WO2021068265A1 - 策略配置方法、通信装置和通信系统 - Google Patents

策略配置方法、通信装置和通信系统 Download PDF

Info

Publication number
WO2021068265A1
WO2021068265A1 PCT/CN2019/110888 CN2019110888W WO2021068265A1 WO 2021068265 A1 WO2021068265 A1 WO 2021068265A1 CN 2019110888 W CN2019110888 W CN 2019110888W WO 2021068265 A1 WO2021068265 A1 WO 2021068265A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
information
policy control
application data
service
Prior art date
Application number
PCT/CN2019/110888
Other languages
English (en)
French (fr)
Inventor
吴义壮
李永翠
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2019/110888 priority Critical patent/WO2021068265A1/zh
Publication of WO2021068265A1 publication Critical patent/WO2021068265A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Definitions

  • This application relates to the communication field, and more specifically, to a policy configuration method, communication device, and communication system.
  • LADN data network
  • offload point that is, the application or service of the DN is deployed in a location close to the user.
  • the access and mobility management function (AMF) will determine and The policy control function (PCF) establishes UE policy associations, and is used by the PCF to provide UE policies to the UE through AMF.
  • the UE policy is used by the UE to determine the selection of an existing protocol data unit (protocol data unit, when initiating a service). PDU) session or establish a new PDU session to obtain the corresponding service.
  • the PCF generates the UE policy based on the pre-configured subscription information.
  • the present application provides a strategy configuration method, communication device and communication system, which can effectively configure the strategy information of the terminal device.
  • the present application provides a method for policy configuration, the method includes: a first policy control network element receives application data from the first network element, the application data includes service information, and the service information is used to identify Service information; the first policy control network element determines policy information of the terminal device according to the application data, the policy information includes the application data, and the policy information is associated with the service network; the first policy control The network element sends the policy information to the terminal device.
  • the first network element can dynamically obtain the application data of the newly deployed LAND or the newly deployed application, and can provide the application data to the first policy control network element, and the first policy control network element can be based on the application data
  • the policy information of the terminal device is generated, and the policy information is provided to the terminal device. Therefore, the problem that the existing technology cannot configure the terminal device with the relevant data network or applied policy information under the newly deployed LAND or the newly deployed application scenario is solved.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the first network element is a home access management network element, wherein the home
  • the application data of the access management network element is provided by a data management network element
  • the service network is a visited network
  • the first policy control network element is a visited policy control network element
  • the first network element is a visited place, wherein the application data of the visited place access management network element is provided by a data management network element.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the first network element is a home data storage network element.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the first network element is a home data storage network element
  • the method further includes: the first policy control network element receives first indication information from the home access management network element; the first policy control The network element sends a request message to the first network element according to the first indication information, where the request message is used to request the application data.
  • the service network is a visited network
  • the first policy control network element is a visited policy control network element
  • the first network element is a visited data storage network element
  • the method further includes: the first policy control network element receives first indication information from the visited access management network element; the first policy control The network element sends a request message to the first network element according to the first indication information, where the request message is used to request the application data.
  • the service network is a visited network
  • the first policy control network element is a home location policy control network element
  • the first network element is a visited location data storage network element or a visited location access management network element
  • the application data of the visited access management network element is provided by the data management network element; wherein the first policy control network element receives the application data from the first network element, including: the first policy control The network element receives the application data from the first network element through the visited location policy control network element; wherein, the first policy control network element sends the policy information to the terminal device, including: the first network element A policy control network element sends the policy information to the terminal device through the visited location policy control network element.
  • the service information is application identification, service flow information, domain name information or DNN.
  • the service flow information may be an IP triplet or destination information of a non-IP service, and the domain name information may be a fully qualified domain name (FQDN).
  • FQDN fully qualified domain name
  • the application data may include one or more of the following: data network name (DNN), single-network slice selection assistance information (S-NSSAI), Session and service continuity mode (SSC) mode, location information, time information, terminal device identification and group identification.
  • DNN data network name
  • S-NSSAI single-network slice selection assistance information
  • SSC Session and service continuity mode
  • the DNN is used to identify a data network
  • the service indicated (or identified) by the service information is a service in the data network identified by the DNN
  • the S-NSSAI is used to identify a network slice
  • the SSC mode is used To indicate the service continuity requirements of the service indicated by the service information
  • the location information is used to indicate the effective area of the service indicated by the service information
  • the time information is used to indicate the effective time of the service indicated by the service information
  • the terminal device identifier and the group identifier both indicate terminal devices that can apply the service indicated by the service information, and the terminal devices that can apply the service indicated by the service information include the terminal device.
  • the method further includes: the first policy control network element determines a policy section identifier (PSI) corresponding to the policy information, and the PSI is used to indicate the policy information; wherein,
  • the sending of the policy information by the first policy control network element to the terminal device includes: the first policy control network element sending the policy information and the PSI to the terminal device.
  • PSI policy section identifier
  • the first policy control network element receiving the application data from the first network element includes: the first policy control network element receiving the application data from the first network element, and the terminal device identification and/or the group identification .
  • Both the terminal device identifier and the group identifier indicate terminal devices that can use application data.
  • the application data may also include one or more of DNN, S-NSSAI, SSC mode, location information, and time information.
  • DNN DNN
  • S-NSSAI SSC mode
  • location information e.g., location information, and time information.
  • the sending of the policy information by the first policy control network element to the terminal device includes: the first policy control network element sending the policy information and instruction information to the terminal device, the instruction The information is used to indicate that the S-NSSAI in the policy information is the S-NSSAI in the serving network.
  • a communication system including: a first policy control network element and a first network element; the first network element is configured to send application data to the first policy control network element, and the application
  • the data includes service information, the service information is information used to identify the service; the first policy control network element is used to determine the policy information of the terminal device according to the application data, and the policy information includes the application data ,
  • the policy information is associated with a service network; the first policy control network element is further configured to send the policy information to the terminal device.
  • business information and application data in the second aspect are the same as the business information and application data in the first aspect. Therefore, reference may be made to the description of the business information and application data in the first aspect.
  • the first network element can dynamically obtain application data and provide it to the first policy control network element, so that the first policy control network element can generate the policy information of the terminal device, so that the terminal device can be based on the policy Information access to the corresponding business.
  • the system further includes an application network element and a network open network element; the application network element is used to send the application data to the network open network element; the network open network element is used to The first network element sends the application data.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the first network element is a home data storage network element
  • the system further includes a home location Access management network element and data management network element
  • the network open network element is also used to: send first information to the data management network element, and the first information is associated with the application data
  • the data The management network element is configured to send a first request message to the home access management network element according to the first information, where the first request message includes the first information
  • the home access management network Element is used to send first indication information to the first policy control network element according to the first information
  • the first policy control network element is also used to send first indication information to the first policy control network element according to the first indication information
  • a network element sends a second request message, where the second request message is used to request the application data.
  • the service network is a visited network
  • the first policy control network element is a home local policy control network element
  • the first network element is a visited data storage network element
  • the first network The element is used to send application data to a first policy control network element, including: the first network element is used to send the application data to the first policy control network element through a visited location policy control network element; wherein, The first policy control network element is further configured to send the policy information to the terminal device, including: the first policy control network element is further configured to control the network element through the visited location policy to send the policy information to the terminal The device sends the policy information.
  • the system further includes a visited access management network element and a data management network element; the network opening network element is further configured to send first information to the data management network element, where the first information is The application data is associated; the data management network element is configured to, according to the first information, send a first request message to the visited access management network element, the first request message including the first information
  • the visited place access management network element is used to send first indication information to the visited place policy control network element according to the first information; the visited place policy control network element is used to, according to the first information
  • An indication information sending a second request message to the first network element, where the second request message is used to request the application data.
  • the service network is a home network, the first policy control network element is a home policy control network element, and the first network element is a home access management network element; or, the service network Is a visited place network, the first policy control network element is a visited place policy control network element, and the first network element is a visited place access management network element; the system further includes a data management network element; wherein, the The network open network element is configured to send the application data to the first network element, including: the network open network element is configured to send the application to the first network element through the data management network element data.
  • the service network is a visited location network
  • the first policy control network element is a visited location policy control network element
  • the first network element is a visited location data storage network element.
  • the first policy control network element is further used to determine the PSI corresponding to the policy information, and the PSI is used to indicate the policy information; wherein, the first policy control network element is used to communicate to all
  • the terminal device sending the policy information includes: the first policy control network element is configured to send the policy information and the PSI to the terminal device
  • the first policy control network element is configured to send the policy information to the terminal device, including: the first policy control network element is configured to send the policy information to the terminal device and Indication information, where the indication information is used to indicate that the S-NSSAI in the policy information is the S-NSSAI in the serving network.
  • the first network element is configured to send application data to the first policy control network element, including: the first network element is configured to send application data to the first policy control network element; Terminal device identification and/or group identification. Both the terminal device identifier and the group identifier indicate terminal devices that can use application data.
  • the application data may also include one or more of DNN, S-NSSAI, SSC mode, location information, and time information. For the specific meaning of DNN, S-NSSAI, SSC mode, location information, and time information, please refer to the above description.
  • a policy configuration method including: a first network element sends application data to a first policy control network element, the application data includes service information, and the service information is information used to identify a service; The first policy control network element determines policy information for the terminal device according to the application data, the policy information includes the application data, and the policy information is associated with the service network; the first policy control network element is directed to The terminal device sends the policy information.
  • business information and application data in the third aspect are the same as the business information and application data in the first aspect. Therefore, reference may be made to the description of the business information and application data in the first aspect.
  • the first network element can dynamically obtain application data and provide it to the first policy control network element, so that the first policy control network element can generate the policy information of the terminal device, so that the terminal device can be based on the The policy information is connected to the corresponding service.
  • the method further includes: the application network element network sends the application data to the open network element; the network open network element sends the application data to the open network element; The first network element sends the application data.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the method further includes: the network opening network element sends the first information to the data management network element
  • the first information is associated with the application data;
  • the data management network element sends a first request message to the home access management network element according to the first information, and the first request message includes the first request message.
  • the home access management network element sends first indication information to the first policy control network element according to the first information; the first policy control network element according to the first indication information, Sending a second request message to the first network element, where the second request message is used to request the application data.
  • the service network is a visited network
  • the first policy control network element is a home local policy control network element
  • the first network element is a visited data storage network element
  • the first network The element sending application data to the first policy control network element includes: the first network element sends the application data to the first policy control network element through the visited location policy control network element; wherein, the first policy The control network element sending the policy information to the terminal device includes: the first policy control network element sends the policy information to the terminal device through the visited place policy control network element.
  • the method further includes: the network opening network element sends first information to a data management network element, where the first information is associated with the application data; and the data management network element is based on the first information , Sending a first request message to the visited place access management network element, where the first request message includes the first information; the visited place access management network element sends a policy to the visited place according to the first information
  • the control network element sends first indication information; the visited location policy control network element sends a second request message to the first network element according to the first indication information, and the second request message is used to request the application data.
  • the service network is a home network, the first policy control network element is a home policy control network element, and the first network element is a home access management network element; or, the service network Is a visited place network, the first policy control network element is a visited place policy control network element, and the first network element is a visited place access management network element; wherein, the network opening network element is open to the first network
  • the element sending the application data includes: the network open network element sends the application data to the first network element through the data management network element.
  • the service network is a visited location network
  • the first policy control network element is a visited location policy control network element
  • the first network element is a visited location data storage network element.
  • the method further includes: the first policy control network element determines a policy part identifier PSI corresponding to the policy information, and the PSI is used to indicate the policy information; wherein, the first policy control network
  • the element sending the policy information to the terminal device includes: the first policy control network element sending the policy information and the PSI to the terminal device.
  • the first policy control network element receiving the application data from the first network element includes: the first policy control network element receiving the application data from the first network element, and the terminal device identification and/or the group identification .
  • the first policy control network element receiving the application data from the first network element includes: the first policy control network element receiving the application data from the first network element, and the terminal device identification and/or the group identification .
  • a policy configuration method including: a network open network element receives application data from an application network element by the network element, the application data includes service information, and the service information is information used to identify a service; The network opening network element sends the application data to a second network element.
  • the second network element is a data storage network element or a data management network element.
  • a policy configuration method including: an access management network element receives application data from a data management network element, the application data includes service information, and the service information is information used to identify a service; The incoming management network element sends the application data to the first policy control network element, where the application data is used by the first policy control network element to generate policy information of the terminal device.
  • a communication system which is characterized by comprising: a policy control network element, a network open network element, and a data storage network element; the network open network element is used to send application data to the policy control network element ,
  • the application data includes service information, and the service information is information used to identify a service;
  • the policy control network element is used to send the application data to a data storage network element, and the application data is stored in the data storage network element In the contract data of the terminal device.
  • the network open network element can dynamically provide application data to the policy control network element, and the further policy control network element stores the application data in the policy contract data of the terminal device so that the policy control network of the terminal device can be served.
  • the meta obtains the corresponding information and generates a terminal device policy.
  • the network open network element is used to send application data to the policy control network element, including: the network open network element is used to send application data to the policy control network element, and a terminal device identification and/ Or group ID.
  • This implementation manner is similar to the manner in which the first network element sends application data and terminal device identification and/or group identification to the first policy control network element in the first aspect. For details, refer to the description of the first aspect, and details are not repeated here.
  • a policy configuration method which is characterized in that it includes: a network open network element sends application data to the policy control network element, the application data includes service information, and the service information is used to identify a service ⁇ ; The policy control network element sends the application data to the data storage network element, and the application data is stored in the terminal device contract data of the data storage network element.
  • business information and application data in the seventh aspect are the same as the business information and application data in the first aspect. Therefore, reference may be made to the description of the business information and application data in the first aspect.
  • the network open network element can dynamically provide application data to the policy control network element, and the further policy control network element stores the application data in the policy contract data of the terminal device so that the policy control network element of the terminal device can be served Obtain the corresponding information and generate a terminal device policy.
  • a communication device has the function of implementing the first policy control network element in any possible implementation manner from the first aspect to the third aspect or the first aspect to the third aspect.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the device has the function of implementing the first network element in any possible implementation manner from the first aspect to the third aspect or the first aspect to the third aspect. This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the device has the function of implementing the policy control network element in the sixth aspect or any possible implementation manner of the sixth aspect.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the device may also be any network element other than the first policy control network element, the first network element, and the policy control network element, such as a network open network element, an application network element, and the like.
  • a communication device including a processor.
  • the processor is coupled with the memory and can be used to execute instructions in the memory to implement the function of the first policy control network element in any possible implementation manner of the first to third aspects or the first to third aspects, or The function of the first network element in any possible implementation of the first to third aspects or the first to third aspects, or the function of the policy control network element in any possible implementation of the sixth aspect or the sixth aspect .
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled with the communication interface.
  • a processor including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is configured to receive a signal through the input circuit, and transmit a signal through the output circuit, so that the processor executes any possible implementation of the first aspect to the third aspect or the first aspect to the third aspect.
  • the first policy controls the operation performed by the network element, or performs the operation performed by the first network element in any possible implementation of the first aspect to the third aspect or the first aspect to the third aspect, or performs the foregoing
  • the above-mentioned processor can be one or more chips
  • the input circuit can be an input pin
  • the output circuit can be an output pin
  • the processing circuit can be a transistor, a gate circuit, a flip-flop, and various logic circuits, etc.
  • the input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver
  • the signal output by the output circuit may be, for example, but not limited to, output to the transmitter and transmitted by the transmitter
  • the circuit can be the same circuit, which is used as an input circuit and an output circuit at different times.
  • the embodiments of the present application do not limit the specific implementation manners of the processor and various circuits.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, receive signals through a receiver, and transmit signals through a transmitter, so as to implement any possible implementation of the first aspect to the third aspect or the first aspect to the third aspect.
  • the first policy controls the operation performed by the network element, or performs the operation performed by the first network element in any possible implementation of the first to third aspects or the first to third aspects, or performs the first
  • the policy controls operations performed by the network element in the sixth aspect or any possible implementation of the sixth aspect.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory and the processor may be provided separately.
  • the memory can be a non-transitory (non-transitory) memory, such as a read only memory (ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the embodiment of the present application does not limit the type of the memory and the setting mode of the memory and the processor.
  • ROM read only memory
  • the processing device in the above-mentioned eleventh aspect may be one or more chips.
  • the processor in the processing device can be implemented by hardware or software.
  • the processor may be a logic circuit, integrated circuit, etc.; when implemented by software, the processor may be a general-purpose processor, which is implemented by reading the software code stored in the memory, and the memory may Integrated in the processor, can be located outside the processor, and exist independently.
  • a computer program product includes: a computer program (also called code, or instruction), which when the computer program is executed, causes a computer to execute any of the above aspects and The operation performed by any network element in any possible implementation manner in this aspect.
  • a computer program also called code, or instruction
  • a computer-readable medium stores a computer program (also called code, or instruction) when it runs on a computer, so that the computer executes any of the above aspects and The operation performed by any network element in any possible implementation manner in this aspect.
  • a computer program also called code, or instruction
  • Fig. 1 is a schematic diagram of a system to which an embodiment of the present application is applied.
  • Fig. 2 is a schematic diagram of another system to which an embodiment of the present application is applied.
  • Figure 3 is a schematic diagram of the architecture of a 5G system in a non-roaming scenario.
  • Figure 4 is a schematic diagram of the architecture of a 5G system in a roaming scenario.
  • Fig. 5 is a schematic block diagram of the device provided by the present application.
  • Fig. 6 is a schematic flowchart of a method for policy configuration provided by the present application.
  • FIGS 7 to 12 are flowcharts of specific examples of the policy configuration method provided by the present application.
  • FIG. 13 is a schematic flowchart of another method for policy configuration provided by the present application.
  • Fig. 14 is a schematic block diagram of a communication device provided in the present application.
  • the technical solutions of the embodiments of the present application may be applied to a fifth generation (5G) system or a new radio (NR) communication system, and may also be applied to other communication systems that may appear in the future, such as a 6G communication system.
  • 5G fifth generation
  • NR new radio
  • Fig. 1 shows a schematic diagram of a system 100 to which an embodiment of the present application is applied.
  • the system 100 includes: a first policy control network element 110 and a first network element 120.
  • the system may also include terminal equipment not shown in the figure.
  • the first network element 120 is configured to: send application data to the first policy control network element 110, where the application data includes service information, and the service information is information for identifying services; the first policy control network element 110 It is used to determine the policy information of the terminal device according to the application data, the policy information includes the application data, and the policy information is associated with the service network; the first policy control network element 110 is also used to report to the terminal The device sends the policy information.
  • the first network element 120 is a data storage network element or an access management network element, wherein the application information of the access management network element is provided by the data management network element.
  • the system may further include an application network element 130 and a network opening network element 140.
  • the application network element 130 is used to provide the application data to the network open network element 140, and the network open network element is used to directly or indirectly provide the application data to the first network element 130.
  • the first policy control network element 110 may be a home location policy control network element or a visited location policy control network element.
  • the service network is a home network
  • the first policy control network element 110 is a home policy control network element
  • the first network element 120 is a home data storage network element.
  • the system may also include a home access management network element and a data management network element.
  • the network open network element is further used to: send first information to the data management network element, the first information is associated with the application data; the data management network element is used to, according to the first Information, sending a first request message to the home access management network element, where the first request message includes the first information; the home access management network element is configured to, according to the first information, Sending first instruction information to the first policy control network element 110; the first policy control network element 110 is further configured to send a second request message to the first network element according to the first instruction information, The second request message is used to request the application data.
  • the service network is a visited network
  • the first policy control network element 110 is a home location policy control network element
  • the first network element 120 is a visited data storage network element
  • the first network element A network element 120 is used to send application data to the first policy control network element 110, including: the first network element 120 is used to control the network element through the visited location policy and send all the data to the first policy control network element 110 The application data;
  • the first policy control network element 110 is also used to send the policy information to the terminal device, including: the first policy control network element 110 is also used to pass the visited location policy
  • the control network element sends the policy information to the terminal device.
  • the system further includes a visited access management network element and a data management network element; the network opening network element 140 is further configured to send first information to the data management network element, and the first information Is associated with the application data; the data management network element is configured to, according to the first information, send a first request message to the visited access management network element, the first request message including the first Information; the visited place access management network element is used to, according to the first information, send first instruction information to the visited place policy control network element; the visited place policy control network element is used to, according to the The first indication information is to send a second request message to the first network element, where the second request message is used to request the application data.
  • the service network is a home network, the first policy control network element 110 is a home policy control network element, and the first network element 120 is a home access management network element; or
  • the service network is a visited place network, the first policy control network element 110 is a visited place policy control network element, and the first network element 120 is a visited place access management network element;
  • the system further includes a data management network element;
  • the network open network element 140 is configured to send the application data to the first network element 120, including: the network open network element 140 is configured to send the application data to the first network element through the data management network element.
  • a network element 120 sends the application data.
  • the service network is a visited network
  • the first policy control network element 110 is a visited policy control network element
  • the first network element 120 is a visited data storage network element.
  • the first policy control network element 110 is further configured to determine the policy part identifier PSI corresponding to the policy information, and the PSI is used to indicate the policy information; wherein, the first policy control network element 110
  • the method for sending the policy information to the terminal device includes: the first policy control network element 110 is used for sending the policy information and the PSI to the terminal device.
  • the service information is application identification, service flow information, domain name information or DNN.
  • the service flow information may be IP triples or destination information of non-IP services, and the domain name information may be FQDN.
  • the application data further includes one or more of the following:
  • the DNN is used to identify a data network, and the service information indicates The service is the service in the data network identified by the DNN; the S-NSSAI is used to identify a network slice; the SSC mode is used to indicate the continuity requirements of the service indicated by the service information; the location information is used for Indicates the effective area of the service indicated by the service information; the time information is used to indicate the effective time of the service indicated by the service information; both the terminal device identifier and the group identifier indicate that the service information indication can be applied
  • the terminal device of the service that can apply the service indicated by the service information includes the terminal device.
  • the first policy control network element 110 receiving the application data from the first network element 120 includes: the first policy control network element 110 receives the application data from the first network element 120, and the terminal device identification and/ Or group ID. Both the terminal device identifier and the group identifier indicate terminal devices that can use application data.
  • the application data may also include one or more of DNN, S-NSSAI, SSC mode, location information, and time information.
  • the DNN is used to identify a data network
  • the service indicated by the service information is a service in the data network identified by the DNN
  • the S-NSSAI is used to identify a network slice
  • the SSC mode is used to indicate The service continuity requirement of the service indicated by the service information
  • the location information is used to indicate the effective area of the service indicated by the service information
  • the time information is used to indicate the effective time of the service indicated by the service information.
  • the first policy control network element 110 is further configured to determine to store part or all of the information in the application data in the data storage network element according to the terminal device identification and/or group identification from the first network element 120 in.
  • the application data is provided through the first network element, so that the first policy control network element can generate the policy information of the terminal device based on the application data provided by the first network element, which solves the dynamic deployment of the LAND network or the dynamic deployment application scenario , The policy control network element cannot effectively configure the policy information of the terminal device.
  • all the network elements in the aforementioned system 100 may be implemented by one device, or jointly implemented by multiple devices, or may be a functional module in one device, which is not specifically limited in the embodiment of the present application. It is understandable that the above functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • the first policy control network element, data storage network element, etc. in FIG. 1 are only a name, and the name does not constitute a limitation on the device itself.
  • the first policy control network element may also have other names, which are not specifically limited in the embodiment of the present application.
  • the first policy control network element may also be replaced with a policy control function (PCF) entity
  • the data storage network element may be replaced with a unified data repository (UDR) entity.
  • PCF policy control function
  • UDR unified data repository
  • Fig. 2 shows a schematic diagram of a system 200 to which an embodiment of the present application is applied.
  • the system 200 includes: a network opening network element 210, a policy control network element 220, and a data storage network element 230.
  • the network open network element 210 is configured to send application data to the policy control network element 220, where the application data includes service information, and the service information is information used to identify services; the policy control network element 220 sends to the data storage network element 230
  • the application data and the application data are stored in the terminal device contract data of the data storage network element 230.
  • system 200 may further include an application network element 240 for sending application data to the network open network element 210.
  • the network open network element 210 is used to send application data to the policy control network element 220, including: the network open network element 210 is used to send application data to the policy control network element 220, and the terminal device identification and/or group Group ID. Both the terminal device identifier and the group identifier indicate terminal devices that can use application data.
  • the application data may also include one or more of DNN, S-NSSAI, SSC mode, location information, and time information.
  • DNN, S-NSSAI, SSC mode, location information, and time information can be referred to the description in the system 100 above.
  • the network open network element dynamically provides application data to the policy control network element, and the policy control network element stores the application data in the policy contract data of the terminal device, so that the policy control network element serving the terminal device can be based on the dynamic
  • the stored contract data generates the strategy of the terminal device, which solves the problem that the strategy control network element cannot effectively configure the strategy information of the terminal device in the dynamic deployment of the LAND network or the dynamic deployment application scenario in the prior art.
  • all network elements in the aforementioned system 200 may be implemented by one device, or jointly implemented by multiple devices, or may be a functional module in one device, which is not specifically limited in the embodiment of the present application. It is understandable that the above functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • the policy control network element, data storage network element, etc. in FIG. 2 are only a name, and the name does not constitute a limitation on the device itself.
  • the first policy control network element may also have other names, which are not specifically limited in the embodiment of the present application.
  • the first policy control network element may also be replaced with a PCF entity, and the data storage network element may be replaced with a UDR entity, etc., which are uniformly explained here and will not be described in detail below.
  • FIG. 1 and FIG. 2 may also include other network elements that interact or communicate with the network elements in the figures, which is not limited.
  • the terminal equipment in the embodiments of this application may refer to user equipment (UE), access terminal, terminal in V2X communication, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile equipment, User terminal, terminal equipment, wireless communication equipment, user agent or user device.
  • UE user equipment
  • access terminal terminal in V2X communication
  • user unit user station, mobile station, mobile station, remote station, remote terminal, mobile equipment, User terminal, terminal equipment, wireless communication equipment, user agent or user device.
  • the terminal can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), and a wireless communication function Handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the future 5G network or terminals in the public land mobile network (PLMN) that will evolve in the future Devices, etc., are not limited in the embodiment of the present application.
  • the terminal may also include a V2X device, such as a vehicle or an on-board unit (OBU) in the vehicle.
  • V2X device such as a vehicle or an on-board unit (OBU) in the vehicle.
  • the terminal in the embodiment of the present application is connected to a radio access network (Radio Access Network, RAN) device in a wireless manner, and the radio access network device is connected to a core network device in a wireless or wired manner.
  • the core network device and the wireless access network device can be separate and different physical devices, or it can integrate the functions of the core network device and the logical function of the wireless access network device on the same physical device, or it can be a physical device. It integrates the functions of part of the core network equipment and part of the wireless access network equipment.
  • the terminal can be a fixed location, or it can be movable.
  • the radio access network equipment is the access equipment that the UE accesses to the mobile communication system by wireless means, and can be a base station (for example, a base station (gNodeB, gNB) in a 5G mobile communication system), a base station in a future mobile communication system Or an access node in a wireless fidelity (Wireless Fidelity, WiFi) system, etc., it can also be a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN) scenario, or the access network device can be a relay station , Access points, in-vehicle devices, wearable devices, network devices in the future 5G network or network devices in the future evolved PLMN network, etc., the specific technologies and specific equipment used by the embodiments of the present application for wireless access network devices The shape is not limited.
  • Core network equipment includes core network control plane (CP) or user plan (UP) network functions, for example, session management function (SMF), access and mobility management function AMF, etc. .
  • CP core network control plane
  • UP user plan
  • SMF session management function
  • AMF access and mobility management function AMF
  • the core network control plane can also be understood as a core network control plane function (CPF) entity.
  • CPF core network control plane function
  • system 100 shown in FIG. 1 or the system 200 shown in FIG. 2 may be applied to a 5G network and other possible networks in the future, which is not specifically limited in the embodiment of the present application.
  • the first policy control function network element may be the PCF in 5G
  • the data storage network element is UDR
  • the network opening network element is NEF.
  • the application network element is AF; or, as shown in FIG. 4, for example, the above-mentioned first policy control function network element may be H-PCF or V-PCF in 5G, and the data storage network element is H-UDR or V-UDR.
  • the system 200 shown in FIG. 2 is applied to a 5G network, as shown in FIG. 3.
  • the above-mentioned policy control function network element may be the PCF in 5G
  • the data storage network element is UDR
  • the network opening network element is NEF.
  • the application network element is AF; or, as shown in FIG. 4, for example, the above-mentioned policy control function network element may be H-PCF in 5G.
  • FIG. 3 shows a schematic diagram of the architecture of a 5G system in a non-roaming scenario.
  • the system 300 includes: access and mobility management function (AMF), session management function (session management function, SMF), radio access network (RAN) , Unified data management (UDM), policy control function (PCF), data network (DN), user plane function (UPF), UE, application function (application function) , AF), unified data repository (UDR) and capability opening function (network exposure function, NEF).
  • AMF access and mobility management function
  • SMF session management function
  • RAN radio access network
  • UDM Unified data management
  • PCF policy control function
  • DN data network
  • UPF user plane function
  • UE application function
  • application function application function
  • AF application function
  • UDR unified data repository
  • capability opening function network exposure function
  • each network element the main functions of each network element are described as follows:
  • AF It can be understood as the naming of application network elements in the 5G architecture.
  • the application network element mainly conveys the requirements of the application side on the network side, for example, quality of service (QoS) requirements.
  • QoS quality of service
  • AF can be a third-party functional network element, or an application functional network element deployed by an operator, such as the P-CSCF (Proxy call session control function) in the IP Multimedia Subsystem (IMS), proxy call session control function ).
  • P-CSCF Proxy call session control function
  • IMS IP Multimedia Subsystem
  • UDM It can be understood as the naming of data management network elements in the 5G architecture.
  • the data management network element mainly includes the following functions: unified data management, support for authentication credential processing in 3GPP authentication and key agreement mechanism, user identity processing, access authorization, registration and mobility management, contract management, short message management Wait.
  • UDR It can be understood as the naming of data storage network elements in the 5G architecture.
  • the data storage network element mainly includes the following functions: the access function of contract data, policy data, application data and other types of data.
  • PCF It can be understood as the naming of policy control network elements in the 5G architecture. Among them, the policy control network element is mainly responsible for the policy control functions such as charging for sessions and service flow levels, QoS bandwidth guarantee and mobility management, and UE policy decision-making.
  • the PCF connected to the AMF and SMF is the access and mobility control PCF (PCF for access and mobility control, AM PCF) and the session management PCF (PCF for session management, SM PCF).
  • AM PCF access and mobility control
  • SM PCF session management
  • AM PCF It may not be the same PCF entity as SM PCF.
  • SMF It can be understood as the naming of the session management network element in the 5G architecture. Among them, the session management network element mainly performs functions such as session management, PCF issuing control strategy execution, UPF selection, and UE IP address allocation.
  • AMF It can be understood as the naming of mobile management network elements in the 5G architecture.
  • the mobility management network element mainly includes the following functions: connection management, mobility management, registration management, access authentication and authorization, reachability management, security context management and other access and mobility-related functions.
  • the user plane function network element mainly includes the following functions: data packet routing and transmission, packet inspection, service usage reporting, QoS processing, lawful monitoring, upstream packet inspection, downstream data packet storage and other user-related functions.
  • (R)AN (wireless) access network, corresponding to different access networks in 5G, such as wired access, wireless base station access and other methods.
  • the capability opening network element mainly includes the following functions: the services and capabilities provided by the safe and open 3GPP network functions, which are internally open or open to third parties, etc.; transform or translate the information exchanged with AF and the information exchanged by internal network functions, For example, AF service identification and internal 5G core network information such as data network name (DNN), single network slice selection assistance information (S-NSSAI), etc.
  • DNN data network name
  • S-NSSAI single network slice selection assistance information
  • DN The network used to provide service data, for example, the Internet network, the service of an operator, and so on.
  • a variety of services can be deployed on the DN to provide services such as data or voice for the terminal.
  • a terminal device can access one or more DNs through the operator's network.
  • network elements may be hardware devices, chips, or software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform). It should also be understood that some network elements shown in FIG. 3 may be deployed in the same location (for example, on the same hardware device or software function), or may be deployed separately, which is not limited in this application.
  • FIG. 4 shows a schematic diagram of the architecture of a 5G system in a roaming scenario.
  • the system 400 includes: AMF, SMF, (R)AN, UDM, visited-policy control function (V-PCF), home-policy control function , H-PCF), DN, UPF, UE, AF, NEF, visited UDR (V-UDR) and home UDR (H-UDR).
  • the interface between V-PCF and H-PCF is N24.
  • the other network elements are all located in the visited public land mobile communications network.
  • Network (visited public land mobile network, V-PLMN) side the UE can also access the DN located in the HPLMN, that is, establish a Home Ruted PDU session.
  • each network element such as V-PCF, H-PCF, AMF, etc.
  • the aforementioned network elements may also have other names, which are not specifically limited in the embodiment of the present application.
  • 5G 5G
  • 6G 6G network
  • some or all of the above-mentioned various network elements may use the terminology of 5G, or may be named in other ways, etc., which will be uniformly explained here and will not be repeated in the following.
  • FIG. 3 and FIG. 4 are only exemplarily described, and in fact may also include other network elements that interact with the network elements illustrated in the figures, which will not be repeated here.
  • the communication between the various network elements of the control plane function in FIG. 3 and FIG. 4 is described using a non-service interface as an example, but it does not limit the protection scope of the embodiments of the present application.
  • the various network elements of the control plane functions in Figures 3 and 4 can also communicate through service-oriented interfaces.
  • the service-oriented interface provided by AMF can be Namf
  • the service-oriented interface provided by SMF can be Nsmf
  • the service-oriented interface provided by UDM can be Nudm
  • the service-oriented interface provided by AF can be Naf
  • the service-oriented interface provided by PCF can be Npcf and so on.
  • FIG. 5 shows a schematic block diagram of a device 500 to which an embodiment of the present application is applied.
  • Each network element in FIG. 2, such as a policy control function network element, a data storage network element, and an application network element, can also be implemented by the device in FIG. 5.
  • the device 500 may be a physical device, a component of a physical device (for example, an integrated circuit, a chip, etc.), or a functional module in the physical device.
  • the computer device includes: one or more processors 501.
  • the processor 501 may store execution instructions for executing the method in the embodiments of the present application.
  • the processor 501 may call an interface to implement receiving and sending functions.
  • the interface may be a logical interface or a physical interface, which is not limited.
  • the interface can be a transceiver circuit or an interface circuit.
  • the transceiver circuits or interface circuits used to implement the receiving and transmitting functions may be separate or integrated.
  • the foregoing transceiver circuit or interface circuit can be used for code/data reading and writing, or the foregoing transceiver circuit or interface circuit can be used for signal transmission or transmission.
  • the interface can be implemented by a transceiver.
  • the device 500 may further include a transceiver 503.
  • the transceiver 503 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and is used to implement a transceiver function.
  • the computer device may further include a memory 502.
  • the embodiment of the present application does not specifically limit the specific deployment location of the memory 502, and the memory may be integrated in the processor, or may be independent of the processor.
  • the computer device does not include a memory, the computer device only needs to have processing functions, and the memory can be deployed in other locations (for example, a cloud system).
  • the processor 501, the memory 502, and the transceiver 503 communicate with each other through internal connection paths to transfer control and/or data signals.
  • the device 500 may also include other devices, such as an input device, an output device, a battery, and the like.
  • the memory 502 may store execution instructions for executing the methods in the embodiments of the present application.
  • the processor 501 can execute the instructions stored in the memory 502 in combination with other hardware (for example, the transceiver 503) to complete the steps executed by the method shown below.
  • other hardware for example, the transceiver 503
  • the method disclosed in the embodiment of the present application may be applied to the processor 503 or implemented by the processor 503.
  • the processor 503 may be an integrated circuit chip with signal processing capability.
  • each step of the method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application can be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory (RAM), flash memory, read-only memory (read-only memory, ROM), programmable read-only memory or electrically erasable programmable memory, registers, etc. mature in the field Storage medium.
  • the storage medium is located in the memory, and the processor reads the instructions in the memory and completes the steps of the above method in combination with its hardware.
  • the memory 502 may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be a read-only memory ROM, a programmable read-only memory (programmable ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), and an electrically erasable programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory RAM, which acts as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM
  • the above-mentioned device 500 may be a general-purpose computer device or a special-purpose computer device.
  • the device 500 may be a desktop computer, a portable computer, a network server, a PDA (personal digital assistant, PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device, an embedded device, or the like in Figure 5 Structure of equipment.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the device 500.
  • UE terminal equipment
  • PCF Policy control network element
  • AMF Access management network element
  • UDR data storage network element
  • UDM data management network element
  • NEF Network open network element.
  • FIG. 6 shows a schematic flowchart of a method 600 for policy configuration provided by the present application.
  • the method 600 can be applied to the system 100 shown in FIG. 1.
  • the first network element sends application data to the first PCF.
  • the first PCF determines the policy information of the UE according to the application data.
  • the first PCF sends the determined policy information to the UE.
  • the first network element can dynamically acquire application data and provide it to the first PCF, and the first PCF can generate and send the UE policy information according to the application data to the UE, so that the UE can access the corresponding service based on the policy information.
  • the application data includes service information
  • the service information is information used to identify a service.
  • the service information may be an application identifier (APP ID) or service flow information.
  • APP ID application identifier
  • the service information may be service information corresponding to a newly deployed application or service in a network identified by an existing DNN.
  • the service information may be service information corresponding to applications or services in a dynamically deployed data network, such as service information corresponding to applications or services in a newly deployed LADN network.
  • the application data may also include one or more of the following: DNN, S-NSSAI, SSC mode, location information, time information, UE identification, and group identification.
  • DNN is used to identify a data network.
  • the DNN indicates the data network corresponding to the service information, that is, the data network provides the service.
  • the S-NSSAI indicates the network slice information associated with the service corresponding to the service information, and the UE can access the service through the S-NSSAI.
  • the SSC mode refers to the continuity requirement of the service corresponding to the service information, that is, whether the network needs to ensure the continuity of the service when the UE accessing the service moves.
  • the location information is used to indicate the effective area of the service corresponding to the service information. In other words, the service can be accessed only in the area indicated by the location information.
  • the time information is used to indicate the effective time of the service corresponding to the service information, or the time information is used to indicate the effective time of the service corresponding to the service information. That is, the service can be accessed only within the time indicated by the time information. Or, the application data is valid only within the time indicated by the time information.
  • Both the UE identifier and the group identifier indicate UEs that can apply the service corresponding to the service information, and the UEs that can apply the service corresponding to the service information include the aforementioned UEs. In other words, the service information is only valid for some UEs.
  • the UE identity and/or group identity may not be provided to the first network element as part of the application data.
  • the application data may include service information, and optionally include one or more of DNN, S-NSSAI, SSC mode, location information, and time information.
  • the application data may be directly or indirectly sent by the AF to the first network element through the NEF, and then directly or indirectly sent by the first network element to the first PCF.
  • the first network element is AMF.
  • the application data of AMF is sent by NEF to UDM.
  • NEF can send the application data to UDM first, and then UDM sends the application data to AMF.
  • the first network element is UDR. That is, the NEF can send the application data to the UDR, and then the UDR sends it to the first PCF.
  • the first network element sending application data to the first PCF includes: the first network element sending application data to the first PCF according to a request of the first PCF.
  • the first network element may request the application data from the first PCF, and the first network element may request the application data according to the first The PCF requests to send the application data to the first PCF.
  • the first network element may also directly push the application data to the first PCF.
  • the UE subscribes to the first network element for the service update notification of the UE. Then, before the first network element obtains the application data, if the UE is already registered to the network, the first network element can directly push the application data to the first PCF.
  • the first network element sending application data to the first PCF includes: the first network element determines at least one PCF according to the application data, and sends the application data to the at least one PCF.
  • the at least one PCF includes the first PCF.
  • the first network element is a UDR
  • the UDR can determine at least one PCF in the area indicated by the location information according to the location information in the application data, and then the UDR can send the application data to the at least one PCF.
  • the first PCF may be an H-PCF.
  • the first PCF can be H-PCF or V-PCF.
  • the information contained in the application data sent by the AF to the NEF can be directly used in the 3GPP network, or NEF can convert it into information that can be recognized or used by the 3GPP network.
  • This article only focuses on the actual meaning of application data, so the article does not specifically emphasize NEF's conversion operation of received application data, but those skilled in the art can understand that the application data sent by NEF to UDM, UDR, AMF and other network elements can pass through Data after NEF conversion. For example, if the information sent by AF to NEF includes an external group identifier, NEF needs to convert it into an internal group identifier, that is, the group identifier in this article.
  • the application data is the application data of the UE served by the first PCF.
  • the UE identifier in the application data is the identifier of the UE served by the first PCF
  • the group identifier in the application data is the group identifier of the group to which the UE served by the first PCF belongs.
  • a PCF can generate policy information of the UE served by the first PCF according to the application data.
  • the policy information mainly refers to a user routing selection policy (URSP).
  • URSP user routing selection policy
  • the policy information determined by the first PCF may include one or more of service information, DNN, S-NSSAI, SSC mode, location information, and time information in the application data.
  • the method may further include: the first PCF determines the PSI corresponding to the policy information, and the PSI is used to indicate the policy information.
  • the PSI may identify specific types of policy information. If the policy information is LADN-related or local application-related policy information or policy information available in a specific PLMN, the PSI identifier can be used. Further, the PSI is also used to indicate that the policy information is specific policy information, for example, the S-NSSAI in the policy information is the S-NSSAI in the serving network.
  • the PSI may be newly allocated or existing PSI.
  • the PSI may also include the PLMN ID.
  • the method may further include: the first PCF determines the PLMN ID corresponding to the policy information, where the PLMN ID is used to indicate that the policy information is the policy information available in the PLMN indicated by the PLMN ID.
  • the first PCF may first send the determined policy information to the AMF, and then the AMF forwards it to the UE.
  • the UE here refers to the UE served by the first PCF.
  • the first PCF may send the first URSP to the UE via the AMF through the UE Configuration Update (UE Configuration Update) procedure.
  • UE Configuration Update UE Configuration Update
  • the first PCF may also send the PSI to the UE.
  • the first PCF may also send the PLMN ID to the UE.
  • the first network element can dynamically obtain application data of the newly deployed LAND or newly deployed application, and can provide the application data to the first PCF, and the first PCF generates the UE’s data based on the application data. Policy information, and provide the policy information to the UE. Therefore, the problem that the existing technology cannot configure the relevant data network or applied policy information to the UE in the newly deployed LAND or the new deployment scenario is solved.
  • the method 600 will be described in detail below in conjunction with FIGS. 7 to 13. It should be noted that for the content that has been explained above, such as the content contained in the application data, if there is no special explanation below, you can refer to the above description.
  • Fig. 7 is a flowchart of a specific example of a strategy configuration method.
  • the first PCF is H-PCF
  • the first network element is UDR (H-UDR)
  • the AF is located in the H-PLMN.
  • the AF sends a service configuration request to the NEF, where the configuration request includes the application data.
  • the AF may send a Nnef_ServiceParameters_Create request message to the NEF, and the request message may include the application data.
  • S702 The NEF performs authorization checking to check whether the AF is authorized to perform the configuration request of the service.
  • the NEF sends a configuration response message (for example, Nnef_ServiceParameters_Create response message) to the AF.
  • the configuration response message indicates that the configuration failed and contains the reason value for the failure. The process ends.
  • S703 The NEF sends the application data to the UDR.
  • the NEF sends the application data to the UDR, so that the UDR stores the application data.
  • the application data is in the application data set part of the UDR.
  • the AF and UDR are located in the same PLMN. That is, if AF is located in PLMN1, the UDR is the UDR in PLMN1; if AF2 is located in PLMN2, the UDR is the UDR in PLMN2. From the perspective of the UE, in this method, the AF is located in the hometown PLMN, and the UDR is H-UDR.
  • S704 can be implemented in two ways.
  • the UDR After receiving the application data sent by the NEF, the UDR can send the application data to at least one H-PCF.
  • the at least one H-PCF may be an H-PCF determined by the UDR according to one or more of DNN, location information, time information, and slice information in the application data.
  • the at least one H-PCF may be an H-PCF that has subscribed to the UDR for service update notifications.
  • the at least one H-PCF may respectively send a subscription message to the UDR.
  • the subscription message is used to subscribe to service update notifications.
  • the subscription message may not include UE identification information (eg, the UE identification or the group to which the UE belongs).
  • the group identification of the UE below, the identification information of the UE below may also be the identification of the UE or the group identification of the group to which the UE belongs). Then, after the UDR receives the application data, it can send the application data to the at least one H-PCF.
  • the at least one H-PCF may be an H-PCF that requests application data from the UDR.
  • the at least one H-PCF may send a request message to the UDR, the request message is used to request the application data, the request message may not include the UE identification information, and the UDR may send the request message to the UDR respectively.
  • At least one H-PCF sends the application data.
  • the UDR can send application data to the at least one H-PCF.
  • the UDR After receiving the application data sent by the NEF, the UDR sends the application data of the specific UE to the specific H-PCF.
  • the H-PCF serving the UE may send a subscription message to the UDR.
  • the subscription message is used to subscribe to service update notifications, and the subscription message may include the UE's identity information.
  • the UDR receives the application data of the UE, the UDR can send the application data to the H-PCF.
  • the UDR may send a Nudr_DM_Notify message to the H-PCF, and the message may include Application data of the UE.
  • the H-PCF serving the UE may send a request message to the UDR.
  • the request message is used to request application data of the UE.
  • the request message may Including the identification information of the UE.
  • the UDR receives the request message, if it is determined that the application data of the UE is stored, that is, the UDR has previously received the application data of the UE from the NEF, it may send the application data of the UE to the H-PCF.
  • the AMF serving the UE may send a request message #1, such as a Npcf_UEPolicyControlCreate request message, to the H-PCF.
  • the request message #1 is used to request the establishment of a UE policy association with the H-PCF.
  • the H-PCF may request message #2 from the UDR according to the request message #1.
  • the request message #2 is used to request application data, and the request message #2 may include the identification information of the UE.
  • the UDR receives the request message #2, if it is determined that the application data of the UE is stored, that is, the UDR has previously received the application data of the UE from the NEF, it may send the application data of the UE to the H-PCF.
  • the application data sent by the UDR to the H-PCF may not include the identification information of the UE, but this application does not limit this.
  • the message carrying application data sent by the UDR to the H-PCF may include the identification information of the UE.
  • the Nudr_DM_Notify message may carry the identification information of the UE, but this application does not limit this.
  • the H-PCF generates policy information of the UE.
  • any H-PCF in the at least one H-PCF for example, if the application data received by the H-PCF is used for all UEs, for example, the application data does not include The UE identity or group identity or application data indication is used for any user, then the H-PCF can generate UE policy information according to the application data, and can send the policy information to all UEs served by the H-PCF. Wherein, the policy information includes application data.
  • the H-PCF If the application data received by the H-PCF is the application data of a certain UE (or multiple UEs) served by the H-PCF, for example, the application data contains the UE identity or the group identity, and the H-PCF -The identity of the UE served by the PCF is the UE identity or a group member corresponding to the group identity, then the H-PCF generates policy information of the UE according to the application data. If the application data received by the H-PCF is not the application data of the UE served by the H-PCF, the H-PCF does not generate the policy information of the UE according to the application data.
  • the aforementioned UE identification or group identification or information indicating that it is used for any user may not be sent to the H-PCF as a part of the application data. That is, the H-PCF receives application data, and receives UE identification or group identification or information indicating that it is used for any user. The H-PCF determines whether the application data is used to generate the policy information of the UE according to the UE identity or the group identity or the information indicating that it is used for any user.
  • the application data received by the H-PCF is the application data of the UE served by the H-PCF, so the H-PCF can generate the policy information of the UE according to the application data without making a judgment.
  • the H-PCF may also determine the PSI and/or PLMN ID corresponding to the policy information.
  • the PSI and/or PLMN ID may be determined from the above description, which will not be repeated here. It should be understood that this application does not limit the sequence between this step and S705.
  • the H-PCF sends the UE's policy information to the AMF.
  • the AMF sends the policy information to the UE.
  • the H-PCF may also send the PSI and/or PLMN ID to the AMF.
  • the AMF may also send the PSI and/or PLMN ID to the UE. It should be understood that the two operations of sending the PSI and/or PLMN ID and sending the UE's policy information may also be performed at different times, and the sequence of these two operations is not limited in this application.
  • AF can provide dynamic application data to UDR in time through NEF, and UDR can provide the application data to H-PCF, so that H-PCF can generate UE policy information based on the application data, thereby enabling Ensure that the UE can access the service corresponding to the application data.
  • Fig. 8 is a flowchart of a specific example of a policy configuration method.
  • the first PCF is H-PCF
  • the first network element is V-UDR
  • the AF is located in the V-PLMN.
  • S801 to S802 the AF sends a configuration request including the application data service to the NEF, and the NEF performs an authorization check to check whether the AF is authorized to perform the configuration request of the service.
  • S801 to S802 are the same as S701 to S702. For details, please refer to S701 and S702.
  • S803 The NEF sends the application data to the V-UDR.
  • the NEF sends the application data to the V-UDR, so that the V-UDR stores the application data.
  • the application data is in the application data set part of the V-UDR.
  • the AF and UDR are located in the same PLMN. That is, if AF is located in PLMN1, the UDR is the UDR in PLMN1; if AF2 is located in PLMN2, the UDR is the UDR in PLMN2. From the perspective of the UE, in this method, the AF is located in the visited PLMN, and the UDR is a V-UDR.
  • V-UDR provides application data to V-PCF.
  • S804 can be implemented in two ways. These two implementation manners are similar to the manner in which the UDR provides application data to the H-PCF described in S704. Specifically, the V-UDR here can correspond to the UDR in S704, and the V-PCF can correspond to the H-PCF in S704. For the specific content of the two methods, refer to the description of S704 above, which will not be repeated here.
  • V-PCF sends the application data to the H-PCF.
  • any V-PCF in the at least one V-PCF for example, if the application data received by the V-PCF is used for all UEs, for example, the application data does not include The UE identity or group identity or application data indication is used for any user, then the V-PCF can send the application data to the H-PCF.
  • the V-PCF sends the application data to the H-PCF. If the application data received by the V-PCF is not the application data of the UE served by the V-PCF, the V-PCF does not send the application data to the H-PCF.
  • the application data received by the V-PCF is the application data of the UE served by the V-PCF, so the V-PCF can send the application data to the H-PCF without making a judgment.
  • the application data may not include the UE identity.
  • the V-PCF may send the application data to the H-PCF through the Npcf_UEPolicyControlUpdate message.
  • the H-PCF generates policy information of the UE.
  • the H-PCF generates the policy information of the UE according to the application data. For this step, refer to S603.
  • the H-PCF may also determine the PSI and/or V-PLMN ID corresponding to the policy information.
  • the PSI and/or V-PLMN ID may be determined from the above description.
  • the H-PCF sends the policy information of the UE to the V-PCF.
  • the V-PCF sends the policy information of the UE to the AMF.
  • the AMF sends the policy information to the UE.
  • the H-PCF may also send the PSI and/or V-PLMN ID to the V-PCF.
  • the V-PCF may also send the PSI and/or V-PLMN ID to the AMF, and in S809, the AMF may also send the PSI and/or V-PLMN ID to the UE.
  • the two operations of sending the PSI and/or V-PLMN ID and sending the UE's policy information may also be performed at different times, and the sequence of these two operations is not limited in this application.
  • AF can provide dynamic application data to V-UDR in time through NEF, and V-UDR can provide the application data to V-PCF, and then V-PCF can provide the application data to H-UDR.
  • PCF so that the H-PCF can generate the policy information of the UE according to the application data, thereby ensuring that the UE can access the service corresponding to the application data.
  • the first PCF may be a V-PCF
  • the first network element is a V-UDR
  • the AF is located in the V-PLMN.
  • the difference between this method and method 800 is that in this example, after the V-PCF obtains the application data, it does not need to be provided to the H-PCF, but instead determines the UE's policy information by itself and sends it to the UE.
  • AF in a roaming scenario, can provide dynamic application data to V-UDR in time through NEF, and V-UDR can provide the application data to V-PCF, so that V-PCF can generate data based on the application data.
  • the policy information of the UE can thereby ensure that the UE can access the service corresponding to the application data.
  • Fig. 9 is a flowchart of a specific example of a policy configuration method.
  • the first PCF is H-PCF
  • the first network element is AMF
  • AF is located in H-PLMN
  • the application data in AMF is sent to AMF by UDM.
  • S901 to S902 the AF sends a configuration request including the application data service to the NEF, and the NEF performs an authorization check to check whether the AF is authorized to perform the configuration request of the service.
  • S901 to S902 are the same as S701 to S702. For details, please refer to S701 and S702.
  • the NEF sends the application data to the UDM.
  • the NEF sends the application data to the UDM, so that the UDM stores the application data.
  • NEF may send a Nudm_ParameterProvisionservice message to UDM, and the message may include application data.
  • the UDM may obtain the subscription information from the UDR to perform authorization, and if the authorization is passed, the application data is stored.
  • the AMF obtains the application data in the UDM.
  • S904 can be implemented in two ways.
  • the UDM After receiving the application data sent by the NEF, the UDM can send the application data to at least one AMF.
  • the at least one AMF may be determined by the UDM according to one or more of DNN, location information, time information, and slice information in the application data.
  • the at least one AMF may be an AMF that requests application data from the UDM.
  • the at least one AMF may send a request message to the UDM, the request message is used to request the application data, the request message may not include the UE identification information, and the UDM may send a request message to the at least one UDM according to the request message.
  • AMF sends the application data.
  • the UDM can send application data to the at least one AMF.
  • the UDM After the UDM receives the application data sent by the NEF, it sends the application data of the specific UE to the specific AMF.
  • the UDM may directly send the application data of the UE to the AMF serving the UE.
  • the UDM may send a Nudm_SDM_notification message to the AMF, and the message includes the application data of the UE.
  • the AMF serving the UE may obtain the application data of the UE from the UDM through the Nudm_SDM_Get procedure. That is, the AMF may send a request message to the UDM, and the request message may include the identification information of the UE. According to the identification information of the UE, the UDM will send the application data of the UE to the AMF if it is determined that the application data of the UE is stored. .
  • the application data sent by the UDM to the AMF may not include the identification information of the UE, but this application does not limit this.
  • the message carrying application data sent by the UDM to the AMF may include the identification information of the UE.
  • the Nudm_SDM_notification message may carry the identification information of the UE, but this application does not limit this.
  • the method may further include: the UDM obtains the subscription information from the UDR, and performs authorization checking. If the AF is allowed to initiate a configuration request, the UDM will store the application data as the user's subscription information in the UDR.
  • S905 The AMF sends application data to the H-PCF.
  • any AMF in the at least one AMF exemplarily, if the application data received by the AMF is used for all UEs, for example, the application data does not contain the UE identity or the group identity Or the application data indicates that it is used for any user, then the AMF can send the application data to the H-PCF serving the same UE as the AMF.
  • the AMF may send the application data of the UE to the H-PCF serving the same UE as the AMF. If the application data received by the AMF is not the application data of the UE served by the AMF, the AMF does not send the application data to the H-PCF serving the same UE as the AMF.
  • the aforementioned UE identification or group identification or information indicating that it is used for any user may not be sent to the AMF as a part of the application data. That is, the AMF receives application data, and receives UE identification or group identification or information indicating that it is used for any user. The AMF determines to send the application data to the H-PCF according to the UE identity or the group identity or the information indicated for any user.
  • the application data received by the AMF is the application data of the UE served by the AMF, so the AMF can send the application data to the H-PCF serving the same UE as the AMF without making a judgment.
  • the AMF may send an Npcf_UEPolicyControlUpdate message to the H-PCF, and the message may include the application data.
  • the AMF can provide the H-PCF with the application data in the UE policy association establishment procedure.
  • S906 The H-PCF generates policy information of the UE. Refer to S603 for this step.
  • the H-PCF may also determine the PSI and/or PLMN ID corresponding to the policy information.
  • the PSI and/or PLMN ID may be determined from the above description.
  • the H-PCF sends the policy information of the UE to the AMF, and the AMF sends the policy information to the UE. This step is the same as S706 to S707.
  • the H-PCF may also send the PSI and/or PLMN ID to the AMF.
  • the AMF may also send the PSI and/or PLMN ID to the UE.
  • AF can provide dynamic application data to AMF in time through NEF and UDM, and AMF can provide the application data to H-PCF, so that H-PCF can generate UE policy information based on the application data. Therefore, it can be ensured that the UE can access the service corresponding to the application data.
  • Fig. 10 is a flowchart of a specific example of a policy configuration method.
  • the first PCF is H-PCF
  • the first network element is AMF
  • AF is located in V-PLMN
  • the application data in AMF is sent to AMF by UDM.
  • the AF sends a configuration request including the application data service to the NEF, and the NEF performs an authorization check to check whether the AF is authorized to perform the configuration request of the service. If the AF is authorized to perform the configuration request of the service, the NEF sends the application data to the UDM, and the UDM provides the application data to the AMF.
  • S1001 to S1004 are the same as S901 to S904, and for details, refer to S901 to S904.
  • the AMF sends application data to the V-PCF.
  • V-PCF here can correspond to the H-PCF in S905.
  • S1005 can be implemented in two ways. These two implementation manners are similar to the manner in which the AMF provides application data to the H-PCF described in S905. Specifically, the V-PCF here may correspond to the H-PCF in S905. For the specific content of the two methods, please refer to the description of S905 above, which will not be repeated here.
  • the AMF may send the Npcf_UEPolicyControlUpdate message to the V-PCF, and the message may include the application data.
  • the AMF can provide the V-PCF with the application data in the UE policy association establishment process.
  • V-PCF sends the application data to the H-PCF.
  • any one of the at least one V-PCF for example, if the application data received by the V-PCF is used for all UEs, for example, the application data does not include The UE identity or group identity or application data indication is used for any user, then the V-PCF can send the application data to the H-PCF.
  • the application data received by the V-PCF is the application data of a certain UE (or multiple UEs) served by the V-PCF, for example, the application data contains the UE identity or group identity or V-PCF Receive application data and UE identity/group identity (ie, UE identity/group identity is not part of the application data), and the identity of the UE served by the V-PCF is the UE identity or the group identity Corresponding group members, the V-PCF sends the application data to the H-PCF. If the application data received by the V-PCF is not the application data of the UE served by the V-PCF, the V-PCF does not send the application data to the H-PCF.
  • the application data received by the V-PCF is the application data of the UE served by the V-PCF, so the V-PCF can send the application data to the H-PCF without making a judgment.
  • the V-PCF may send the application data to the H-PCF through the Npcf_UEPolicyControlUpdate message.
  • the H-PCF From S1007 to S1010, the H-PCF generates the policy information of the UE, and then sends the policy information to the V-PCF, and the V-PCF sends the policy information to the UE via the AMF.
  • This step is the same as S806 to S809.
  • the H-PCF may also determine the PSI and/or V-PLMN ID, and may send it to the UE through the V-PCF and AMF.
  • AF can provide dynamic application data to AMF in time through NEF and UDM, and AMF can provide the application data to H-PCF via V-PCF, so that H-PCF can generate UE based on the application data Therefore, it can ensure that the UE can access the service corresponding to the application data.
  • the first PCF may be V-PCF
  • the first network element is AMF
  • AF is located in V-PLMN
  • the application data in AMF is UDM Sent to AMF.
  • the difference between this method and method 1000 is that in this example, after the V-PCF obtains the application data, it does not need to provide the H-PCF, but instead determines the UE's policy information by itself and sends it to the UE.
  • AF in a roaming scenario, can provide dynamic application data to AMF in time through NEF and UDM, and AMF can provide the application data to V-PCF, so that V-PCF can generate UE’s data based on the application data. Policy information, so as to ensure that the UE can access the service corresponding to the application data.
  • Fig. 11 is a flowchart of a specific example of a policy configuration method.
  • the first PCF is H-PCF
  • the first network element is UDR (H-UDR)
  • the AF is located in the H-PLMN.
  • the difference between this method and method 700 is that in this method, the AMF instructs the PCF to obtain the application data from the UDR.
  • the AF sends a configuration request including the application data service to the NEF, and the NEF performs an authorization check to check whether the AF is authorized to perform the configuration request of the service. If the AF is authorized to perform the configuration request of the service, the NEF sends the application data to the UDR.
  • S1101 to S1103 are the same as S701 to S703. For details, please refer to S701 and S703.
  • S1104 The NEF sends the first information to the UDM.
  • NEF may select UDM, for example, select UDM according to the UE identification or group identification in the application data, and then send the first information to the selected UDM, for example, NEF may send the first information through the Nudm_ParameterProvisionservice message.
  • the first information is associated with application data.
  • the first information may be application data, or the first information may include one or more of DNN, location information, and time information.
  • S1105 The UDM sends the first information to the AMF.
  • S1105 can be implemented in two ways.
  • the UDM may send the first information to at least one AMF.
  • the at least one AMF may be determined by the UDM according to one or more of DNN, location information, time information, and slice information in the first information.
  • the at least one AMF may be an AMF that requests the first information from the UDM.
  • the at least one AMF may respectively send a request message to the UDM, the request message is used to request the first information, the request message may not include the UE identification information, and the UDM may send the request message to the UDM respectively according to the first information.
  • At least one AMF sends the first information.
  • the UDM can send the first information to the at least one AMF.
  • the UDM After receiving the first information sent by the NEF, the UDM sends the first information of the specific UE to the specific AMF.
  • the UDM may directly send the first information of the UE to the AMF serving the UE.
  • the UDM may send a Nudm_SDM_notification message to the AMF, and the message includes the first information of the UE.
  • the AMF serving the UE may obtain the first information of the UE from the UDM through the Nudm_SDM_Get procedure. That is, the AMF may send a request message to the UDM, and the request message may include the identification information of the UE. According to the identification information of the UE, the UDM may send the first information of the UE to the AMF if it determines that the first information of the UE is stored. One information.
  • the first information sent by the UDM to the AMF may not include the identification information of the UE, but this application does not limit this.
  • the message carrying the first information sent by the UDM to the AMF may include the identification information of the UE, for example, the Nudm_SDM_notification message may carry the identification information of the UE, but this application does not limit this.
  • the method may further include: UDM obtains subscription information from UDR, and performs authorization check. If the AF is allowed to initiate a configuration request, the UDM will store the application data as the user's subscription information in the UDR.
  • S1106 The AMF sends first indication information to the H-PCF.
  • the AMF may send the first indication information to the H-PCF serving the same UE as the AMF.
  • the AMF may send the first indication information of the UE to the H-PCF serving the same UE as the AMF. If the first information received by the AMF is not the first information of the UE served by the AMF, the AMF does not send the first indication information to the H-PCF serving the same UE as the AMF.
  • the first information received by the AMF is the first information of the UE served by the AMF, so the AMF can send the first indication to the H-PCF serving the same UE as the AMF without making a judgment. information.
  • the first indication information may indicate that the H-PCF obtains application data of a specific UE from the UDR.
  • the first indication information may be DNN.
  • the first indication information may be carried by Npcf_UEPolicyControlUpdate. If the UE accesses the network after the UDM receives the first information, the AMF may provide the H-PCF with the first indication information during the UE policy association establishment procedure.
  • the location information may include time information and/or location information.
  • the AMF may also be in the area indicated by the location information or within the time indicated by the time information.
  • the H-PCF sends the first instruction information.
  • the H-PCF sends a second request message to the UDR according to the first indication information, where the second request message is used to obtain the application data.
  • the second request message may include DNN.
  • the H-PCF From S1109 to S1111, the H-PCF generates the policy information of the UE and sends it to the UE through the AMF.
  • S1109 to S1111 are the same as S705 to S707, and reference may be made to S705 to S707.
  • the H-PCF may also determine the PSI and/or PLMN ID, and may send it to the UE through the AMF.
  • AF can provide application data to UDR and UDM in a timely manner through NEF, and UDM instructs H-PCF to obtain application data from UDR through AMF, so that H-PCF can obtain application data and based on the application data
  • the policy information of the UE is generated, so as to ensure that the UE can access the service corresponding to the application data.
  • Fig. 12 is a flowchart of a specific example of a policy configuration method.
  • the first PCF is H-PCF
  • the first network element is V-UDR
  • the AF is located in the V-PLMN.
  • the difference between this method and method 800 is that in this method, the AMF instructs the V-PCF to obtain the application data from the V-UDR.
  • the AF sends a configuration request including the application data service to the NEF, and the NEF performs an authorization check to check whether the AF is authorized to perform the configuration request of the service. If the AF is authorized to perform the configuration request of the service, the NEF sends the application data to the V-UDR. NEF sends the first information to UDM, and UDM sends the first information to AMF.
  • S1201 to S1205 are similar to 1101 to S1105, except that the NEF sends application data to the V-UDR in step S1203, and the NEF sends application data to the UDR (H-UDR) in step S1103.
  • S1201 to S1205 refer to S701 and S705.
  • the method may further include: UDM obtains subscription information from UDR (H-UDR), and performs authorization check. If the AF is allowed to initiate a configuration request, the UDM will store the application data as the user's subscription information in the UDR.
  • UDR subscription information from UDR
  • authorization check If the AF is allowed to initiate a configuration request, the UDM will store the application data as the user's subscription information in the UDR.
  • S1206 The AMF sends the first indication information to the V-PCF.
  • S1206 can be implemented in two ways. These two implementation manners are similar to the manner in which the AMF sends the first indication information to the H-PCF described in S1106. Specifically, the V-PCF here may correspond to the H-PCF in S1106. For the specific content of the two methods, please refer to the description of S1106 above, which will not be repeated here.
  • the V-PCF sends a second request message to the V-UDR, where the second request message is used to obtain the application data.
  • the second request message may include DNN.
  • V-UDR sends the application data to the V-PCF.
  • the H-PCF From S1210 to S1213, the H-PCF generates UE policy information and sends it to the UE through V-PCF and AMF.
  • S1210 to S1213 are the same as S806 to S809, and reference may be made to S806 to S809.
  • the H-PCF may also determine the PSI and/or V-PLMN ID, and may send it to the UE through V-PCF and AMF.
  • AF can provide application data to V-UDR and UDM in time through NEF, and UDM instructs H-PCF to obtain application data from V-UDR through AMF, so that H-PCF can obtain application data, and
  • the policy information of the UE is generated according to the application data, so as to ensure that the UE can access the service corresponding to the application data.
  • This application also provides a method similar to method 1200.
  • the first PCF is H-PCF
  • the first network element is V-UDR
  • the AF is located in the V-PLMN.
  • the V-PCF obtains application data from the V-UDR according to the instructions of the AMF, and after obtaining the application data, it does not need to be provided to the H-PCF, but instead determines the UE by itself. Policy information, and send it to the UE.
  • AF can provide application data to V-UDR and UDM in time through NEF, and UDM instructs V-PCF to obtain application data from V-UDR through AMF, so that V-PCF can obtain Apply data, and generate UE policy information according to the application data, so as to ensure that the UE can access the service corresponding to the application data.
  • FIG. 13 shows a schematic flowchart of a policy configuration method 1300 provided by the present application.
  • the method 1300 can be applied to the system 200 shown in FIG. 2.
  • the AF may send the application data through the Nnef_ServiceParameters_create request message.
  • NEF performs authorization checks to check whether the AF is authorized to initiate the request. If the AF is authorized to initiate the request, the NEF can select the PCF, for example, the PCF is selected based on the UE ID or the group ID. Then, the NEF sends application data to the selected PCF, such as creating a service message through Npcf_dynamicpolicy and sending the application data to the PCF.
  • the PCF sends the application data to the UDR, where the application data is stored in the UE subscription data of the UDR.
  • the PCF may select the UDR according to the UE identification or the group identification, and store the application data in the subscription information of the UE of the UDR. Further, the PCF includes indication information in the UE subscription data, the indication information is used to indicate that the application information is application information of a specific network, for example, the indication information includes a PLMN ID. Subsequently, the PCF serving the UE can generate the policy information of the UE according to the subscription information.
  • the AF dynamically provides application data to the PCF through the NEF, and the PCF further stores the application data in the policy subscription data of the UE so that the PCF serving the UE obtains the corresponding information and generates the UE policy.
  • FIG. 14 shows a schematic block diagram of a communication device 2000 according to an embodiment of the present application.
  • the specific form of the communication device 2000 may be a general-purpose computer device or a chip in a general-purpose computer device, which is not limited in the embodiment of the present application.
  • the communication device 2000 includes a receiving module 2100 and a sending module 2200.
  • the communication device 2000 may further include a processing module 2300.
  • the communication device 2000 may be any network element involved in this application, and may implement the functions that the network element can implement. It should be understood that the communication apparatus 2000 may be a physical device, a component of a physical device (for example, an integrated circuit, a chip, etc.), or a functional module in the physical device.
  • the communication device 2000 may be used to implement the function of the first policy control network element described herein.
  • the communication device 2000 may be a first policy control network element, a component of the first policy control network element (for example, an integrated circuit, a chip, etc.), or a functional module.
  • the receiving module 2100 is configured to receive application data from the first network element, where the application data includes service information, and the service information is information used to identify services;
  • the processing module 2300 is configured to receive application data based on the application data. , Determine the policy information of the terminal device, the policy information includes the application data, and the policy information is associated with the service network;
  • the sending module 2200 is configured to send the policy information to the terminal device.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the first network element is a home access management network element, wherein the home
  • the application data of the access management network element is provided by a data management network element
  • the service network is a visited network
  • the first policy control network element is a visited policy control network element
  • the first network element is a visited place, wherein the application data of the visited place access management network element is provided by a data management network element.
  • the service network is a home network
  • the first policy control network element is a home policy control network element
  • the first network element is a home data storage network element
  • the receiving module 2100 also uses Yu: receiving first indication information from the home access management network element
  • the sending module 2200 is further configured to: according to the first indication information, send a request message to the first network element, the request message being used to request The application data.
  • the service network is a visited location network
  • the first policy control network element is a visited location policy control network element
  • the first network element is a visited location data storage network element.
  • the receiving module 2100 is further configured to: receive first indication information from the visited access management network element; the sending module 2200 is further configured to: send a request message to the first network element according to the first indication information, the The request message is used to request the application data.
  • the service network is a visited network
  • the first policy control network element is a home location policy control network element
  • the first network element is a visited location data storage network element or a visited location access management network element
  • the application data of the visited access management network element is provided by the data management network element;
  • the receiving module 2100 is specifically configured to control the network element through the visited location policy, and receive the information from the first network element Application data;
  • the sending module 2200 is specifically configured to send the policy information to the terminal device by the first policy control network element through the visited location policy control network element.
  • the application data includes a data network name DNN
  • the service indicated by the service information is a service in the data network identified by the DNN.
  • the processing module 2300 is further configured to determine the policy part identifier PSI corresponding to the policy information, where the PSI is used to indicate the policy information; and the sending module 2200 is specifically configured to send the terminal device to the terminal device. Policy information and the PSI.
  • the communication device 2000 may correspond to the method of controlling the network element by the first policy in the foregoing method embodiment, and the above-mentioned and other management operations and/or functions of each module in the communication device 2000 are respectively intended to realize
  • the corresponding steps of the method for controlling the network element by the first policy in the foregoing method embodiment can also achieve the beneficial effects in the foregoing method embodiment. For the sake of brevity, details are not described here.
  • the communication device 2000 is presented in the form of a functional module.
  • the “module” here may refer to application-specific integrated circuits ASIC, circuits, processors and memories that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above-mentioned functions.
  • the processing module 2030 may be implemented by the processor 501 shown in FIG. 5.
  • the processing module 2300 may be implemented by the processor 501 and the memory 502.
  • the receiving module 2100 and the sending module 2200 may be implemented by the transceiver 503 shown in FIG. 5.
  • the transceiver 503 includes a receiving function and a sending function.
  • the processor is implemented by executing a computer program stored in the memory.
  • the memory may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the computer device, as shown in FIG. 5
  • the memory 502 alternatively, may also be a storage unit deployed in other systems or devices, and is not in the computer device.
  • computer-readable media may include, but are not limited to: magnetic storage devices (for example, hard disks, floppy disks, or tapes, etc.), optical disks (for example, compact discs (CD), digital versatile discs (DVD)) Etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • various storage media described herein may represent one or more devices and/or other machine-readable media for storing information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
  • the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the function of any of the foregoing method embodiments is realized.
  • This application also provides a computer program product, which, when executed by a computer, realizes the functions of any of the foregoing method embodiments.
  • the computer may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk, SSD)) etc.
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic.
  • the various digital numbers or serial numbers involved in the various processes described above are only for easy distinction for description, and should not constitute any limitation on the implementation process of the embodiments of the present application.
  • a corresponding to B means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种策略配置方法、通信装置和通信系统,首先由第一网元向第一策略控制网元发送应用数据,应用数据包括业务信息,业务信息是用于标识业务的信息;第一策略控制网元根据应用数据,确定终端设备的策略信息,策略信息包括应用数据,策略信息与服务网络关联;第一策略控制网元向终端设备发送所述策略信息,从而实现终端设备的策略信息的效配置。

Description

策略配置方法、通信装置和通信系统 技术领域
本申请涉及通信领域,并且更具体地,涉及一种策略配置方法、通信装置和通信系统。
背景技术
在第五代通信系统中,为了支持高效的提供低时延和大数据量的通信服务,需要将应用或者业务的内容分布式的部署在网络的边缘。为此,提出了一种本地数据网络(local area data network,LAND),LADN主要用于为企业、体育场活动、音乐厅等场景而部署的数据网络。同时还提出了通过分流点本地接入一个数据网络(data network,DN),即DN的应用或者业务部署在靠近用户的位置。
当前技术中,用户设备(user equipment,UE)注册到第三代合作伙伴计划(3rd generation partnership project,3GPP)网络时,接入和移动性管理功能(access and mobility management function,AMF)会确定与策略控制功能(policy control function,PCF)建立UE策略关联,用于PCF通过AMF向UE提供UE策略,所述UE策略用于UE在发起业务时确定选择已有的协议数据单元(protocol data unit,PDU)会话或者建立新的PDU会话获取对应的业务。其中,PCF基于预配置的签约信息来生成UE策略。
然而,对于新部署本地数据网络(local area data network,LAND)或者新部署应用的场景,如何向网络下的UE发送相关数据网络或者应用的策略信息,目前没有解决方案。
发明内容
本申请提供一种策略配置方法、通信装置和通信系统,能够有效配置终端设备的策略信息。
第一方面,本申请提供了一种策略配置方法,该方法包括:第一策略控制网元接收来自第一网元的应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;所述第一策略控制网元根据所述应用数据,确定终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;所述第一策略控制网元向所述终端设备发送所述策略信息。
根据本申请提供的方法,第一网元可以动态获取新部署的LAND或者新部署应用的应用数据,并且可以将应用数据提供给第一策略控制网元,第一策略控制网元根据该应用数据生成终端设备的策略信息,并且将该策略信息提供给终端设备。从而,解决新部署LAND或者新部署应用场景下,现有技术无法向终端设备配置相关数据网络或者应用的策略信息的问题。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元,其中,所述归属地接入管理网元的所述应用数据由数据管理网元提供;或者,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地 策略控制网元,所述第一网元为拜访地接入管理网元,其中,所述拜访地接入管理网元的所述应用数据由数据管理网元提供。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地数据存储网元。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地数据存储网元;其中,在所述第一策略控制网元接收来自第一网元的应用数据之前,所述方法还包括:所述第一策略控制网元接收来自归属地接入管理网元的第一指示信息;所述第一策略控制网元根据所述第一指示信息,向所述第一网元发送请求消息,所述请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元;其中,在所述第一策略控制网元接收来自第一网元的应用数据之前,所述方法还包括:所述第一策略控制网元接收来自拜访地接入管理网元的第一指示信息;所述第一策略控制网元根据所述第一指示信息,向所述第一网元发送请求消息,所述请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元或拜访地接入管理网元,所述拜访地接入管理网元的所述应用数据由数据管理网元提供;其中,所述第一策略控制网元接收来自第一网元的应用数据,包括:所述第一策略控制网元通过拜访地策略控制网元,接收来自所述第一网元的所述应用数据;其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:所述第一策略控制网元通过拜访地策略控制网元,向所述终端设备发送所述策略信息。
可选地,所述业务信息为应用标识、业务流信息、域名信息或者DNN。其中业务流信息可以为IP三元组或者非IP业务的目的地信息,域名信息可以为全量域名(fully qualified domain name,FQDN)。
可选地,所述应用数据可以包括下述中的一项或多项:数据网络名称(data network name,DNN)、单切片选择辅助信息(single-network slice selection assistance information,S-NSSAI)、会话和服务连续(session and service continuity mode,SSC)模式、位置信息、时间信息、终端设备标识和群组标识。
其中,DNN用于标识一个数据网络,所述业务信息指示(或标识)的业务是所述DNN标识的数据网络中的业务;所述S-NSSAI用于标识一个网络切片;所述SSC模式用于指示所述业务信息指示的业务的业务连续性需求;所述位置信息用于指示所述业务信息指示的业务的有效区域;所述时间信息用于指示所述业务信息指示的业务的有效时间;所述终端设备标识和所述群组标识均指示能够应用所述业务信息指示的业务的终端设备,所述能够应用所述业务信息指示的业务的终端设备包括所述终端设备。
可选地,所述方法还包括:所述第一策略控制网元确定所述策略信息对应的策略部分标识(policy section identifier,PSI),所述PSI用于指示所述策略信息;其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:所述第一策略控制网元向所述终端设备发送所述策略信息和所述PSI。
可选地,第一策略控制网元接收来自第一网元的应用数据,包括:第一策略控制网元接收来自第一网元的所述应用数据,以及终端设备标识和/或群组标识。所述终端设备标 识和所述群组标识均指示能够使用应用数据的终端设备。所述应用数据还可以包含DNN、S-NSSAI、SSC模式、位置信息、时间信息中的一项或多项。关于DNN、S-NSSAI、SSC模式、位置信息以及时间信息的具体含义,可以参见上文描述。
可选地,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:所述第一策略控制网元向所述终端设备发送所述策略信息和指示信息,所述指示信息用于指示所述策略信息中的S-NSSAI为服务网络中的S-NSSAI。
第二方面,提供了一种通信系统,包括:第一策略控制网元和第一网元;所述第一网元用于,向所述第一策略控制网元发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;所述第一策略控制网元用于,根据所述应用数据,确定终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;所述第一策略控制网元还用于,向所述终端设备发送所述策略信息。
应理解,第二方面中的业务信息和应用数据与第一方面中的业务信息和应用数据相同,因此可以参见第一方面对业务信息和应用数据的描述。
因此,本申请提供的通信系统,第一网元可以动态获取应用数据并提供给第一策略控制网元,使得第一策略控制网元可以生成终端设备的策略信息,从而终端设备可以基于该策略信息接入相应业务。
可选地,所述系统还包括应用网元和网络开放网元;所述应用网元用于,向所述网络开放网元发送所述应用数据;所述网络开放网元用于,向所述第一网元发送所述应用数据。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地数据存储网元;所述系统还包括归属地接入管理网元和数据管理网元;其中,所述网络开放网元还用于:向所述数据管理网元发送第一信息,所述第一信息与所述应用数据关联;所述数据管理网元用于,根据所述第一信息,向所述归属地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;所述归属地接入管理网元用于,根据所述第一信息,向所述第一策略控制网元发送第一指示信息;所述第一策略控制网元还用于,根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元;其中,所述第一网元用于向第一策略控制网元发送应用数据,包括:所述第一网元用于,通过拜访地策略控制网元,向所述第一策略控制网元发送所述应用数据;其中,所述第一策略控制网元还用于向所述终端设备发送所述策略信息,包括:所述第一策略控制网元还用于,通过所述拜访地策略控制网元,向所述终端设备发送所述策略信息。
可选地,所述系统还包括拜访地接入管理网元和数据管理网元;所述网络开放网元还用于,向所述数据管理网元发送第一信息,所述第一信息与所述应用数据关联;所述数据管理网元用于,根据所述第一信息,向所述拜访地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;所述拜访地接入管理网元用于,根据所述第一信息,向所述拜访地策略控制网元发送第一指示信息;所述拜访地策略控制网元用于,根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元;或者,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地接入管理网元;所述系统还包括数据管理网元;其中,所述网络开放网元用于,向所述第一网元发送所述应用数据,包括:所述网络开放网元用于,通过所述数据管理网元,向所述第一网元发送所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元。
可选地,所述第一策略控制网元还用于确定所述策略信息对应的PSI,所述PSI用于指示所述策略信息;其中,所述第一策略控制网元用于,向所述终端设备发送所述策略信息,包括:所述第一策略控制网元用于,向所述终端设备发送所述策略信息和所述PSI
可选地,所述第一策略控制网元用于,向所述终端设备发送所述策略信息,包括:所述第一策略控制网元用于,向所述终端设备发送所述策略信息和指示信息,所述指示信息用于指示所述策略信息中的S-NSSAI为服务网络中的S-NSSAI。
可选地,所述第一网元用于,向所述第一策略控制网元发送应用数据,包括:所述第一网元用于,向所述第一策略控制网元发送应用数据以及终端设备标识和/或群组标识。所述终端设备标识和所述群组标识均指示能够使用应用数据的终端设备。所述应用数据还可以包含DNN、S-NSSAI、SSC模式、位置信息、时间信息中的一项或多项。关于DNN、S-NSSAI、SSC模式、位置信息以及时间信息的具体含义,可以参见上文描述。
第三方面,提供了一种策略配置方法,包括:第一网元向第一策略控制网元发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;所述第一策略控制网元根据所述应用数据,确定用于终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;所述第一策略控制网元向所述终端设备发送所述策略信息。
应理解,第三方面中的业务信息和应用数据与第一方面中的业务信息和应用数据相同,因此可以参见第一方面对业务信息和应用数据的描述。
因此,本申请提供的策略配置方法,第一网元可以动态获取应用数据并提供给第一策略控制网元,使得第一策略控制网元可以生成终端设备的策略信息,从而终端设备可以基于该策略信息接入相应业务。
可选地,在所述第一网元向第一策略控制网元发送应用数据之前,所述方法还包括:应用网元网络向开放网元发送所述应用数据;所述网络开放网元向所述第一网元发送所述应用数据。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元;所述方法还包括:所述网络开放网元向数据管理网元发送第一信息,所述第一信息与所述应用数据关联;所述数据管理网元根据所述第一信息,向归属地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;所述归属地接入管理网元根据所述第一信息,向所述第一策略控制网元发送第一指示信息;所述第一策略控制网元根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元;其中,所述第一网元向第一策略控制网元发送应用 数据,包括:所述第一网元通过拜访地策略控制网元,向所述第一策略控制网元发送所述应用数据;其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:所述第一策略控制网元通过所述拜访地策略控制网元,向所述终端设备发送所述策略信息。
可选地,所述方法还包括:所述网络开放网元向数据管理网元发送第一信息,所述第一信息与所述应用数据关联;所述数据管理网元根据所述第一信息,向拜访地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;所述拜访地接入管理网元根据所述第一信息,向所述拜访地策略控制网元发送第一指示信息;所述拜访地策略控制网元根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元;或者,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地接入管理网元;其中,所述网络开放网元向所述第一网元发送所述应用数据,包括:所述网络开放网元通过所述数据管理网元,向所述第一网元发送所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元。
可选地,所述方法还包括:所述第一策略控制网元确定所述策略信息对应的策略部分标识PSI,所述PSI用于指示所述策略信息;其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:所述第一策略控制网元向所述终端设备发送所述策略信息和所述PSI。
可选地,第一策略控制网元接收来自第一网元的应用数据,包括:第一策略控制网元接收来自第一网元的所述应用数据,以及终端设备标识和/或群组标识。该实现方式可以参见第一方面中与该实现方式相关的描述,这里不再赘述。
第四方面,提供了一种策略配置方法,包括:网络开放网元接收网元来自应用网元的应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;所述网络开放网元向第二网元发送所述应用数据。
可选地,所述第二网元为数据存储网元或数据管理网元。
第五方面,提供了一种策略配置方法,包括:接入管理网元接收来自数据管理网元的应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;接入管理网元向第一策略控制网元发送所述应用数据,所述应用数据用于所述第一策略控制网元生成终端设备的策略信息。
第六方面,提供了一种通信系统,其特征在于,包括:策略控制网元、网络开放网元和数据存储网元;所述网络开放网元用于向所述策略控制网元发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;所述策略控制网元用于向数据存储网元发送所述应用数据,所述应用数据存储在数据存储网元的终端设备签约数据中。
根据本申请提供的通信系统,网络开放网元可以向策略控制网元动态提供应用数据,进一步的策略控制网元将应用数据存储在终端设备的策略签约数据中以使得服务终端设备的策略控制网元获取对应的信息并生成终端设备策略。
应理解,第六方面中的业务信息的可能的形式和应用数据可能包括的内容与第一方面 相同,具体可以参见第一方面对业务信息和应用数据的描述。
可选地,所述网络开放网元用于向所述策略控制网元发送应用数据,包括:所述网络开放网元用于向所述策略控制网元发送应用数据,以及终端设备标识和/或群组标识。该实现方式与第一方面中第一网元向第一策略控制网元发送应用数据以及终端设备标识和/或群组标识的方式类似,具体可以参见第一方面的描述,这里不再赘述。
第七方面,提供了一种策略配置方法,其特征在于,包括:网络开放网元向所述策略控制网元发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;所述策略控制网元向数据存储网元发送所述应用数据,所述应用数据存储在数据存储网元的终端设备签约数据中。
应理解,第七方面中的业务信息和应用数据与第一方面中的业务信息和应用数据相同,因此可以参见第一方面对业务信息和应用数据的描述。
根据本申请提供的方法,网络开放网元可以向策略控制网元动态提供应用数据,进一步的策略控制网元将应用数据存储在终端设备的策略签约数据中以使得服务终端设备的策略控制网元获取对应的信息并生成终端设备策略。
第八方面,提供了一种通信装置。在一种方式中,该装置具有实现上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一策略控制网元的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在另一种方式中,该装置具有实现上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一网元的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。在又一种方式中,该装置具有实现上述第六方面或第六方面中任意可能的实现方式中策略控制网元的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。应理解,该装置还可以是上述除第一策略控制网元、第一网元和策略控制网元以外的其他任一网元,如网络开放网元、应用网元等。
第九方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一策略控制网元的功能,或第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一网元的功能,或第六方面或第六方面中任意可能的实现方式中策略控制网元的功能。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。
第十方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。所述处理电路用于通过所述输入电路接收信号,并通过所述输出电路发射信号,使得所述处理器执行上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一策略控制网元所执行的操作,或执行上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一网元所执行的操作,或执行上述第六方面或第六方面中任意可能的实现方式中策略控制网元所执行的操作。
在具体实现过程中,上述处理器可以为一个或多个芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。 输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。
第十一方面,提供了一种处理装置,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过接收器接收信号,通过发射器发射信号,以执行上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一策略控制网元所执行的操作,或执行上述第一方面至第三方面或第一方面至第三方面中任意可能的实现方式中第一网元所执行的操作,或执行上述第六方面或第六方面中任意可能的实现方式中策略控制网元所执行的操作。
可选地,所述处理器为一个或多个,所述存储器为一个或多个。
可选地,所述存储器可以与所述处理器集成在一起,或者所述存储器与处理器分离设置。
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。
上述第十一方面中的处理装置可以是一个或多个芯片。该处理装置中的处理器可以通过硬件来实现也可以通过软件来实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。
第十二方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序(也可以称为代码,或指令),当所述计算机程序被运行时,使得计算机执行上述任一方面以及该方面中任一种可能实现方式中任一网元的所执行的操作。
第十三方面,提供了一种计算机可读介质,所述计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述任一方面以及该方面中任一种可能实现方式中任一网元的所执行的操作。
附图说明
图1是应用本申请实施例的一个系统的示意图。
图2是应用本申请实施例的另一系统的示意图。
图3是非漫游场景下5G系统的架构示意图。
图4是漫游场景下的5G系统的架构示意图。
图5是本申请提供的设备的示意性框图。
图6是本申请提供的一种策略配置方法的示意性流程图。
图7至图12是本申请提供的策略配置方法的具体示例的流程图。
图13是本申请提供的另一种策略配置方法的示意性流程图。
图14本申请提供的通信装置的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于第五代(5th generation,5G)系统或新无线(new radio,NR)通信系统,也可以应用于未来可能出现的其他的通信系统,如6G通信系统。
图1示出了应用本申请实施例的系统100的示意图。如图1所示,该系统100包括:第一策略控制网元110和第一网元120。可选地,该系统还可以包括图中未示出的终端设备。
具体地,第一网元120用于:向第一策略控制网元110发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;第一策略控制网元110用于,根据所述应用数据,确定终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;第一策略控制网元110还用于,向所述终端设备发送所述策略信息。
可选地,第一网元120为数据存储网元或接入管理网元,其中接入管理网元的所述应用信息由数据管理网元提供。
可选地,该系统还可以包括应用网元130和网络开放网元140。应用网元130用于向网络开放网元140提供所述应用数据,网络开放网元用于直接或间接地向第一网元130提供所述应用数据。
可选地,第一策略控制网元110可以是归属地策略控制网元,也可以是拜访地策略控制网元。
可选地,所述服务网络为归属地网络,所述第一策略控制网元110为归属地策略控制网元,所述第一网元120为归属地数据存储网元。所述系统还可以包括归属地接入管理网元和数据管理网元。其中,所述网络开放网元还用于:向所述数据管理网元发送第一信息,所述第一信息与所述应用数据关联;所述数据管理网元用于,根据所述第一信息,向所述归属地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;所述归属地接入管理网元用于,根据所述第一信息,向所述第一策略控制网元110发送第一指示信息;所述第一策略控制网元110还用于,根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元110为归属地策略控制网元,所述第一网元120为拜访地数据存储网元;其中,所述第一网元120用于向第一策略控制网元110发送应用数据,包括:所述第一网元120用于,通过拜访地策略控制网元,向所述第一策略控制网元110发送所述应用数据;其中,所述第一策略控制网元110还用于向所述终端设备发送所述策略信息,包括:所述第一策略控制网元110还用于,通过所述拜访地策略控制网元,向所述终端设备发送所述策略信息。
可选地,所述系统还包括拜访地接入管理网元和数据管理网元;所述网络开放网元140还用于,向所述数据管理网元发送第一信息,所述第一信息与所述应用数据关联;所述数据管理网元用于,根据所述第一信息,向所述拜访地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;所述拜访地接入管理网元用于,根据所述第一信息,向所述拜访地策略控制网元发送第一指示信息;所述拜访地策略控制网元用于,根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
可选地,所述服务网络为归属地网络,所述第一策略控制网元110为归属地策略控制网元,所述第一网元120为归属地接入管理网元;或者,所述服务网络为拜访地网络,所述第一策略控制网元110为拜访地策略控制网元,所述第一网元120为拜访地接入管理网元;所述系统还包括数据管理网元;其中,所述网络开放网元140用于,向所述第一网元120发送所述应用数据,包括:所述网络开放网元140用于,通过所述数据管理网元,向所述第一网元120发送所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元110为拜访地策略控制网元,所述第一网元120为拜访地数据存储网元。
可选地,所述第一策略控制网元110还用于确定所述策略信息对应的策略部分标识PSI,所述PSI用于指示所述策略信息;其中,所述第一策略控制网元110用于向所述终端设备发送所述策略信息,包括:所述第一策略控制网元110用于向所述终端设备发送所述策略信息和所述PSI。
可选地,所述业务信息为应用标识、业务流信息、域名信息或者DNN。其中业务流信息可以为IP三元组或者非IP业务的目的地信息,域名信息可以为FQDN。
可选地,所述应用数据还包括下述中的一项或多项:
DNN、单切片选择辅助信息S-NSSAI、会话和服务连续SSC模式、位置信息、时间信息、终端设备标识和群组标识;其中,所述DNN用于标识一个数据网络,所述业务信息指示的业务是所述DNN标识的数据网络中的业务;所述S-NSSAI用于标识一个网络切片;所述SSC模式用于指示所述业务信息指示的业务的连续性需求;所述位置信息用于指示所述业务信息指示的业务的有效区域;所述时间信息用于指示所述业务信息指示的业务的有效时间;所述终端设备标识和所述群组标识均指示能够应用所述业务信息指示的业务的终端设备,所述能够应用所述业务信息指示的业务的终端设备包括所述终端设备。
可选地,第一策略控制网元110接收来自第一网元120的应用数据,包括:第一策略控制网元110接收来自第一网元120的所述应用数据,以及终端设备标识和/或群组标识。所述终端设备标识和所述群组标识均指示能够使用应用数据的终端设备。所述应用数据还可以包含DNN、S-NSSAI、SSC模式、位置信息、时间信息中的一项或多项。其中,所述DNN用于标识一个数据网络,所述业务信息指示的业务是所述DNN标识的数据网络中的业务;所述S-NSSAI用于标识一个网络切片;所述SSC模式用于指示所述业务信息指示的业务的业务连续性需求;所述位置信息用于指示所述业务信息指示的业务的有效区域;所述时间信息用于指示所述业务信息指示的业务的有效时间。
可选的,第一策略控制网元110还用于,根据来自第一网元120的终端设备标识和/或群组标识,确定将应用数据中的部分信息或者全部信息存储在数据存储网元中。
系统100中,通过第一网元提供应用数据,使得第一策略控制网元可以基于第一网元提供的应用数据,生成终端设备的策略信息,解决了动态部署LAND网络或者动态部署应用场景下,策略控制网元无法有效配置终端设备的策略信息的问题。
可选的,上述系统100中的所有网元可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。
需要说明的是,图1中的第一策略控制网元,数据存储网元等仅是一个名字,名字对设备本身不构成限定。在5G网络以及未来其它的网络中,如第一策略控制网元也可以是其他的名字,本申请实施例对此不作具体限定。例如,第一策略控制网元还可能被替换为策略控制功能(policy control function,PCF)实体,数据存储网元可以被替换为统一数据存储(unified data repository,UDR)实体等等,在此进行统一说明,以下不再赘述。
图2示出了应用本申请实施例的系统200的示意图。如图2所示,该系统200包括:网络开放网元210、策略控制网元220和数据存储网元230。
网络开放网元210用于,向策略控制网元220发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;策略控制网元220向数据存储网元230发送所述应用数据,所述应用数据存储在数据存储网元230的终端设备签约数据中。
应理解,这里的业务信息的可能的形式和应用数据可能包括的内容可以参见上文在系统100中的描述,这里不再赘述。可选地,该系统200还可以包括应用网元240,用于向网络开放网元210发送应用数据。
可选地,网络开放网元210用于,向策略控制网元220发送应用数据,包括:网络开放网元210用于,向策略控制网元220发送应用数据,以及终端设备标识和/或群组标识。所述终端设备标识和所述群组标识均指示能够使用应用数据的终端设备。所述应用数据还可以包含DNN、S-NSSAI、SSC模式、位置信息、时间信息中的一项或多项。DNN、S-NSSAI、SSC模式、位置信息以及时间信息的含义可以参见上文在系统100中的描述。
系统200中,由网络开放网元向策略控制网元动态提供应用数据,策略控制网元将应用数据存储在终端设备的策略签约数据中,从而使得服务终端设备的策略控制网元可以根据该动态存储的签约数据,生成终端设备的策略,解决了现有技术中动态部署LAND网络或者动态部署应用场景下,策略控制网元无法有效配置终端设备的策略信息的问题。
可选的,上述系统200中的所有网元可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。
需要说明的是,图2中的策略控制网元,数据存储网元等仅是一个名字,名字对设备本身不构成限定。在5G网络以及未来其它的网络中,如第一策略控制网元也可以是其他的名字,本申请实施例对此不作具体限定。例如,第一策略控制网元还可能被替换为PCF实体,数据存储网元可以被替换为UDR实体等等,在此进行统一说明,以下不再赘述。
应理解,上述图1和图2中的系统还可以包括与图中的网元交互或通信的其他网元,对此不作限定。
本申请实施例中的终端设备可以指用户设备(user equipment,UE)、接入终端、V2X通信中的终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端设备、无线通信设备、用户代理或用户装置。终端还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile  network,PLMN)中的终端设备等,本申请实施例对此并不限定。终端还可以包括V2X设备,例如为车辆或车辆中的车载单元(on board unit,OBU)。
本申请实施例中的终端通过无线的方式与无线接入网(Radio Access Network,RAN)设备相连,无线接入网设备通过无线或有线方式与核心网设备连接。核心网设备与无线接入网设备可以是独立的不同的物理设备,也可以是将核心网设备的功能与无线接入网设备的逻辑功能集成在同一个物理设备上,还可以是一个物理设备上集成了部分核心网设备的功能和部分的无线接入网设备的功能。终端可以是固定位置的,也可以是可移动的。
无线接入网设备是UE通过无线方式接入到该移动通信系统中的接入设备,可以是基站(如,5G移动通信系统中的基站(gNodeB,gNB))、未来移动通信系统中的基站或无线保真(Wireless Fidelity,WiFi)系统中的接入节点等,还可以是云无线接入网络(Cloud Radio Access Network,CRAN)场景下的无线控制器,或者该接入网设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等,本申请的实施例对无线接入网设备所采用的具体技术和具体设备形态不做限定。
核心网设备例如包括核心网控制面(control plane,CP)或用户面(user plan,UP)网络功能等,例如,会话管理功能(session management function,SMF)、接入和移动性管理功能AMF等。其中,核心网控制面也可以理解为核心网控制面功能(control plane function,CPF)实体。
可选地,图1所示的系统100,或者,图2所示的系统200可以应用于5G网络以及未来其他可能的网络,本申请实施例对此不作具体限定。
其中,图1所示的系统100应用于5G网络,则如图3所示,比如,第一策略控制功能网元可以为5G中PCF,数据存储网元为UDR,网络开放网元为NEF,应用网元为AF;或者,如图4所示,比如,上述第一策略控制功能网元可以为5G中的H-PCF或V-PCF,数据存储网元为H-UDR或V-UDR。
其中,图2所示的系统200应用于5G网络,则如图3所示,比如,上述策略控制功能网元可以为5G中的PCF,数据存储网元为UDR,网络开放网元为NEF,应用网元为AF;或者,如图4所示,比如,上述策略控制功能网元可以为5G中的H-PCF。
下面将结合图3和图4,举例说明漫游场景和非漫游场景下的5G系统。应理解,本文中描述的5G系统仅是示例,不应对本申请构成任何限定。
图3示出了一个非漫游场景下5G系统的架构示意图。如图3所示,该系统300包括:接入和移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、无线接入网(radio access network,RAN)、统一数据管理(unified data management,UDM)、策略控制功能(policy control function,PCF)、数据网络(data network,DN)、用户面功能(user plane function,UPF)、UE、应用功能(application function,AF)、统一数据存储(unified data repository,UDR)和能力开放功能(network exposure function,NEF)。
其中,各网元主要功能描述如下:
AF:可以理解为应用网元在5G架构中的命名。其中,应用网元主要传递应用侧对网络侧的需求,例如,服务质量(quality of service,QoS)需求等。AF可以是第三方功能 网元,也可以是运营商部署的应用功能网元,如IP多媒体子系统(IP Multimedia Subsystem,IMS)中的P-CSCF(Proxy call session control function,代理呼叫会话控制功能)。
UDM:可以理解为数据管理网元在5G架构中的命名。其中,数据管理网元主要包括以下功能:统一数据管理,支持3GPP认证和密钥协商机制中的认证信任状处理,用户身份处理,接入授权,注册和移动性管理,签约管理,短消息管理等。
UDR:可以理解为数据存储网元在5G架构中的命名。其中,数据存储网元主要包括以下功能:签约数据、策略数据、应用数据等类型数据的存取功能。
PCF:可以理解为策略控制网元在5G架构中的命名。其中,策略控制网元主要负责针对会话、业务流级别进行计费、QoS带宽保障及移动性管理、UE策略决策等策略控制功能。该系统中,AMF与SMF所连接的PCF分别是接入和移动控制PCF(PCF for access and mobility control,AM PCF)和会话管理PCF(PCF for session management,SM PCF),在实际部署中AM PCF和SM PCF可能不是同一个PCF实体。
SMF:可以理解为会话管理网元在5G架构中的命名。其中,会话管理网元主要进行会话管理、PCF下发控制策略的执行、UPF的选择、UE IP地址分配等功能。
AMF:可以理解为移动管理网元在5G架构中的命名。其中,移动性管理网元主要包括以下功能:连接管理、移动性管理、注册管理、接入认证和授权、可达性管理、安全上下文管理等接入和移动性相关的功能。
UPF:可以理解为用户面功能网元在5G架构中的命名。其中,用户面功能网元主要包括以下功能:数据包路由和传输、包检测、业务用量上报、QoS处理、合法监听、上行包检测、下行数据包存储等用户面相关的功能。
(R)AN:(无线)接入网,对应5G中的不同接入网,如有线接入、无线基站接入等多种方式。
NEF:可以理解为网络开放网元在5G架构中的命名。其中,能力开放网元主要包括以下功能:安全的开放3GPP网络功能提供的业务和能力,有内部开放,或者开放给第三方等;转化或翻译与AF交互的信息和内部网络功能交互的信息,如AF服务标识和内部5G核心网信息如数据网络名(data network name,DNN),单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)等。
DN:用于提供业务数据的网络,例如,Internet网络、运营商的业务等。DN上可以部署多种业务,为终端提供数据或语音等服务。一个终端设备可以通过运营商网络接入一个或者多个DN。
可以理解的是,上述各网元既可以是硬件设备,也可以是芯片,或者是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。还应理解,图3中所示的一些网元可部署在同一位置(如同一硬件设备或软件功能上),也可以分开部署,本申请对此不作限定。
应理解,图3中所示的各网元之间的接口仅是一种示例,在实践中,网元之间的接口可能有所改变。
图4示出了漫游场景下5G系统的架构示意图。如图4所示,该系统400包括:AMF、SMF、(R)AN、UDM、拜访地策略控制功能(visited-policy control function,V-PCF)、归属地策略控制功能(home-policy control function,H-PCF)、DN、UPF、UE、AF、NEF、 拜访地UDR(V-UDR)和归属地UDR(H-UDR)。其中,V-PCF和H-PCF之间的接口为N24。应理解,图4中除UDM、H-UDR和H-PCF位于归属地公用陆地移动通信网络(home public land mobile network,H-PLMN)侧外,其他的网元都位于拜访地公用陆地移动通信网络(visited public land mobile network,V-PLMN)侧。应理解,在漫游场景下,UE也可以接入位于HPLMN的DN,即建立Home Ruted PDU会话。
需要说明的是,图3和图4中包括的各个网元(比如V-PCF、H-PCF、AMF等)的命名仅是一个名字,名字对网元本身的功能不构成限定。在5G网络以及未来其它的网络中,上述各个网元也可以是其他的名字,本申请实施例对此不作具体限定。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能是其他命名,等等,在此进行统一说明,以下不再赘述。
本领域技术人员可以理解,图3和图4中的网元只是示例性地描述,事实上还可以包括其他与图中示意的网元进行交互的网元,在此不予赘述。
还需要说明的是,图3和图4中控制面功能的各个网元之间的通信是以非服务化接口为例进行描述,但是并不对本申请实施例的保护范围构成限定的。本领域技术人员可以理解,图3和图4中控制面功能的各个网元也可以通过服务化接口进行通信,比如,AMF对外提供的服务化接口可以为Namf;SMF提供的服务化接口可以为Nsmf;UDM对外提供的服务化接口可以为Nudm,AF提供的服务化接口可以为Naf;PCF对外提供的服务化接口可以为Npcf等等。
图1至图4系统中网元的具体工作过程和有益效果可以参见下文方法实施例中的描述。
图5示出了应用本申请实施例的设备500的示意性框图。上述图1中的各网元,如第一策略控制功能网元、数据存储网元等都可以由图5中的设备来实现。图2中的各网元,如策略控制功能网元、数据存储网元以及应用网元等也都可以由图5中的设备来实现。
应理解,设备500可以是实体设备,也可以是实体设备的部件(例如,集成电路,芯片等等),还可以是实体设备中的功能模块。
如图5所示,该计算机设备包括:一个或多个处理器501。处理器501可以存储用于执行本申请实施例的方法的执行指令。可选地,处理器501中可以调用接口实现接收和发送功能。所述接口可以是逻辑接口或物理接口,对此不作限定。例如,接口可以是收发电路,或是接口电路。用于实现接收和发送功能的收发电路、或接口电路可以是分开的,也可以集成在一起。上述收发电路或接口电路可以用于代码/数据的读写,或者,上述收发电路或接口电路可以用于信号的传输或传递。
可选地,接口可以通过收发器实现。可选地,该设备500还可以包括收发器503。所述收发器503可以称为收发单元、收发机、收发电路或者收发器等,用于实现收发功能。
可选地,该计算机设备还可以包括存储器502。本申请实施例对存储器502的具体部署位置不作具体限定,该存储器可以集成于处理器中,也可以是独立于处理器之外。对于该计算机设备不包括存储器的情形,该计算机设备具备处理功能即可,存储器可以部署在其他位置(如,云系统)。
处理器501、存储器502和收发器503之间通过内部连接通路互相通信,传递控制和/或数据信号。
可以理解的是,尽管并未示出,设备500还可以包括其他装置,例如输入装置、输出装置、电池等。
可选的,在一些实施例中,存储器502可以存储用于执行本申请实施例的方法的执行指令。处理器501可以执行存储器502中存储的指令结合其他硬件(例如收发器503)完成下文所示方法执行的步骤,具体工作过程和有益效果可以参见下文方法实施例中的描述。
本申请实施例揭示的方法可以应用于处理器503中,或者由处理器503实现。处理器503可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存取存储器(random access memory,RAM)、闪存、只读存储器(read-only memory,ROM)、可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的指令,结合其硬件完成上述方法的步骤。
可以理解,存储器502可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器ROM、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器RAM,其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
上述的设备500可以是一个通用计算机设备或者是一个专用计算机设备。在具体实现中,设备500可以是台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、通信设备、嵌入式设备或有图5中类似结构的设备。本申请实施例不限定设备500的类型。
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
为便于理解本申请,下面以5G系统中网元的命名为例,对本申请提供的方案进行说明。即,下文中,有如下对应关系:
UE:终端设备;
PCF:策略控制网元;
AMF:接入管理网元;
UDR:数据存储网元;
UDM:数据管理网元;
AF:应用网元;
NEF:网络开放网元。
应理解,本申请提供的方法的执行顺序仅由该方法内部逻辑决定,并不由各实施例对应的附图中的附图标记限定。
图6示出了本申请提供的一种策略配置方法600的示意性流程图。该方法600可以应用于图1所示的系统100中。
S601,第一网元向第一PCF发送应用数据。
S602,第一PCF根据该应用数据,确定UE的策略信息。
S603,第一PCF向该UE发送所确定的策略信息。
具体地,第一网元可以动态获取应用数据并提供给第一PCF,第一PCF可以根据该应用数据,生成UE的策略信息并发送给UE,从而UE可以基于该策略信息接入相应业务。
其中,所述应用数据包括业务信息,该业务信息是用于标识业务的信息,例如业务信息可以是应用标识(application identifier,APP ID)或者业务流信息。比如,该业务信息可以是已有的DNN标识的网络中新部署的应用或者业务所对应的业务信息。或者,该业务信息可以是动态部署的数据网络中的应用或者业务所对应的业务信息,如新部署的LADN网络中的应用或者业务所对应的业务信息。
可选地,应用数据还可以包括下述中的一项或多项:DNN、S-NSSAI、SSC模式、位置信息、时间信息、UE标识和群组标识。
其中,DNN用于标识一个数据网络。该DNN指示该业务信息对应的数据网络,即,该数据网络提供该业务。
S-NSSAI指示该业务信息对应的业务所关联的网络切片信息,UE通过该S-NSSAI可以接入该业务。
SSC模式是指业务信息对应的业务对连续性的需求,即接入业务的UE发生移动时,网络是否需要保证业务的连续性。
位置信息用于指示该业务信息对应的业务的有效区域。也就是说,只有在该位置信息所指示的区域,才能接入该业务。
时间信息用于指示该业务信息对应的业务的有效时间,或者时间信息用于指示该业务信息对应的业务的有效时间。即,只有在该时间信息所指示的时间内,才能接入该业务。或者,只有在该时间信息所指示的时间内,该应用数据才有效。
UE标识和群组标识均指示能够应用业务信息对应的业务的UE,其中能够应用该业务信息对应的业务的UE包括前述UE。也就是说,该业务信息只针对部分UE有效。
可选地,UE标识和/或群组标识可以不做为应用数据的部分提供给第一网元。此时所述应用数据可以包含业务信息,可选的包含DNN、S-NSSAI、SSC模式、位置信息、时间信息中的一项或者多项。
本申请中,所述应用数据可以由AF通过NEF直接或间接地发送给第一网元,然而再由第一网元直接或间接地发送给第一PCF。
在一种实现方式中,第一网元为AMF。其中,AMF的所述应用数据是NEF发送给UDM的。也就是说,NEF可以先向UDM发送该应用数据,然后UDM再把该应用数据发送给AMF。
另一种实现方式中,第一网元为UDR。即,NEF可以将应用数据发送给UDR,再由UDR发送给第一PCF。
可选地,第一网元向第一PCF发送应用数据,包括:第一网元根据第一PCF的请求向第一PCF发送应用数据。
例如,若在第一网元获取到所述应用数据后,UE才发起注册流程,则在注册过程中,第一网元可以向第一PCF请求所述应用数据,第一网元根据第一PCF的请求向第一PCF发送所述应用数据。
另外,第一网元也可以直接将应用数据推送给第一PCF。例如,UE在注册过程中,向第一网元订阅了该UE的业务更新通知。那么,在第一网元获取到所述应用数据之前,若UE已经注册到网络,则第一网元可以直接将应用数据推送给第一PCF。
可选地,第一网元向第一PCF发送应用数据,包括:第一网元根据所述应用数据,确定至少一个PCF,并向所述至少一个PCF发送应用数据。其中,所述至少一个PCF包括第一PCF。
比如,第一网元为UDR,UDR根据应用数据中的位置信息,可以确定该位置信息所指示的区域内的至少一个PCF,然后UDR可以向该至少一个PCF发送应用数据。
可选地,本申请中,在非漫游场景下,第一PCF可以是H-PCF。在漫游场景下,第一PCF可以是H-PCF,也可以是V-PCF。
应理解,本申请中,AF发送给NEF的应用数据包含的信息可以直接用于3GPP网络,或者可以由NEF将其转化为3GPP网络能够识别或者使用的信息。本文中只关注应用数据的实际含义,因此文中没有特殊强调NEF对接收到的应用数据的转化操作,但本领域技术人员能够理解,NEF发送给UDM、UDR、AMF等网元的应用数据可以经过NEF转化后的数据。如,AF发送给NEF的信息包括外部群组标识,则NEF需要将其转化为内部群组标识,即本文中的群组标识。
在S602中,若所述应用数据是第一PCF所服务的UE的应用数据。比如,所述应用数据中的UE标识为第一PCF所服务的UE的标识,或者,所述应用数据中的群组标识为第一PCF所服务的UE所属群组的群组标识,则第一PCF可以根据该应用数据生成第一PCF所服务的UE的策略信息。
本申请中,所述策略信息主要是指用户路由选择策略(user routing selection policy,URSP)。
示例性的,第一PCF所确定的策略信息可以包括应用数据中的业务信息、DNN、S-NSSAI、SSC模式、位置信息和时间信息中的一项或多项。
可选地,该方法还可以包括:第一PCF确定所述策略信息对应的PSI,该PSI用于指示该策略信息。
示例性的,该PSI可以标识特定类型的策略信息。如该策略信息为LADN相关或者本地应用相关的策略信息或在特定PLMN中可用的策略信息时,可以采用该PSI标识。进一步的,PSI还用于指示所述策略信息为特定的策略信息,如策略信息中的S-NSSAI为服务网络中的S-NSSAI。
示例性的,所述PSI可以是新分配的或者已有的PSI。一种可能的实现方式,PSI中还可以包含PLMN ID。
可选地,该方法还可以包括:第一PCF确定所述策略信息对应的PLMN ID,所述PLMN ID用于指示所述策略信息为所述PLMN ID指示的PLMN中可用的策略信息。
在S603中,第一PCF可以先将所确定的策略信息发送给AMF,然后再由AMF转发给UE。
应理解,这里的UE是指第一PCF所服务的UE。
示例性的,第一PCF可以通过UE配置更新(UE Configuration Update)流程经由AMF将第一URSP发送给UE。
可选地,在S603中,第一PCF还可以向UE发送所述PSI。
可选地,在S603中,第一PCF还可以向UE发送所述PLMN ID。
综上,根据本申请提供的方法,第一网元可以动态获取新部署的LAND或者新部署应用的应用数据,并且可以将应用数据提供给第一PCF,第一PCF根据该应用数据生成UE的策略信息,并且将该策略信息提供给UE。从而,解决新部署LAND或者新部署场景下,现有技术无法向UE配置相关数据网络或者应用的策略信息的问题。
下面将结合图7至图13,对方法600进行详细说明。需要说明的是,对于上文中已经作了解释说明的内容,如,应用数据所包含的内容,下文中若无特殊说明,均可以参照上文的描述。
图7是一种策略配置方法的具体示例的流程图。在该方法700中,第一PCF为H-PCF,第一网元为UDR(H-UDR),AF位于H-PLMN中。
S701,AF向NEF发送业务的配置请求,该配置请求包括所述应用数据。
例如,AF可以向NEF发送Nnef_ServiceParameters_Create请求消息,该请求消息中可以包括所述应用数据。
S702,NEF执行授权检查,检查AF是否被授权执行所述业务的配置请求。
如果AF被授权执行所述业务的配置请求,则可以执行S703,否则NEF向AF发送配置响应消息(例如,Nnef_ServiceParameters_Create响应消息),该配置响应消息中指示配置失败,并包含失败的原因值,该流程结束。
S703,NEF向UDR发送所述应用数据。
具体地,NEF向UDR发送所述应用数据,以使UDR存储所述应用数据。所述应用数据在UDR的应用数据集部分,当其他网元从UDR获取该应用数据时,数据集设置为应用数据(i.e.Data Set=Application data)。
应理解,所述AF与UDR位于同一个PLMN中。即若AF位于PLMN1中,则UDR为PLMN1中的UDR;若AF2位于PLMN2中,则UDR为PLMN2中的UDR。从UE的 角度,在该方法中,AF位于家乡的PLMN中,UDR为H-UDR。
S704,UDR将应用数据提供给H-PCF。
示例性的,S704可以有两种实现方式。
方式一
UDR接收到NEF发送的应用数据后,可以向至少一个H-PCF发送应用数据。
所述至少一个H-PCF可以是UDR根据应用数据中的DNN、位置信息、时间信息、切片信息中的一个或者多个信息确定的H-PCF。
或者,所述至少一个H-PCF可以是向该UDR订阅了业务更新通知的H-PCF。比如,所述至少一个H-PCF可以分别向该UDR发送订阅消息,该订阅消息用于订阅业务更新通知,该订阅消息可以不包括UE的标识信息(如,该UE标识或该UE所属群组的群组标识,下文中的UE的标识信息也可以是该UE的标识或该UE所属群组的群组标识)。那么,在UDR接收到应用数据后,可以向该至少一个H-PCF发送该应用数据。
或者,所述至少一个H-PCF可以是向该UDR请求应用数据的H-PCF。比如,所述至少一个H-PCF可以分别向该UDR发送请求消息,该请求消息用于请求该应用数据,该请求消息可以不包括UE的标识信息,该UDR可以根据该请求消息,分别向该至少一个H-PCF发送该应用数据。
应理解,方式一与UE是否注册网络没有关系。也就是说,无论UE是否注册到了网络,或者是否正在发起注册流程,UDR都可以向所述至少一个H-PCF发送应用数据。
方式二
UDR接收到NEF发送的应用数据后,向特定的H-PCF发送特定UE的应用数据。
在一个示例中,针对任一UE,在该UE注册过程中,服务该UE的H-PCF可以向UDR发送订阅消息,该订阅消息用于订阅业务更新通知,该订阅消息可以包括该UE的标识信息。若UE注册完成后,UDR接收到该UE的应用数据,则UDR可以向该H-PCF发送该应用数据。比如,UDR接收到包括该UE的标识信息的应用数据,或者NEF向UDR发送的携带该应用数据的消息包括该UE的标识信息,则UDR可以向该H-PCF发送Nudr_DM_Notify消息,该消息可以包括该UE的应用数据。
在另一个示例中,针对任一UE,在该UE注册到网络后,服务该UE的H-PCF可以向UDR发送请求消息,该请求消息用于请求该UE的应用数据,比如该请求消息可以包括该UE的标识信息。UDR接收到该请求消息后,若确定存储了该UE的应用数据,即,UDR之前从NEF接收到了该UE的应用数据,则可以向该H-PCF发送该UE的应用数据。
在又一个示例中,在UE注册过程中,服务该UE的AMF可以通过向H-PCF发送请求消息#1,例如Npcf_UEPolicyControlCreate请求消息,请求消息#1用于请求与H-PCF建立UE策略关联。H-PCF可以根据该请求消息#1,向UDR请求消息#2,请求消息#2用于请求应用数据,请求消息#2可以包括该UE的标识信息。UDR接收到请求消息#2后,若确定存储了该UE的应用数据,即,UDR之前从NEF接收到了该UE的应用数据,则可以向H-PCF发送该UE的应用数据。
可选地,无论是方式一还是方式二,UDR向H-PCF发送的应用数据可以不包括UE的标识信息,但本申请对此不作限定。
可选地,无论是方式一还是方式二,UDR向H-PCF发送的携带应用数据的消息可以 包括UE的标识信息,比如Nudr_DM_Notify消息可以携带UE的标识信息,但本申请对此不作限定。
S705,H-PCF生成UE的策略信息。
对应S704中的方式一,针对所述至少一个H-PCF中的任一H-PCF,示例性的,若该H-PCF接收到的应用数据用于所有的UE,比如该应用数据中不包含UE标识或者群组标识或者应用数据指示用于任意用户,则该H-PCF可以根据应用数据生成UE的策略信息,并且可以向该H-PCF所服务的所有UE发送该策略信息。其中,所述策略信息包含应用数据。若该H-PCF接收到的应用数据为该H-PCF所服务的某个UE(也可以是多个UE)的应用数据,比如,该应用数据中包含UE标识或者群组标识,且该H-PCF所服务的该UE的标识为所述UE标识或者为所述群组标识对应的群组成员,则该H-PCF根据该应用数据生成该UE的策略信息。若该H-PCF接收到的应用数据不是该H-PCF所服务的UE的应用数据,则H-PCF不根据该应用数据生成UE的策略信息。示例性的,上述UE标识或者群组标识或者指示用于任意用户的信息可以不作为应用数据的一部分发送给H-PCF。即H-PCF接收应用数据,以及接收UE标识或者群组标识或者指示用于任意用户的信息。H-PCF根据UE标识或者群组标识或者指示用于任意用户的信息确定应用数据是否用于生成UE的策略信息。
对应S704中的方式二,H-PCF接收到的应用数据就是该H-PCF所服务的UE的应用数据,因此H-PCF无需进行判断就可以根据该应用数据生成该UE的策略信息。
可选地,H-PCF还可以确定该策略信息对应的PSI和/或PLMN ID,具体可以参见上文描述,这里不再赘述。应理解,本申请不限定该步骤与S705之间的先后顺序。
S706,H-PCF向AMF发送UE的策略信息。
S707,AMF向UE发送该策略信息。
可选地,在S706中,H-PCF还可以向AMF发送所述PSI和/或PLMN ID。相应地,在S707中,AMF还可以向UE发送所述PSI和/或PLMN ID。应理解,发送PSI和/或PLMN ID和发送UE的策略信息这两个操作也可以不同时执行,本申请不限定这两个操作的先后顺序。
根据本申请提供的方法,AF可以通过NEF将动态的应用数据及时提供给UDR,UDR可以将该应用数据提供给H-PCF,从而H-PCF可以根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
图8是一种策略配置方法的具体示例的流程图。在该方法800中,第一PCF为H-PCF,第一网元为V-UDR,AF位于V-PLMN中。
S801至S802,AF向NEF发送包括所述应用数据业务的配置请求,NEF执行授权检查,检查AF是否被授权执行所述业务的配置请求。S801至S802与S701至S702相同,具体可以参见S701和S702。
S803,NEF向V-UDR发送所述应用数据。
具体地,NEF向V-UDR发送所述应用数据,以使V-UDR存储所述应用数据。所述应用数据在V-UDR的应用数据集部分,当其他网元从V-UDR获取该应用数据时,数据集设置为应用数据(i.e.Data Set=Application data)。
应理解,所述AF与UDR位于同一个PLMN中。即若AF位于PLMN1中,则UDR 为PLMN1中的UDR;若AF2位于PLMN2中,则UDR为PLMN2中的UDR。从UE的角度,在该方法中,AF位于拜访地的PLMN中,UDR为V-UDR。
S804,V-UDR将应用数据提供给V-PCF。
示例性的,S804可以有两种实现方式。这两种实现方式与S704中描述的UDR向H-PCF提供应用数据的方式类似,具体地这里的V-UDR可以对应S704中的UDR,V-PCF可以对应S704中的H-PCF。两种方式的具体内容参见上文对S704所作的说明,这里不再赘述。
S805,V-PCF向H-PCF发送该应用数据。
对应S804中的方式一,针对所述至少一个V-PCF中的任一V-PCF,示例性的,若该V-PCF接收到的应用数据用于所有的UE,比如该应用数据中不包含UE标识或者群组标识或者应用数据指示用于任意用户,则该V-PCF可以向H-PCF发送该应用数据。若该V-PCF接收到的应用数据为该V-PCF所服务的某个UE(也可以是多个UE)的应用数据,比如,该应用数据中包含UE标识或者群组标识,且该V-PCF所服务的该UE的标识为所述UE标识或者为所述群组标识对应的群组成员,则该V-PCF向H-PCF发送该应用数据。若该V-PCF接收到的应用数据不是该V-PCF所服务的UE的应用数据,则V-PCF不向H-PCF发送该应用数据。
对应S804中的方式二,V-PCF接收到的应用数据就是该V-PCF所服务的UE的应用数据,因此V-PCF无需进行判断就可以向H-PCF发送该应用数据。所述应用数据中可以不包含UE标识。
可选地,V-PCF可以通过Npcf_UEPolicyControlUpdate消息向H-PCF发送所述应用数据。
S806,H-PCF生成UE的策略信息。
即,H-PCF根据所述应用数据生成UE的策略信息,该步骤可以参见S603。
可选地,H-PCF还可以确定该策略信息对应的PSI和/或V-PLMN ID,具体可以参见上文描述,这里不再赘述。应理解,本申请不限定该步骤与S806之间的先后顺序。
S807,H-PCF向V-PCF发送UE的策略信息。
S808,V-PCF向AMF发送UE的策略信息。
S809,AMF向UE发送该策略信息。
可选地,在S807中,H-PCF还可以向V-PCF发送所述PSI和/或V-PLMN ID。相应地,在S807中,V-PCF还可以向AMF发送所述PSI和/或V-PLMN ID,以及在S809中,AMF还可以向UE发送所述PSI和/或V-PLMN ID。应理解,发送PSI和/或V-PLMN ID和发送UE的策略信息这两个操作也可以不同时执行,本申请不限定这两个操作的先后顺序。
根据本申请提供的方法,AF可以通过NEF将动态的应用数据及时提供给V-UDR,V-UDR可以将该应用数据提供给V-PCF,进而由V-PCF将该应用数据提供给H-PCF,从而H-PCF可以根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
本申请还提供了一种与方法800类似的方法,在该方法中,第一PCF可以是V-PCF,第一网元为V-UDR,AF位于V-PLMN中。该方法与方法800的不同之处在于,该示例 中,V-PCF获得应用数据后,不需要提供给H-PCF,而是自己确定UE的策略信息,并且发送给UE。
因此根据该方法,在漫游场景下,AF可以通过NEF将动态的应用数据及时提供给V-UDR,V-UDR可以将该应用数据提供给V-PCF,从而V-PCF可以根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。该方法800的具体流程可以参考方法800,本文中不再赘述。
图9是一种策略配置方法的具体示例的流程图。在该方法900中,第一PCF为H-PCF,第一网元为AMF,AF位于H-PLMN中,其中AMF中的应用数据是UDM发送给AMF的。
S901至S902,AF向NEF发送包括所述应用数据业务的配置请求,NEF执行授权检查,检查AF是否被授权执行所述业务的配置请求。S901至S902与S701至S702相同,具体可以参见S701和S702。
S903,NEF向UDM发送所述应用数据。
具体地,NEF向UDM发送所述应用数据,以使UDM存储所述应用数据。例如,NEF可以向UDM发送Nudm_ParameterProvisionservice消息,该消息中可以包括应用数据。
可选地,UDM接收到NEF发送的该应用该数据后,可以从UDR获取签约信息执行授权,若授权通过则存储所述应用数据。
S904,AMF获取UDM中的应用数据。
示例性的,S904可以有两种实现方式。
方式一
UDM接收到NEF发送的应用数据后,可以向至少一个AMF发送应用数据。
比如,所述至少一个AMF可以是UDM根据应用数据中的DNN、位置信息、时间信息、切片信息中的一个或者多个信息确定的。
或者,所述至少一个AMF可以是向该UDM请求应用数据的AMF。比如,所述至少一个AMF可以分别向该UDM发送请求消息,该请求消息用于请求该应用数据,该请求消息可以不包括UE的标识信息,该UDM可以根据该请求消息,分别向该至少一个AMF发送该应用数据。
应理解,方式一与UE是否注册网络没有关系。也就是说,无论UE是否注册到了网络,或者是否正在发起注册流程,UDM都可以向所述至少一个AMF发送应用数据。
方式二
UDM接收到NEF发送的应用数据后,向特定的AMF发送特定UE的应用数据。
在一个示例中,针对任一UE,若该UE注册完成后,UDM接收到该UE的应用数据,则UDM可以直接向服务该UE的AMF发送该UE的应用数据。比如,UDM可以向AMF发送Nudm_SDM_notification消息,该消息中包括该UE的应用数据。
在另一示例中,针对任一UE,在该UE的注册过程中,服务该UE的AMF可以通过Nudm_SDM_Get流程从UDM获取该UE的应用数据。即,AMF可以向UDM发送一个请求消息,该请求消息可以包括该UE的标识信息,UDM根据该UE的标识信息,若确定存储了该UE的应用数据,则向该AMF发送该UE的应用数据。
可选地,无论是方式一还是方式二,UDM向AMF发送的应用数据可以不包括UE的 标识信息,但本申请对此不作限定。
可选地,无论是方式一还是方式二,UDM向AMF发送的携带应用数据的消息可以包括UE的标识信息,比如Nudm_SDM_notification消息可以携带UE的标识信息,但本申请对此不作限定。
可选地,在S904之前,该方法还可以包括:UDM从UDR获取签约信息,执行授权检查。若允许AF发起配置请求,则UDM将应用数据作为用户的签约信息存储在UDR中。
S905,AMF向H-PCF发送应用数据。
对应S904中的方式一,针对所述至少一个AMF中的任一AMF,示例性的,若该AMF接收到的应用数据用于所有的UE,比如该应用数据中不包含UE标识或者群组标识或者应用数据指示用于任意用户,则该AMF可以向与该AMF服务相同UE的H-PCF发送应用数据。若该AMF接收到的应用数据为该AMF所服务的某个UE(也可以是多个UE)的应用数据,比如,该应用数据中包含UE标识或者群组标识,且该AMF所服务的该UE的标识为所述UE标识或者为所述群组标识对应的群组成员,则该AMF可以向与该AMF服务相同UE的H-PCF发送该UE的应用数据。若该AMF接收到的应用数据不是该AMF所服务的UE的应用数据,则AMF不向与该AMF服务相同UE的H-PCF发送应用数据。示例性的,上述UE标识或者群组标识或者指示用于任意用户的信息可以不作为应用数据的一部分发送给AMF。即AMF接收应用数据,以及接收UE标识或者群组标识或者指示用于任意用户的信息。AMF根据UE标识或者群组标识或者指示用于任意用户的信息确定向H-PCF发送应用数据。
对应S904中的实现方式二,AMF接收到的应用数据就是该AMF所服务的UE的应用数据,因此AMF无需进行判断就可以向与该AMF服务相同UE的H-PCF发送该应用数据。
示例性的,在S904中,若UDM获得应用数据时,UE已经接入到网络,则AMF可以向H-PCF发送Npcf_UEPolicyControlUpdate消息,该消息可以包括所述应用数据。再如,若UDM获得应用数据之后,UE才接入到网络,则AMF可以在UE策略关联建立流程中向H-PCF提供所述应用数据。
S906,H-PCF生成UE的策略信息。该步骤可以参见S603。
可选地,H-PCF还可以确定该策略信息对应的PSI和/或PLMN ID,具体可以参见上文描述,这里不再赘述。
S907至S908,H-PCF向AMF发送UE的策略信息,AMF向UE发送该策略信息。该步骤与S706至S707相同。
可选地,在S907中,H-PCF还可以向AMF发送所述PSI和/或PLMN ID。相应地,在S908中,AMF还可以向UE发送所述PSI和/或PLMN ID。
根据本申请提供的方法,AF可以通过NEF和UDM将动态的应用数据及时提供给AMF,AMF可以将该应用数据提供给H-PCF,从而H-PCF可以根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
图10是一种策略配置方法的具体示例的流程图。在该方法1000中,第一PCF为H-PCF,第一网元为AMF,AF位于V-PLMN中,其中AMF中的应用数据是UDM发送 给AMF的。
S1001至S1004,AF向NEF发送包括所述应用数据业务的配置请求,NEF执行授权检查,检查AF是否被授权执行所述业务的配置请求。若AF被授权执行所述业务的配置请求,NEF向UDM发送所述应用数据,UDM向AMF提供所述应用数据。
应理解,S1001至S1004与S901至S904相同,具体可以参见S901至S904。
S1005,AMF向V-PCF发送应用数据。
与S905类似,这里的V-PCF可以对应S905中的H-PCF。
示例性的,S1005可以有两种实现方式。这两种实现方式与S905中描述的AMF向H-PCF提供应用数据的方式类似,具体地这里的V-PCF可以对应S905中的H-PCF。两种方式的具体内容参见上文对S905所作的说明,这里不再赘述。
示例性的,在S1005中,若UDM获得应用数据时,UE已经接入到网络,则AMF可以向V-PCF发送Npcf_UEPolicyControlUpdate消息,该消息可以包括所述应用数据。再如,若UDM获得应用数据之后,UE才接入到网络,则AMF可以在UE策略关联建立流程中向V-PCF提供所述应用数据。
S1006,V-PCF向H-PCF发送所述应用数据。
对应S1005中的方式一,针对所述至少一个V-PCF中的任一V-PCF,示例性的,若该V-PCF接收到的应用数据用于所有的UE,比如该应用数据中不包含UE标识或者群组标识或者应用数据指示用于任意用户,则该V-PCF可以向H-PCF发送该应用数据。若该V-PCF接收到的应用数据为该V-PCF所服务的某个UE(也可以是多个UE)的应用数据,比如,该应用数据中包含UE标识或者群组标识或者V-PCF接收应用数据和UE标识/群组标识(即UE标识/群组标识不作为应用数据的部分),且该V-PCF所服务的该UE的标识为所述UE标识或者为所述群组标识对应的群组成员,则该V-PCF向H-PCF发送该应用数据。若该V-PCF接收到的应用数据不是该V-PCF所服务的UE的应用数据,则V-PCF不向H-PCF发送该应用数据。
对应S1005中的方式二,V-PCF接收到的应用数据就是该V-PCF所服务的UE的应用数据,因此V-PCF无需进行判断就可以向H-PCF发送该应用数据。
可选地,V-PCF可以通过Npcf_UEPolicyControlUpdate消息向H-PCF发送所述应用数据。
S1007至S1010,H-PCF生成UE的策略信息,然后将该策略信息发送给V-PCF,V-PCF经由AMF将该策略信息发送给UE。该步骤与S806至S809相同,具体可以参见S806至S809,这里不再赘述。
可选地,H-PCF还可以确定PSI和/或V-PLMN ID,并且可以通过V-PCF和AMF发送给UE。
根据本申请提供的方法,AF可以通过NEF和UDM将动态的应用数据及时提供给AMF,AMF可以经由V-PCF将该应用数据提供给H-PCF,从而H-PCF可以根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
本申请还提供了一种与方法1000类似的方法,在该方法中,第一PCF可以是V-PCF,第一网元为AMF,AF位于V-PLMN中,其中AMF中的应用数据是UDM发送给AMF的。该方法与方法1000的不同之处在于,该示例中,V-PCF获得应用数据后,不需要提 供给H-PCF,而是自己确定UE的策略信息,并且发送给UE。
因此根据该方法,在漫游场景下,AF可以通过NEF和UDM将动态的应用数据及时提供给AMF,AMF可以将该应用数据提供给V-PCF,从而V-PCF可以根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
图11是一种策略配置方法的具体示例的流程图。在该方法1100中,第一PCF为H-PCF,第一网元为UDR(H-UDR),AF位于H-PLMN中。该方法与方法700的不同之处在于,该方法中由AMF向PCF指示PCF从UDR中获取应用数据。
S1101至S1103,AF向NEF发送包括所述应用数据业务的配置请求,NEF执行授权检查,检查AF是否被授权执行所述业务的配置请求。若AF被授权执行所述业务的配置请求,NEF向UDR发送所述应用数据。
应理解,S1101至S1103与S701至S703相同,具体可以参见S701和S703。
S1104,NEF向UDM发送第一信息。
具体地,NEF可以选择UDM,比如根据应用数据中的UE标识或群组标识选择UDM,然后向所选择的UDM发送第一信息,比如NEF可以通过Nudm_ParameterProvisionservice消息发送第一信息。
第一信息与应用数据关联,比如第一信息可以为应用数据,或者,第一信息可以包括DNN、位置信息以及时间信息等中的一项或多项。
S1105,UDM向AMF发送第一信息。
示例性的,S1105可以有两种实现方式。
方式一
UDM接收到NEF发送的第一信息后,可以向至少一个AMF发送第一信息。
比如,所述至少一个AMF可以是UDM根据第一信息中的DNN、位置信息、时间信息、切片信息中的一个或者多个信息确定的。
或者,所述至少一个AMF可以是向该UDM请求第一信息的AMF。比如,所述至少一个AMF可以分别向该UDM发送请求消息,该请求消息用于请求该第一信息,该请求消息可以不包括UE的标识信息,该UDM可以根据该第一信息,分别向该至少一个AMF发送该第一信息。
应理解,方式一与UE是否注册网络没有关系。也就是说,无论UE是否注册到了网络,或者是否正在发起注册流程,UDM都可以向所述至少一个AMF发送第一信息。
方式二
UDM接收到NEF发送的第一信息后,向特定的AMF发送特定UE的第一信息。
在一个示例中,针对任一UE,若该UE注册完成后,UDM接收到该UE的第一信息,则UDM可以直接向服务该UE的AMF发送该UE的第一信息。比如,UDM可以向AMF发送Nudm_SDM_notification消息,该消息中包括该UE的第一信息。
在另一示例中,针对任一UE,在该UE的注册过程中,服务该UE的AMF可以通过Nudm_SDM_Get流程从UDM获取该UE的第一信息。即,AMF可以向UDM发送一个请求消息,该请求消息可以包括该UE的标识信息,UDM根据该UE的标识信息,若确定存储了该UE的第一信息,则向该AMF发送该UE的第一信息。
可选地,无论是方式一还是方式二,UDM向AMF发送的第一信息可以不包括UE的 标识信息,但本申请对此不作限定。
可选地,无论是方式一还是方式二,UDM向AMF发送的携带第一信息的消息可以包括UE的标识信息,比如Nudm_SDM_notification消息可以携带UE的标识信息,但本申请对此不作限定。
可选地,在S1105之前,该方法还可以包括:UDM从UDR获取签约信息,执行授权检查。若允许AF发起配置请求,则UDM将应用数据作为用户的签约信息存储在UDR中。
S1106,AMF向H-PCF发送第一指示信息。
对应S1105中的方式一,针对所述至少一个AMF中的任一AMF,示例性的,若该AMF接收到的第一信息用于所有的UE,比如该第一信息中不包含UE标识或者群组标识或者第一信息指示用于任意用户,则该AMF可以向与该AMF服务相同UE的H-PCF发送第一指示信息。若该AMF接收到的第一信息为该AMF所服务的某个UE(也可以是多个UE)的第一信息,比如,该第一信息中包含UE标识或者群组标识,且该AMF所服务的该UE的标识为所述UE标识或者为所述群组标识对应的群组成员,则该AMF可以向与该AMF服务相同UE的H-PCF发送该UE的第一指示信息。若该AMF接收到的第一信息不是该AMF所服务的UE的第一信息,则AMF不向与该AMF服务相同UE的H-PCF发送第一指示信息。
对应S1105中的实现方式二,AMF接收到的第一信息就是该AMF所服务的UE的第一信息,因此AMF无需进行判断就可以向与该AMF服务相同UE的H-PCF发送该第一指示信息。
其中,第一指示信息可以指示H-PCF从UDR中获取特定UE的应用数据。第一指示信息可以为DNN。示例性的,若UDM接收到第一信息时,UE已经接入到网络,第一指示信息可以通过Npcf_UEPolicyControlUpdate携带。若UDM接收到第一信息之后,UE才接入到网络,AMF可以在UE策略关联建立流程中向H-PCF提供第一指示信息。
如前所述,位置信息可以包括时间信息和/或位置信息,那么可选地,AMF也可以在位于该位置信息所指示的区域内时,或者在该时间信息所指示的时间内时,向H-PCF发送第一指示信息。
S1107,H-PCF根据第一指示信息,向UDR发送第二请求消息,第二请求消息用于获取所述应用数据。比如,第二请求消息可以包括DNN。
S1108,UDR向H-PCF发送所述应用数据。
S1109至S1111,H-PCF生成UE的策略信息,并通过AMF发送给UE。
应理解,S1109至S1111与S705至S707相同,可以参见S705至S707。
可选地,H-PCF还可以确定PSI和/或PLMN ID,并且可以通过AMF发送给UE。
根据本申请提供的方法,AF可以通过NEF将应用数据及时提供给UDR和UDM,并且UDM通过AMF指示H-PCF从UDR中获取应用数据,从而H-PCF可以获取应用数据,并根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
图12是一种策略配置方法的具体示例的流程图。在该方法1200中,第一PCF为H-PCF,第一网元为V-UDR,AF位于V-PLMN中。该方法与方法800的不同之处在于, 该方法中由AMF向V-PCF指示V-PCF从V-UDR中获取应用数据。
S1201至S1205,AF向NEF发送包括所述应用数据业务的配置请求,NEF执行授权检查,检查AF是否被授权执行所述业务的配置请求。若AF被授权执行所述业务的配置请求,NEF向V-UDR发送所述应用数据。NEF向UDM发送第一信息,UDM向AMF发送第一信息。
应理解,S1201至S1205与1101至S1105类似,唯一不同的是,S1203步骤中NEF向V-UDR发送应用数据,而S1103中NEF向UDR(H-UDR)发送应用数据。S1201至S1205具体可以参见S701和S705。
可选地,在S1205之前,该方法还可以包括:UDM从UDR(H-UDR)获取签约信息,执行授权检查。若允许AF发起配置请求,则UDM将应用数据作为用户的签约信息存储在UDR中。
S1206,AMF向V-PCF发送第一指示信息。
示例性的,S1206可以有两种实现方式。这两种实现方式与S1106中描述的AMF向H-PCF发送第一指示信息的方式类似,具体地这里的V-PCF可以对应S1106中的H-PCF。两种方式的具体内容参见上文对S1106所作的说明,这里不再赘述。
S1207,V-PCF向V-UDR发送第二请求消息,第二请求消息用于获取所述应用数据。比如,第二请求消息可以包括DNN。
S1208,V-UDR向V-PCF发送所述应用数据。
S1209,V-PCF向H-PCF发送所述应用数据。
S1210至S1213,H-PCF生成UE的策略信息,并通过V-PCF和AMF发送给UE。
应理解,S1210至S1213与S806至S809相同,可以参见S806至S809。
可选地,H-PCF也可以确定PSI和/或V-PLMN ID,并且可以通过V-PCF和AMF发送给UE。
根据本申请提供的方法,AF可以通过NEF将应用数据及时提供给V-UDR和UDM,并且UDM通过AMF指示H-PCF从V-UDR中获取应用数据,从而H-PCF可以获取应用数据,并根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
本申请还提供了一种与方法1200类似的方法,在该方法中,第一PCF为H-PCF,第一网元为V-UDR,AF位于V-PLMN中。该方法与方法1200的不同之处在于,该示例中,V-PCF根据AMF的指示,从V-UDR获取应用数据,并且获得应用数据后,不需要提供给H-PCF,而是自己确定UE的策略信息,并且发送给UE。
因此根据该方法,在漫游场景下,AF可以通过NEF将应用数据及时提供给V-UDR和UDM,并有UDM通过AMF指示V-PCF从V-UDR中获取应用数据,从而V-PCF可以获取应用数据,并根据该应用数据生成UE的策略信息,从而能够保证UE可以接入该应用数据对应的业务。
图13示出了本申请提供的一种策略配置方法1300的示意性流程图。该方法1300可以应用于图2所示的系统200中。
S1301,AF向NEF发送应用数据。
其中,这里应用数据和前述的应用数据所包括的内容相同,这里不再赘述。
示例性的,AF可以通过Nnef_ServiceParameters_create请求消息发送所述应用数据。
S1302,NEF向PCF发送应用数据。
具体地,NEF执行授权检查,检查AF是否被授权发起请求。若AF被授权发起请求,NEF可以选择PCF,如根据UE标识或者群组标识选择PCF。然后,NEF向所选择的PCF发送应用数据,如通过Npcf_dynamicpolicy创建服务消息将应用数据发送给PCF。
S1303,PCF向UDR发送所述应用数据,所述应用数据存储在UDR的UE签约数据中。
示例性的,PCF可以根据UE标识或者群组标识选择UDR,并将应用数据存储在UDR的UE的签约信息中。进一步的PCF在UE签约数据中包含指示信息,所述指示信息用于指示该应用信息为特定网络的应用信息,如所述指示信息包含PLMN ID。后续,服务UE的PCF可以根据该签约信息,生成UE的策略信息。
根据本申请提供的方法,AF通过NEF向PCF动态提供应用数据,进一步的PCF将应用数据存储在UE的策略签约数据中以使得服务UE的PCF获取对应的信息并生成UE策略。
应理解,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。
上文中结合图6至图13,详细描述了根据本申请实施例的策略配置方法,下面将描述根据本申请实施例的装置。应理解,方法实施例所描述的技术特征同样适用于以下装置实施例。
图14示出了根据本申请实施例的通信装置2000的示意性框图。可选地,所述通信装置2000的具体形态可以是通用计算机设备或通用计算机设备中的芯片,本申请实施例对此不作限定。如图14所示,该通信装置2000包括接收模块2100和发送模块2200。可选地,该通信装置2000还可以包括处理模块2300。
具体而言,通信装置2000可以是本申请涉及的任一网元,并且可以实现该网元所能实现的功能。应理解,通信装置2000可以是实体设备,也可以是实体设备的部件(例如,集成电路,芯片等等),还可以是实体设备中的功能模块。
比如,在一种实现方式中,通信装置2000可以用于实现本文中所描述的第一策略控制网元的功能。如通信装置2000可以是第一策略控制网元,也可以是第一策略控制网元的部件(例如,集成电路,芯片等等),还可以是功能模块。
具体地,接收模块2100用于,接收来自第一网元的应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;处理模块2300,用于根据所述应用数据,确定终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;发送模块2200,用于向所述终端设备发送所述策略信息。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元,其中,所述归属地接入管理网元的所述应用数据由数据管理网元提供;或者,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地接入管理网元,其中,所述拜访地接入管理网元的所述应用数据由数据管理网元提供。
可选地,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元, 所述第一网元为归属地数据存储网元;其中,接收模块2100还用于:接收来自归属地接入管理网元的第一指示信息;发送模块2200还用于:根据所述第一指示信息,向所述第一网元发送请求消息,所述请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元。接收模块2100还用于:接收来自拜访地接入管理网元的第一指示信息;发送模块2200还用于:根据所述第一指示信息,向所述第一网元发送请求消息,所述请求消息用于请求所述应用数据。
可选地,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元或拜访地接入管理网元,所述拜访地接入管理网元的所述应用数据由数据管理网元提供;其中,接收模块2100具体用于,通过拜访地策略控制网元,接收来自所述第一网元的所述应用数据;其中,发送模块2200具体用于,所述第一策略控制网元通过拜访地策略控制网元,向所述终端设备发送所述策略信息。
可选地,所述应用数据包括数据网络名称DNN,所述业务信息所指示的业务是所述DNN标识的数据网络中的业务。
可选地,还处理模块2300还用于,确定所述策略信息对应的策略部分标识PSI,所述PSI用于指示所述策略信息;发送模块2200具体用于,向所述终端设备发送所述策略信息和所述PSI。
应理解,根据本申请实施例的通信装置2000可对应于前述方法实施例中第一策略控制网元的方法,并且通信装置2000中的各个模块的上述和其它管理操作和/或功能分别为了实现前述方法实施例中第一策略控制网元的方法的相应步骤,因此也可以实现前述方法实施例中的有益效果,为了简洁,这里不作赘述。
还应理解,在本实施例中,通信装置2000是以功能模块的形式来呈现。这里的“模块”可以指特定应用集成电路ASIC、电路、执行一个或多个软件或固件程序的处理器和存储器、集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到装置2000可以采用图5所示的形式。处理模块2030可以通过图5所示的处理器501来实现。可选地,如果图5所示的计算机设备包括存储器502,处理模块2300可以通过处理器501和存储器502来实现。接收模块2100和发送模块2200可以通过图5所示的收发器503来实现。所述收发器503包括接收功能和发送功能。具体的,处理器通过执行存储器中存储的计算机程序来实现。可选地,当所述装置2000是芯片时,那么接收模块2010和发送模块2200的功能和/或实现过程还可以通过管脚或电路等来实现。可选地,所述存储器可以为所述芯片内的存储单元,比如寄存器、缓存等,所述存储单元还可以是所述计算机设备内的位于所述芯片外部的存储单元,如图5所的存储器502,或者,也可以是部署在其他系统或设备中的存储单元,不在所述计算机设备内。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制 品。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。
本申请还提供了一种计算机可读介质,其上存储有计算机程序,该计算机程序被计算机执行时实现上述任一方法实施例的功能。
本申请还提供了一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
应理解,说明书通篇中提到的“实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各个实施例未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。
应理解,在本申请实施例中,编号“第一”、“第二”…仅仅为了区分不同的对象,比如为了区分不同的消息或者指示信息,并不对本申请实施例的范围构成限制,本申请实施例并不限于此。
还应理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下网元会做出相应的处理,并非是限定时间,且也不要求网元实现时一定要有判断的动作,也不意味着存在其它限定。
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
还应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。上述各个过程涉及的各种数字编 号或序号仅为描述方便进行的区分,而不应对本申请实施例的实施过程构成任何限定。
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本申请中出现的类似于“项目包括如下中的一项或多项:A,B,以及C”表述的含义,如无特别说明,通常是指该项目可以为如下中任一个:A;B;C;A和B;A和C;B和C;A,B和C;A和A;A,A和A;A,A和B;A,A和C,A,B和B;A,C和C;B和B,B,B和B,B,B和C,C和C;C,C和C,以及其他A,B和C的组合。以上是以A,B和C共3个元素进行举例来说明该项目的可选用条目,当表达为“项目包括如下中至少一种:A,B,……,以及X”时,即表达中具有更多元素时,那么该项目可以适用的条目也可以按照前述规则获得。
应理解,在本申请各实施例中,“A对应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的 介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (29)

  1. 一种策略配置方法,其特征在于,包括:
    第一策略控制网元接收来自第一网元的应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;
    所述第一策略控制网元根据所述应用数据,确定终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;
    所述第一策略控制网元向所述终端设备发送所述策略信息。
  2. 如权利要求1所述的方法,其特征在于,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元,其中,所述归属地接入管理网元的所述应用数据由数据管理网元提供;或者,
    所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地接入管理网元,其中,所述拜访地接入管理网元的所述应用数据由数据管理网元提供。
  3. 如权利要求1所述的方法,其特征在于,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地数据存储网元;
    其中,在所述第一策略控制网元接收来自第一网元的应用数据之前,所述方法还包括:
    所述第一策略控制网元接收来自归属地接入管理网元的第一指示信息;
    所述第一策略控制网元根据所述第一指示信息,向所述第一网元发送请求消息,所述请求消息用于请求所述应用数据。
  4. 如权利要求1所述的方法,其特征在于,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元;
    其中,在所述第一策略控制网元接收来自第一网元的应用数据之前,所述方法还包括:
    所述第一策略控制网元接收来自拜访地接入管理网元的第一指示信息;
    所述第一策略控制网元根据所述第一指示信息,向所述第一网元发送请求消息,所述请求消息用于请求所述应用数据。
  5. 如权利要求1所述的方法,其特征在于,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元或拜访地接入管理网元,所述拜访地接入管理网元的所述应用数据由数据管理网元提供;
    其中,所述第一策略控制网元接收来自第一网元的应用数据,包括:
    所述第一策略控制网元通过拜访地策略控制网元,接收来自所述第一网元的所述应用数据;
    其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:
    所述第一策略控制网元通过拜访地策略控制网元,向所述终端设备发送所述策略信息。
  6. 如权利要求1-5中任一项所述的方法,其特征在于,所述应用数据包括数据网络名称DNN,所述业务信息所标识的业务是所述DNN标识的数据网络中的业务。
  7. 如权利要求1-6中任一项所述的方法,其特征在于,还包括:
    所述第一策略控制网元确定所述策略信息对应的策略部分标识PSI,所述PSI用于指示所述策略信息;
    其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:
    所述第一策略控制网元向所述终端设备发送所述策略信息和所述PSI。
  8. 如权利要求1-7中任一项所述的方法,其特征在于,所述业务信息为应用标识、业务流信息、域名信息或者数据网络名称DNN。
  9. 如权利要求1-8中任一项所述的方法,其特征在于,所述应用数据还包括下述中的一项或多项:
    单切片选择辅助信息S-NSSAI、会话和服务连续SSC模式、位置信息、时间信息、终端设备标识和群组标识;
    其中,所述S-NSSAI用于标识一个网络切片;
    所述SSC模式用于指示所述业务信息指示的业务的业务连续性需求;所述位置信息用于指示所述业务信息指示的业务的有效区域;
    所述时间信息用于指示所述业务信息指示的业务的有效时间;
    所述终端设备标识和所述群组标识均指示能够应用所述业务信息指示的业务的终端设备。
  10. 一种通信系统,其特征在于,包括:第一策略控制网元和第一网元;
    所述第一网元用于,向所述第一策略控制网元发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;
    所述第一策略控制网元用于,根据所述应用数据,确定终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;
    所述第一策略控制网元还用于,向所述终端设备发送所述策略信息。
  11. 如权利要求10所述的系统,其特征在于,所述系统还包括应用网元和网络开放网元;
    所述应用网元用于,向所述网络开放网元发送所述应用数据;
    所述网络开放网元用于,向所述第一网元发送所述应用数据。
  12. 如权利要求11所述的系统,其特征在于,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地数据存储网元;
    所述系统还包括归属地接入管理网元和数据管理网元;
    其中,所述网络开放网元还用于:
    向所述数据管理网元发送第一信息,所述第一信息与所述应用数据关联;
    所述数据管理网元用于,根据所述第一信息,向所述归属地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;
    所述归属地接入管理网元用于,根据所述第一信息,向所述第一策略控制网元发送第一指示信息;
    所述第一策略控制网元还用于,根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
  13. 如权利要求11所述的系统,其特征在于,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元;
    其中,所述第一网元用于向第一策略控制网元发送应用数据,包括:
    所述第一网元用于,通过拜访地策略控制网元,向所述第一策略控制网元发送所述应用数据;
    其中,所述第一策略控制网元还用于向所述终端设备发送所述策略信息,包括:
    所述第一策略控制网元还用于,通过所述拜访地策略控制网元,向所述终端设备发送所述策略信息。
  14. 如权利要求13所述系统,其特征在于,所述系统还包括拜访地接入管理网元和数据管理网元;
    所述网络开放网元还用于,向所述数据管理网元发送第一信息,所述第一信息与所述应用数据关联;
    所述数据管理网元用于,根据所述第一信息,向所述拜访地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;
    所述拜访地接入管理网元用于,根据所述第一信息,向所述拜访地策略控制网元发送第一指示信息;
    所述拜访地策略控制网元用于,根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
  15. 如权利要求11所述的系统,其特征在于,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元;或者,
    所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地接入管理网元;
    所述系统还包括数据管理网元;
    其中,所述网络开放网元用于,向所述第一网元发送所述应用数据,包括:
    所述网络开放网元用于,通过所述数据管理网元,向所述第一网元发送所述应用数据。
  16. 如权利要求11所述的系统,其特征在于,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元。
  17. 一种策略配置方法,其特征在于,包括:
    第一网元向第一策略控制网元发送应用数据,所述应用数据包括业务信息,所述业务信息是用于标识业务的信息;
    所述第一策略控制网元根据所述应用数据,确定用于终端设备的策略信息,所述策略信息包括所述应用数据,所述策略信息与服务网络关联;
    所述第一策略控制网元向所述终端设备发送所述策略信息。
  18. 如权利要求16所述的方法,其特征在于,在所述第一网元向第一策略控制网元发送应用数据之前,所述方法还包括:
    应用网元向网络开放网元发送所述应用数据;
    所述网络开放网元向所述第一网元发送所述应用数据。
  19. 如权利要求18所述的方法,其特征在于,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元;
    所述方法还包括:
    所述网络开放网元向数据管理网元发送第一信息,所述第一信息与所述应用数据关 联;
    所述数据管理网元根据所述第一信息,向归属地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;
    所述归属地接入管理网元根据所述第一信息,向所述第一策略控制网元发送第一指示信息;
    所述第一策略控制网元根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
  20. 如权利要求18所述的方法,其特征在于,所述服务网络为拜访地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为拜访地数据存储网元;
    其中,所述第一网元向第一策略控制网元发送应用数据,包括:
    所述第一网元通过拜访地策略控制网元,向所述第一策略控制网元发送所述应用数据;
    其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:
    所述第一策略控制网元通过所述拜访地策略控制网元,向所述终端设备发送所述策略信息。
  21. 如权利要求20所述方法,其特征在于,所述方法还包括:
    所述网络开放网元向数据管理网元发送第一信息,所述第一信息与所述应用数据关联;
    所述数据管理网元根据所述第一信息,向拜访地接入管理网元发送第一请求消息,所述第一请求消息包括所述第一信息;
    所述拜访地接入管理网元根据所述第一信息,向所述拜访地策略控制网元发送第一指示信息;
    所述拜访地策略控制网元根据所述第一指示信息,向所述第一网元发送第二请求消息,所述第二请求消息用于请求所述应用数据。
  22. 如权利要求18所述的方法,其特征在于,所述服务网络为归属地网络,所述第一策略控制网元为归属地策略控制网元,所述第一网元为归属地接入管理网元;或者,
    所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地接入管理网元;
    其中,所述网络开放网元向所述第一网元发送所述应用数据,包括:
    所述网络开放网元通过所述数据管理网元,向所述第一网元发送所述应用数据。
  23. 如权利要求18所述的方法,其特征在于,所述服务网络为拜访地网络,所述第一策略控制网元为拜访地策略控制网元,所述第一网元为拜访地数据存储网元。
  24. 如权利要求17-23中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一策略控制网元确定所述策略信息对应的策略部分标识PSI,所述PSI用于指示所述策略信息;
    其中,所述第一策略控制网元向所述终端设备发送所述策略信息,包括:
    所述第一策略控制网元向所述终端设备发送所述策略信息和所述PSI。
  25. 如权利要求17-24中任一项所述的方法,其特征在于,所述业务信息为应用标识、业务流信息、域名信息或者数据网络名称DNN。
  26. 如权利要求17-25中任一项所述的方法,其特征在于,所述应用数据还包括下述中的一项或多项:
    数据网络名称DNN、单切片选择辅助信息S-NSSAI、会话和服务连续SSC模式、位置信息、时间信息、终端设备标识和群组标识;
    其中,DNN用于标识一个数据网络,所述业务信息标识的业务是所述DNN标识的数据网络中的业务;
    所述S-NSSAI用于标识一个网络切片;
    所述SSC模式用于指示所述业务信息指示的业务的业务连续性需求;所述位置信息用于指示所述业务信息指示的业务的有效区域;
    所述时间信息用于指示所述业务信息指示的业务的有效时间;
    所述终端设备标识和所述群组标识均指示能够应用所述业务信息指示的业务的终端设备。
  27. 一种通信装置,其特征在于,所述装置用于执行如权利要求1-9中任一项或者权利要求17-26中任一项所述的方法。
  28. 一种通信装置,其特征在于,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得所述装置执行如权利要求1-9中任一项或者权利要求17-26中任一项所述的方法。
  29. 一种可读存储介质,其上存储有计算机程序或指令,其特征在于,所述计算机程序或指令被执行时使得如权利要求1-9中任一项或者权利要求17-26中任一项所述的方法被执行。
PCT/CN2019/110888 2019-10-12 2019-10-12 策略配置方法、通信装置和通信系统 WO2021068265A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/110888 WO2021068265A1 (zh) 2019-10-12 2019-10-12 策略配置方法、通信装置和通信系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/110888 WO2021068265A1 (zh) 2019-10-12 2019-10-12 策略配置方法、通信装置和通信系统

Publications (1)

Publication Number Publication Date
WO2021068265A1 true WO2021068265A1 (zh) 2021-04-15

Family

ID=75437794

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/110888 WO2021068265A1 (zh) 2019-10-12 2019-10-12 策略配置方法、通信装置和通信系统

Country Status (1)

Country Link
WO (1) WO2021068265A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190053308A1 (en) * 2017-08-14 2019-02-14 Telefonaktiebolaget Lm Ericsson (Publ) Method And Device For Network Initiated Packet Data Unit, PDU, Session Establishment In A Telecommunication Network
CN109862581A (zh) * 2017-11-30 2019-06-07 华为技术有限公司 一种通信方法及装置
US20190313236A1 (en) * 2018-04-09 2019-10-10 Samsung Electronics Co., Ltd. Method and device using network slicing in mobile communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190053308A1 (en) * 2017-08-14 2019-02-14 Telefonaktiebolaget Lm Ericsson (Publ) Method And Device For Network Initiated Packet Data Unit, PDU, Session Establishment In A Telecommunication Network
CN109862581A (zh) * 2017-11-30 2019-06-07 华为技术有限公司 一种通信方法及装置
US20190313236A1 (en) * 2018-04-09 2019-10-10 Samsung Electronics Co., Ltd. Method and device using network slicing in mobile communication system

Similar Documents

Publication Publication Date Title
WO2021018021A1 (zh) 计费方法、计费系统和通信装置
US10064043B2 (en) Connecting user equipment to different core networks
WO2020253701A1 (zh) 管理背景数据传输策略的方法、装置和系统
US20220159606A1 (en) Policy Control Function Network Element Selection Method, Apparatus, System, and Storage Medium
RU2740637C1 (ru) Способ исполнения услуги для потребителя услуги, а также соответствующий сетевой узел и компьютерный программный продукт
EP3923671A1 (en) Session establishment method and device
WO2021063413A1 (zh) 一种通信方法及装置
KR20140106229A (ko) M2m 디바이스의 제어권 공유 방법 및 이를 위한 m2m 서비스 플랫폼
WO2021012736A1 (zh) 一种会话管理网元的选择方法、装置及系统
CN113994633B (zh) 通信系统中的网络功能集合的授权
WO2021212939A1 (zh) 通信方法、装置及系统
US20220360670A1 (en) System and method to enable charging and policies for a ue with one or more user identities
WO2022012122A1 (zh) 一种通信方法、设备及系统
WO2022222745A1 (zh) 一种通信方法及装置
US20210329464A1 (en) Network slicing with a radio access network node
CN110278095A (zh) 一种消息传输方法和装置
EP4207828A1 (en) Data communication method and communication apparatus
CN114830703B (zh) 签约改变的处理方法、设备及系统
JP7428265B2 (ja) 通信端末及びその方法
EP4131894B1 (en) Operation of a user equipment within or as part of a telecommunications network using a control plane functionality
WO2021068265A1 (zh) 策略配置方法、通信装置和通信系统
WO2022067736A1 (zh) 一种通信方法及装置
CN113574829A (zh) 与第三方应用共享通信网络锚定加密密钥
WO2023134630A1 (zh) 配置策略的方法和装置
WO2023185441A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19948332

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19948332

Country of ref document: EP

Kind code of ref document: A1