 | |
KR20240043813A (ko) | 개인 네트워크들의 인가, 생성, 및 관리 | |
WO2021254116A1 (zh) | 通信方法和装置 | |
CN116097688B (zh) | 通信方法、装置及系统 | |
US20220124008A1 (en) | Automated Service Layer Message Flow Management In A Communications Network | |
EP4391629A1 (en) | Communication method and related device | |
WO2023061207A1 (zh) | 一种通信方法、通信装置及通信系统 | |
EP3912329B1 (en) | Automated service layer message flow management in a communications network | |
WO2023213159A1 (zh) | 通信方法及装置 | |
WO2023221604A1 (zh) | 一种通信方法和装置 | |
WO2024032552A1 (zh) | 通信方法、装置及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20777019 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112021018699 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2020777019 Country of ref document: EP Effective date: 20210929 |
|
ENP | Entry into the national phase |
Ref document number: 2020246484 Country of ref document: AU Date of ref document: 20200323 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112021018699 Country of ref document: BR Kind code of ref document: A2 Effective date: 20210920 |