WO2022148254A1 - User information analysis result feedback method and device thereof - Google Patents

User information analysis result feedback method and device thereof Download PDF

Info

Publication number
WO2022148254A1
WO2022148254A1 PCT/CN2021/141266 CN2021141266W WO2022148254A1 WO 2022148254 A1 WO2022148254 A1 WO 2022148254A1 CN 2021141266 W CN2021141266 W CN 2021141266W WO 2022148254 A1 WO2022148254 A1 WO 2022148254A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
target terminal
user information
information
request
Prior art date
Application number
PCT/CN2021/141266
Other languages
French (fr)
Chinese (zh)
Inventor
毕晓宇
Original Assignee
大唐移动通信设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大唐移动通信设备有限公司 filed Critical 大唐移动通信设备有限公司
Publication of WO2022148254A1 publication Critical patent/WO2022148254A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer

Definitions

  • the present application relates to the field of wireless communication technologies, and in particular, to a method and device for feeding back a user information analysis result.
  • the 5G network defines an intelligent network data analysis function (Network Data Analytics Function, NWDAF) network element, which can collect and analyze network function and user equipment (User Equipment, UE, also known as terminal) information, And provide the analysis results to the network function (Network Function, NF) network element. NWDAF network elements can interact with different network elements for different purposes:
  • NWDAF network element is based on the access and mobility management (Access and Mobility Management Function, AMF) network element, session management function (Session Management Function, SMF) network element, Policy Control Function (Policy Control Function, PCF) NEs, Unified Data Manager (UDM) NEs, Application Function (AF) NEs, and Operation Administration and Maintenance (OAM) NEs provide event subscriptions for data collection.
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • Policy Control Function Policy Control Function
  • PCF Policy Control Function
  • UDM Unified Data Manager
  • AF Application Function
  • OFAM Operation Administration and Maintenance
  • NWDAF network elements can directly interact with AF network elements, or interact with AF network elements through Network Exposure Function (NEF) network elements;
  • NEF Network Exposure Function
  • NWDAF network element retrieves information from data repository, for example, obtains subscriber-related information from UDR (Unified Data Repository, unified data warehouse function) network element through UDM network element;
  • UDR Unified Data Repository, unified data warehouse function
  • the NWDAF network element retrieves information about the NF network element, for example, obtains the information related to the NF network element from the network storage function (NF Repository Function, NRF) network element;
  • NRF Network Repository Function
  • NWDAF network elements provide analysis to consumers on demand.
  • the NWDAF network element provides UE-related analysis, including mobility analysis, UE communication analysis, UE expected behavior parameters and abnormal behavior analysis related to network data analysis.
  • the analysis of UE communication and abnormal behavior analysis can enable the network to know the running status of the UE and the network through the data analysis function.
  • UE mobility analysis which is information related to the user's privacy
  • data analysis is performed to provide UE mobility statistics or predictions.
  • the mobility information of the UE provided by the 5G network involves the privacy of the UE. This information requires the user to know and give permission. Otherwise, it may lead to the leakage of the user's privacy. tracking, and this method of obtaining UE permission is currently lacking.
  • the embodiments of the present application provide a user information analysis result feedback method and device thereof, which are used to improve user information security.
  • a first aspect provides a user information analysis result feedback method, including:
  • the first network element receives the first user information analysis request from the second network element
  • the first network element After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
  • the first network element sends the analysis result of the user information of the target terminal to the second network element, including:
  • the first network element After the first network element obtains the permission, it analyzes the user information of the target terminal to obtain an analysis result, and sends the analysis result to the second network element; or, the first network element obtains the analysis result. For the user information of the target terminal, analyze the user information of the target terminal to obtain an analysis result, and after obtaining the permission, send the analysis result to the second network element.
  • the first network element is an NWDAF network element; the first network element obtains a license that allows analyzing the user information of the target terminal, including:
  • the NWDAF network element sends a first query request to the UDM network element
  • the NWDAF network element receives a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  • the first query response carries permission indication information
  • the permission indication information is obtained by the UDM network element instructing the AMF network element to obtain from the target terminal through the RAN; wherein the permission indication information is used to indicate the Whether the target terminal allows the network to analyze the user information of the target terminal.
  • the second network element is an NF network element.
  • the first query response carries permission indication information
  • the permission indication information is obtained by the UDM network element instructing the second network element to obtain from the target terminal through the AF network element
  • the permission indication information It is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  • the second network element is an NEF network element
  • the first user information analysis request is sent by the NEF network element according to the second user information analysis request from the AF network element.
  • the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the first network element is an NWDAF network element
  • the first user information analysis request carries the permission indication information of the target terminal
  • the first network element obtains permission to perform user information on the target terminal.
  • the analyzed license includes: the NWDAF network element sends a verification request to the UDM network element, and the verification request carries the license indication information; the NWDAF network element receives the verification response sent by the UDM network element, and the verification response Carry the verification result.
  • the permission indication letter is sent by the AF network element to the second network element, and the permission indication information is obtained through negotiation between the AF network element and the target terminal.
  • the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is the NEF network element according to the request from the AF network element.
  • the second user information analysis request is sent.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the method further includes: after the NWDAF network element obtains the updated user information of the target terminal, if it is determined according to the validity period information that the validity period has expired, sending a second query request to the UDM network element. ;
  • the NWDAF network element receives the second query response sent by the UDM network element
  • the NWDAF network element analyzes the updated user information, and sends the analysis result to the second network element.
  • the method further includes: if the first network element has not obtained the permission of the target terminal to allow the network to analyze the user of the target terminal, sending the first user information to the second network element An analysis response, where the first user information analysis response is used to indicate rejection of the first user information analysis request.
  • the user information includes mobility-related information and/or communication-related information.
  • the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
  • the user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  • a user information analysis result feedback method including:
  • the UDM network element receives a first request from the NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
  • the UDM network element sends a first response to the NWDAF network element, where the first response is used to indicate whether the user information of the target terminal is allowed to be analyzed.
  • the first request is a first query request, and the first query request is used for requesting to query the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
  • the UDM network element sends a first response to the NWDAF network element, including:
  • the UDM network element obtains, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
  • the UDM network element sends a first query response to the NWDAF network element, where the first query response carries permission indication information of whether the target terminal allows the network to analyze the user information of the target terminal.
  • the method further includes: if the UDM network element has not acquired the subscription information, sending a first permission indication acquisition request to the AMF network element, so that the AMF network element acquires a license from the target terminal Indication information; the UDM network element receives a first license indication acquisition response sent by the AMF network element, where the first license indication acquisition response carries the license indication information of the target terminal.
  • the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, where the second permission indication acquisition response carries the permission of the target terminal.
  • indication information, the second permission indication acquisition request and the second permission indication acquisition response are non-access stratum NAS messages; or, the AMF network element sends a third permission indication acquisition request to the radio access network RAN, to causing the RAN to acquire permission indication information from the target terminal.
  • the first permission indication acquisition request and the third permission indication acquisition request carry the identifier of the target terminal, and the RAN sends an RRC reconfiguration message to the corresponding terminal according to the identifier of the target terminal, to causing the corresponding terminal to send permission indication information to the RAN; or, the first permission indication acquisition request and the third permission indication acquisition request carry the group identifier of the target terminal group, and the RAN determines the target terminal group according to the target terminal group ID.
  • the group identifier of the group sends a broadcast message or a multicast message, so that the corresponding terminal sends permission indication information to the RAN.
  • the first query request is sent by the NWDAF network element after receiving the first user information analysis request from the NEF network element, and the first user information analysis request is received by the NEF network element from the Sent by the second user information analysis request sent by the AF network element;
  • the method also includes:
  • the UDM network element sends a fourth permission indication acquisition request to the NEF network element, and the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element can obtain the request from the NEF network element.
  • the UDM network element receives a fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
  • the first query response carries validity period information
  • the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the first request is a verification request, and the verification request carries the permission indication information of the target terminal;
  • the method also includes:
  • the UDM network element verifies the permission indication information of the target terminal to obtain a verification result, and the verification result is used to indicate whether the permission indication information is verified, or to indicate whether the target terminal allows the network to Analyze the user information of the target terminal;
  • the UDM network element sends a verification response to the NWDAF network element, where the verification response carries the verification result.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the method further includes:
  • the UDM network element receives a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the target terminal's updated user information. Sent after the validity period has expired;
  • the UDM network element sends a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the user information includes mobility-related information and/or communication-related information.
  • the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
  • the user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  • a network device including:
  • a receiving unit configured to receive a first user information analysis request from a second network element
  • a processing unit configured to obtain a license that allows analyzing the user information of the target terminal
  • the sending unit is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
  • a network device including:
  • a receiving unit configured to receive a first request from a network data analysis function NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
  • a sending unit configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
  • a communication device comprising: a processor and a memory;
  • the memory storing computer instructions
  • the processor is configured to read the computer instructions and execute the method according to any one of the above first aspects.
  • a communication device comprising: a processor and a memory;
  • the memory storing computer instructions
  • the processor is configured to read the computer instructions and execute the method according to any one of the above second aspects.
  • a computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause a computer to execute any one of the first aspect or the second aspect above method described in item.
  • a computer program product which, when invoked by a computer, causes the computer to execute the method according to any one of the first aspect or the second aspect.
  • the first network element after the first network element receives the user information analysis request from the second network element and obtains the permission to analyze the user information of the target terminal, it will analyze the user information of the target terminal.
  • the analysis result of the user information of the target terminal is sent to the second network element, thereby protecting user privacy and improving user information security.
  • FIG. 1 is a schematic flowchart of a user information analysis result feedback method provided in an embodiment of the present application
  • FIGS. 2a and 2b are schematic flowcharts of a method for feeding back a user information analysis result provided by an embodiment of the present application, respectively;
  • 3 to 7 are respectively schematic diagrams of signaling interaction of a method for feeding back a user information analysis result provided by an embodiment of the present application;
  • FIG. 8 is a schematic structural diagram of a network device (a first network element) provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a network device (a second network element) provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a communication apparatus provided by another embodiment of the present application.
  • a terminal is a device that can provide users with voice and/or data connectivity.
  • the terminal device includes a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • terminal devices can be: mobile phones (mobile phones), tablet computers, notebook computers, PDAs, mobile Internet devices (MIDs), wearable devices, virtual reality (virtual reality, VR) devices, augmented reality (augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in smart grid, wireless terminals in transportation safety A wireless terminal, a wireless terminal in a smart city, or a wireless terminal in a smart home, etc.
  • the NWDAF network element in the 5G network can collect network function and UE information, analyze it, and provide the analysis result to the NF network element or the AF network element. This information requires the user to know and give permission, otherwise it may cause the user The issue of privacy leakage.
  • the embodiments of the present application provide a method and device for feedback of user information analysis results. Only then can we analyze the user information or provide the analysis results obtained by analyzing the user, so as to improve the security of user information.
  • terminal may also be understood as “UE's permission” or “user consent”, which means that the terminal allows the network to collect and/or analyze user information of the terminal.
  • the user of the terminal (UE) is called the user.
  • the terminal (UE) is usually provided with a SIM card (Subscriber Identity Module) or other devices for realizing communication, and the device is configured with a user identity. Therefore, the “terminal (UE)” " has a corresponding relationship with the user "user” of the terminal.
  • SIM card Subscriber Identity Module
  • the embodiments of the present application can be applied to a 5G system, and can also be applied to a subsequent evolution system thereof.
  • FIG. 1 it is a schematic flowchart of a user information analysis result feedback method provided by an embodiment of the present application. As shown in the figure, the process may include:
  • a second network element sends a first user information analysis request to a first network element, where the first user information analysis request is used to request to analyze user information of the target terminal.
  • the first network element and the second network element may be core network network elements in the 5G system.
  • the first network element may be an NWDAF network element
  • the second network element may be an NF network element or a NEF network element.
  • the indication information of the target terminal carried in the first user information analysis request may be used to indicate a target terminal, for example, the indication information may be identification information of a terminal; the indication information of the target terminal may also be Used to indicate multiple target terminals, such as a group of target terminals, the indication information can be the identification information of each target terminal in the multiple target terminals, or the group identification of the terminal group (used to indicate a group of target terminals) .
  • the second network element may also carry information such as filtering information such as the area of interest, analysis target time period or prediction time period, the maximum number of analysis objects, and the target address notified in the contract in the request.
  • the first network element After receiving the first user information analysis request, the first network element obtains a license for allowing analysis of the user information of the target terminal.
  • the first network element may interact with the UDM network element to obtain a license that allows analyzing the user information of the target terminal.
  • the first network element may query the UDM network element whether the target terminal allows the network to analyze the user information of the target terminal, or query the subscription information of the target terminal, where the subscription information is used to indicate Whether to allow the network to analyze the user information of the target terminal.
  • the first network element (such as the NWDAF network element) sends a first query request to the UDM network element, where the first query request is used to request the query target terminal whether the network allows the network to analyze the user information of the target terminal, or is used to request Query whether there is subscription information that allows the network to analyze the user information of the target terminal;
  • the UDM network element returns the first query response to the first network element (such as the NWDAF network element), and the first query response is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed.
  • the first network element such as the NWDAF network element
  • the UDM network element can store the subscription information of the target terminal on whether to allow the network to analyze the user information of the target terminal, and the UDM network element can determine whether the target terminal allows the network to analyze the user information of the target terminal according to the subscription information. analyze, and return the first query response to the first network element (eg, the NWDAF network element).
  • the first network element eg, the NWDAF network element
  • the UDM network element can also send the first permission indication acquisition request to the AMF network element (for example, when the UDM network element does not store the subscription information of the target terminal on whether to allow the network to analyze the user information of the target terminal, or the user information of the target terminal is not queried, or the subscription information), so that the AMF network element obtains the permission indication information from the target terminal, and the AMF network element obtains the permission indication information of the target terminal from the target terminal through the radio access network (RAN) and sends it to the UDM network element,
  • the UDM network element returns a first query response to the first network element (eg, the NWDAF network element) according to the permission indication information.
  • the AMF network element may obtain permission indication information from the target terminal through a non-access stratum (non-access stratum, NAS) for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
  • NAS non-access stratum
  • the AMF network element sends a second permission indication acquisition request to the target terminal, receives a second permission indication acquisition response sent by the target terminal, and the second permission indication acquisition response carries the permission indication information of the target terminal.
  • the second permission indication acquisition request and the second permission indication acquisition response are NAS messages.
  • the AMF network element may also send a third permission indication obtaining request to the RAN to trigger the RAN to obtain permission indication information from the target terminal for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
  • the first permission indication acquisition request sent by the UDM network element to the AMF network element and the third permission indication acquisition request sent by the AMF network element to the RAN carry the identifier of the target terminal, and the RAN sends the request to the RAN according to the identifier of the target terminal.
  • the corresponding terminal sends a radio resource control (radio resource control, RRC) reconfiguration message, so that the corresponding terminal sends permission indication information to the RAN.
  • RRC radio resource control
  • the RAN may send a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends the permission indication to the RAN information.
  • the RAN may send a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends the permission indication to the RAN information.
  • the UDM network element may instruct the second network element (such as the NEF network element) to pass the AF network element.
  • the target terminal for indicating whether the target terminal allows the network to analyze the user information of the target terminal, and carry the permission indication information in the first query response and send it to the first network element (such as the NWDAF network element) .
  • the AF network element sends the second user information analysis request to the NEF network element.
  • the NEF network element After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element, and the NWDAF network element receives the first user information analysis request.
  • a first query request is sent to the UDM network element.
  • the UDM sends a fourth permission indication acquisition request to the NEF network element (for example, the UDM network element sends the fourth permission when it has not obtained the subscription information for indicating whether the target terminal allows the target terminal to perform user information analysis on the target terminal)
  • the NEF network element forwards it to the AF network element, so that the AF network element obtains the license instruction information of the target terminal from the target terminal, and sends the request to the target terminal.
  • the obtained license indication information is forwarded to the UDM network element through the NEF network element; the UDM network element receives the fourth license indication acquisition response sent by the NEF network element, which carries the license indication information of the target terminal.
  • the first user information analysis request sent by the second network element to the first network element carries the permission indication information (such as token) of the target terminal, and the first network element requests the UDM network element to The permission indication information is verified (eg, legality verification). If the verification is passed, it is determined that the user information of the target terminal is allowed to be analyzed; otherwise, it is determined that the user information of the target terminal is not allowed to be analyzed.
  • the permission indication information such as token
  • the permission indication information is verified (eg, legality verification). If the verification is passed, it is determined that the user information of the target terminal is allowed to be analyzed; otherwise, it is determined that the user information of the target terminal is not allowed to be analyzed.
  • the first network element (such as the NWDAF network element) sends a verification request to the UDM network element, where the verification request carries the permission indication information (the permission indication information comes from the first user information analysis request sent by the second network element)
  • the UDM network element verifies the permission indication information, and sends a verification response to the first network element (such as the NWDAF network element), the verification response carries a verification result, and the verification result is used to indicate whether the permission indication information is verified and passed, Or it is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  • the first network element eg, NWDAF network element
  • the first network element After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
  • the first network element analyzes the user information to obtain an analysis result.
  • the user information may include at least one of the following information:
  • User mobility-related information such as user location information, etc.
  • User's communication-related information which may include: communication slice information, data network name, application ID and area of interest, in a certain time period (communication termination time), traffic and other information.
  • the analysis result obtained by analyzing the user information of the target terminal may include at least one of the following:
  • the user information of the target terminal collected by the first network element is used to support the analysis of the mobility data of the target terminal.
  • the analysis result can be provided to the NF network element or the AF network element.
  • the analysis result can reflect the data of the mobility analysis of the target terminal, such as the identification, time information, and address of a group of UEs or a certain UE, or the data of UE mobility prediction, the identification information of the UE, and the identification information of the UE at a given time.
  • the first network element does not obtain the permission of the target terminal to analyze the user information of the target terminal, it refuses to obtain the user information of the target terminal, or refuses to analyze the user information of the target terminal. Specifically, if the first network element does not obtain the permission of the target terminal to allow the network to analyze the user information of the target terminal, it sends a first user information analysis response to the second network element, where the first user information analysis response is used to indicate rejection Responding to the first user information analysis request received by the first network element.
  • the first network element after the first network element receives the user information analysis request from the second network element and obtains the permission to analyze the user information of the target terminal, it will analyze the user information of the target terminal.
  • the analysis result of the user information of the target terminal is sent to the second network element, thereby protecting user privacy and improving user information security.
  • the license indication information of the target terminal obtained by the first network element may further include validity period information, where the validity period information is used to indicate that the target terminal allows the network to allow the user information of the target terminal The validity period for which the analysis was performed.
  • the validity period information may be carried in a first query response or a verification response sent by the UDM network element to the first network element.
  • the first network element such as the NWDAF network element
  • the first network element obtains the updated user information of the target terminal
  • the updated user information of the target terminal is refused to be performed. analyze.
  • a second query request is sent to the UDM network element, and the The second query request is used to request to query whether to change the validity period for which the target terminal allows the network to analyze the user information of the target terminal; after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates If the validity period for which the target terminal allows the network to analyze the user information of the target terminal is changed, the updated user information of the target terminal is analyzed, and the analysis result is sent to the second network element.
  • the UDM network element can determine whether to change the validity period of the target terminal according to the validity period change policy. For example, if the validity period change policy allows to extend the validity period of the target terminal, the target terminal can be generated according to the policy. The new validity period of the terminal.
  • the UDM network element may also instruct the AMF network element to request from the target terminal to obtain instruction information on whether to change the validity period of the target terminal, so as to determine whether to change the validity period of the target terminal according to the target terminal's instruction.
  • the process in which the UDM network element instructs the AMF network element to request from the target terminal to obtain the indication information on whether to change the validity period of the target terminal is similar to the process in which the UDM network element instructs the AMF network element to obtain the permission indication information from the target terminal, and is not repeated here. detail.
  • the first network element may analyze the user information of the target terminal after obtaining the permission of the target terminal, and provide the analysis result to the second network element, as shown in FIG. 2a; in another In some embodiments, the first network element may first analyze the user information of the target terminal and obtain the analysis result, then obtain the permission of the target terminal, and after obtaining the permission, send the analysis result to the second network element, Specifically, it can be described in Figure 2b.
  • FIG. 2a it is a schematic flowchart of a method for feeding back a user information analysis result provided in an embodiment of the present application. As shown in the figure, the process may include:
  • the second network element sends a first user information analysis request to the first network element.
  • the first user information analysis request carries the indication information of the target terminal.
  • the first user information analysis request is used to request to analyze the user information of the target terminal.
  • the first network element obtains a license allowing to analyze the user information of the target terminal.
  • S203 The first network element analyzes the user information of the target terminal to obtain an analysis result.
  • each step of the process shown in FIG. 2 a is basically the same as the relevant steps in FIG. 1 .
  • the target terminal After the first network element receives the user information analysis request from the second network element, and obtains the permission to analyze the user information of the target terminal, the target terminal The user information is analyzed, and the analysis result is sent to the second network element, so that user privacy can be protected and user information security can be improved.
  • a schematic flowchart of a method for feeding back a user information analysis result provided by an embodiment of the present application may include:
  • the second network element sends a first user information analysis request to the first network element.
  • the first user information analysis request carries the indication information of the target terminal.
  • the first user information analysis request is used to request to analyze the user information of the target terminal.
  • the first network element analyzes the user information of the target terminal to obtain an analysis result.
  • the first network element obtains a license allowing to analyze the user information of the target terminal.
  • each step of the flow shown in FIG. 2 b is basically the same as the relevant steps in FIG. 1 .
  • the first network element after receiving the user information analysis request from the second network element, the first network element first analyzes the user information of the target terminal, and then obtains the user information that allows the target terminal to be analyzed. If the permission of the target terminal is obtained, the analysis result is sent to the second network element, thereby protecting user privacy and improving user information security.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
  • FIG. 3 it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
  • Step 1 The NF network element sends a first user information analysis request to the NWDAF network element.
  • the NF network element may use the Nnwdaf_AnalyticsInfo service or the Nnwdaf_AnalyticsSubscription service to send the first user information analysis request to the NWDAF network element to analyze the user information of the target UE or a group of target UEs.
  • the first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message or a Nnwdaf_AnalyticsSubscription_Subscribe message.
  • the NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry indication information of the target UE, and the indication information of the target UE may be a UE ID (UE ID) or a group ID (group ID) of a UE group.
  • Step 2 After receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, which is used to request the query target UE whether the network allows the network to analyze the user information of the target UE, or is used to request query Subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query request carries the indication information of the target UE.
  • Step 3a After receiving the first query request, the UDM network element sends a first permission indication acquisition request to the AMF network element, which carries the indication information of the target UE, and the first query request is used to request to query whether the target UE allows the network to perform this request.
  • the user information of the target UE is analyzed.
  • the UDM network element may first query the subscription information of the target UE locally (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE). , then the first query response can be returned to the NWDAF network element according to the subscription information (step 4) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 3a to 3f do not need to be performed. If the UDM network element does not query the above subscription information, step 3a to step 3f are performed.
  • Step 3b After receiving the first permission indication acquisition request, the AMF network element sends a third permission indication acquisition request to the RAN, which carries the indication information of the target UE.
  • the third permission indication acquisition request is used to instruct the RAN to request the target UE to report a policy of whether to allow the network to analyze the user information of the target UE.
  • the third permission indication acquisition request may be sent through the N2 interface, that is, the message may be an N2 interface message.
  • Step 3c After the RAN receives the third permission indication acquisition request, it sends an RRC reconfiguration message to the target UE, which carries a policy acquisition request, which is used to request whether the target UE allows the network to analyze the user information of the target UE. .
  • the RAN may send the policy acquisition request to the target UE in a unicast manner, or may send the policy acquisition request to a group of target UEs in a broadcast manner or a multicast manner.
  • Step 3d The target UE sends policy information of the target UE (ie, permission indication information of the target UE) to the RAN to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • policy information of the target UE ie, permission indication information of the target UE
  • the license indication information sent by the target UE may carry license validity period information, which is used to indicate the validity period for which the target UE allows the network to analyze the user information of the target UE.
  • Step 3e The RAN returns the permission indication information of the target UE to the AMF network element.
  • Step 3f The AMF network element returns the permission indication information of the target UE to the UDM network element.
  • Step 4 After receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze user information of the target UE.
  • the UDM network element queries the subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information can also be carried in the first query.
  • the response is sent to the NWDAF network element.
  • the NWDAF network element may send the first user information analysis response to the NF network element to notify The NF network element refuses to analyze the user information of the target UE, and the subsequent steps 5 to 11 are not executed.
  • Step 5 The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the first query response, and then obtains the user information of the target UE.
  • the NWDAF network element may acquire the user information of the target UE from at least one of the AMF network element and the AF network element.
  • the implementation process of the NWDAF network element acquiring the user information of the target UE from the AMF network element may include: the NWDAF network element sends a subscription request (such as Namf_EventExposure_Subscribe) to the AMF network element to request to subscribe to the user information of the target UE; the AMF network element A notification message (eg Namf_EventExposure_Notify) may be sent to the NWDAF network element according to the subscription request, which carries the user information of the target UE.
  • a subscription request such as Namf_EventExposure_Subscribe
  • a notification message eg Namf_EventExposure_Notify
  • the user information obtained by the NWDAF network element from the AMF is information related to the mobility of the UE, for example, it may include: the identity of the user, the location of the user, the tracking area (TA) or cell entered by the UE, when the AMF network element The timestamp of the UE's entry to the location, the type of location code, and the frequency of mobile registration updates are detected.
  • the implementation process of the NWDAF network element acquiring the user information of the target UE from the AF network element may include: the NWDAF network element sends a subscription request (such as Naf_EventExposure_Subscribe) to the AF network element to request to subscribe to the user information of the target UE; the AF network element A notification message (such as Naf_EventExposure_Notify) may be sent to the NWDAF network element according to the subscription request, which carries the user information of the target UE.
  • a subscription request such as Naf_EventExposure_Subscribe
  • a notification message such as Naf_EventExposure_Notify
  • the NWDAF network element may also acquire user information of the target UE from the SMF network element.
  • the user information obtained by the NWDAF network element from the AF network element or the SMF network element is information related to UE communication, and may include, for example, the user's identity, group ID, network slice information, and the establishment of a packet data unit (packet data unit, PDU) session data network name, application ID, expected user behavior parameters, uplink and downlink data rates, traffic, etc.
  • packet data unit packet data unit, PDU
  • Step 6 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • the NF network element requests to analyze the mobility of the target UE
  • the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE
  • the result obtained by analyzing the user information includes the mobility of the target UE.
  • Step 7 The NWDAF network element sends a first user information analysis response to the NF network element, which carries the analysis result for the target UE.
  • the above process may further include the following steps:
  • Step 8 The NWDAF network element obtains the updated user information of the target UE.
  • the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element
  • the AMF network element and/or the AF network element subscribe to the NWDAF network element.
  • the network element sends updated user information.
  • the AMF network element can send the updated user information of the target UE to the NWDAF network element through a notification message (such as Namf_EventExposure_Notify); for another example, the AF network element can send the updated user information of the target UE to the NWDAF through a notification message (such as Naf_EventExposure_Notify) network element.
  • Step 9 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target. The validity period during which the UE allows the network to analyze the user information of the target UE.
  • the NWDAF network element After the NWDAF network element obtains the updated user information of the target UE, if it is determined that the validity period expires or expires according to the validity period information of the target UE, it sends a second query request to the UDM network element, and the second query request is used for Request to query whether to change the validity period of the target UE that allows the network to analyze the user information of the target UE.
  • the UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request from the target UE to obtain indication information on whether to change the validity period of the target terminal.
  • step 9 is an optional step.
  • the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to The NF network element is notified to refuse to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
  • Step 10 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period.
  • the updated user information of the target UE is analyzed; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and the subsequent step 11 is not performed, and the AF network element can be further notified to refuse to analyze the user information of the target UE, and The reason for the rejection may be further indicated that the license validity period of the target UE has expired.
  • Step 11 The NWDAF network element sends the analysis result to the NF network element.
  • the NWDAF network element may subscribe to the NWDAF network element for multiple times.
  • the element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. The validity period of the target UE has expired or expired, then the above step 9 is performed or the analysis of the updated user information of the target UE is rejected.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
  • FIG. 4 it is a schematic diagram of signaling interaction of another method for feeding back a user information analysis result provided by an embodiment of the present application.
  • the process shown in FIG. 4 is basically the same as the process shown in FIG. 3, except that: in FIG. 4, steps 3b to 3c in FIG. 3 are replaced by step 3b; in FIG. 4, steps in FIG. 3 are replaced by step 3d 3d to step 3e.
  • the AMF network element sends a second permission indication acquisition request, which carries the indication information of the target UE (such as UE ID or UE group ID), which is a NAS message and can be transparently transmitted by the RAN to target UE.
  • the target UE sends a second permission indication acquisition response to the AMF network element, which can carry the permission indication information of the target UE, which is a NAS message and can be transparently transmitted by the RAN to the AMF network element.
  • the UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request from the target UE to obtain indication information on whether to change the validity period of the target terminal.
  • the process in which the UDM network element instructs the AMF network element to request from the target terminal to obtain the indication information on whether to change the validity period of the target terminal is similar to the process in which the UDM network element instructs the AMF network element to obtain the permission indication information from the target terminal in FIG. 4 . No further details.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
  • FIG. 5 it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
  • Step 1 The AF network element sends a second user information analysis request to the NEF network element, which is used to request to analyze the user information of the target UE.
  • the AF network element may use the Nnef_AnalyticsExpose service to send the second user information analysis request to the NEF network element, so as to analyze the user information of the target UE or a group of target UEs.
  • the second user information analysis request may be an Nnef_AnalyticsExpose_Fetch message.
  • the AF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, or may request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • Step 2 After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element.
  • the NF network element may use the Nnwdaf_AnalyticsInfo service to send the first user information analysis request to the NWDAF network element, so as to analyze the user information of the target UE or a group of target UEs.
  • the first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message.
  • the NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • Step 3 After receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, which is used for requesting to query whether the target UE allows the network to analyze the user information of the target UE, or for requesting query Subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query request carries the indication information of the target UE.
  • Step 4a After receiving the first query request, the UDM network element sends a fourth permission indication acquisition request to the NEF network element, which carries the indication information of the target UE and also carries the identifier of the AF.
  • the UDM network element may first query the subscription information of the target UE locally (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE). , then the first query response can be returned to the NWDAF network element according to the subscription information (step 5) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 4a to 4d do not need to be performed. If the UDM network element does not query the above subscription information, step 4a to step 4d are performed.
  • Step 4b After receiving the fourth permission indication acquisition request, the NEF network element forwards the request to the corresponding AF network element.
  • Step 4c The AF network element provides the user of the target UE with permitted options (such as "allow to analyze user information” and “not allow user information to be analyzed") through the user interface to obtain the user's choice.
  • Step 4d After acquiring the user's selection of the option, the AF network element sends a fourth permission indication acquisition response to the NEF network element according to the user's selection, which carries the permission indication information of the target UE obtained according to the user's selection (this The indication information is used to indicate whether the target UE allows the network to analyze the user information of the target UE).
  • the license indication information of the target UE may carry license validity period information, which is used to indicate the validity period for which the target UE allows the network to analyze the user information of the target UE.
  • Step 4e The NEF network element forwards the fourth permission indication acquisition response to the UDM network element.
  • Step 5 After receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze user information of the target UE.
  • the UDM network element queries the subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information can also be carried in the first query.
  • the response is sent to the NWDAF network element.
  • step 5 if the first query response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a message to the NEF network element to indicate that the user information is rejected for the target UE.
  • the analyzed first user information analyzes the response, and the NEF network element notifies the AF network element to refuse to analyze the user information of the target UE, and the subsequent steps 6 to 14 are not performed.
  • Step 6 The NWDAF network element determines, according to the first query response, that the target UE allows the network to collect and analyze the user information of the target UE, and then acquires the user information of the target UE.
  • this step is the same as the relevant step in the flowchart of FIG. 3 .
  • Step 7 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • the NF network element requests to analyze the mobility of the target UE
  • the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE
  • the result obtained by analyzing the user information includes the mobility of the target UE.
  • Step 8 The NWDAF network element sends a first user information analysis response to the NEF network element, which carries the analysis result for the target UE.
  • Step 9 The NEF network element sends a second user information analysis response to the AF network element, which carries the analysis result for the target UE.
  • the above process may further include the following steps:
  • Step 10 The NWDAF network element acquires the updated user information of the target UE.
  • this step is the same as the relevant step in the flowchart of FIG. 3 .
  • Step 11 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target The validity period during which the UE allows the network to analyze the user information of the target UE.
  • the NWDAF network element After the NWDAF network element obtains the updated user information of the target UE, if it is determined that the validity period expires or expires according to the validity period information of the target UE, it sends a second query request to the UDM network element, and the second query request is used for Request to query whether to change the validity period of the target UE that allows the network to analyze the user information of the target UE.
  • the UDM network element can directly determine whether to change the validity period of the target UE, or can instruct the NEF network element to trigger the AF network element to negotiate with the target UE to obtain indication information on whether to change the validity period of the target terminal.
  • the UDM network element instructs the NEF network element to trigger the process of the AF network element to negotiate with the target UE, which is basically the same as the process of step 4a to step 4e in this flow.
  • step 11 is an optional step.
  • the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NEF network element, and The AF network element is notified by the NEF network element to refuse to analyze the user information of the target UE, and the subsequent steps 12 to 14 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
  • Step 12 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • the NWDAF network element After the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period. Analyze the updated user information of the target UE; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and does not perform steps 12 to 14, and can further notify the AF network element through the NEF network element to reject the target UE. The user information of the target UE is analyzed, and the reason for rejection can be further indicated that the license validity period of the target UE has expired.
  • Step 13 The NWDAF network element sends the analysis result to the NEF network element.
  • Step 14 The NEF network element sends the analysis result to the AF network element.
  • the NWDAF network element may subscribe to the NWDAF network element for multiple times.
  • the element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. The validity period has expired or expired, then perform the above step 11.
  • steps 4a to 4e in the process shown in FIG. 4 are only an example, and the UDM network element may also obtain the license indication information of the target UE in other ways, which is not limited in this embodiment of the present application.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
  • FIG. 6 it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
  • Step 1 The NF network element sends a first user information analysis request to the NWDAF network element.
  • the NF network element may use the Nnwdaf_AnalyticsInfo service or the Nnwdaf_AnalyticsSubscription service to send the first user information analysis request to the NWDAF network element to analyze the user information of the target UE or a group of target UEs.
  • the first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message or a Nnwdaf_AnalyticsSubscription_Subscribe message.
  • the NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • the request message also carries the permission indication information of the target UE, and the permission indication information may be a token of the target UE, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the permission indication information (eg token) can be obtained through negotiation with the target UE.
  • Step 2 After receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, which carries the permission indication information (such as token) of the target UE, and the verification request is used to request the permission indication information for the target UE. authenticating.
  • the permission indication information such as token
  • Step 3 After receiving the verification request, the UDM network element verifies the legality of the permission indication information (eg token) of the target UE, and obtains a verification result, which is used to indicate whether the permission indication information of the target UE is verified.
  • the permission indication information eg token
  • the UDM network element can compare the received permission indication information (such as token) of the target UE with the permission indication information of the target UE saved by the UDM network element. If they are consistent, the verification passes, otherwise the verification fails. By verifying the permission indication information (eg token) of the target UE, the security can be improved.
  • the permission indication information such as token
  • Step 4 The UDM network element returns a verification response to the NWDAF network element, where the verification response is used to indicate whether the permission indication information of the target UE is verified, or whether the target UE allows the network to analyze the user information of the target UE.
  • the verification response may carry the verification result; in other embodiments, the NWDAF network element may also determine whether the target UE allows the network to collect or analyze the user information of the target UE according to the verification result. , and notify the NWDAF network element of the determined result through the verification response.
  • step 4 if the verification response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a message to the NF network element to indicate that the user information of the target UE is refused to be analyzed.
  • the first user information analysis response is to notify the NF network element to refuse to analyze the user information of the target UE, and the subsequent steps 5 to 11 are not executed.
  • Step 5 The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then obtains the user information of the target UE.
  • Step 6 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • the NF network element requests to analyze the mobility of the target UE
  • the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE
  • the result obtained by analyzing the user information includes the mobility of the target UE.
  • Step 7 The NWDAF network element sends a first user information analysis response to the NF network element, which carries the analysis result for the target UE.
  • the above process may further include the following steps:
  • Step 8 The NWDAF network element obtains the updated user information of the target UE.
  • the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element
  • the AMF network element and/or the AF network element subscribe to the NWDAF network element.
  • the network element sends updated user information.
  • the AMF network element can send the updated user information of the target UE to the NWDAF network element through a notification message (such as Namf_EventExposure_Notify); for another example, the AF network element can send the updated user information of the target UE to the NWDAF through a notification message (such as Naf_EventExposure_Notify) network element.
  • Step 9 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target. The validity period during which the UE allows the network to analyze the user information of the target UE.
  • step 9 is an optional step.
  • the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to The NF network element is notified to refuse to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
  • Step 10 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period.
  • the updated user information of the target UE is analyzed; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and the subsequent step 11 is not performed, and the AF network element can be further notified to refuse to analyze the user information of the target UE, and The reason for the rejection may be further indicated that the license validity period of the target UE has expired.
  • Step 11 The NWDAF network element sends the analysis result to the NF network element.
  • the NWDAF network element may subscribe to the NWDAF network element for multiple times.
  • the element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. has expired or expired, go to step 9 above.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
  • FIG. 7 it is a schematic diagram of signaling interaction of another method for feeding back a user information analysis result provided by an embodiment of the present application. As shown in the figure, the process may include:
  • Step 0 The AF network element and the target UE negotiate the permission indication information of the target UE through the application layer, that is, whether the target UE allows the network to analyze the user information of the target UE.
  • the AF network element and the target UE can use the Network Key Exchange Protocol (IKE) to negotiate whether the target UE allows the network to analyze the user information of the target UE, and the AF network element can generate a command for the target UE according to the negotiation result.
  • the token (token), as the shared information between the target UE and the AF network element, is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the information may be stored in the UDM network element as subscription information of the target UE.
  • Step 1 The AF network element sends a second user information analysis request to the NEF network element for requesting to analyze the user information of the target UE, and the request carries the permission indication information (eg token) of the target UE.
  • the permission indication information eg token
  • the AF network element may use the Nnef_AnalyticsExpose service to send the second user information analysis request to the NEF network element, so as to analyze the user information of the target UE or a group of target UEs.
  • the second user information analysis request may be an Nnef_AnalyticsExpose_Fetch message.
  • the AF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, or may request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • Step 2 After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element.
  • Step 3 After receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, which carries the permission indication information (such as token) of the target UE, and the verification request is used to request the permission indication information for the target UE. authenticating.
  • the permission indication information such as token
  • Step 4 After receiving the verification request, the UDM network element verifies the legality of the permission indication information (eg token) of the target UE, and obtains a verification result, which is used to indicate whether the permission indication information of the target UE is verified.
  • the permission indication information eg token
  • Step 5 The UDM network element returns a verification response to the NWDAF network element, where the verification response is used to indicate whether the permission indication information of the target UE is verified, or whether the target UE allows the network to analyze the user information of the target UE.
  • Step 6 The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then obtains the user information of the target UE.
  • Step 7 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • Step 8 The NWDAF network element sends a first user information analysis response to the NEF network element, which carries the analysis result for the target UE.
  • Step 9 The NEF network element sends the analysis result to the AF network element.
  • the above process may further include the following steps:
  • Step 10 The NWDAF network element acquires the updated user information of the target UE.
  • Step 11 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target The validity period during which the UE allows the network to analyze the user information of the target UE.
  • Step 12 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • Step 13 The NWDAF network element sends the analysis result to the NF network element.
  • Step 14 The NEF network element sends the analysis result to the AF network element.
  • an embodiment of the present application further provides a network device, which can implement the function of the first network element (eg, the NWDAF network element) in the foregoing embodiments.
  • the first network element eg, the NWDAF network element
  • the network device may include: a receiving unit 801 , a processing unit 802 , and a sending unit 803 .
  • a receiving unit 801 configured to receive a first user information analysis request from a second network element
  • a processing unit 802 configured to obtain a license allowing to analyze the user information of the target terminal
  • the sending unit 803 is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
  • the processing unit 802 is specifically configured to: after obtaining the permission, analyze the user information of the target terminal to obtain an analysis result, and send the analysis result to the second network element; or, obtain the analysis result.
  • user information of the target terminal analyze the user information of the target terminal to obtain an analysis result, and after obtaining the permission, send the analysis result to the second network element.
  • the processing unit 802 may be specifically configured to: send a first query request to the UDM network element; receive a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed.
  • the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the first user information analysis request carries the permission indication information of the target terminal; the processing unit 802 is specifically configured to: send a verification request to the UDM network element, where the verification request carries the permission indication information; The verification response sent by the UDM network element, where the verification response carries the verification result.
  • the verification result is used to indicate whether the permission indication information passes the verification, or is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal, wherein the permission indication information is verified.
  • the network is allowed to analyze the user information of the target terminal.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the processing unit 802 is further configured to: after acquiring the updated user information of the target terminal, if it is determined that the validity period expires according to the validity period information, send a second query request to the UDM network element, and the first query request is sent to the UDM network element.
  • the second query request is used to query whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal; receive the second query response sent by the UDM network element; if the second query response indicates a change If the target terminal allows the network to analyze the user information of the target terminal within the validity period, the updated user information is analyzed, and the analysis result is sent to the second network element.
  • the above-mentioned network device provided in the embodiment of the present application can implement all the method steps implemented by the first network element in the above-mentioned method embodiment, and can achieve the same technical effect, and this embodiment will not be described here.
  • the same parts and beneficial effects as in the method embodiment will be described in detail.
  • an embodiment of the present application further provides a network device, and the network device can implement the function of the second network element (eg, a UDM network element) in the foregoing embodiments.
  • the network device can implement the function of the second network element (eg, a UDM network element) in the foregoing embodiments.
  • the network device may include: a receiving unit 901 , a processing unit 902 , and a sending unit 903 .
  • a receiving unit 901 configured to receive a first request from an NWDAF network element, where the first request is used to request to obtain whether the user information of the target terminal is allowed to be analyzed;
  • the sending unit 903 is configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
  • the first request is a first query request
  • the first query request is used to request to query whether the target terminal allows the network to analyze the user information of the target terminal, or to query whether the target terminal has user information.
  • Subscription information that allows the network to analyze the user information of the target terminal.
  • the processing unit 902 is configured to: obtain, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal; and determine whether the target terminal allows the network to analyze the user information of the target terminal according to the subscription information; Analyze the user information of the target terminal; the sending unit 903 is specifically configured to: send a first query response to the NWDAF network element, where the first query response is used to indicate whether the target terminal allows the network to respond to the target terminal analysis of user information.
  • the processing unit 902 is further configured to: if the subscription information is not acquired, the instruction sending unit 903 sends a first permission instruction acquisition request to the AMF network element, so that the AMF network element acquires the target terminal from the AMF network element. License indication information, where the license indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal; the receiving unit 901 is further configured to: receive the first license instruction acquisition sent by the AMF network element In response, the first permission indication acquisition response carries the permission indication information of the target terminal.
  • the first query request is sent by the NWDAF network element after receiving the first user information analysis request from the NEF network element, and the first user information analysis request is received by the NEF network element from the Sent by the second user information analysis request sent by the AF network element.
  • the sending unit 903 is further configured to: send a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element Obtain permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal; the receiving unit 901 is further configured to: receive the The fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
  • the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the first request is a verification request
  • the verification request carries the permission indication information of the target terminal.
  • the processing unit 902 is further configured to: verify the permission indication information of the target terminal to obtain a verification result, where the verification result is used to indicate whether the permission indication information passes the verification, or is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed, wherein the verification of the permission indication information indicates that the target terminal allows the network to analyze the user information of the target terminal; the sending unit 903 is further configured to: send to the NWDAF network element A verification response is sent, where the verification response carries the verification result.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the receiving unit 901 is further configured to: receive a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the updated user information of the target terminal. Sent after the validity period of the target terminal expires, the second query request is used to request to query whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal; the sending unit 903 is further used for: Send a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal.
  • the above-mentioned network device provided in the embodiment of the present application can implement all the method steps implemented by the second network element in the above-mentioned method embodiment, and can achieve the same technical effect, and this embodiment will not be described here.
  • the same parts and beneficial effects as in the method embodiment will be described in detail.
  • an embodiment of the present application also provides a communication device.
  • the communication apparatus may implement the function of the first network element (eg, the NWDAF network element) in the foregoing embodiment.
  • the communication device may include: a processor 1001 , a memory 1002 , a communication interface 1003 and a bus interface 1004 .
  • the processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations.
  • the communication interface 1003 is used to receive and transmit data under the control of the processor 1001 .
  • the bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 1001 and various circuits of memory represented by memory 1002 linked together.
  • the bus architecture may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be described further herein.
  • the bus interface provides the interface.
  • the processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations.
  • the processes disclosed in the embodiments of the present application may be applied to the processor 1001 or implemented by the processor 1001 .
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1001 or an instruction in the form of software.
  • the processor 1001 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory 1002, and the processor 1001 reads the information in the memory 1002, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1001 is configured to read the computer instructions in the memory 1002 and execute the function implemented by the first network element (eg, the NWDAF network element) in the embodiment of the present application.
  • the first network element eg, the NWDAF network element
  • the above-mentioned communication device provided by the embodiment of the present invention can implement all the method steps implemented by the first network element (such as the NWDAF network element) in the above-mentioned method embodiment, and can achieve the same technical effect.
  • the same parts and beneficial effects in this embodiment as those in the method embodiment will not be described in detail here.
  • an embodiment of the present application also provides a communication device.
  • the communication device may implement the function of the second network element (eg, a UDM network element) in the foregoing embodiment.
  • the communication device may include: a processor 1101 , a memory 1102 , a communication interface 1103 and a bus interface 1104 .
  • the processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations.
  • the communication interface 1103 is used to receive and transmit data under the control of the processor 1101 .
  • the bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 1101 and various circuits of memory represented by memory 1102 linked together.
  • the bus architecture may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be described further herein.
  • the bus interface provides the interface.
  • the processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations.
  • the processes disclosed in the embodiments of the present application may be applied to the processor 1101 or implemented by the processor 1101 .
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1101 or an instruction in the form of software.
  • the processor 1101 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory 1102, and the processor 1101 reads the information in the memory 1102, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1101 is configured to read the computer instructions in the memory 1102 and execute the function implemented by the second network element (eg, the UDM network element) in the embodiment of the present application.
  • the second network element eg, the UDM network element
  • the above-mentioned communication device provided in the embodiment of the present invention can implement all the method steps implemented by the second network element (such as a UDM network element) in the above-mentioned method embodiment, and can achieve the same technical effect.
  • the second network element such as a UDM network element
  • Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the first network element (eg, NWDAF network element) in the foregoing embodiment. method performed.
  • the first network element eg, NWDAF network element
  • Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the second network element (such as a UDM network element) in the foregoing embodiment. method performed.
  • the second network element such as a UDM network element
  • the present application further provides a computer program product, which, when invoked and executed by a computer, can complete the method embodiments and the methods involved in any possible designs of the above method embodiments.
  • the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present application discloses a user information analysis result feedback method and device thereof. In the present application, a first network element receives a first user information analysis request from a second network element; the first network element obtains permission to allow analysis of user information of the target terminal; and after obtaining the permission, the first network element sends an analysis result for the user information of the target terminal to the second network element. By using the present application, the security of the user information can be improved.

Description

一种用户信息分析结果反馈方法及其装置A user information analysis result feedback method and device
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请要求在2021年01月08日提交中国专利局、申请号为202110026412.2、申请名称为“一种用户信息分析结果反馈方法及其装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number of 202110026412.2 and the application title of "A user information analysis result feedback method and device" filed with the China Patent Office on January 8, 2021, the entire contents of which are incorporated by reference in this application.
技术领域technical field
本申请涉及无线通信技术领域,尤其涉及一种用户信息分析结果反馈方法及其装置。The present application relates to the field of wireless communication technologies, and in particular, to a method and device for feeding back a user information analysis result.
背景技术Background technique
5G网络定义了一种智能化的网络数据分析功能(Network Data Analytics Function,NWDAF)网元,该网元可以收集网络功能和用户设备(User Equipment,UE,也称终端)的信息并进行分析,并将分析结果提供给网络功能(Network Function,NF)网元。NWDAF网元可与不同网元出于不同目的进行交互:The 5G network defines an intelligent network data analysis function (Network Data Analytics Function, NWDAF) network element, which can collect and analyze network function and user equipment (User Equipment, UE, also known as terminal) information, And provide the analysis results to the network function (Network Function, NF) network element. NWDAF network elements can interact with different network elements for different purposes:
(1)NWDAF网元基于对由接入及移动性管理(Access and Mobility Management Function,AMF)网元、会话管理功能(Session Management Function,SMF)网元、策略控制功能(Policy Control Function,PCF)网元、统一数据管理(Unified Data Manager,UDM)网元、应用功能(Application Function,AF)网元和操作维护管理(Operation Administration and Maintenance,OAM)网元提供的事件的签约进行数据收集,其中,NWDAF网元可直接与AF网元交互,或通过网络开放功能(Network Exposure Function,NEF)网元与AF网元交互;(1) NWDAF network element is based on the access and mobility management (Access and Mobility Management Function, AMF) network element, session management function (Session Management Function, SMF) network element, Policy Control Function (Policy Control Function, PCF) NEs, Unified Data Manager (UDM) NEs, Application Function (AF) NEs, and Operation Administration and Maintenance (OAM) NEs provide event subscriptions for data collection. , NWDAF network elements can directly interact with AF network elements, or interact with AF network elements through Network Exposure Function (NEF) network elements;
(2)NWDAF网元从数据存储库中检索信息,例如,通过UDM网元从UDR(Unified Data Repository,统一数据仓库功能)网元获得与订户相关的 信息;(2) NWDAF network element retrieves information from data repository, for example, obtains subscriber-related information from UDR (Unified Data Repository, unified data warehouse function) network element through UDM network element;
(3)NWDAF网元检索有关NF网元的信息,例如,从网络存储功能(NF Repository Function,NRF)网元获取与NF网元相关的信息;(3) The NWDAF network element retrieves information about the NF network element, for example, obtains the information related to the NF network element from the network storage function (NF Repository Function, NRF) network element;
(4)NWDAF网元按需向消费者提供分析。NWDAF网元提供了UE相关的分析,包括移动性分析、UE通信的分析、与网络数据分析相关的UE的预期行为参数和异常行为分析。UE通信的分析以及异常行为分析等可以使得网络通过数据分析功能获知到UE和网络的运行状态。而对于UE移动性分析,属于与用户的隐私相关的信息,执行数据分析以提供UE移动性统计或预测。(4) NWDAF network elements provide analysis to consumers on demand. The NWDAF network element provides UE-related analysis, including mobility analysis, UE communication analysis, UE expected behavior parameters and abnormal behavior analysis related to network data analysis. The analysis of UE communication and abnormal behavior analysis can enable the network to know the running status of the UE and the network through the data analysis function. Whereas for UE mobility analysis, which is information related to the user's privacy, data analysis is performed to provide UE mobility statistics or predictions.
5G网络提供的UE移动性的信息涉及了UE的隐私,这些信息需要用户获知并给予许可,否则可能会导致用户隐私的泄露的问题,尤其是如果攻击者获取了这些信息,可能会对UE进行跟踪,而目前缺少这种获得UE许可的方法。The mobility information of the UE provided by the 5G network involves the privacy of the UE. This information requires the user to know and give permission. Otherwise, it may lead to the leakage of the user's privacy. tracking, and this method of obtaining UE permission is currently lacking.
发明内容SUMMARY OF THE INVENTION
本申请实施例提一种用户信息分析结果反馈方法及其装置,用以提高用户信息安全。The embodiments of the present application provide a user information analysis result feedback method and device thereof, which are used to improve user information security.
第一方面,提供一种用户信息分析结果反馈方法,包括:A first aspect provides a user information analysis result feedback method, including:
第一网元接收来自于第二网元的第一用户信息分析请求;The first network element receives the first user information analysis request from the second network element;
所述第一网元获取允许对所述目标终端的用户信息进行分析的许可;obtaining, by the first network element, a license allowing to analyze the user information of the target terminal;
所述第一网元获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元。After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
可选的,所述第一网元获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元,包括:Optionally, after obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element, including:
所述第一网元获得所述许可后,对所述目标终端的用户信息进行分析得到分析结果,并将所述分析结果发送给所述第二网元;或者,所述第一网元获取所述目标终端的用户信息,对所述目标终端的用户信息进行分析得到分析结果,并在获得所述许可后,将所述分析结果发送给所述第二网元。After the first network element obtains the permission, it analyzes the user information of the target terminal to obtain an analysis result, and sends the analysis result to the second network element; or, the first network element obtains the analysis result. For the user information of the target terminal, analyze the user information of the target terminal to obtain an analysis result, and after obtaining the permission, send the analysis result to the second network element.
可选的,所述第一网元为NWDAF网元;所述第一网元获取允许对所述目标终端的用户信息进行分析的许可,包括:Optionally, the first network element is an NWDAF network element; the first network element obtains a license that allows analyzing the user information of the target terminal, including:
所述NWDAF网元向UDM网元发送第一查询请求;The NWDAF network element sends a first query request to the UDM network element;
所述NWDAF网元接收所述UDM网元发送的第一查询响应,所述第一查询响应用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。The NWDAF network element receives a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
进一步的,所述第一查询响应携带许可指示信息,所述许可指示信息是所述UDM网元指示AMF网元通过RAN从所述目标终端获取的;其中,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。Further, the first query response carries permission indication information, and the permission indication information is obtained by the UDM network element instructing the AMF network element to obtain from the target terminal through the RAN; wherein the permission indication information is used to indicate the Whether the target terminal allows the network to analyze the user information of the target terminal.
进一步的,所述第二网元为NF网元。Further, the second network element is an NF network element.
可选的,所述第一查询响应携带许可指示信息,所述许可指示信息是所述UDM网元指示所述第二网元通过AF网元从所述目标终端获得的,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。Optionally, the first query response carries permission indication information, the permission indication information is obtained by the UDM network element instructing the second network element to obtain from the target terminal through the AF network element, and the permission indication information It is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
进一步的,所述第二网元为NEF网元,所述第一用户信息分析请求是所述NEF网元根据来自于所述AF网元的第二用户信息分析请求发送的。Further, the second network element is an NEF network element, and the first user information analysis request is sent by the NEF network element according to the second user information analysis request from the AF network element.
可选的,所述第一查询响应携带许可指示信息,所述许可指示信息包括有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述第一网元为NWDAF网元,所述第一用户信息分析请求携带所述目标终端的许可指示信息;所述第一网元获取允许对所述目标终端的用户信息进行分析的许可,包括:所述NWDAF网元向UDM网元发送验证请求,所述验证请求携带所述许可指示信息;所述NWDAF网元接收所述UDM网元发送的验证响应,所述验证响应携带验证结果。Optionally, the first network element is an NWDAF network element, and the first user information analysis request carries the permission indication information of the target terminal; the first network element obtains permission to perform user information on the target terminal. The analyzed license includes: the NWDAF network element sends a verification request to the UDM network element, and the verification request carries the license indication information; the NWDAF network element receives the verification response sent by the UDM network element, and the verification response Carry the verification result.
进一步的,所述许可指示信是AF网元发送给所述第二网元的,所述许可指示信息是所述AF网元和所述目标终端协商得到的。Further, the permission indication letter is sent by the AF network element to the second network element, and the permission indication information is obtained through negotiation between the AF network element and the target terminal.
可选的,所述第二网元为NF网元;或者,所述第二网元为NEF网元,所述第一用户信息分析请求是所述NEF网元根据来自于所述AF网元的第二用户信息分析请求发送的。Optionally, the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is the NEF network element according to the request from the AF network element. The second user information analysis request is sent.
可选的,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述方法还包括:所述NWDAF网元获取到所述目标终端的更新的用户信息后,若根据所述有效期信息判断有效期过期,则向所述UDM网元发送第二查询请求;Optionally, the method further includes: after the NWDAF network element obtains the updated user information of the target terminal, if it is determined according to the validity period information that the validity period has expired, sending a second query request to the UDM network element. ;
所述NWDAF网元接收所述UDM网元发送的第二查询响应;The NWDAF network element receives the second query response sent by the UDM network element;
若所述第二查询响应指示更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期,则所述NWDAF网元对所述更新的用户信息进行分析,并将分析结果发送给所述第二网元。If the second query response indicates to change the validity period for which the target terminal allows the network to analyze the user information of the target terminal, the NWDAF network element analyzes the updated user information, and sends the analysis result to the second network element.
可选的,所述方法还包括:若所述第一网元未获得所述目标终端允许网络对所述目标终端的用户进行分析的许可,则向所述第二网元发送第一用户信息分析响应,所述第一用户信息分析响应用于指示拒绝所述第一用户信息分析请求。Optionally, the method further includes: if the first network element has not obtained the permission of the target terminal to allow the network to analyze the user of the target terminal, sending the first user information to the second network element An analysis response, where the first user information analysis response is used to indicate rejection of the first user information analysis request.
可选的,所述用户信息包括移动性相关信息和/或通信相关信息。Optionally, the user information includes mobility-related information and/or communication-related information.
可选的,所述对所述目标终端的用户信息进行分析得到分析结果,包括以下至少一项:Optionally, the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
对所述目标终端的用户信息进行分析,得到所述目标终端的移动性统计信息和/或移动性预测信息;Analyzing the user information of the target terminal to obtain mobility statistics and/or mobility prediction information of the target terminal;
对所述目标终端的通信进行分析,得到所述目标终端的通信分析结果;Analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
对所述目标终端的用户信息进行分析,得到所述目标终端与网络数据相关的预期行为和/或异常行为。The user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
第二方面,提供一种用户信息分析结果反馈方法,包括:In a second aspect, a user information analysis result feedback method is provided, including:
UDM网元接收来自于NWDAF网元的第一请求,所述第一请求用于请求获取目标终端是否允许对所述目标终端的用户信息进行分析;The UDM network element receives a first request from the NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
所述UDM网元向所述NWDAF网元发送第一响应,所述第一响应用于指示是否允许对所述目标终端的用户信息进行分析。The UDM network element sends a first response to the NWDAF network element, where the first response is used to indicate whether the user information of the target terminal is allowed to be analyzed.
可选的,所述第一请求为第一查询请求,所述第一查询请求用于请求查询所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;Optionally, the first request is a first query request, and the first query request is used for requesting to query the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
所述UDM网元向所述NWDAF网元发送第一响应,包括:The UDM network element sends a first response to the NWDAF network element, including:
所述UDM网元根据所述第一查询请求,获取所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;The UDM network element obtains, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
所述UDM网元向所述NWDAF网元发送第一查询响应,所述第一查询响应携带所述目标终端是否允许网络对所述目标终端的用户信息进行分析的许可指示信息。The UDM network element sends a first query response to the NWDAF network element, where the first query response carries permission indication information of whether the target terminal allows the network to analyze the user information of the target terminal.
进一步的,所述方法还包括:若所述UDM网元未获取到所述签约信息,则向AMF网元发送第一许可指示获取请求,以使得所述AMF网元向所述目标终端获取许可指示信息;所述UDM网元接收所述AMF网元发送的第一许可指示获取响应,所述第一许可指示获取响应携带所述目标终端的许可指示信息。Further, the method further includes: if the UDM network element has not acquired the subscription information, sending a first permission indication acquisition request to the AMF network element, so that the AMF network element acquires a license from the target terminal Indication information; the UDM network element receives a first license indication acquisition response sent by the AMF network element, where the first license indication acquisition response carries the license indication information of the target terminal.
进一步的,所述AMF网元向所述目标终端发送第二许可指示获取请求,接收所述目标终端发送的第二许可指示获取响应,所述第二许可指示获取响应携带所述目标终端的许可指示信息,所述第二许可指示获取请求和所述第二许可指示获取响应为非接入层NAS消息;或者,所述AMF网元向无线接入网RAN发送第三许可指示获取请求,以使得所述RAN从所述目标终端获取许可指示信息。Further, the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, where the second permission indication acquisition response carries the permission of the target terminal. indication information, the second permission indication acquisition request and the second permission indication acquisition response are non-access stratum NAS messages; or, the AMF network element sends a third permission indication acquisition request to the radio access network RAN, to causing the RAN to acquire permission indication information from the target terminal.
进一步的,所述第一许可指示获取请求以及所述第三许可指示获取请求携带所述目标终端的标识,所述RAN根据所述目标终端的标识,向对应的终端发送RRC重配置消息,以使得所述对应的终端向所述RAN发送许可指示信息;或者,所述第一许可指示获取请求以及所述第三许可指示获取请求携带目标终端组的组标识,所述RAN根据所述目标终端组的组标识发送广播消 息或组播消息,以使得对应的终端向所述RAN发送许可指示信息。Further, the first permission indication acquisition request and the third permission indication acquisition request carry the identifier of the target terminal, and the RAN sends an RRC reconfiguration message to the corresponding terminal according to the identifier of the target terminal, to causing the corresponding terminal to send permission indication information to the RAN; or, the first permission indication acquisition request and the third permission indication acquisition request carry the group identifier of the target terminal group, and the RAN determines the target terminal group according to the target terminal group ID. The group identifier of the group sends a broadcast message or a multicast message, so that the corresponding terminal sends permission indication information to the RAN.
可选的,所述第一查询请求是所述NWDAF网元接收到来自于NEF网元的第一用户信息分析请求发送的,所述第一用户信息分析请求是所述NEF网元接收到来自于AF网元发送的第二用户信息分析请求发送的;Optionally, the first query request is sent by the NWDAF network element after receiving the first user information analysis request from the NEF network element, and the first user information analysis request is received by the NEF network element from the Sent by the second user information analysis request sent by the AF network element;
所述方法还包括:The method also includes:
所述UDM网元向所述NEF网元发送第四许可指示获取请求,所述第四许可指示获取请求被所述NEF网元转发给所述AF网元,以使得所述AF网元从所述目标终端获得所述目标终端的许可指示信息,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;The UDM network element sends a fourth permission indication acquisition request to the NEF network element, and the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element can obtain the request from the NEF network element. obtaining, by the target terminal, permission indication information of the target terminal, where the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal;
所述UDM网元接收所述NEF网元发送的第四许可指示获取响应,所述第四许可指示获取响应携带所述目标终端的许可指示信息。The UDM network element receives a fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
可选的,所述第一查询响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the first query response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述第一请求为验证请求,所述验证请求携带所述目标终端的许可指示信息;Optionally, the first request is a verification request, and the verification request carries the permission indication information of the target terminal;
所述方法还包括:The method also includes:
所述UDM网元对所述目标终端的许可指示信息进行验证得到验证结果,所述验证结果用于指示所述许可指示信息是否验证通过,或者用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;The UDM network element verifies the permission indication information of the target terminal to obtain a verification result, and the verification result is used to indicate whether the permission indication information is verified, or to indicate whether the target terminal allows the network to Analyze the user information of the target terminal;
所述UDM网元向所述NWDAF网元发送验证响应,所述验证响应携带所述验证结果。The UDM network element sends a verification response to the NWDAF network element, where the verification response carries the verification result.
进一步的,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Further, the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述方法还包括:Optionally, the method further includes:
所述UDM网元接收所述NWDAF网元发送的第二查询请求,所述第二查询请求是所述NWDAF网元获取到所述目标终端的更新的用户信息并确定所述目标终端的所述有效期过期后发送的;The UDM network element receives a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the target terminal's updated user information. Sent after the validity period has expired;
所述UDM网元向所述NWDAF网元发送第二查询响应,所述第二查询响应用于指示是否更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The UDM network element sends a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述用户信息包括移动性相关信息和/或通信相关信息。Optionally, the user information includes mobility-related information and/or communication-related information.
可选的,所述对所述目标终端的用户信息进行分析得到分析结果,包括以下至少一项:Optionally, the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
对所述目标终端的用户信息进行分析,得到所述目标终端的移动性统计信息和/或移动性预测信息;Analyzing the user information of the target terminal to obtain mobility statistics and/or mobility prediction information of the target terminal;
对所述目标终端的通信进行分析,得到所述目标终端的通信分析结果;Analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
对所述目标终端的用户信息进行分析,得到所述目标终端与网络数据相关的预期行为和/或异常行为。The user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
第三方面,提供一种网络设备,包括:In a third aspect, a network device is provided, including:
接收单元,用于接收来自于第二网元的第一用户信息分析请求;a receiving unit, configured to receive a first user information analysis request from a second network element;
处理单元,用于获取允许对所述目标终端的用户信息进行分析的许可;a processing unit, configured to obtain a license that allows analyzing the user information of the target terminal;
发送单元,用于获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元。The sending unit is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
第四方面,提供一种网络设备,包括:In a fourth aspect, a network device is provided, including:
接收单元,用于接收来自于网络数据分析功能NWDAF网元的第一请求,所述第一请求用于请求获取目标终端是否允许对所述目标终端的用户信息进行分析;a receiving unit, configured to receive a first request from a network data analysis function NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
发送单元,用于向所述NWDAF网元发送第一响应,所述第一响应用于指示是否允许对所述目标终端的用户信息进行分析。A sending unit, configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
第五方面,提供一种通信装置,包括:处理器、存储器;In a fifth aspect, a communication device is provided, comprising: a processor and a memory;
所述存储器,存储计算机指令;the memory, storing computer instructions;
所述处理器,用于读取所述计算机指令,执行如上述第一方面中任一项所述的方法。The processor is configured to read the computer instructions and execute the method according to any one of the above first aspects.
第六方面,提供一种通信装置,包括:处理器、存储器;In a sixth aspect, a communication device is provided, comprising: a processor and a memory;
所述存储器,存储计算机指令;the memory, storing computer instructions;
所述处理器,用于读取所述计算机指令,执行如上述第二方面中任一项所述的方法。The processor is configured to read the computer instructions and execute the method according to any one of the above second aspects.
第七方面,提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如上述第一方面或第二方面中任一项所述的方法。In a seventh aspect, a computer-readable storage medium is provided, the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause a computer to execute any one of the first aspect or the second aspect above method described in item.
第八方面,提供一种计算机程序产品,所述计算机程序产品在被计算机调用时,使得所述计算机执行如上述第一方面或第二方面中任一项所述的方法。In an eighth aspect, a computer program product is provided, which, when invoked by a computer, causes the computer to execute the method according to any one of the first aspect or the second aspect.
本申请的上述实施例中,第一网元在接收到来自于第二网元的用户信息分析请求后,在获取到允许对所述目标终端的用户信息进行分析的许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元,从而可以保护用户隐私,提高用户信息安全性。In the above-mentioned embodiment of the present application, after the first network element receives the user information analysis request from the second network element and obtains the permission to analyze the user information of the target terminal, it will analyze the user information of the target terminal. The analysis result of the user information of the target terminal is sent to the second network element, thereby protecting user privacy and improving user information security.
附图说明Description of drawings
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例中所需要使用的附图作简单地介绍,显而易见地,下面所介绍的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions of the embodiments of the present application more clearly, the following briefly introduces the drawings that need to be used in the embodiments of the present application. Obviously, the drawings introduced below are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without any creative effort.
图1为本申请实施例提供的用户信息分析结果反馈方法的流程示意图;1 is a schematic flowchart of a user information analysis result feedback method provided in an embodiment of the present application;
图2a、图2b分别为本申请实施例提供的用户信息分析结果反馈方法的流程示意图;2a and 2b are schematic flowcharts of a method for feeding back a user information analysis result provided by an embodiment of the present application, respectively;
图3至图7分别为本申请实施例提供的用户信息分析结果反馈方法的信令交互示意图;3 to 7 are respectively schematic diagrams of signaling interaction of a method for feeding back a user information analysis result provided by an embodiment of the present application;
图8为本申请实施例提供的网络设备(第一网元)的结构示意图;FIG. 8 is a schematic structural diagram of a network device (a first network element) provided by an embodiment of the present application;
图9为本申请实施例提供的网络设备(第二网元)的结构示意图;FIG. 9 is a schematic structural diagram of a network device (a second network element) provided by an embodiment of the present application;
图10为本申请实施例提供的通信装置的结构示意图;FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图11为本申请另外的实施例提供的通信装置的结构示意图。FIG. 11 is a schematic structural diagram of a communication apparatus provided by another embodiment of the present application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。In order to make the objectives, technical solutions and advantages of the present application clearer, the present application will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present application.
以下对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。Some terms in the embodiments of the present application are explained below to facilitate understanding by those skilled in the art.
(1)本申请实施例中,名词“网络”和“系统”经常交替使用,但本领域的技术人员可以理解其含义。(1) In the embodiments of the present application, the terms "network" and "system" are often used interchangeably, but those skilled in the art can understand their meanings.
(2)本申请实施例中术语“多个”是指两个或两个以上,其它量词与之类似。(2) The term "plurality" in the embodiments of the present application refers to two or more than two, and other quantifiers are similar.
(3)“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。(3) "and/or", which describes the relationship of the associated objects, indicates that there can be three kinds of relationships, for example, A and/or B, which can indicate that A exists alone, A and B exist at the same time, and B exists alone. Happening. The character "/" generally indicates that the associated objects are an "or" relationship.
(4)终端,是一种可以向用户提供语音和/或数据连通性的设备。例如,终端设备包括具有无线连接功能的手持式设备、车载设备等。目前,终端设备可以是:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端等。(4) A terminal is a device that can provide users with voice and/or data connectivity. For example, the terminal device includes a handheld device with a wireless connection function, a vehicle-mounted device, and the like. At present, terminal devices can be: mobile phones (mobile phones), tablet computers, notebook computers, PDAs, mobile Internet devices (MIDs), wearable devices, virtual reality (virtual reality, VR) devices, augmented reality ( augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in smart grid, wireless terminals in transportation safety A wireless terminal, a wireless terminal in a smart city, or a wireless terminal in a smart home, etc.
目前,5G网络中的NWDAF网元可以收集网络功能和UE的信息,并进行分析,并将分析结果提供给NF网元或AF网元,这些信息需要用户获知并 给予许可,否则可能会导致用户隐私的泄露的问题。At present, the NWDAF network element in the 5G network can collect network function and UE information, analyze it, and provide the analysis result to the NF network element or the AF network element. This information requires the user to know and give permission, otherwise it may cause the user The issue of privacy leakage.
为了减少或避免这种用户隐私泄露的问题,本申请实施例提供了一种用户信息分析结果反馈方法及其装置,本申请实施例中,只有在获得用户的许可的情况下,才能对该用户的用户信息进行分析或者才能提供对用户进行分析得到的分析结果,用以提高用户信息安全。In order to reduce or avoid this problem of user privacy leakage, the embodiments of the present application provide a method and device for feedback of user information analysis results. Only then can we analyze the user information or provide the analysis results obtained by analyzing the user, so as to improve the security of user information.
应理解,本申请实施例中,“用户的许可”也可理解为“UE的许可”或“user consent”,是指终端允许网络对该终端的用户信息进行采集和/或分析。终端(UE)的使用者称为用户,终端(UE)中通常设置有SIM卡(用户身份识别模块)或其他用于实现通信的装置,该装置配置有用户标识,因此,“终端(UE)”与该终端的使用者“用户(user)”存在对应关系。在本申请实施例的一些描述中,“终端(UE)”和用户(user)可以相互替换,应不影响本申请的实质。It should be understood that, in the embodiment of this application, "user's permission" may also be understood as "UE's permission" or "user consent", which means that the terminal allows the network to collect and/or analyze user information of the terminal. The user of the terminal (UE) is called the user. The terminal (UE) is usually provided with a SIM card (Subscriber Identity Module) or other devices for realizing communication, and the device is configured with a user identity. Therefore, the "terminal (UE)" " has a corresponding relationship with the user "user" of the terminal. In some descriptions of the embodiments of this application, "terminal (UE)" and user (user) may be interchanged, which should not affect the essence of this application.
本申请实施例可以应用于5G系统,也可应用于其后续演进系统。The embodiments of the present application can be applied to a 5G system, and can also be applied to a subsequent evolution system thereof.
下面结合附图对本申请实施例进行详细描述。The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
参见图1,为本申请实施例提供的用户信息分析结果反馈方法的流程示意图,如图所示,该流程可包括:Referring to FIG. 1, it is a schematic flowchart of a user information analysis result feedback method provided by an embodiment of the present application. As shown in the figure, the process may include:
S101:第二网元向第一网元发送第一用户信息分析请求,所述第一用户信息分析请求用于请求对所述目标终端的用户信息进行分析。S101: A second network element sends a first user information analysis request to a first network element, where the first user information analysis request is used to request to analyze user information of the target terminal.
其中,第一网元和第二网元可以是5G系统中的核心网网元。具体的,第一网元可以是NWDAF网元,第二网元可以是NF网元或NEF网元。Wherein, the first network element and the second network element may be core network network elements in the 5G system. Specifically, the first network element may be an NWDAF network element, and the second network element may be an NF network element or a NEF network element.
可选的,所述第一用户信息分析请求中携带的目标终端的指示信息,可以用于指示一个目标终端,比如,该指示信息可以是一个终端的标识信息;该目标终端的指示信息也可以用于指示多个目标终端,比如一组目标终端,该指示信息可以所述多个目标终端中每个目标终端的标识信息,也可以是终端组的组标识(用于指示一组目标终端)。Optionally, the indication information of the target terminal carried in the first user information analysis request may be used to indicate a target terminal, for example, the indication information may be identification information of a terminal; the indication information of the target terminal may also be Used to indicate multiple target terminals, such as a group of target terminals, the indication information can be the identification information of each target terminal in the multiple target terminals, or the group identification of the terminal group (used to indicate a group of target terminals) .
可选的,第二网元还可以在请求中携带感兴趣的区域等过滤信息、分析目标时间段或者预测时间段、分析对象最大数量、签约中告知的目标地址等 信息。Optionally, the second network element may also carry information such as filtering information such as the area of interest, analysis target time period or prediction time period, the maximum number of analysis objects, and the target address notified in the contract in the request.
S102:第一网元接收到第一用户信息分析请求后,获取允许对目标终端的用户信息进行分析的许可。S102: After receiving the first user information analysis request, the first network element obtains a license for allowing analysis of the user information of the target terminal.
该步骤中,第一网元可以通过与UDM网元进行交互,以获取允许对目标终端的用户信息进行分析的许可。In this step, the first network element may interact with the UDM network element to obtain a license that allows analyzing the user information of the target terminal.
可选的,在一些实施例中,第一网元可以向UDM网元查询目标终端是否允许网络对该目标终端的用户信息进行分析,或者查询该目标终端的签约信息,该签约信息用于指示是否允许网络对该目标终端的用户信息进行分析。Optionally, in some embodiments, the first network element may query the UDM network element whether the target terminal allows the network to analyze the user information of the target terminal, or query the subscription information of the target terminal, where the subscription information is used to indicate Whether to allow the network to analyze the user information of the target terminal.
具体的,第一网元(如NWDAF网元)向UDM网元发送第一查询请求,第一查询请求用于请求查询目标终端是否允许网络对该目标终端的用户信息进行分析,或者用于请求查询是否具有允许网络对目标终端的用户信息进行分析的签约信息;UDM网元向第一网元(如NWDAF网元)返回第一查询响应,第一查询响应用于指示目标终端是否允许网络对该目标终端的用户信息进行分析。上述流程的一种具体实现方式可参见图3或图4所示的流程。Specifically, the first network element (such as the NWDAF network element) sends a first query request to the UDM network element, where the first query request is used to request the query target terminal whether the network allows the network to analyze the user information of the target terminal, or is used to request Query whether there is subscription information that allows the network to analyze the user information of the target terminal; the UDM network element returns the first query response to the first network element (such as the NWDAF network element), and the first query response is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed. For a specific implementation manner of the above process, reference may be made to the process shown in FIG. 3 or FIG. 4 .
其中,UDM网元中可存储目标终端关于是否允许网络对该目标终端的用户信息进行分析的签约信息,UDM网元可以根据该签约信息确定该目标终端是否允许网络对该目标终端的用户信息进行分析,并向第一网元(如NWDAF网元)返回第一查询响应。UDM网元也可以向AMF网元发送第一许可指示获取请求(比如当UDM网元中未存储有目标终端关于是否允许网络对该目标终端的用户信息进行分析的签约信息,或未查询到该签约信息时),以使得AMF网元向目标终端获取许可指示信息,AMF网元通过无线接入网(radio access network,RAN)从目标终端获得目标终端的许可指示信息后发送给UDM网元,UDM网元根据该许可指示信息,向第一网元(如NWDAF网元)返回第一查询响应。The UDM network element can store the subscription information of the target terminal on whether to allow the network to analyze the user information of the target terminal, and the UDM network element can determine whether the target terminal allows the network to analyze the user information of the target terminal according to the subscription information. analyze, and return the first query response to the first network element (eg, the NWDAF network element). The UDM network element can also send the first permission indication acquisition request to the AMF network element (for example, when the UDM network element does not store the subscription information of the target terminal on whether to allow the network to analyze the user information of the target terminal, or the user information of the target terminal is not queried, or the subscription information), so that the AMF network element obtains the permission indication information from the target terminal, and the AMF network element obtains the permission indication information of the target terminal from the target terminal through the radio access network (RAN) and sends it to the UDM network element, The UDM network element returns a first query response to the first network element (eg, the NWDAF network element) according to the permission indication information.
其中,可选的,AMF网元可以通过非接入层(non-access stratum,NAS)消从目标终端获取用于指示目标终端是否允许网络对该目标终端的用户信息进行分析的许可指示信息。具体的,AMF网元向目标终端发送第二许可指示 获取请求,接收目标终端发送的第二许可指示获取响应,第二许可指示获取响应携带目标终端的许可指示信息。其中,第二许可指示获取请求和第二许可指示获取响应为NAS消息。该过程的一种具体实现方式可参见图4所示的流程。Wherein, optionally, the AMF network element may obtain permission indication information from the target terminal through a non-access stratum (non-access stratum, NAS) for indicating whether the target terminal allows the network to analyze the user information of the target terminal. Specifically, the AMF network element sends a second permission indication acquisition request to the target terminal, receives a second permission indication acquisition response sent by the target terminal, and the second permission indication acquisition response carries the permission indication information of the target terminal. Wherein, the second permission indication acquisition request and the second permission indication acquisition response are NAS messages. For a specific implementation manner of this process, reference may be made to the flow shown in FIG. 4 .
可选的,AMF网元也可向RAN发送第三许可指示获取请求,以触发RAN从目标终端获取用于指示目标终端是否允许网络对该目标终端的用户信息进行分析的许可指示信息。具体的,UDM网元发送给AMF网元的第一许可指示获取请求,以及AMF网元发送给RAN的第三许可指示获取请求,携带目标终端的标识,RAN根据所述目标终端的标识,向对应的终端发送无线资源控制(radio resource control,RRC)重配置消息,以使得对应的终端向RAN发送许可指示信息。如果第一许可指示获取请求以及第三许可指示获取请求携带目标终端组的组标识,RAN可根据该目标终端组的组标识发送广播消息或组播消息,以使得对应的终端向RAN发送许可指示信息。该过程的一种具体实现方式可参见图3所示的流程。Optionally, the AMF network element may also send a third permission indication obtaining request to the RAN to trigger the RAN to obtain permission indication information from the target terminal for indicating whether the target terminal allows the network to analyze the user information of the target terminal. Specifically, the first permission indication acquisition request sent by the UDM network element to the AMF network element and the third permission indication acquisition request sent by the AMF network element to the RAN carry the identifier of the target terminal, and the RAN sends the request to the RAN according to the identifier of the target terminal. The corresponding terminal sends a radio resource control (radio resource control, RRC) reconfiguration message, so that the corresponding terminal sends permission indication information to the RAN. If the first permission indication acquisition request and the third permission indication acquisition request carry the group identifier of the target terminal group, the RAN may send a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends the permission indication to the RAN information. For a specific implementation manner of this process, reference may be made to the flow shown in FIG. 3 .
可选的,在一些实施例中,第一网元(如NWDAF网元)向UDM网元发送第一查询请求后,UDM网元可以指示第二网元(如NEF网元)通过AF网元从目标终端获得用于指示目标终端是否允许网络对该目标终端的用户信息进行分析的许可指示信息,并将该许可指示信息携带于第一查询响应发送给第一网元(如NWDAF网元)。Optionally, in some embodiments, after the first network element (such as the NWDAF network element) sends the first query request to the UDM network element, the UDM network element may instruct the second network element (such as the NEF network element) to pass the AF network element. Obtain permission indication information from the target terminal for indicating whether the target terminal allows the network to analyze the user information of the target terminal, and carry the permission indication information in the first query response and send it to the first network element (such as the NWDAF network element) .
具体的,AF网元向NEF网元发送第二用户信息分析请求,NEF网元接收到第二用户信息分析请求后,向NWDAF网元发送第一用户信息分析请求,NWDAF网元接收到第一用户信息分析请求后,向UDM网元发送第一查询请求。UDM向NEF网元发送第四许可指示获取请求(比如UDM网元在未获取到目标终端的用于指示该目标终端是否允许对该目标终端进行用户信息分析的签约信息时,发送该第四许可指示获取请求);NEF网元接收到该第四许可指示获取请求后,将其转发给所述AF网元,以使得所述AF网元从目标终端获得该目标终端的许可指示信息,并将获得的许可指示信息通过NEF网元转 发给UDM网元;UDM网元接收NEF网元发送的第四许可指示获取响应,其中携带目标终端的许可指示信息。上述UDM网元指示AMF网元获取用户许可指示信息的流程的一种具体实现方式可参见图5所示的流程。Specifically, the AF network element sends the second user information analysis request to the NEF network element. After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element, and the NWDAF network element receives the first user information analysis request. After the user information analysis request, a first query request is sent to the UDM network element. The UDM sends a fourth permission indication acquisition request to the NEF network element (for example, the UDM network element sends the fourth permission when it has not obtained the subscription information for indicating whether the target terminal allows the target terminal to perform user information analysis on the target terminal) After receiving the fourth license instruction acquisition request, the NEF network element forwards it to the AF network element, so that the AF network element obtains the license instruction information of the target terminal from the target terminal, and sends the request to the target terminal. The obtained license indication information is forwarded to the UDM network element through the NEF network element; the UDM network element receives the fourth license indication acquisition response sent by the NEF network element, which carries the license indication information of the target terminal. For a specific implementation manner of the above-mentioned process of instructing the AMF network element to obtain the user permission indication information by the UDM network element, reference may be made to the process shown in FIG. 5 .
可选的,在另一些实施例中,第二网元发送给第一网元的第一用户信息分析请求中携带目标终端的许可指示信息(比如token),第一网元请求UDM网元对该许可指示信息进行验证(比如进行合法性验证),若验证通过,则确定允许对目标终端的用户信息进行分析,否则确定不允许对目标终端的用户信息进行分析。Optionally, in some other embodiments, the first user information analysis request sent by the second network element to the first network element carries the permission indication information (such as token) of the target terminal, and the first network element requests the UDM network element to The permission indication information is verified (eg, legality verification). If the verification is passed, it is determined that the user information of the target terminal is allowed to be analyzed; otherwise, it is determined that the user information of the target terminal is not allowed to be analyzed.
具体的,第一网元(如NWDAF网元)向UDM网元发送验证请求,该验证请求携带所述许可指示信息(该许可指示信息来自于第二网元发送的第一用户信息分析请求);UDM网元对该许可指示信息进行验证,并向第一网元(如NWDAF网元)发送验证响应,该验证响应携带验证结果,该验证结果用于指示所述许可指示信息是否验证通过,或者用于指示目标终端是否允许网络对该目标终端的用户信息进行分析。第一网元(如NWDAF网元)根据接收到的验证响应,确定目标终端是否允许对该目标终端的用户信息进行分析。具体实现方式可参见图6或图7所示的流程。Specifically, the first network element (such as the NWDAF network element) sends a verification request to the UDM network element, where the verification request carries the permission indication information (the permission indication information comes from the first user information analysis request sent by the second network element) The UDM network element verifies the permission indication information, and sends a verification response to the first network element (such as the NWDAF network element), the verification response carries a verification result, and the verification result is used to indicate whether the permission indication information is verified and passed, Or it is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal. The first network element (eg, NWDAF network element) determines whether the target terminal is allowed to analyze the user information of the target terminal according to the received verification response. For a specific implementation manner, refer to the flow shown in FIG. 6 or FIG. 7 .
S103:第一网元获得所述许可后,将对目标终端的用户信息的分析结果发送给所述第二网元。S103: After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
其中,第一网元获取到目标终端的用户信息后,对用户信息进行分析,得到分析结果。Wherein, after acquiring the user information of the target terminal, the first network element analyzes the user information to obtain an analysis result.
可选的,所述用户信息,可包括以下信息中的至少一项:Optionally, the user information may include at least one of the following information:
(1)用户的移动性相关信息,比如,用户位置信息等;(1) User mobility-related information, such as user location information, etc.;
(2)用户的通信相关信息,可包括:通信的切片信息,数据网络名称,应用ID以及感兴趣的区域,在某个时间段(通信的终结时间)、流量等信息。(2) User's communication-related information, which may include: communication slice information, data network name, application ID and area of interest, in a certain time period (communication termination time), traffic and other information.
可选的,对该目标终端的用户信息进行分析得到分析结果,可包括以下至少一项:Optionally, the analysis result obtained by analyzing the user information of the target terminal may include at least one of the following:
(1)对目标终端的用户信息进行分析,得到目标终端的移动性统计信息 和移动性预测信息中的至少一项;(1) analyze the user information of the target terminal to obtain at least one of the mobility statistical information and the mobility prediction information of the target terminal;
例如,第一网元收集的目标终端的用户信息用于支持对目标终端的移动性数据的分析。第一网元将这些信息作为输入后,可以将分析结果提供给NF网元或者AF网元。分析结果可以体现目标终端的移动性分析的数据,比如包含一组UE或者某个UE的标识、时间信息以及UE的地址,或者是UE移动性预测的数据,UE的标识信息以及在给定时间内UE在给定位置组的可能性(概率)。For example, the user information of the target terminal collected by the first network element is used to support the analysis of the mobility data of the target terminal. After the first network element takes the information as input, the analysis result can be provided to the NF network element or the AF network element. The analysis result can reflect the data of the mobility analysis of the target terminal, such as the identification, time information, and address of a group of UEs or a certain UE, or the data of UE mobility prediction, the identification information of the UE, and the identification information of the UE at a given time. Likelihood (probability) of a UE within a given group of locations.
(2)对目标终端的通信进行分析,得到目标终端的通信分析结果;(2) Analyze the communication of the target terminal to obtain the communication analysis result of the target terminal;
(3)对目标终端的用户信息进行分析,得到目标终端与网络数据相关的预期行为、异常行为中的至少一项。(3) Analyzing the user information of the target terminal to obtain at least one of expected behaviors and abnormal behaviors of the target terminal related to network data.
进一步的,如果第一网元未获得目标终端允许对该目标终端的用户信息进行分析的许可,则拒绝获取该目标终端的用户信息,或者拒绝对目标终端的用户信息进行分析。具体的,若第一网元未获得目标终端允许网络对目标终端的用户信息进行分析的许可,则向第二网元发送第一用户信息分析响应,该第一用户信息分析响应用于指示拒绝响应第一网元接收到的第一用户信息分析请求。Further, if the first network element does not obtain the permission of the target terminal to analyze the user information of the target terminal, it refuses to obtain the user information of the target terminal, or refuses to analyze the user information of the target terminal. Specifically, if the first network element does not obtain the permission of the target terminal to allow the network to analyze the user information of the target terminal, it sends a first user information analysis response to the second network element, where the first user information analysis response is used to indicate rejection Responding to the first user information analysis request received by the first network element.
本申请的上述实施例中,第一网元在接收到来自于第二网元的用户信息分析请求后,在获取到允许对所述目标终端的用户信息进行分析的许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元,从而可以保护用户隐私,提高用户信息安全性。In the above-mentioned embodiment of the present application, after the first network element receives the user information analysis request from the second network element and obtains the permission to analyze the user information of the target terminal, it will analyze the user information of the target terminal. The analysis result of the user information of the target terminal is sent to the second network element, thereby protecting user privacy and improving user information security.
在一些实施例中,第一网元(如NWDAF网元)获取到的目标终端的许可指示信息中还可包括有效期信息,所述有效期信息用于指示目标终端允许网络对该目标终端的用户信息进行分析的有效期。在另一些实施例中,该有效期信息可携带于UDM网元向第一网元发送的第一查询响应或验证响应中。In some embodiments, the license indication information of the target terminal obtained by the first network element (such as the NWDAF network element) may further include validity period information, where the validity period information is used to indicate that the target terminal allows the network to allow the user information of the target terminal The validity period for which the analysis was performed. In other embodiments, the validity period information may be carried in a first query response or a verification response sent by the UDM network element to the first network element.
可选的,当第一网元(如NWDAF网元)获取到目标终端的更新的用户信息后,若根据该目标终端的有效期信息判断有效期过期,则拒绝对该目标终端的更新的用户信息进行分析。Optionally, after the first network element (such as the NWDAF network element) obtains the updated user information of the target terminal, if it is judged that the validity period has expired according to the validity period information of the target terminal, the updated user information of the target terminal is refused to be performed. analyze.
可选的,当第一网元(如NWDAF网元)获取到目标终端的更新的用户信息后,若根据该目标终端的有效期信息判断有效期过期,则向UDM网元发送第二查询请求,所述第二查询请求用于请求查询是否更改该目标终端允许网络对该目标终端的用户信息进行分析的有效期;NWDAF网元接收到UDM网元发送的第二查询响应后,若第二查询响应指示更改该目标终端允许网络对该目标终端的用户信息进行分析的有效期,则对该目标终端的更新的用户信息进行分析,并将分析结果发送给第二网元。通过上述流程,可在目标终端的许可过期后,再次请求获取目标终端的许可,以提高用户信息的安全性。Optionally, after the first network element (such as the NWDAF network element) obtains the updated user information of the target terminal, if it is determined that the validity period has expired according to the validity period information of the target terminal, a second query request is sent to the UDM network element, and the The second query request is used to request to query whether to change the validity period for which the target terminal allows the network to analyze the user information of the target terminal; after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates If the validity period for which the target terminal allows the network to analyze the user information of the target terminal is changed, the updated user information of the target terminal is analyzed, and the analysis result is sent to the second network element. Through the above process, after the license of the target terminal expires, a request for obtaining the license of the target terminal can be made again, so as to improve the security of the user information.
可选的,UDM网元在接收到第二查询请求后,可以根据有效期更改策略确定是否更改目标终端的有效期,比如,如果有效期更改策略允许延长目标终端的有效期,则可根据该策略生成该目标终端的新的有效期。可选的,UDM网元也可以指示AMF网元从目标终端请求获取是否更改目标终端的有效期的指示信息,从而根据目标终端的指示确定是否更改目标终端的有效期。其中,UDM网元指示AMF网元从目标终端请求获取是否更改目标终端的有效期的指示信息的过程,与上述UDM网元指示AMF网元从目标终端获取许可指示信息的过程类似,在此不再详述。Optionally, after receiving the second query request, the UDM network element can determine whether to change the validity period of the target terminal according to the validity period change policy. For example, if the validity period change policy allows to extend the validity period of the target terminal, the target terminal can be generated according to the policy. The new validity period of the terminal. Optionally, the UDM network element may also instruct the AMF network element to request from the target terminal to obtain instruction information on whether to change the validity period of the target terminal, so as to determine whether to change the validity period of the target terminal according to the target terminal's instruction. The process in which the UDM network element instructs the AMF network element to request from the target terminal to obtain the indication information on whether to change the validity period of the target terminal is similar to the process in which the UDM network element instructs the AMF network element to obtain the permission indication information from the target terminal, and is not repeated here. detail.
在一些实施例中,第一网元可以在获得目标终端的许可后,对该目标终端的用户信息进行分析,并将分析结果提供给第二网元,具体可如图2a所示;在另一些实施例中,第一网元也可先对目标终端的用户信息进行分析并得到分析结果,然后获取目标终端的许可,并在获取到许可后,将该分析结果发送给第二网元,具体可如图2b所述。In some embodiments, the first network element may analyze the user information of the target terminal after obtaining the permission of the target terminal, and provide the analysis result to the second network element, as shown in FIG. 2a; in another In some embodiments, the first network element may first analyze the user information of the target terminal and obtain the analysis result, then obtain the permission of the target terminal, and after obtaining the permission, send the analysis result to the second network element, Specifically, it can be described in Figure 2b.
参见图2a,为本申请实施例提供的一种用户信息分析结果反馈方法的流程示意图,如图所示,该流程可包括:Referring to FIG. 2a, it is a schematic flowchart of a method for feeding back a user information analysis result provided in an embodiment of the present application. As shown in the figure, the process may include:
S201:第二网元向第一网元发送第一用户信息分析请求。S201: The second network element sends a first user information analysis request to the first network element.
其中,所述第一用户信息分析请求携带目标终端的指示信息。所述第一用户信息分析请求用于请求对所述目标终端的用户信息进行分析。Wherein, the first user information analysis request carries the indication information of the target terminal. The first user information analysis request is used to request to analyze the user information of the target terminal.
S202:第一网元获取允许对目标终端的用户信息进行分析的许可。S202: The first network element obtains a license allowing to analyze the user information of the target terminal.
S203:第一网元对目标终端的用户信息进行分析,得到分析结果。S203: The first network element analyzes the user information of the target terminal to obtain an analysis result.
S204:第一网元将分析结果发送给第二网元。S204: The first network element sends the analysis result to the second network element.
上述图2a所示流程各步骤的具体实现,基本与图1中相关步骤相同。The specific implementation of each step of the process shown in FIG. 2 a is basically the same as the relevant steps in FIG. 1 .
图2a所示的流程中,第一网元在接收到来自于第二网元的用户信息分析请求后,在获取到允许对所述目标终端的用户信息进行分析的许可后,才对目标终端的用户信息进行分析,并将分析结果发送给第二网元,从而可以保护用户隐私,提高用户信息安全性。In the process shown in Fig. 2a, after the first network element receives the user information analysis request from the second network element, and obtains the permission to analyze the user information of the target terminal, the target terminal The user information is analyzed, and the analysis result is sent to the second network element, so that user privacy can be protected and user information security can be improved.
参见图2b,为本申请实施例提供的一种用户信息分析结果反馈方法的流程示意图,如图所示,该流程可包括:Referring to Fig. 2b, a schematic flowchart of a method for feeding back a user information analysis result provided by an embodiment of the present application, as shown in the figure, the process may include:
S210:第二网元向第一网元发送第一用户信息分析请求。S210: The second network element sends a first user information analysis request to the first network element.
其中,所述第一用户信息分析请求携带目标终端的指示信息。所述第一用户信息分析请求用于请求对所述目标终端的用户信息进行分析。Wherein, the first user information analysis request carries the indication information of the target terminal. The first user information analysis request is used to request to analyze the user information of the target terminal.
S211:第一网元对目标终端的用户信息进行分析,得到分析结果。S211: The first network element analyzes the user information of the target terminal to obtain an analysis result.
S212:第一网元获取允许对目标终端的用户信息进行分析的许可。S212: The first network element obtains a license allowing to analyze the user information of the target terminal.
S213:第一网元将分析结果发送给第二网元。S213: The first network element sends the analysis result to the second network element.
上述图2b所示流程各步骤的具体实现,基本与图1中相关步骤相同。The specific implementation of each step of the flow shown in FIG. 2 b is basically the same as the relevant steps in FIG. 1 .
图2b所示的流程中,第一网元在接收到来自于第二网元的用户信息分析请求后,首先对目标终端的用户信息进行分析,再获取到允许对所述目标终端的用户信息进行分析的许可,若获取到目标终端的许可,则将分析结果发送给第二网元,从而可以保护用户隐私,提高用户信息安全性。In the process shown in Figure 2b, after receiving the user information analysis request from the second network element, the first network element first analyzes the user information of the target terminal, and then obtains the user information that allows the target terminal to be analyzed. If the permission of the target terminal is obtained, the analysis result is sent to the second network element, thereby protecting user privacy and improving user information security.
基于图1所示的用户信息分析结果反馈方法,下面以第一网元为NWDAF网元,第二网元为NF网元为例,对本申请实施例进行描述。Based on the user information analysis result feedback method shown in FIG. 1 , the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
参见图3,为本申请实施例提供的一种用户信息分析结果反馈方法的信令交互示意图。如图所示,该流程可包括:Referring to FIG. 3 , it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
步骤1:NF网元向NWDAF网元发送第一用户信息分析请求。Step 1: The NF network element sends a first user information analysis request to the NWDAF network element.
该步骤中,NF网元可以使用Nnwdaf_AnalyticsInfo服务或Nnwdaf_AnalyticsSubscription服务,将第一用户信息分析请求发送到NWDAF 网元,以对目标UE或一组目标UE的用户信息进行分析。其中,第一用户信息分析请求可以是Nswdaf_AnalyticsInfo_Request消息,或者是Nnwdaf_AnalyticsSubscription_Subscribe消息。In this step, the NF network element may use the Nnwdaf_AnalyticsInfo service or the Nnwdaf_AnalyticsSubscription service to send the first user information analysis request to the NWDAF network element to analyze the user information of the target UE or a group of target UEs. The first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message or a Nnwdaf_AnalyticsSubscription_Subscribe message.
NF网元可以请求通过对目标UE的用户信息进行分析以获得目标UE的移动性统计信息,也可以请求获得目标UE的移动性预测信息,还可以请求获得目标UE的移动性统计信息以及移动性预测信息。该请求消息中可携带分析类型的指示信息,该分析类型可设置为UE移动性信息(type of analytics=UE mobility information)。该请求消息中还可携带目标UE的指示信息,该目标UE的指示信息可以是UE标识(UE ID),也可以是UE组的组标识(group ID)。The NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information. The request message may carry indication information of the analysis type, and the analysis type may be set to UE mobility information (type of analytics=UE mobility information). The request message may also carry indication information of the target UE, and the indication information of the target UE may be a UE ID (UE ID) or a group ID (group ID) of a UE group.
步骤2:NWDAF网元接收到第一用户信息分析请求后,向UDM网元发送第一查询请求,用于请求查询目标UE是否允许网络对该目标UE的用户信息进行分析,或者用于请求查询目标UE的签约信息,该签约信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 2: After receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, which is used to request the query target UE whether the network allows the network to analyze the user information of the target UE, or is used to request query Subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
该步骤中,第一查询请求中携带目标UE的指示信息。In this step, the first query request carries the indication information of the target UE.
步骤3a:UDM网元接收到第一查询请求后,向AMF网元发送第一许可指示获取请求,其中携带目标UE的指示信息,该第一查询请求用于请求查询目标UE是否允许网络对该目标UE的用户信息进行分析。Step 3a: After receiving the first query request, the UDM network element sends a first permission indication acquisition request to the AMF network element, which carries the indication information of the target UE, and the first query request is used to request to query whether the target UE allows the network to perform this request. The user information of the target UE is analyzed.
可选的,UDM网元可首先从本地查询目标UE的签约信息(该签约信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析),若查询到该目标UE的上述签约信息,则可以根据该签约信息向NWDAF网元返回第一查询响应(步骤4),以指示目标UE是否允许网络对该目标UE的用户信息进行分析,这样,无需执行步骤3a至步骤3f。如果UDM网元未查询到上述签约信息,则执行步骤3a至步骤3f。Optionally, the UDM network element may first query the subscription information of the target UE locally (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE). , then the first query response can be returned to the NWDAF network element according to the subscription information (step 4) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 3a to 3f do not need to be performed. If the UDM network element does not query the above subscription information, step 3a to step 3f are performed.
步骤3b:AMF网元接收到第一许可指示获取请求后,向RAN发送第三许可指示获取请求,其中携带目标UE的指示信息。Step 3b: After receiving the first permission indication acquisition request, the AMF network element sends a third permission indication acquisition request to the RAN, which carries the indication information of the target UE.
其中,该第三许可指示获取请求用于指示RAN请求目标UE上报是否允许网络对目标UE的用户信息进行分析的策略。Wherein, the third permission indication acquisition request is used to instruct the RAN to request the target UE to report a policy of whether to allow the network to analyze the user information of the target UE.
可选的,该第三许可指示获取请求可以通过N2接口发送,即该消息可以是N2接口消息。Optionally, the third permission indication acquisition request may be sent through the N2 interface, that is, the message may be an N2 interface message.
步骤3c:RAN接收到第三许可指示获取请求后,向目标UE发送RRC重配置消息,该消息中携带策略获取请求,用于请求获取目标UE是否允许网络对目标UE的用户信息进行分析的策略。Step 3c: After the RAN receives the third permission indication acquisition request, it sends an RRC reconfiguration message to the target UE, which carries a policy acquisition request, which is used to request whether the target UE allows the network to analyze the user information of the target UE. .
该步骤中,RAN可以通过单播方式向目标UE发送策略获取请求,也可以通过广播方式或组播方式向一组目标UE发送策略获取请求。In this step, the RAN may send the policy acquisition request to the target UE in a unicast manner, or may send the policy acquisition request to a group of target UEs in a broadcast manner or a multicast manner.
步骤3d:目标UE向RAN发送目标UE的策略信息(即目标UE的许可指示信息),用以指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 3d: The target UE sends policy information of the target UE (ie, permission indication information of the target UE) to the RAN to indicate whether the target UE allows the network to analyze the user information of the target UE.
其中,目标UE发送的许可指示信息中可携带许可有效期信息,用于指示目标UE许可网络对该目标UE的用户信息进行分析的有效期。The license indication information sent by the target UE may carry license validity period information, which is used to indicate the validity period for which the target UE allows the network to analyze the user information of the target UE.
步骤3e:RAN向AMF网元返回目标UE的许可指示信息。Step 3e: The RAN returns the permission indication information of the target UE to the AMF network element.
步骤3f:AMF网元向UDM网元返回目标UE的许可指示信息。Step 3f: The AMF network element returns the permission indication information of the target UE to the UDM network element.
步骤4:UDM网元接收到目标UE的许可指示信息后,向NWDAF网元返回第一查询响应,用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 4: After receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
可选的,第一查询响应中可携带目标UE的许可指示信息,该许可指示信息用于指示目标UE是否允许网络对该目标UE的用户信息进行收集或分析。Optionally, the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze user information of the target UE.
可选的,如果UDM网元查询到目标UE的签约信息(该签约信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析),则也可将该签约信息携带于第一查询响应中发送给NWDAF网元。Optionally, if the UDM network element queries the subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information can also be carried in the first query. The response is sent to the NWDAF network element.
需要说明的是,若步骤4中,若第一查询响应指示目标UE不允许网络对该目标UE的用户信息进行分析,则NWDAF网元可向NF网元发送第一用户信息分析响应,以通知NF网元拒绝对目标UE的用户信息进行分析,不再执行后续的步骤5至步骤11。It should be noted that, if in step 4, if the first query response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send the first user information analysis response to the NF network element to notify The NF network element refuses to analyze the user information of the target UE, and the subsequent steps 5 to 11 are not executed.
步骤5:NWDAF网元根据第一查询响应确定目标UE允许网络对该目标 UE的用户信息进行收集和分析,则获取目标UE的用户信息。Step 5: The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the first query response, and then obtains the user information of the target UE.
该步骤中,NWDAF网元可以从AMF网元、AF网元中的至少一个获取目标UE的用户信息。In this step, the NWDAF network element may acquire the user information of the target UE from at least one of the AMF network element and the AF network element.
可选的,NWDAF网元从AMF网元获取目标UE的用户信息的实现过程可包括:NWDAF网元向AMF网元发送订阅请求(如Namf_EventExposure_Subscribe),以请求订阅目标UE的用户信息;AMF网元可根据该订阅请求向NWDAF网元发送通知消息(如Namf_EventExposure_Notify),其中携带目标UE的用户信息。其中,NWDAF网元从AMF往后获取的用户信息是与UE的移动性相关的信息,比如可包括:用户的身份,用户的位置,UE进入的跟踪区(TA)或者小区,当AMF网元检测到UE进入到该地点的时间戳、位置码的类型以及移动注册更新的频率等。Optionally, the implementation process of the NWDAF network element acquiring the user information of the target UE from the AMF network element may include: the NWDAF network element sends a subscription request (such as Namf_EventExposure_Subscribe) to the AMF network element to request to subscribe to the user information of the target UE; the AMF network element A notification message (eg Namf_EventExposure_Notify) may be sent to the NWDAF network element according to the subscription request, which carries the user information of the target UE. Among them, the user information obtained by the NWDAF network element from the AMF is information related to the mobility of the UE, for example, it may include: the identity of the user, the location of the user, the tracking area (TA) or cell entered by the UE, when the AMF network element The timestamp of the UE's entry to the location, the type of location code, and the frequency of mobile registration updates are detected.
可选的,NWDAF网元从AF网元获取目标UE的用户信息的实现过程可包括:NWDAF网元向AF网元发送订阅请求(如Naf_EventExposure_Subscribe),以请求订阅目标UE的用户信息;AF网元可根据该订阅请求向NWDAF网元发送通知消息(如Naf_EventExposure_Notify),其中携带目标UE的用户信息。Optionally, the implementation process of the NWDAF network element acquiring the user information of the target UE from the AF network element may include: the NWDAF network element sends a subscription request (such as Naf_EventExposure_Subscribe) to the AF network element to request to subscribe to the user information of the target UE; the AF network element A notification message (such as Naf_EventExposure_Notify) may be sent to the NWDAF network element according to the subscription request, which carries the user information of the target UE.
可选的,NWDAF网元还可从SMF网元获取目标UE的用户信息。Optionally, the NWDAF network element may also acquire user information of the target UE from the SMF network element.
其中,NWDAF网元从AF网元或者SMF网元获取的用户信息是与UE通信相关的信息,比如可包括:用户的身份标识,组ID,网络切片信息,建立分组数据单元(packet data unit,PDU)会话的数据网络名称,应用ID,期望的用户行为参数,上下行数据速率,流量等。Wherein, the user information obtained by the NWDAF network element from the AF network element or the SMF network element is information related to UE communication, and may include, for example, the user's identity, group ID, network slice information, and the establishment of a packet data unit (packet data unit, PDU) session data network name, application ID, expected user behavior parameters, uplink and downlink data rates, traffic, etc.
步骤6:NWDAF网元对目标UE的用户信息进行分析,得到分析结果。Step 6: The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
其中,目标UE的用户信息的内容,以及对用户信息进行分析所得到的分析结果,可参见前述实施例的相关描述。例如,若NF网元请求对目标UE的移动性进行分析,则NWDAF网元获取到的用户信息至少包括目标UE的移动性相关信息,对用户信息进行分析所得到的结果包括目标UE的移动性统计信息以及目标UE的移动性预测信息中的至少一项。For the content of the user information of the target UE and the analysis result obtained by analyzing the user information, reference may be made to the relevant descriptions of the foregoing embodiments. For example, if the NF network element requests to analyze the mobility of the target UE, the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE, and the result obtained by analyzing the user information includes the mobility of the target UE. At least one item of statistical information and mobility prediction information of the target UE.
步骤7:NWDAF网元向NF网元发送第一用户信息分析响应,其中携带针对目标UE的分析结果。Step 7: The NWDAF network element sends a first user information analysis response to the NF network element, which carries the analysis result for the target UE.
进一步的,上述流程还可包括以下步骤:Further, the above process may further include the following steps:
步骤8:NWDAF网元获取目标UE的更新的用户信息。Step 8: The NWDAF network element obtains the updated user information of the target UE.
其中,如果NWDAF网元向AMF网元和/或AF网元订阅了目标UE的用户信息,则AMF网元和/或AF网元根据订阅请求,在目标UE的用户信息发生更新时,向NWDAF网元发送更新的用户信息。例如,AMF网元可以通过通知消息(如Namf_EventExposure_Notify)将目标UE的更新用户信息发送给NWDAF网元;再例如,AF网元可以通过通知消息(如Naf_EventExposure_Notify)将目标UE的更新用户信息发送给NWDAF网元。Wherein, if the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element, according to the subscription request, when the user information of the target UE is updated, subscribe to the NWDAF network element. The network element sends updated user information. For example, the AMF network element can send the updated user information of the target UE to the NWDAF network element through a notification message (such as Namf_EventExposure_Notify); for another example, the AF network element can send the updated user information of the target UE to the NWDAF through a notification message (such as Naf_EventExposure_Notify) network element.
步骤9:NWDAF网元确定目标UE的有效期(即目标UE允许网络对该目标UE的用户信息进行分析的有效期)是否到期,若已到期或过期,则向UDM网元查询是否更改该目标UE允许网络对该目标UE的用户信息进行分析的有效期。Step 9: The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target. The validity period during which the UE allows the network to analyze the user information of the target UE.
可选的,NWDAF网元获取到目标UE的更新的用户信息后,若根据该目标UE的有效期信息判断有效期到期或过期,则向UDM网元发送第二查询请求,第二查询请求用于请求查询是否更改目标UE允许网络对该目标UE的用户信息进行分析的有效期。其中,UDM网元可以直接确定是否更改目标UE的有效期,也可以指示AMF网元从目标UE请求获取是否更改目标终端的有效期的指示信息。Optionally, after the NWDAF network element obtains the updated user information of the target UE, if it is determined that the validity period expires or expires according to the validity period information of the target UE, it sends a second query request to the UDM network element, and the second query request is used for Request to query whether to change the validity period of the target UE that allows the network to analyze the user information of the target UE. The UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request from the target UE to obtain indication information on whether to change the validity period of the target terminal.
需要说明的是,步骤9为可选步骤。在另外的实施例中,若NWDAF网元确定目标UE的有效期到期或过期,则可以拒绝对该目标UE的用户信息进行分析,并可进一步向NF网元发送第一用户信息分析响应,以通知NF网元拒绝对目标UE的用户信息进行分析,不再执行后续的步骤10至步骤11。进一步的,NWDAF网元还可以向AMF网元和/或AF网元发送取消订阅目标UE的用户信息的请求,以不再接收该目标UE的更新的用户信息。It should be noted that step 9 is an optional step. In another embodiment, if the NWDAF network element determines that the validity period of the target UE has expired or expired, it may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to The NF network element is notified to refuse to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
步骤10:NWDAF网元对目标UE的更新的用户信息进行分析,获得分 析结果。Step 10: The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
该步骤中,NWDAF网元接收UDM网元发送的第二查询响应后,若第二查询响应指示更改目标UE允许网络对该目标UE的用户信息进行分析的有效期,则NWDAF网元对该目标UE的更新的用户信息进行分析;否则,NWDAF网元拒绝对该目标UE的更新的用户信息进行分析,不再执行后续步骤11,可进一步通知AF网元拒绝对目标UE的用户信息进行分析,并可进一步指示拒绝的原因为目标UE的许可有效期到期。In this step, after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period. The updated user information of the target UE is analyzed; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and the subsequent step 11 is not performed, and the AF network element can be further notified to refuse to analyze the user information of the target UE, and The reason for the rejection may be further indicated that the license validity period of the target UE has expired.
步骤11:NWDAF网元将分析结果发送给NF网元。Step 11: The NWDAF network element sends the analysis result to the NF network element.
需要说明的是,在一些实施例中,如果NWDAF网元向AMF网元和/或AF网元订阅了目标UE的用户信息,则AMF网元和/或AF网元可能会多次向NWDAF网元发送该目标UE的更新的用户信息。NWDAF网元每次收到目标UE的更新的用户信息后,均会判断该目标UE的有效期是否到期或过期,若没有到期或过期,则对更新的用户信息进行分析,如果判断目标UE的有效期已到期或过期,则执行上述步骤9或者拒绝对目标UE的更新的用户信息进行分析。It should be noted that, in some embodiments, if the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element may subscribe to the NWDAF network element for multiple times. The element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. The validity period of the target UE has expired or expired, then the above step 9 is performed or the analysis of the updated user information of the target UE is rejected.
基于图1所示的用户信息分析结果反馈方法,下面以第一网元为NWDAF网元,第二网元为NF网元为例,对本申请实施例进行描述。Based on the user information analysis result feedback method shown in FIG. 1 , the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
参见图4,为本申请实施例提供的另一种用户信息分析结果反馈方法的信令交互示意图。图4所示流程基本与图3所示流程相同,不同之处在于:图4中,用步骤3b代替图3中的步骤3b至步骤3c;图4中,用步骤3d代替图3中的步骤3d至步骤3e。Referring to FIG. 4 , it is a schematic diagram of signaling interaction of another method for feeding back a user information analysis result provided by an embodiment of the present application. The process shown in FIG. 4 is basically the same as the process shown in FIG. 3, except that: in FIG. 4, steps 3b to 3c in FIG. 3 are replaced by step 3b; in FIG. 4, steps in FIG. 3 are replaced by step 3d 3d to step 3e.
具体的,图4的步骤3b中,AMF网元发送第二许可指示获取请求,其中携带目标UE的指示信息(如UE ID或UE组ID),该消息为NAS消息,可被RAN透传至目标UE。图4的步骤3d中,目标UE向AMF网元发送第二许可指示获取响应,其中可携带目标UE的许可指示信息,该消息为NAS消息,可被RAN透传到AMF网元。Specifically, in step 3b of FIG. 4 , the AMF network element sends a second permission indication acquisition request, which carries the indication information of the target UE (such as UE ID or UE group ID), which is a NAS message and can be transparently transmitted by the RAN to target UE. In step 3d of FIG. 4 , the target UE sends a second permission indication acquisition response to the AMF network element, which can carry the permission indication information of the target UE, which is a NAS message and can be transparently transmitted by the RAN to the AMF network element.
可选的,在图4的步骤9中,UDM网元可以直接确定是否更改目标UE 的有效期,也可以指示AMF网元从目标UE请求获取是否更改目标终端的有效期的指示信息。其中,UDM网元指示AMF网元从目标终端请求获取是否更改目标终端的有效期的指示信息的过程,与图4中UDM网元指示AMF网元从目标终端获取许可指示信息的过程类似,在此不再详述。Optionally, in step 9 of FIG. 4 , the UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request from the target UE to obtain indication information on whether to change the validity period of the target terminal. The process in which the UDM network element instructs the AMF network element to request from the target terminal to obtain the indication information on whether to change the validity period of the target terminal is similar to the process in which the UDM network element instructs the AMF network element to obtain the permission indication information from the target terminal in FIG. 4 . No further details.
图4中的其余步骤基本与图3所示流程相同,在此不再重复。The remaining steps in FIG. 4 are basically the same as the process shown in FIG. 3 and will not be repeated here.
基于图1所示的用户信息分析结果反馈方法,下面以第一网元为NWDAF网元,第二网元为NEF网元为例,对本申请实施例进行描述。Based on the user information analysis result feedback method shown in FIG. 1 , the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
参见图5,为本申请实施例提供的一种用户信息分析结果反馈方法的信令交互示意图。如图所示,该流程可包括:Referring to FIG. 5 , it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
步骤1:AF网元向NEF网元发送第二用户信息分析请求,用于请求对目标UE的用户信息进行分析。Step 1: The AF network element sends a second user information analysis request to the NEF network element, which is used to request to analyze the user information of the target UE.
该步骤中,AF网元可以使用Nnef_AnalyticsExpose服务,将第二用户信息分析请求发送到NEF网元,以对目标UE或一组目标UE的用户信息进行分析。其中,第二用户信息分析请求可以是Nnef_AnalyticsExpose_Fetch消息。In this step, the AF network element may use the Nnef_AnalyticsExpose service to send the second user information analysis request to the NEF network element, so as to analyze the user information of the target UE or a group of target UEs. The second user information analysis request may be an Nnef_AnalyticsExpose_Fetch message.
AF网元可以请求通过对目标UE的用户信息进行分析以获得目标UE的移动性统计信息,也可以请求获得目标UE的移动性预测信息,还可以请求获得目标UE的移动性统计信息以及移动性预测信息。该请求消息中可携带分析类型的指示信息,该分析类型可设置为UE移动性信息(type of annlytics=UE mobility information)。该请求消息中还可携带目标UE的标识信息,该目标UE的指示信息可以是UE标识(UE ID),也可以是UE组的组标识(group ID)。The AF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, or may request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information. The request message may carry the indication information of the analysis type, and the analysis type may be set to UE mobility information (type of annlytics=UE mobility information). The request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
步骤2:NEF网元接收到第二用户信息分析请求后,向NWDAF网元发送第一用户信息分析请求。Step 2: After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element.
该步骤中,NF网元可以使用Nnwdaf_AnalyticsInfo服务,将第一用户信息分析请求发送到NWDAF网元,以对目标UE或一组目标UE的用户信息进行分析。其中,第一用户信息分析请求可以是Nswdaf_AnalyticsInfo_Request消息。In this step, the NF network element may use the Nnwdaf_AnalyticsInfo service to send the first user information analysis request to the NWDAF network element, so as to analyze the user information of the target UE or a group of target UEs. The first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message.
NF网元可以请求通过对目标UE的用户信息进行分析以获得目标UE的 移动性统计信息,也可以请求获得目标UE的移动性预测信息,还可以请求获得目标UE的移动性统计信息以及移动性预测信息。该请求消息中可携带分析类型的指示信息,该分析类型可设置为UE移动性信息(type of annlytics=UE mobility information)。该请求消息中还可携带目标UE的标识信息,该目标UE的指示信息可以是UE标识(UE ID),也可以是UE组的组标识(group ID)。The NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information. The request message may carry the indication information of the analysis type, and the analysis type may be set to UE mobility information (type of annlytics=UE mobility information). The request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
步骤3:NWDAF网元接收到第一用户信息分析请求后,向UDM网元发送第一查询请求,用于请求查询目标UE是否允许网络对该目标UE的用户信息进行分析,或者用于请求查询目标UE的签约信息,该签约信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 3: After receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, which is used for requesting to query whether the target UE allows the network to analyze the user information of the target UE, or for requesting query Subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
该步骤中,第一查询请求中携带目标UE的指示信息。In this step, the first query request carries the indication information of the target UE.
步骤4a:UDM网元接收到第一查询请求后,向NEF网元发送第四许可指示获取请求,其中携带目标UE的指示信息,还可携带AF的标识。Step 4a: After receiving the first query request, the UDM network element sends a fourth permission indication acquisition request to the NEF network element, which carries the indication information of the target UE and also carries the identifier of the AF.
可选的,UDM网元可首先从本地查询目标UE的签约信息(该签约信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析),若查询到该目标UE的上述签约信息,则可以根据该签约信息向NWDAF网元返回第一查询响应(步骤5),以指示目标UE是否允许网络对该目标UE的用户信息进行分析,这样,无需执行步骤4a至步骤4d。如果UDM网元未查询到上述签约信息,则执行步骤4a至步骤4d。Optionally, the UDM network element may first query the subscription information of the target UE locally (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE). , then the first query response can be returned to the NWDAF network element according to the subscription information (step 5) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 4a to 4d do not need to be performed. If the UDM network element does not query the above subscription information, step 4a to step 4d are performed.
步骤4b:NEF网元接收到第四许可指示获取请求后,将该请求转发给对应的AF网元。Step 4b: After receiving the fourth permission indication acquisition request, the NEF network element forwards the request to the corresponding AF network element.
步骤4c:AF网元通过用户界面,向目标UE的用户提供许可的选项(比如“允许对用户信息进行分析”和“不允许对用户信息进行分析”),用以获取用户的选择。Step 4c: The AF network element provides the user of the target UE with permitted options (such as "allow to analyze user information" and "not allow user information to be analyzed") through the user interface to obtain the user's choice.
步骤4d:AF网元在获取到用户对该选项的选择后,根据用户的选择,向NEF网元发送第四许可指示获取响应,其中携带根据用户的选择得到的目标UE的许可指示信息(该指示信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析)。Step 4d: After acquiring the user's selection of the option, the AF network element sends a fourth permission indication acquisition response to the NEF network element according to the user's selection, which carries the permission indication information of the target UE obtained according to the user's selection (this The indication information is used to indicate whether the target UE allows the network to analyze the user information of the target UE).
可选的,目标UE的许可指示信息中可携带许可有效期信息,用于指示目标UE许可网络对该目标UE的用户信息进行分析的有效期。Optionally, the license indication information of the target UE may carry license validity period information, which is used to indicate the validity period for which the target UE allows the network to analyze the user information of the target UE.
步骤4e:NEF网元将第四许可指示获取响应转发给UDM网元。Step 4e: The NEF network element forwards the fourth permission indication acquisition response to the UDM network element.
步骤5:UDM网元接收到目标UE的许可指示信息后,向NWDAF网元返回第一查询响应,用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 5: After receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
可选的,第一查询响应中可携带目标UE的许可指示信息,该许可指示信息用于指示目标UE是否允许网络对该目标UE的用户信息进行收集或分析。Optionally, the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze user information of the target UE.
可选的,如果UDM网元查询到目标UE的签约信息(该签约信息用于指示目标UE是否允许网络对该目标UE的用户信息进行分析),则也可将该签约信息携带于第一查询响应中发送给NWDAF网元。Optionally, if the UDM network element queries the subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information can also be carried in the first query. The response is sent to the NWDAF network element.
需要说明的是,步骤5中,若第一查询响应指示目标UE不允许网络对该目标UE的用户信息进行分析,则NWDAF网元可向NEF网元发送用于指示拒绝对目标UE进行用户信息分析的第一用户信息分析响应,并由NEF网元通知AF网元拒绝对目标UE的用户信息进行分析,不再执行后续的步骤6至步骤14。It should be noted that, in step 5, if the first query response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a message to the NEF network element to indicate that the user information is rejected for the target UE. The analyzed first user information analyzes the response, and the NEF network element notifies the AF network element to refuse to analyze the user information of the target UE, and the subsequent steps 6 to 14 are not performed.
步骤6:NWDAF网元根据第一查询响应确定目标UE允许网络对该目标UE的用户信息进行收集和分析,则获取目标UE的用户信息。Step 6: The NWDAF network element determines, according to the first query response, that the target UE allows the network to collect and analyze the user information of the target UE, and then acquires the user information of the target UE.
可选的,该步骤的具体实现方式与图3流程中的相关步骤相同。Optionally, the specific implementation manner of this step is the same as the relevant step in the flowchart of FIG. 3 .
步骤7:NWDAF网元对目标UE的用户信息进行分析,得到分析结果。Step 7: The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
其中,目标UE的用户信息的内容,以及对用户信息进行分析所得到的分析结果,可参见前述实施例的相关描述。例如,若NF网元请求对目标UE的移动性进行分析,则NWDAF网元获取到的用户信息至少包括目标UE的移动性相关信息,对用户信息进行分析所得到的结果包括目标UE的移动性统计信息以及目标UE的移动性预测信息中的至少一项。For the content of the user information of the target UE and the analysis result obtained by analyzing the user information, reference may be made to the relevant descriptions of the foregoing embodiments. For example, if the NF network element requests to analyze the mobility of the target UE, the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE, and the result obtained by analyzing the user information includes the mobility of the target UE. At least one item of statistical information and mobility prediction information of the target UE.
步骤8:NWDAF网元向NEF网元发送第一用户信息分析响应,其中携带针对目标UE的分析结果。Step 8: The NWDAF network element sends a first user information analysis response to the NEF network element, which carries the analysis result for the target UE.
步骤9:NEF网元向AF网元发送第二用户信息分析响应,其中携带针对目标UE的分析结果。Step 9: The NEF network element sends a second user information analysis response to the AF network element, which carries the analysis result for the target UE.
进一步的,上述流程还可包括以下步骤:Further, the above process may further include the following steps:
步骤10:NWDAF网元获取目标UE的更新的用户信息。Step 10: The NWDAF network element acquires the updated user information of the target UE.
可选的,该步骤的具体实现方式与图3流程中的相关步骤相同。Optionally, the specific implementation manner of this step is the same as the relevant step in the flowchart of FIG. 3 .
步骤11:NWDAF网元确定目标UE的有效期(即目标UE允许网络对该目标UE的用户信息进行分析的有效期)是否到期,若已到期或过期,则向UDM网元查询是否更改该目标UE允许网络对该目标UE的用户信息进行分析的有效期。Step 11: The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target The validity period during which the UE allows the network to analyze the user information of the target UE.
可选的,NWDAF网元获取到目标UE的更新的用户信息后,若根据该目标UE的有效期信息判断有效期到期或过期,则向UDM网元发送第二查询请求,第二查询请求用于请求查询是否更改目标UE允许网络对该目标UE的用户信息进行分析的有效期。其中,UDM网元可以直接确定是否更改目标UE的有效期,也可以指示NEF网元触发AF网元与目标UE进行协商,以获取是否更改目标终端的有效期的指示信息。Optionally, after the NWDAF network element obtains the updated user information of the target UE, if it is determined that the validity period expires or expires according to the validity period information of the target UE, it sends a second query request to the UDM network element, and the second query request is used for Request to query whether to change the validity period of the target UE that allows the network to analyze the user information of the target UE. The UDM network element can directly determine whether to change the validity period of the target UE, or can instruct the NEF network element to trigger the AF network element to negotiate with the target UE to obtain indication information on whether to change the validity period of the target terminal.
可选的,UDM网元指示NEF网元触发AF网元与目标UE进行协商的过程,与本流程中的步骤4a至步骤4e的过程基本相同。Optionally, the UDM network element instructs the NEF network element to trigger the process of the AF network element to negotiate with the target UE, which is basically the same as the process of step 4a to step 4e in this flow.
需要说明的是,步骤11为可选步骤。在另外的实施例中,若NWDAF网元确定目标UE的有效期到期或过期,则可以拒绝对该目标UE的用户信息进行分析,并可进一步向NEF网元发送第一用户信息分析响应,并通过NEF网元通知AF网元拒绝对目标UE的用户信息进行分析,不再执行后续的步骤12至步骤14。进一步的,NWDAF网元还可以向AMF网元和/或AF网元发送取消订阅目标UE的用户信息的请求,以不再接收该目标UE的更新的用户信息。It should be noted that step 11 is an optional step. In another embodiment, if the NWDAF network element determines that the validity period of the target UE has expired or expired, it may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NEF network element, and The AF network element is notified by the NEF network element to refuse to analyze the user information of the target UE, and the subsequent steps 12 to 14 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
步骤12:NWDAF网元对目标UE的更新的用户信息进行分析,获得分析结果。Step 12: The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
该步骤中,NWDAF网元接收UDM网元发送的第二查询响应后,若第二查询响应指示更改目标UE允许网络对该目标UE的用户信息进行分析的有效 期,则NWDAF网元对该目标UE的更新的用户信息进行分析;否则,NWDAF网元拒绝对该目标UE的更新的用户信息进行分析,不再执行步骤12至步骤14,并可进一步通过NEF网元通知AF网元拒绝对目标UE的用户信息进行分析,并可进一步指示拒绝的原因为目标UE的许可有效期到期。In this step, after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period. Analyze the updated user information of the target UE; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and does not perform steps 12 to 14, and can further notify the AF network element through the NEF network element to reject the target UE. The user information of the target UE is analyzed, and the reason for rejection can be further indicated that the license validity period of the target UE has expired.
步骤13:NWDAF网元将分析结果发送给NEF网元。Step 13: The NWDAF network element sends the analysis result to the NEF network element.
步骤14:NEF网元将分析结果发送给AF网元。Step 14: The NEF network element sends the analysis result to the AF network element.
需要说明的是,在一些实施例中,如果NWDAF网元向AMF网元和/或AF网元订阅了目标UE的用户信息,则AMF网元和/或AF网元可能会多次向NWDAF网元发送该目标UE的更新的用户信息。NWDAF网元每次收到目标UE的更新的用户信息后,均会判断该目标UE的有效期是否到期或过期,若没有到期或过期,则对更新的用户信息进行分析,如果判断目标UE的有效期已到期或过期,则执行上述步骤11。It should be noted that, in some embodiments, if the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element may subscribe to the NWDAF network element for multiple times. The element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. The validity period has expired or expired, then perform the above step 11.
需要说明的是,图4所示流程中的步骤4a至步骤4e仅为一种示例,UDM网元也可以通过其他方式获得目标UE的许可指示信息,本申请实施例对此不作限制。It should be noted that steps 4a to 4e in the process shown in FIG. 4 are only an example, and the UDM network element may also obtain the license indication information of the target UE in other ways, which is not limited in this embodiment of the present application.
基于图1所示的用户信息分析结果反馈方法,下面以第一网元为NWDAF网元,第二网元为NF网元为例,对本申请实施例进行描述。Based on the user information analysis result feedback method shown in FIG. 1 , the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
参见图6,为本申请实施例提供的一种用户信息分析结果反馈方法的信令交互示意图。如图所示,该流程可包括:Referring to FIG. 6 , it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
步骤1:NF网元向NWDAF网元发送第一用户信息分析请求。Step 1: The NF network element sends a first user information analysis request to the NWDAF network element.
该步骤中,NF网元可以使用Nnwdaf_AnalyticsInfo服务或Nnwdaf_AnalyticsSubscription服务,将第一用户信息分析请求发送到NWDAF网元,以对目标UE或一组目标UE的用户信息进行分析。其中,第一用户信息分析请求可以是Nswdaf_AnalyticsInfo_Request消息,或者是Nnwdaf_AnalyticsSubscription_Subscribe消息。In this step, the NF network element may use the Nnwdaf_AnalyticsInfo service or the Nnwdaf_AnalyticsSubscription service to send the first user information analysis request to the NWDAF network element to analyze the user information of the target UE or a group of target UEs. The first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message or a Nnwdaf_AnalyticsSubscription_Subscribe message.
NF网元可以请求通过对目标UE的用户信息进行分析以获得目标UE的移动性统计信息,也可以请求获得目标UE的移动性预测信息,还可以请求获 得目标UE的移动性统计信息以及移动性预测信息。该请求消息中可携带分析类型的指示信息,该分析类型可设置为UE移动性信息(type of analytics=UE mobility information)。该请求消息中还可携带目标UE的标识信息,该目标UE的指示信息可以是UE标识(UE ID),也可以是UE组的组标识(group ID)。The NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information. The request message may carry indication information of the analysis type, and the analysis type may be set to UE mobility information (type of analytics=UE mobility information). The request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
该请求消息中还携带目标UE的许可指示信息,该许可指示信息可以是目标UE的令牌(token),用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。该许可指示信息(如token)可以通过与目标UE进行协商得到。The request message also carries the permission indication information of the target UE, and the permission indication information may be a token of the target UE, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE. The permission indication information (eg token) can be obtained through negotiation with the target UE.
步骤2:NWDAF网元接收到第一用户信息分析请求后,向UDM网元发送验证请求,其中携带目标UE的许可指示信息(如token),该验证请求用于请求对目标UE的许可指示信息进行验证。Step 2: After receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, which carries the permission indication information (such as token) of the target UE, and the verification request is used to request the permission indication information for the target UE. authenticating.
步骤3:UDM网元接收到验证请求后,对目标UE的许可指示信息(如token)的合法性进行验证,得到验证结果,验证结果用于指示目标UE的许可指示信息是否验证通过。Step 3: After receiving the verification request, the UDM network element verifies the legality of the permission indication information (eg token) of the target UE, and obtains a verification result, which is used to indicate whether the permission indication information of the target UE is verified.
可选的,UDM网元可以将接收到的目标UE的许可指示信息(如token)与该UDM网元保存的该目标UE的许可指示信息进行比较,若一致,则验证通过,否则验证失败。通过对目标UE的许可指示信息(如token)进行验证,可以提高安全性。Optionally, the UDM network element can compare the received permission indication information (such as token) of the target UE with the permission indication information of the target UE saved by the UDM network element. If they are consistent, the verification passes, otherwise the verification fails. By verifying the permission indication information (eg token) of the target UE, the security can be improved.
步骤4:UDM网元向NWDAF网元返回验证响应,该验证响应用于指示目标UE的许可指示信息是否验证通过,或者用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 4: The UDM network element returns a verification response to the NWDAF network element, where the verification response is used to indicate whether the permission indication information of the target UE is verified, or whether the target UE allows the network to analyze the user information of the target UE.
可选的,在一些实施例中,验证响应中可携带验证结果;在另一些实施例中,NWDAF网元也可根据验证结果确定目标UE是否允许网络对该目标UE的用户信息进行收集或分析,并将确定出的结果通过验证响应通知给NWDAF网元。Optionally, in some embodiments, the verification response may carry the verification result; in other embodiments, the NWDAF network element may also determine whether the target UE allows the network to collect or analyze the user information of the target UE according to the verification result. , and notify the NWDAF network element of the determined result through the verification response.
需要说明的是,步骤4中,若验证响应指示目标UE不允许网络对该目标UE的用户信息进行分析,则NWDAF网元可向NF网元发送用于指示拒绝对 目标UE的用户信息进行分析的第一用户信息分析响应,以通知NF网元拒绝对目标UE的用户信息进行分析,不再执行后续的步骤5至步骤11。It should be noted that, in step 4, if the verification response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a message to the NF network element to indicate that the user information of the target UE is refused to be analyzed. The first user information analysis response is to notify the NF network element to refuse to analyze the user information of the target UE, and the subsequent steps 5 to 11 are not executed.
步骤5:NWDAF网元根据验证响应确定目标UE允许网络对该目标UE的用户信息进行收集和分析,则获取目标UE的用户信息。Step 5: The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then obtains the user information of the target UE.
该步骤的具体实现,基本与图3中的相关步骤相同,在此不再重复。The specific implementation of this step is basically the same as the relevant step in FIG. 3 , and will not be repeated here.
步骤6:NWDAF网元对目标UE的用户信息进行分析,得到分析结果。Step 6: The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
其中,目标UE的用户信息的内容,以及对用户信息进行分析所得到的分析结果,可参见前述实施例的相关描述。例如,若NF网元请求对目标UE的移动性进行分析,则NWDAF网元获取到的用户信息至少包括目标UE的移动性相关信息,对用户信息进行分析所得到的结果包括目标UE的移动性统计信息以及目标UE的移动性预测信息中的至少一项。For the content of the user information of the target UE and the analysis result obtained by analyzing the user information, reference may be made to the relevant descriptions of the foregoing embodiments. For example, if the NF network element requests to analyze the mobility of the target UE, the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE, and the result obtained by analyzing the user information includes the mobility of the target UE. At least one item of statistical information and mobility prediction information of the target UE.
步骤7:NWDAF网元向NF网元发送第一用户信息分析响应,其中携带针对目标UE的分析结果。Step 7: The NWDAF network element sends a first user information analysis response to the NF network element, which carries the analysis result for the target UE.
进一步的,上述流程还可包括以下步骤:Further, the above process may further include the following steps:
步骤8:NWDAF网元获取目标UE的更新的用户信息。Step 8: The NWDAF network element obtains the updated user information of the target UE.
其中,如果NWDAF网元向AMF网元和/或AF网元订阅了目标UE的用户信息,则AMF网元和/或AF网元根据订阅请求,在目标UE的用户信息发生更新时,向NWDAF网元发送更新的用户信息。例如,AMF网元可以通过通知消息(如Namf_EventExposure_Notify)将目标UE的更新用户信息发送给NWDAF网元;再例如,AF网元可以通过通知消息(如Naf_EventExposure_Notify)将目标UE的更新用户信息发送给NWDAF网元。Wherein, if the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element, according to the subscription request, when the user information of the target UE is updated, subscribe to the NWDAF network element. The network element sends updated user information. For example, the AMF network element can send the updated user information of the target UE to the NWDAF network element through a notification message (such as Namf_EventExposure_Notify); for another example, the AF network element can send the updated user information of the target UE to the NWDAF through a notification message (such as Naf_EventExposure_Notify) network element.
步骤9:NWDAF网元确定目标UE的有效期(即目标UE允许网络对该目标UE的用户信息进行分析的有效期)是否到期,若已到期或过期,则向UDM网元查询是否更改该目标UE允许网络对该目标UE的用户信息进行分析的有效期。Step 9: The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target. The validity period during which the UE allows the network to analyze the user information of the target UE.
该步骤的具体实现,基本与图3中的相关步骤相同,在此不再重复。The specific implementation of this step is basically the same as the relevant step in FIG. 3 , and will not be repeated here.
需要说明的是,步骤9为可选步骤。在另外的实施例中,若NWDAF网 元确定目标UE的有效期到期或过期,则可以拒绝对该目标UE的用户信息进行分析,并可进一步向NF网元发送第一用户信息分析响应,以通知NF网元拒绝对目标UE的用户信息进行分析,不再执行后续的步骤10至步骤11。进一步的,NWDAF网元还可以向AMF网元和/或AF网元发送取消订阅目标UE的用户信息的请求,以不再接收该目标UE的更新的用户信息。It should be noted that step 9 is an optional step. In another embodiment, if the NWDAF network element determines that the validity period of the target UE has expired or expired, it may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to The NF network element is notified to refuse to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
步骤10:NWDAF网元对目标UE的更新的用户信息进行分析,获得分析结果。Step 10: The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
该步骤中,NWDAF网元接收UDM网元发送的第二查询响应后,若第二查询响应指示更改目标UE允许网络对该目标UE的用户信息进行分析的有效期,则NWDAF网元对该目标UE的更新的用户信息进行分析;否则,NWDAF网元拒绝对该目标UE的更新的用户信息进行分析,不再执行后续步骤11,可进一步通知AF网元拒绝对目标UE的用户信息进行分析,并可进一步指示拒绝的原因为目标UE的许可有效期到期。In this step, after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period. The updated user information of the target UE is analyzed; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and the subsequent step 11 is not performed, and the AF network element can be further notified to refuse to analyze the user information of the target UE, and The reason for the rejection may be further indicated that the license validity period of the target UE has expired.
步骤11:NWDAF网元将分析结果发送给NF网元。Step 11: The NWDAF network element sends the analysis result to the NF network element.
需要说明的是,在一些实施例中,如果NWDAF网元向AMF网元和/或AF网元订阅了目标UE的用户信息,则AMF网元和/或AF网元可能会多次向NWDAF网元发送该目标UE的更新的用户信息。NWDAF网元每次收到目标UE的更新的用户信息后,均会判断该目标UE的有效期是否到期或过期,若没有到期或过期,则对更新的用户信息进行分析,如果判断目标UE的有效期已到期或过期,则执行上述步骤9。It should be noted that, in some embodiments, if the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element, the AMF network element and/or the AF network element may subscribe to the NWDAF network element for multiple times. The element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. has expired or expired, go to step 9 above.
基于图1所示的用户信息分析结果反馈方法,下面以第一网元为NWDAF网元,第二网元为NEF网元为例,对本申请实施例进行描述。Based on the user information analysis result feedback method shown in FIG. 1 , the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
参见图7,为本申请实施例提供的另一种用户信息分析结果反馈方法的信令交互示意图,如图所示,该流程可包括:Referring to FIG. 7, it is a schematic diagram of signaling interaction of another method for feeding back a user information analysis result provided by an embodiment of the present application. As shown in the figure, the process may include:
步骤0:AF网元与目标UE通过应用层协商目标UE的许可指示信息,即目标UE是否允许网络对该目标UE的用户信息进行分析。Step 0: The AF network element and the target UE negotiate the permission indication information of the target UE through the application layer, that is, whether the target UE allows the network to analyze the user information of the target UE.
可选的,AF网元与目标UE可以采用网络密钥交换协议(IKE)的方式 协商目标UE是否允许网络对该目标UE的用户信息进行分析,AF网元可以根据协商结果生成目标UE的令牌(token),作为目标UE与AF网元的共享信息,用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。可选的,该信息可以作为目标UE的签约信息保存在UDM网元中。Optionally, the AF network element and the target UE can use the Network Key Exchange Protocol (IKE) to negotiate whether the target UE allows the network to analyze the user information of the target UE, and the AF network element can generate a command for the target UE according to the negotiation result. The token (token), as the shared information between the target UE and the AF network element, is used to indicate whether the target UE allows the network to analyze the user information of the target UE. Optionally, the information may be stored in the UDM network element as subscription information of the target UE.
步骤1:AF网元向NEF网元发送第二用户信息分析请求,用于请求对目标UE的用户信息进行分析,该请求中携带有目标UE的许可指示信息(如token)。Step 1: The AF network element sends a second user information analysis request to the NEF network element for requesting to analyze the user information of the target UE, and the request carries the permission indication information (eg token) of the target UE.
该步骤中,AF网元可以使用Nnef_AnalyticsExpose服务,将第二用户信息分析请求发送到NEF网元,以对目标UE或一组目标UE的用户信息进行分析。其中,第二用户信息分析请求可以是Nnef_AnalyticsExpose_Fetch消息。In this step, the AF network element may use the Nnef_AnalyticsExpose service to send the second user information analysis request to the NEF network element, so as to analyze the user information of the target UE or a group of target UEs. The second user information analysis request may be an Nnef_AnalyticsExpose_Fetch message.
AF网元可以请求通过对目标UE的用户信息进行分析以获得目标UE的移动性统计信息,也可以请求获得目标UE的移动性预测信息,还可以请求获得目标UE的移动性统计信息以及移动性预测信息。该请求消息中可携带分析类型的指示信息,该分析类型可设置为UE移动性信息(type of annlytics=UE mobility information)。该请求消息中还可携带目标UE的标识信息,该目标UE的指示信息可以是UE标识(UE ID),也可以是UE组的组标识(group ID)。The AF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, or may request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information. The request message may carry the indication information of the analysis type, and the analysis type may be set to UE mobility information (type of annlytics=UE mobility information). The request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
步骤2:NEF网元接收到第二用户信息分析请求后,向NWDAF网元发送第一用户信息分析请求。Step 2: After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element.
步骤3:NWDAF网元接收到第一用户信息分析请求后,向UDM网元发送验证请求,其中携带目标UE的许可指示信息(如token),该验证请求用于请求对目标UE的许可指示信息进行验证。Step 3: After receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, which carries the permission indication information (such as token) of the target UE, and the verification request is used to request the permission indication information for the target UE. authenticating.
步骤4:UDM网元接收到验证请求后,对目标UE的许可指示信息(如token)的合法性进行验证,得到验证结果,验证结果用于指示目标UE的许可指示信息是否验证通过。Step 4: After receiving the verification request, the UDM network element verifies the legality of the permission indication information (eg token) of the target UE, and obtains a verification result, which is used to indicate whether the permission indication information of the target UE is verified.
步骤5:UDM网元向NWDAF网元返回验证响应,该验证响应用于指示目标UE的许可指示信息是否验证通过,或者用于指示目标UE是否允许网络对该目标UE的用户信息进行分析。Step 5: The UDM network element returns a verification response to the NWDAF network element, where the verification response is used to indicate whether the permission indication information of the target UE is verified, or whether the target UE allows the network to analyze the user information of the target UE.
步骤6:NWDAF网元根据验证响应确定目标UE允许网络对该目标UE的用户信息进行收集和分析,则获取目标UE的用户信息。Step 6: The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then obtains the user information of the target UE.
步骤7:NWDAF网元对目标UE的用户信息进行分析,得到分析结果。Step 7: The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
步骤8:NWDAF网元向NEF网元发送第一用户信息分析响应,其中携带针对目标UE的分析结果。Step 8: The NWDAF network element sends a first user information analysis response to the NEF network element, which carries the analysis result for the target UE.
步骤9:NEF网元将分析结果发送给AF网元。Step 9: The NEF network element sends the analysis result to the AF network element.
上述步骤1至步骤8的具体实现方式基本与图6中的相关内容相同,在此不再重复。The specific implementation manners of the above steps 1 to 8 are basically the same as the related contents in FIG. 6 , and are not repeated here.
进一步的,上述流程还可包括以下步骤:Further, the above process may further include the following steps:
步骤10:NWDAF网元获取目标UE的更新的用户信息。Step 10: The NWDAF network element acquires the updated user information of the target UE.
步骤11:NWDAF网元确定目标UE的有效期(即目标UE允许网络对该目标UE的用户信息进行分析的有效期)是否到期,若已到期或过期,则向UDM网元查询是否更改该目标UE允许网络对该目标UE的用户信息进行分析的有效期。Step 11: The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target The validity period during which the UE allows the network to analyze the user information of the target UE.
步骤12:NWDAF网元对目标UE的更新的用户信息进行分析,获得分析结果。Step 12: The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
步骤13:NWDAF网元将分析结果发送给NF网元。Step 13: The NWDAF network element sends the analysis result to the NF network element.
步骤14:NEF网元将分析结果发送给AF网元。Step 14: The NEF network element sends the analysis result to the AF network element.
上述步骤10至步骤13的具体实现方式基本与图6中的相关内容相同,在此不再重复。The specific implementation manners of the foregoing steps 10 to 13 are basically the same as the related contents in FIG. 6 , and will not be repeated here.
基于相同的技术构思,本申请实施例还提供了一种网络设备,该网络设备可以实现前述实施例中第一网元(如NWDAF网元)的功能。Based on the same technical concept, an embodiment of the present application further provides a network device, which can implement the function of the first network element (eg, the NWDAF network element) in the foregoing embodiments.
参见图8,为本申请实施例提供的网络设备的结构示意图,如图所示,该网络设备可包括:接收单元801、处理单元802、发送单元803。Referring to FIG. 8 , which is a schematic structural diagram of a network device provided by an embodiment of the present application, as shown in the figure, the network device may include: a receiving unit 801 , a processing unit 802 , and a sending unit 803 .
接收单元801,用于接收来自于第二网元的第一用户信息分析请求;a receiving unit 801, configured to receive a first user information analysis request from a second network element;
处理单元802,用于获取允许对所述目标终端的用户信息进行分析的许可;a processing unit 802, configured to obtain a license allowing to analyze the user information of the target terminal;
发送单元803,用于获得所述许可后,将对所述目标终端的用户信息的分 析结果发送给所述第二网元。The sending unit 803 is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
可选的,处理单元802具体用于:获得所述许可后,对所述目标终端的用户信息进行分析得到分析结果,并将所述分析结果发送给所述第二网元;或者,获取所述目标终端的用户信息,对所述目标终端的用户信息进行分析得到分析结果,并在获得所述许可后,将所述分析结果发送给所述第二网元。Optionally, the processing unit 802 is specifically configured to: after obtaining the permission, analyze the user information of the target terminal to obtain an analysis result, and send the analysis result to the second network element; or, obtain the analysis result. user information of the target terminal, analyze the user information of the target terminal to obtain an analysis result, and after obtaining the permission, send the analysis result to the second network element.
可选的,处理单元802可具体用于:向UDM网元发送第一查询请求;接收UDM网元发送的第一查询响应,所述第一查询响应用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。Optionally, the processing unit 802 may be specifically configured to: send a first query request to the UDM network element; receive a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed.
可选的,所述第一查询响应携带许可指示信息,所述许可指示信息包括有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述第一用户信息分析请求携带所述目标终端的许可指示信息;处理单元802具体用于:向UDM网元发送验证请求,所述验证请求携带所述许可指示信息;接收所述UDM网元发送的验证响应,所述验证响应携带验证结果。可选的,所述验证结果用于指示所述许可指示信息是否验证通过,或者用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析,其中,所述许可指示信息验证通过表示所述目标终端允许网络对所述目标终端的用户信息进行分析。Optionally, the first user information analysis request carries the permission indication information of the target terminal; the processing unit 802 is specifically configured to: send a verification request to the UDM network element, where the verification request carries the permission indication information; The verification response sent by the UDM network element, where the verification response carries the verification result. Optionally, the verification result is used to indicate whether the permission indication information passes the verification, or is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal, wherein the permission indication information is verified. By representing the target terminal, the network is allowed to analyze the user information of the target terminal.
可选的,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
可选的,处理单元802还用于:获取到所述目标终端的更新的用户信息后,若根据所述有效期信息判断有效期过期,则向所述UDM网元发送第二查询请求,所述第二查询请求用于请求查询是否更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期;接收所述UDM网元发送的第二查询响应;若所述第二查询响应指示更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期,则对所述更新的用户信息进行分析,并将分析结果发送给所述第二网元。Optionally, the processing unit 802 is further configured to: after acquiring the updated user information of the target terminal, if it is determined that the validity period expires according to the validity period information, send a second query request to the UDM network element, and the first query request is sent to the UDM network element. The second query request is used to query whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal; receive the second query response sent by the UDM network element; if the second query response indicates a change If the target terminal allows the network to analyze the user information of the target terminal within the validity period, the updated user information is analyzed, and the analysis result is sent to the second network element.
在此需要说明的是,本申请实施例提供的上述网络设备,能够实现上述方法实施例中第一网元所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。It should be noted here that the above-mentioned network device provided in the embodiment of the present application can implement all the method steps implemented by the first network element in the above-mentioned method embodiment, and can achieve the same technical effect, and this embodiment will not be described here. The same parts and beneficial effects as in the method embodiment will be described in detail.
基于相同的技术构思,本申请实施例还提供了一种网络设备,该网络设备可以实现前述实施例中第二网元(如UDM网元)的功能。Based on the same technical concept, an embodiment of the present application further provides a network device, and the network device can implement the function of the second network element (eg, a UDM network element) in the foregoing embodiments.
参见图9,为本申请实施例提供的网络设备的结构示意图,如图所示,该网络设备可包括:接收单元901、处理单元902、发送单元903。Referring to FIG. 9 , which is a schematic structural diagram of a network device provided by an embodiment of the present application, as shown in the figure, the network device may include: a receiving unit 901 , a processing unit 902 , and a sending unit 903 .
接收单元901,用于接收来自于NWDAF网元的第一请求,所述第一请求用于请求获取目标终端的是否允许对所述目标终端的用户信息进行分析;A receiving unit 901, configured to receive a first request from an NWDAF network element, where the first request is used to request to obtain whether the user information of the target terminal is allowed to be analyzed;
发送单元903,用于向所述NWDAF网元发送第一响应,所述第一响应用于指示是否允许对所述目标终端的用户信息进行分析。The sending unit 903 is configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
可选的,所述第一请求为第一查询请求,所述第一查询请求用于请求查询所述目标终端是否允许网络对所述目标终端的用户信息进行分析,或者用于请求查询是否具有允许网络对所述目标终端的用户信息进行分析的签约信息。处理单元902用于:根据所述第一查询请求,获取所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;根据所述签约信息确定所述目标终端是否允许网络对所述目标终端的用户信息进行分析;发送单元903具体用于:向所述NWDAF网元发送第一查询响应,所述第一查询响应用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。Optionally, the first request is a first query request, and the first query request is used to request to query whether the target terminal allows the network to analyze the user information of the target terminal, or to query whether the target terminal has user information. Subscription information that allows the network to analyze the user information of the target terminal. The processing unit 902 is configured to: obtain, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal; and determine whether the target terminal allows the network to analyze the user information of the target terminal according to the subscription information; Analyze the user information of the target terminal; the sending unit 903 is specifically configured to: send a first query response to the NWDAF network element, where the first query response is used to indicate whether the target terminal allows the network to respond to the target terminal analysis of user information.
可选的,处理单元902还用于:若未获取到所述签约信息,则指示发送单元903向AMF网元发送第一许可指示获取请求,以使得所述AMF网元向所述目标终端获取许可指示信息,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;接收单元901还用于:接收所述AMF网元发送的第一许可指示获取响应,所述第一许可指示获取响应携带所述目标终端的许可指示信息。Optionally, the processing unit 902 is further configured to: if the subscription information is not acquired, the instruction sending unit 903 sends a first permission instruction acquisition request to the AMF network element, so that the AMF network element acquires the target terminal from the AMF network element. License indication information, where the license indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal; the receiving unit 901 is further configured to: receive the first license instruction acquisition sent by the AMF network element In response, the first permission indication acquisition response carries the permission indication information of the target terminal.
可选的,所述第一查询请求是所述NWDAF网元接收到来自于NEF网元 的第一用户信息分析请求发送的,所述第一用户信息分析请求是所述NEF网元接收到来自于AF网元发送的第二用户信息分析请求发送的。发送单元903还用于:向所述NEF网元发送第四许可指示获取请求,所述第四许可指示获取请求被所述NEF网元转发给所述AF网元,以使得所述AF网元从所述目标终端获得所述目标终端的许可指示信息,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;接收单元901还用于:接收所述NEF网元发送的第四许可指示获取响应,所述第四许可指示获取响应携带所述目标终端的许可指示信息。Optionally, the first query request is sent by the NWDAF network element after receiving the first user information analysis request from the NEF network element, and the first user information analysis request is received by the NEF network element from the Sent by the second user information analysis request sent by the AF network element. The sending unit 903 is further configured to: send a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element Obtain permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal; the receiving unit 901 is further configured to: receive the The fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
可选的,所述第一查询响应携带许可指示信息,所述许可指示信息包括有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
可选的,所述第一请求为验证请求,所述验证请求携带所述目标终端的许可指示信息。处理单元902还用于:对所述目标终端的许可指示信息进行验证得到验证结果,所述验证结果用于指示所述许可指示信息是否验证通过,或者用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析,其中,所述许可指示信息验证通过表示所述目标终端允许网络对所述目标终端的用户信息进行分析;发送单元903还用于:向所述NWDAF网元发送验证响应,所述验证响应携带所述验证结果。Optionally, the first request is a verification request, and the verification request carries the permission indication information of the target terminal. The processing unit 902 is further configured to: verify the permission indication information of the target terminal to obtain a verification result, where the verification result is used to indicate whether the permission indication information passes the verification, or is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed, wherein the verification of the permission indication information indicates that the target terminal allows the network to analyze the user information of the target terminal; the sending unit 903 is further configured to: send to the NWDAF network element A verification response is sent, where the verification response carries the verification result.
可选的,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
可选的,接收单元901还用于:接收所述NWDAF网元发送的第二查询请求,所述第二查询请求是所述NWDAF网元获取到所述目标终端的更新的用户信息并确定所述目标终端的所述有效期过期后发送的,所述第二查询请求用于请求查询是否更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期;发送单元903还用于:向所述NWDAF网元发送第二查询响应,所述第二查询响应用于指示是否更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Optionally, the receiving unit 901 is further configured to: receive a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the updated user information of the target terminal. Sent after the validity period of the target terminal expires, the second query request is used to request to query whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal; the sending unit 903 is further used for: Send a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal.
在此需要说明的是,本申请实施例提供的上述网络设备,能够实现上述方法实施例中第二网元所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。It should be noted here that the above-mentioned network device provided in the embodiment of the present application can implement all the method steps implemented by the second network element in the above-mentioned method embodiment, and can achieve the same technical effect, and this embodiment will not be described here. The same parts and beneficial effects as in the method embodiment will be described in detail.
基于相同的技术构思,本申请实施例还提供了一种通信装置。该通信装置可以实现前述实施例中第一网元(如NWDAF网元)的功能。Based on the same technical idea, an embodiment of the present application also provides a communication device. The communication apparatus may implement the function of the first network element (eg, the NWDAF network element) in the foregoing embodiment.
参见图10,为本申请实施例提供的通信装置的结构示意图。如图所示,该通信装置可包括:处理器1001、存储器1002、通信接口1003以及总线接口1004。Referring to FIG. 10 , it is a schematic structural diagram of a communication apparatus according to an embodiment of the present application. As shown in the figure, the communication device may include: a processor 1001 , a memory 1002 , a communication interface 1003 and a bus interface 1004 .
处理器1001负责管理总线架构和通常的处理,存储器1002可以存储处理器1001在执行操作时所使用的数据。通信接口1003用于在处理器1001的控制下接收和发送数据。The processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations. The communication interface 1003 is used to receive and transmit data under the control of the processor 1001 .
总线架构可以包括任意数量的互联的总线和桥,具体由处理器1001代表的一个或多个处理器和存储器1002代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。处理器1001负责管理总线架构和通常的处理,存储器1002可以存储处理器1001在执行操作时所使用的数据。The bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 1001 and various circuits of memory represented by memory 1002 linked together. The bus architecture may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be described further herein. The bus interface provides the interface. The processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations.
本申请实施例揭示的流程,可以应用于处理器1001中,或者由处理器1001实现。在实现过程中,信号处理流程的各步骤可以通过处理器1001中的硬件的集成逻辑电路或者软件形式的指令完成。处理器1001可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位 于存储器1002,处理器1001读取存储器1002中的信息,结合其硬件完成信号处理流程的步骤。The processes disclosed in the embodiments of the present application may be applied to the processor 1001 or implemented by the processor 1001 . In the implementation process, each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1001 or an instruction in the form of software. The processor 1001 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the embodiments of the present application. The disclosed methods, steps, and logical block diagrams of . A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor. The software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art. The storage medium is located in the memory 1002, and the processor 1001 reads the information in the memory 1002, and completes the steps of the signal processing flow in combination with its hardware.
具体地,处理器1001,用于读取存储器1002中的计算机指令并执行本申请实施例中第一网元(如NWDAF网元)实现的功能。Specifically, the processor 1001 is configured to read the computer instructions in the memory 1002 and execute the function implemented by the first network element (eg, the NWDAF network element) in the embodiment of the present application.
在此需要说明的是,本发明实施例提供的上述通信装置,能够实现上述方法实施例中第一网元(如NWDAF网元)所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。It should be noted here that the above-mentioned communication device provided by the embodiment of the present invention can implement all the method steps implemented by the first network element (such as the NWDAF network element) in the above-mentioned method embodiment, and can achieve the same technical effect. The same parts and beneficial effects in this embodiment as those in the method embodiment will not be described in detail here.
基于相同的技术构思,本申请实施例还提供了一种通信装置。该通信装置可以实现前述实施例中第二网元(如UDM网元)的功能。Based on the same technical idea, an embodiment of the present application also provides a communication device. The communication device may implement the function of the second network element (eg, a UDM network element) in the foregoing embodiment.
参见图11,为本申请实施例提供的通信装置的结构示意图。如图所示,该通信装置可包括:处理器1101、存储器1102、通信接口1103以及总线接口1104。Referring to FIG. 11 , it is a schematic structural diagram of a communication apparatus according to an embodiment of the present application. As shown in the figure, the communication device may include: a processor 1101 , a memory 1102 , a communication interface 1103 and a bus interface 1104 .
处理器1101负责管理总线架构和通常的处理,存储器1102可以存储处理器1101在执行操作时所使用的数据。通信接口1103用于在处理器1101的控制下接收和发送数据。The processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations. The communication interface 1103 is used to receive and transmit data under the control of the processor 1101 .
总线架构可以包括任意数量的互联的总线和桥,具体由处理器1101代表的一个或多个处理器和存储器1102代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。处理器1101负责管理总线架构和通常的处理,存储器1102可以存储处理器1101在执行操作时所使用的数据。The bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 1101 and various circuits of memory represented by memory 1102 linked together. The bus architecture may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be described further herein. The bus interface provides the interface. The processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations.
本申请实施例揭示的流程,可以应用于处理器1101中,或者由处理器1101实现。在实现过程中,信号处理流程的各步骤可以通过处理器1101中的硬件的集成逻辑电路或者软件形式的指令完成。处理器1101可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请 实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器1102,处理器1101读取存储器1102中的信息,结合其硬件完成信号处理流程的步骤。The processes disclosed in the embodiments of the present application may be applied to the processor 1101 or implemented by the processor 1101 . In the implementation process, each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1101 or an instruction in the form of software. The processor 1101 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the embodiments of the present application. The disclosed methods, steps, and logical block diagrams of . A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor. The software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art. The storage medium is located in the memory 1102, and the processor 1101 reads the information in the memory 1102, and completes the steps of the signal processing flow in combination with its hardware.
具体地,处理器1101,用于读取存储器1102中的计算机指令并执行本申请实施例中第二网元(如UDM网元)实现的功能。Specifically, the processor 1101 is configured to read the computer instructions in the memory 1102 and execute the function implemented by the second network element (eg, the UDM network element) in the embodiment of the present application.
在此需要说明的是,本发明实施例提供的上述通信装置,能够实现上述方法实施例中第二网元(如UDM网元)所实现的所有方法步骤,且能够达到相同的技术效果,在此不再对本实施例中与方法实施例相同的部分及有益效果进行具体赘述。It should be noted here that the above-mentioned communication device provided in the embodiment of the present invention can implement all the method steps implemented by the second network element (such as a UDM network element) in the above-mentioned method embodiment, and can achieve the same technical effect. The same parts and beneficial effects in this embodiment as those in the method embodiment will not be described in detail here.
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机可执行指令,计算机可执行指令用于使计算机执行上述实施例中第一网元(如NWDAF网元)所执行的方法。Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the first network element (eg, NWDAF network element) in the foregoing embodiment. method performed.
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机可执行指令,计算机可执行指令用于使计算机执行上述实施例中第二网元(如UDM网元)所执行的方法。Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the second network element (such as a UDM network element) in the foregoing embodiment. method performed.
基于与上述方法实施例相同构思,本申请还提供一种计算机程序产品,该计算机程序产品在被计算机调用执行时可以完成方法实施例以及上述方法实施例任意可能的设计中所涉及的方法。Based on the same concept as the above method embodiments, the present application further provides a computer program product, which, when invoked and executed by a computer, can complete the method embodiments and the methods involved in any possible designs of the above method embodiments.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by those skilled in the art, the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.

Claims (59)

  1. 一种用户信息分析结果反馈方法,其特征在于,包括:A user information analysis result feedback method is characterized in that, comprising:
    第一网元接收来自于第二网元的第一用户信息分析请求;The first network element receives the first user information analysis request from the second network element;
    所述第一网元获取允许对所述目标终端的用户信息进行分析的许可;obtaining, by the first network element, a license allowing to analyze the user information of the target terminal;
    所述第一网元获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元。After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
  2. 如权利要求1所述的方法,其特征在于,所述第一网元获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元,包括:The method according to claim 1, wherein after the first network element obtains the permission, sending an analysis result of the user information of the target terminal to the second network element, comprising:
    所述第一网元获得所述许可后,对所述目标终端的用户信息进行分析得到分析结果,并将所述分析结果发送给所述第二网元;或者,After the first network element obtains the permission, analyze the user information of the target terminal to obtain an analysis result, and send the analysis result to the second network element; or,
    所述第一网元获取所述目标终端的用户信息,对所述目标终端的用户信息进行分析得到分析结果,并在获得所述许可后,将所述分析结果发送给所述第二网元。The first network element obtains the user information of the target terminal, analyzes the user information of the target terminal to obtain an analysis result, and after obtaining the permission, sends the analysis result to the second network element .
  3. 如权利要求1或2所述的方法,其特征在于,所述第一网元为网络数据分析功能NWDAF网元;The method according to claim 1 or 2, wherein the first network element is a network data analysis function NWDAF network element;
    所述第一网元获取允许对所述目标终端的用户信息进行分析的许可,包括:The first network element obtains a license that allows to analyze the user information of the target terminal, including:
    所述NWDAF网元向统一数据管理UDM网元发送第一查询请求;The NWDAF network element sends a first query request to the unified data management UDM network element;
    所述NWDAF网元接收所述UDM网元发送的第一查询响应,所述第一查询响应用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。The NWDAF network element receives a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  4. 如权利要求3所述的方法,其特征在于,所述第一查询响应携带许可指示信息,所述许可指示信息是所述UDM网元指示接入及移动性管理功能AMF网元通过无线接入网RAN从所述目标终端获取的;其中,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。The method according to claim 3, wherein the first query response carries permission indication information, and the permission indication information is that the UDM network element instructs the access and mobility management function AMF network element to access wirelessly The network RAN is obtained from the target terminal; wherein the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  5. 如权利要求4所述的方法,其特征在于,所述第二网元为网络功能NF网元。The method of claim 4, wherein the second network element is a network function NF network element.
  6. 如权利要求3所述的方法,其特征在于,所述第一查询响应携带许可指示信息,所述许可指示信息是所述UDM网元指示所述第二网元通过应用功能AF网元从所述目标终端获得的,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。The method according to claim 3, wherein the first query response carries permission indication information, and the permission indication information is that the UDM network element instructs the second network element to use the application function AF network element from the obtained by the target terminal, and the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  7. 如权利要求6所述的方法,其特征在于,所述第二网元为网络开放功能NEF网元,所述第一用户信息分析请求是所述NEF网元根据来自于所述AF网元的第二用户信息分析请求发送的。The method according to claim 6, wherein the second network element is a network open function NEF network element, and the first user information analysis request is the NEF network element according to the request from the AF network element. The second user information analysis request is sent.
  8. 如权利要求3所述的方法,其特征在于,所述第一查询响应携带许可指示信息,所述许可指示信息包括有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The method according to claim 3, wherein the first query response carries permission indication information, the permission indication information includes validity period information, and the validity period information is used to indicate that the target terminal allows the network to allow the target The validity period of the terminal user information for analysis.
  9. 如权利要求1或2所述的方法,其特征在于,所述第一网元为NWDAF网元,所述第一用户信息分析请求携带所述目标终端的许可指示信息;The method according to claim 1 or 2, wherein the first network element is an NWDAF network element, and the first user information analysis request carries the permission indication information of the target terminal;
    所述第一网元获取允许对所述目标终端的用户信息进行分析的许可,包括:The first network element obtains a license that allows to analyze the user information of the target terminal, including:
    所述NWDAF网元向UDM网元发送验证请求,所述验证请求携带所述许可指示信息;The NWDAF network element sends a verification request to the UDM network element, where the verification request carries the permission indication information;
    所述NWDAF网元接收所述UDM网元发送的验证响应,所述验证响应携带验证结果。The NWDAF network element receives a verification response sent by the UDM network element, where the verification response carries a verification result.
  10. 如权利要求9所述的方法,其特征在于,所述许可指示信是AF网元发送给所述第二网元的,所述许可指示信息是所述AF网元和所述目标终端协商得到的。The method according to claim 9, wherein the permission indication letter is sent by the AF network element to the second network element, and the permission indication information is obtained through negotiation between the AF network element and the target terminal of.
  11. 如权利要求9所述的方法,其特征在于,所述第二网元为NF网元;或者,所述第二网元为NEF网元,所述第一用户信息分析请求是所述NEF网元根据来自于所述AF网元的第二用户信息分析请求发送的。The method according to claim 9, wherein the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is the NEF network element The element is sent according to the second user information analysis request from the AF network element.
  12. 如权利要求9所述的方法,其特征在于,所述验证响应携带有效期 信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The method according to claim 9, wherein the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  13. 如权利要求8或12所述的方法,其特征在于,所述方法还包括:The method of claim 8 or 12, wherein the method further comprises:
    所述NWDAF网元获取到所述目标终端的更新的用户信息后,若根据所述有效期信息判断有效期过期,则向所述UDM网元发送第二查询请求;After the NWDAF network element obtains the updated user information of the target terminal, if it is judged that the validity period has expired according to the validity period information, a second query request is sent to the UDM network element;
    所述NWDAF网元接收所述UDM网元发送的第二查询响应;The NWDAF network element receives the second query response sent by the UDM network element;
    若所述第二查询响应指示更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期,则所述NWDAF网元对所述更新的用户信息进行分析,并将分析结果发送给所述第二网元。If the second query response indicates to change the validity period for which the target terminal allows the network to analyze the user information of the target terminal, the NWDAF network element analyzes the updated user information, and sends the analysis result to the second network element.
  14. 如权利要求1或2所述的方法,其特征在于,所述方法还包括:The method of claim 1 or 2, wherein the method further comprises:
    若所述第一网元未获得所述目标终端允许网络对所述目标终端的用户进行分析的许可,则向所述第二网元发送第一用户信息分析响应,所述第一用户信息分析响应用于指示拒绝所述第一用户信息分析请求。If the first network element has not obtained the permission of the target terminal to allow the network to analyze the user of the target terminal, send a first user information analysis response to the second network element, and the first user information analysis The response is used to indicate that the first user information analysis request is rejected.
  15. 如权利要求1或2所述的方法,其特征在于,所述用户信息包括移动性相关信息和/或通信相关信息。The method according to claim 1 or 2, wherein the user information includes mobility-related information and/or communication-related information.
  16. 如权利要求1或2所述的方法,其特征在于,所述对所述目标终端的用户信息进行分析得到分析结果,包括以下至少一项:The method according to claim 1 or 2, wherein the analyzing the user information of the target terminal to obtain an analysis result includes at least one of the following:
    对所述目标终端的用户信息进行分析,得到所述目标终端的移动性统计信息和/或移动性预测信息;Analyzing the user information of the target terminal to obtain mobility statistics and/or mobility prediction information of the target terminal;
    对所述目标终端的通信进行分析,得到所述目标终端的通信分析结果;Analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
    对所述目标终端的用户信息进行分析,得到所述目标终端与网络数据相关的预期行为和/或异常行为。The user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  17. 一种用户信息分析结果反馈方法,其特征在于,包括:A user information analysis result feedback method is characterized in that, comprising:
    统一数据管理UDM网元接收来自于网络数据分析功能NWDAF网元的第一请求,所述第一请求用于请求获取目标终端是否允许对所述目标终端的用户信息进行分析;The unified data management UDM network element receives a first request from the network data analysis function NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
    所述UDM网元向所述NWDAF网元发送第一响应,所述第一响应用于 指示是否允许对所述目标终端的用户信息进行分析。The UDM network element sends a first response to the NWDAF network element, where the first response is used to indicate whether the user information of the target terminal is allowed to be analyzed.
  18. 如权利要求17所述的方法,其特征在于,所述第一请求为第一查询请求,所述第一查询请求用于请求查询所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;The method according to claim 17, wherein the first request is a first query request, and the first query request is used to request to query whether the target terminal allows the network to perform user information of the target terminal. Analyzed contract information;
    所述UDM网元向所述NWDAF网元发送第一响应,包括:The UDM network element sends a first response to the NWDAF network element, including:
    所述UDM网元根据所述第一查询请求,获取所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;The UDM network element obtains, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
    所述UDM网元向所述NWDAF网元发送第一查询响应,所述第一查询响应携带所述目标终端是否允许网络对所述目标终端的用户信息进行分析的许可指示信息。The UDM network element sends a first query response to the NWDAF network element, where the first query response carries permission indication information of whether the target terminal allows the network to analyze the user information of the target terminal.
  19. 如权利要求18所述的方法,其特征在于,所述方法还包括:The method of claim 18, wherein the method further comprises:
    若所述UDM网元未获取到所述签约信息,则向接入及移动性管理AMF网元发送第一许可指示获取请求,以使得所述AMF网元向所述目标终端获取许可指示信息;If the UDM network element has not acquired the subscription information, sending a first permission indication acquisition request to the access and mobility management AMF network element, so that the AMF network element acquires the permission indication information from the target terminal;
    所述UDM网元接收所述AMF网元发送的第一许可指示获取响应,所述第一许可指示获取响应携带所述目标终端的许可指示信息。The UDM network element receives a first license indication acquisition response sent by the AMF network element, where the first license indication acquisition response carries the license indication information of the target terminal.
  20. 如权利要求19所述的方法,其特征在于,所述AMF网元向所述目标终端发送第二许可指示获取请求,接收所述目标终端发送的第二许可指示获取响应,所述第二许可指示获取响应携带所述目标终端的许可指示信息,所述第二许可指示获取请求和所述第二许可指示获取响应为非接入层NAS消息;或者,The method according to claim 19, wherein the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, the second permission indication The indication acquisition response carries the permission indication information of the target terminal, and the second permission indication acquisition request and the second permission indication acquisition response are non-access stratum NAS messages; or,
    所述AMF网元向无线接入网RAN发送第三许可指示获取请求,以使得所述RAN从所述目标终端获取许可指示信息。The AMF network element sends a third permission indication acquisition request to the radio access network RAN, so that the RAN acquires the permission indication information from the target terminal.
  21. 如权利要求20所述的方法,其特征在于,所述第一许可指示获取请求以及所述第三许可指示获取请求携带所述目标终端的标识,所述RAN根据所述目标终端的标识,向对应的终端发送无线资源控制RRC重配置消息,以使得所述对应的终端向所述RAN发送许可指示信息;或者,The method according to claim 20, wherein the first permission indication acquisition request and the third permission indication acquisition request carry the identifier of the target terminal, and the RAN sends the request to the target terminal according to the identifier of the target terminal. The corresponding terminal sends a radio resource control RRC reconfiguration message, so that the corresponding terminal sends grant indication information to the RAN; or,
    所述第一许可指示获取请求以及所述第三许可指示获取请求携带目标终端组的组标识,所述RAN根据所述目标终端组的组标识发送广播消息或组播消息,以使得对应的终端向所述RAN发送许可指示信息。The first permission indication acquisition request and the third permission indication acquisition request carry the group identifier of the target terminal group, and the RAN sends a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal Sending grant indication information to the RAN.
  22. 如权利要求18所述的方法,其特征在于,所述第一查询请求是所述NWDAF网元接收到来自于NEF网元的第一用户信息分析请求发送的,所述第一用户信息分析请求是所述NEF网元接收到来自于AF网元发送的第二用户信息分析请求发送的;The method of claim 18, wherein the first query request is sent by the NWDAF network element receiving a first user information analysis request from an NEF network element, and the first user information analysis request It is sent by the NEF network element receiving the second user information analysis request sent by the AF network element;
    所述方法还包括:The method also includes:
    所述UDM网元向所述NEF网元发送第四许可指示获取请求,所述第四许可指示获取请求被所述NEF网元转发给所述AF网元,以使得所述AF网元从所述目标终端获得所述目标终端的许可指示信息,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;The UDM network element sends a fourth permission indication acquisition request to the NEF network element, and the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element can obtain the request from the NEF network element. obtaining, by the target terminal, permission indication information of the target terminal, where the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal;
    所述UDM网元接收所述NEF网元发送的第四许可指示获取响应,所述第四许可指示获取响应携带所述目标终端的许可指示信息。The UDM network element receives a fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
  23. 如权利要求18所述的方法,其特征在于,所述第一查询响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The method of claim 18, wherein the first query response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  24. 如权利要求17所述的方法,其特征在于,所述第一请求为验证请求,所述验证请求携带所述目标终端的许可指示信息;The method of claim 17, wherein the first request is a verification request, and the verification request carries permission indication information of the target terminal;
    所述方法还包括:The method also includes:
    所述UDM网元对所述目标终端的许可指示信息进行验证得到验证结果,所述验证结果用于指示所述许可指示信息是否验证通过,或者用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;The UDM network element verifies the permission indication information of the target terminal to obtain a verification result, and the verification result is used to indicate whether the permission indication information is verified, or to indicate whether the target terminal allows the network to Analyze the user information of the target terminal;
    所述UDM网元向所述NWDAF网元发送验证响应,所述验证响应携带所述验证结果。The UDM network element sends a verification response to the NWDAF network element, where the verification response carries the verification result.
  25. 如权利要求24所述的方法,其特征在于,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用 户信息进行分析的有效期。The method according to claim 24, wherein the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  26. 如权利要求23或25所述的方法,其特征在于,所述方法还包括:The method of claim 23 or 25, wherein the method further comprises:
    所述UDM网元接收所述NWDAF网元发送的第二查询请求,所述第二查询请求是所述NWDAF网元获取到所述目标终端的更新的用户信息并确定所述目标终端的所述有效期过期后发送的;The UDM network element receives a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the target terminal's updated user information. Sent after the validity period has expired;
    所述UDM网元向所述NWDAF网元发送第二查询响应,所述第二查询响应用于指示是否更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The UDM network element sends a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  27. 如权利要求17-22、24-25任一项所述的方法,其特征在于,所述用户信息包括移动性相关信息和/或通信相关信息。The method according to any one of claims 17-22 and 24-25, wherein the user information includes mobility-related information and/or communication-related information.
  28. 如权利要求17-22、24-25任一项所述的方法,其特征在于,所述对所述目标终端的用户信息进行分析得到分析结果,包括以下至少一项:The method according to any one of claims 17-22 and 24-25, wherein the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
    对所述目标终端的用户信息进行分析,得到所述目标终端的移动性统计信息和/或移动性预测信息;Analyzing the user information of the target terminal to obtain mobility statistics and/or mobility prediction information of the target terminal;
    对所述目标终端的通信进行分析,得到所述目标终端的通信分析结果;Analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
    对所述目标终端的用户信息进行分析,得到所述目标终端与网络数据相关的预期行为和/或异常行为。The user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  29. 一种网络设备,其特征在于,包括:A network device, characterized in that it includes:
    接收单元,用于接收来自于第二网元的第一用户信息分析请求;a receiving unit, configured to receive a first user information analysis request from a second network element;
    处理单元,用于获取允许对所述目标终端的用户信息进行分析的许可;a processing unit, configured to obtain a license that allows analyzing the user information of the target terminal;
    发送单元,用于获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元。The sending unit is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
  30. 一种网络设备,其特征在于,包括:A network device, characterized in that it includes:
    接收单元,用于接收来自于网络数据分析功能NWDAF网元的第一请求,所述第一请求用于请求获取目标终端是否允许对所述目标终端的用户信息进行分析;a receiving unit, configured to receive a first request from a network data analysis function NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
    发送单元,用于向所述NWDAF网元发送第一响应,所述第一响应用于 指示是否允许对所述目标终端的用户信息进行分析。A sending unit, configured to send a first response to the NWDAF network element, where the first response is used to indicate whether the user information of the target terminal is allowed to be analyzed.
  31. 一种通信装置,其特征在于,包括:处理器、存储器;A communication device, comprising: a processor and a memory;
    所述存储器,存储计算机指令;the memory, storing computer instructions;
    所述处理器,用于读取所述计算机指令,执行以下操作:The processor, for reading the computer instructions, performs the following operations:
    接收来自于第二网元的第一用户信息分析请求;receiving a first user information analysis request from a second network element;
    获取允许对所述目标终端的用户信息进行分析的许可;Obtain a license that allows analysis of the user information of the target terminal;
    获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元。After obtaining the permission, the analysis result of the user information of the target terminal is sent to the second network element.
  32. 如权利要求31所述的通信装置,其特征在于,所述第一网元获得所述许可后,将对所述目标终端的用户信息的分析结果发送给所述第二网元,包括:The communication device according to claim 31, wherein after the first network element obtains the permission, sending the analysis result of the user information of the target terminal to the second network element, comprising:
    所述第一网元获得所述许可后,对所述目标终端的用户信息进行分析得到分析结果,并将所述分析结果发送给所述第二网元;或者,After the first network element obtains the permission, analyze the user information of the target terminal to obtain an analysis result, and send the analysis result to the second network element; or,
    所述第一网元获取所述目标终端的用户信息,对所述目标终端的用户信息进行分析得到分析结果,并在获得所述许可后,将所述分析结果发送给所述第二网元。The first network element obtains the user information of the target terminal, analyzes the user information of the target terminal to obtain an analysis result, and after obtaining the permission, sends the analysis result to the second network element .
  33. 如权利要求31或32所述的通信装置,其特征在于,所述获取允许对所述目标终端的用户信息进行分析的许可,包括:The communication device according to claim 31 or 32, wherein the acquiring a license allowing to analyze the user information of the target terminal comprises:
    向统一数据管理UDM网元发送第一查询请求;sending a first query request to the unified data management UDM network element;
    接收所述UDM网元发送的第一查询响应,所述第一查询响应用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。A first query response sent by the UDM network element is received, where the first query response is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  34. 如权利要求33所述的通信装置,其特征在于,所述第一查询响应携带许可指示信息,所述许可指示信息是所述UDM网元指示接入及移动性管理功能AMF网元通过无线接入网RAN从所述目标终端获取的;其中,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。The communication device according to claim 33, wherein the first query response carries permission indication information, and the permission indication information is that the UDM network element instructs the access and mobility management function AMF network element to use the wireless connection The network access RAN is obtained from the target terminal; wherein, the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  35. 如权利要求34所述的通信装置,其特征在于,所述第二网元为网络 功能NF网元。The communication device of claim 34, wherein the second network element is a network function NF network element.
  36. 如权利要求33所述的通信装置,其特征在于,所述第一查询响应携带许可指示信息,所述许可指示信息是所述UDM网元指示所述第二网元通过应用功能AF网元从所述目标终端获得的,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析。The communication device according to claim 33, wherein the first query response carries permission indication information, and the permission indication information is that the UDM network element instructs the second network element to obtain a request from the second network element through the application function AF network element. The permission indication information obtained by the target terminal is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  37. 如权利要求36所述的通信装置,其特征在于,所述第二网元为网络开放功能NEF网元,所述第一用户信息分析请求是所述NEF网元根据来自于所述AF网元的第二用户信息分析请求发送的。The communication device according to claim 36, wherein the second network element is a network open function NEF network element, and the first user information analysis request is the request of the NEF network element according to the request from the AF network element. The second user information analysis request is sent.
  38. 如权利要求33所述的通信装置,其特征在于,所述第一查询响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The communication device according to claim 33, wherein the first query response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  39. 如权利要求32所述的通信装置,其特征在于,所述第一用户信息分析请求携带所述目标终端的许可指示信息;The communication device according to claim 32, wherein the first user information analysis request carries permission indication information of the target terminal;
    所述获取允许对所述目标终端的用户信息进行分析的许可,包括:The acquiring a license that allows analyzing the user information of the target terminal includes:
    向UDM网元发送验证请求,所述验证请求携带所述许可指示信息;sending a verification request to the UDM network element, where the verification request carries the permission indication information;
    接收所述UDM网元发送的验证响应,所述验证响应携带验证结果。A verification response sent by the UDM network element is received, where the verification response carries a verification result.
  40. 如权利要求39所述的通信装置,其特征在于,所述许可指示信是AF网元发送给所述第二网元的,所述许可指示信息是所述AF网元和所述目标终端协商得到的。The communication device according to claim 39, wherein the permission indication letter is sent by the AF network element to the second network element, and the permission indication information is negotiated between the AF network element and the target terminal owned.
  41. 如权利要求39所述的通信装置,其特征在于,所述第二网元为NF网元;或者,所述第二网元为NEF网元,所述第一用户信息分析请求是所述NEF网元根据来自于所述AF网元的第二用户信息分析请求发送的。The communication device according to claim 39, wherein the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is the NEF network element The network element is sent according to the second user information analysis request from the AF network element.
  42. 如权利要求39所述的通信装置,其特征在于,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The communication device according to claim 39, wherein the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  43. 如权利要求38或42所述的通信装置,其特征在于,所述操作还包括:The communication device of claim 38 or 42, wherein the operations further comprise:
    获取到所述目标终端的更新的用户信息后,若根据所述有效期信息判断有效期过期,则向所述UDM网元发送第二查询请求;After acquiring the updated user information of the target terminal, if it is determined that the validity period has expired according to the validity period information, send a second query request to the UDM network element;
    接收所述UDM网元发送的第二查询响应;receiving a second query response sent by the UDM network element;
    若所述第二查询响应指示更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期,则对所述更新的用户信息进行分析,并将分析结果发送给所述第二网元。If the second query response indicates to change the validity period during which the target terminal allows the network to analyze the user information of the target terminal, analyze the updated user information, and send the analysis result to the second network Yuan.
  44. 如权利要求31或32所述的通信装置,其特征在于,所述操作还包括:The communication device of claim 31 or 32, wherein the operations further comprise:
    若未获得所述目标终端允许网络对所述目标终端的用户进行分析的许可,则向所述第二网元发送第一用户信息分析响应,所述第一用户信息分析响应用于指示拒绝所述第一用户信息分析请求。If the permission of the target terminal to allow the network to analyze the user of the target terminal is not obtained, a first user information analysis response is sent to the second network element, where the first user information analysis response is used to indicate rejection of the target terminal. Describe the first user information analysis request.
  45. 如权利要求31或32所述的通信装置,其特征在于,所述用户信息包括移动性相关信息和/或通信相关信息。The communication device according to claim 31 or 32, wherein the user information includes mobility-related information and/or communication-related information.
  46. 如权利要求31或32所述的通信装置,其特征在于,所述对所述目标终端的用户信息进行分析得到分析结果,包括以下至少一项:The communication device according to claim 31 or 32, wherein the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
    对所述目标终端的用户信息进行分析,得到所述目标终端的移动性统计信息和/或移动性预测信息;Analyzing the user information of the target terminal to obtain mobility statistics and/or mobility prediction information of the target terminal;
    对所述目标终端的通信进行分析,得到所述目标终端的通信分析结果;Analyzing the communication of the target terminal to obtain a communication analysis result of the target terminal;
    对所述目标终端的用户信息进行分析,得到所述目标终端与网络数据相关的预期行为和/或异常行为。The user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  47. 如权利要求31或32所述的方法,其特征在于,所述通信装置为网络数据分析功能NWDAF网元。The method according to claim 31 or 32, wherein the communication device is a network data analysis function NWDAF network element.
  48. 一种通信装置,其特征在于,包括:处理器、存储器;A communication device, comprising: a processor and a memory;
    所述存储器,存储计算机指令;the memory, storing computer instructions;
    所述处理器,用于读取所述计算机指令,执行以下操作:The processor, for reading the computer instructions, performs the following operations:
    接收来自于网络数据分析功能NWDAF网元的第一请求,所述第一请求用于请求获取目标终端是否允许对所述目标终端的用户信息进行分析;Receive a first request from the network data analysis function NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
    向所述NWDAF网元发送第一响应,所述第一响应用于指示是否允许对所述目标终端的用户信息进行分析。Send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
  49. 如权利要求48所述的通信装置,其特征在于,所述第一请求为第一查询请求,所述第一查询请求用于请求查询所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;The communication device according to claim 48, wherein the first request is a first query request, and the first query request is used to request to query whether the target terminal allows the network to access user information of the target terminal contract information for analysis;
    所述向所述NWDAF网元发送第一响应,包括:The sending the first response to the NWDAF network element includes:
    根据所述第一查询请求,获取所述目标终端是否允许网络对所述目标终端的用户信息进行分析的签约信息;obtaining, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
    向所述NWDAF网元发送第一查询响应,所述第一查询响应携带所述目标终端是否允许网络对所述目标终端的用户信息进行分析的许可指示信息。Send a first query response to the NWDAF network element, where the first query response carries permission indication information of whether the target terminal allows the network to analyze the user information of the target terminal.
  50. 如权利要求49所述的通信装置,其特征在于,所述操作还包括:The communication device of claim 49, wherein the operations further comprise:
    若未获取到所述签约信息,则向接入及移动性管理AMF网元发送第一许可指示获取请求,以使得所述AMF网元向所述目标终端获取许可指示信息;If the subscription information is not acquired, sending a first permission indication acquisition request to the access and mobility management AMF network element, so that the AMF network element acquires the permission indication information from the target terminal;
    接收所述AMF网元发送的第一许可指示获取响应,所述第一许可指示获取响应携带所述目标终端的许可指示信息。A first license indication acquisition response sent by the AMF network element is received, where the first license indication acquisition response carries the license indication information of the target terminal.
  51. 如权利要求49所述的通信装置,其特征在于,所述第一查询请求是所述NWDAF网元接收到来自于NEF网元的第一用户信息分析请求发送的,所述第一用户信息分析请求是所述NEF网元接收到来自于AF网元发送的第二用户信息分析请求发送的;The communication device according to claim 49, wherein the first query request is sent by the NWDAF network element receiving a first user information analysis request from an NEF network element, and the first user information analysis request is sent by the NWDAF network element. The request is sent by the NEF network element receiving the second user information analysis request sent by the AF network element;
    所述操作还包括:The operations also include:
    向所述NEF网元发送第四许可指示获取请求,所述第四许可指示获取请求被所述NEF网元转发给所述AF网元,以使得所述AF网元从所述目标终端获得所述目标终端的许可指示信息,所述许可指示信息用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析;A fourth permission indication acquisition request is sent to the NEF network element, and the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element obtains all the information from the target terminal. the permission indication information of the target terminal, where the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal;
    接收所述NEF网元发送的第四许可指示获取响应,所述第四许可指示获取响应携带所述目标终端的许可指示信息。A fourth license indication acquisition response sent by the NEF network element is received, where the fourth license indication acquisition response carries the license indication information of the target terminal.
  52. 如权利要求49所述的通信装置,其特征在于,所述第一查询响应携 带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The communication device according to claim 49, wherein the first query response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  53. 如权利要求48所述的通信装置,其特征在于,所述第一请求为验证请求,所述验证请求携带所述目标终端的许可指示信息;The communication device according to claim 48, wherein the first request is a verification request, and the verification request carries permission indication information of the target terminal;
    所述操作还包括:The operations also include:
    对所述目标终端的许可指示信息进行验证得到验证结果,所述验证结果用于指示所述许可指示信息是否验证通过,或者用于指示所述目标终端是否允许网络对所述目标终端的用户信息进行分析,其中,所述许可指示信息验证通过表示所述目标终端允许网络对所述目标终端的用户信息进行分析;Verifying the permission indication information of the target terminal to obtain a verification result, where the verification result is used to indicate whether the permission indication information is verified, or to indicate whether the target terminal allows the network to verify the user information of the target terminal performing analysis, wherein the verification of the permission indication information indicates that the target terminal allows the network to analyze the user information of the target terminal;
    向所述NWDAF网元发送验证响应,所述验证响应携带所述验证结果。Send a verification response to the NWDAF network element, where the verification response carries the verification result.
  54. 如权利要求53所述的通信装置,其特征在于,所述验证响应携带有效期信息,所述有效期信息用于指示所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。The communication device according to claim 53, wherein the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  55. 如权利要求52或54所述的通信装置,其特征在于,所述操作还包括:The communication device of claim 52 or 54, wherein the operations further comprise:
    接收所述NWDAF网元发送的第二查询请求,所述第二查询请求是所述NWDAF网元获取到所述目标终端的更新的用户信息并确定所述目标终端的所述有效期过期后发送的;Receive a second query request sent by the NWDAF network element, where the second query request is sent after the NWDAF network element obtains the updated user information of the target terminal and determines that the validity period of the target terminal expires ;
    向所述NWDAF网元发送第二查询响应,所述第二查询响应用于指示是否更改所述目标终端允许网络对所述目标终端的用户信息进行分析的有效期。Send a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal.
  56. 如权利要求48-51、53-54任一项所述的通信装置,其特征在于,所述用户信息包括移动性相关信息和/或通信相关信息。The communication device according to any one of claims 48-51 and 53-54, wherein the user information includes mobility-related information and/or communication-related information.
  57. 如权利要求48-51、53-54任一项所述的通信装置,其特征在于,所述通信装置为统一数据管理UDM网元。The communication device according to any one of claims 48-51 and 53-54, wherein the communication device is a unified data management UDM network element.
  58. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如权利要求1-28任一项所述的方法。A computer-readable storage medium, wherein the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause a computer to execute the method according to any one of claims 1-28 .
  59. 一种计算机程序产品,其特征在于,所述计算机程序产品在被计算机调用时,使得所述计算机执行如权利要求1-28任一项所述的方法。A computer program product, characterized in that, when the computer program product is invoked by a computer, the computer causes the computer to execute the method according to any one of claims 1-28.
PCT/CN2021/141266 2021-01-08 2021-12-24 User information analysis result feedback method and device thereof WO2022148254A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110026412.2A CN114760619A (en) 2021-01-08 2021-01-08 User information analysis result feedback method and device
CN202110026412.2 2021-01-08

Publications (1)

Publication Number Publication Date
WO2022148254A1 true WO2022148254A1 (en) 2022-07-14

Family

ID=82325601

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/141266 WO2022148254A1 (en) 2021-01-08 2021-12-24 User information analysis result feedback method and device thereof

Country Status (2)

Country Link
CN (1) CN114760619A (en)
WO (1) WO2022148254A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023201733A1 (en) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Wireless communication method and device
CN117641309A (en) * 2022-08-12 2024-03-01 维沃移动通信有限公司 User intention verification method and device and network equipment
WO2024031702A1 (en) * 2022-08-12 2024-02-15 北京小米移动软件有限公司 Information processing method and apparatus, and communication device and storage medium
WO2024092677A1 (en) * 2022-11-03 2024-05-10 北京小米移动软件有限公司 Method and apparatus for transmitting data in roaming scenario, and readable storage medium
CN116599862B (en) * 2023-07-18 2023-09-29 中国电信股份有限公司 Communication method, analysis network element and communication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020070118A1 (en) * 2018-10-05 2020-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for analytics function discovery
WO2020145030A1 (en) * 2019-01-09 2020-07-16 Nec Corporation Core network node and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020070118A1 (en) * 2018-10-05 2020-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for analytics function discovery
WO2020145030A1 (en) * 2019-01-09 2020-07-16 Nec Corporation Core network node and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for 5G System (5GS) to support network data analytics services; (Release 16)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 23.288, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.1.0, 1 February 2019 (2019-02-01), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 40, XP051591861 *

Also Published As

Publication number Publication date
CN114760619A (en) 2022-07-15

Similar Documents

Publication Publication Date Title
WO2022148254A1 (en) User information analysis result feedback method and device thereof
US20200120580A1 (en) Communication method, network device, terminal device, and system
US11770444B2 (en) Edge computing for internet of things security with blockchain authentication
WO2017186092A1 (en) Network slice selection method and apparatus
CN110351828B (en) Positioning method and device
WO2018176220A1 (en) Network access method, terminal, access network, and core network
KR20200139748A (en) Service subscription method and device
KR102202994B1 (en) Location change reporting method, device and system
JP2013528985A (en) Method and system for controlling a machine-type communication device for accessing a network
WO2017125025A1 (en) Call method, device, system, and storage medium
US20120202492A1 (en) Method and apparatus for enabling identification of a rejecting network in connection with registration area updating
US20220263672A1 (en) Data Sharing Method, Device, and System
CN105828413A (en) Safety method of D2D mode B discovery, terminal and system
CN105472550A (en) Method, device and system for WIFI connection
WO2019057027A1 (en) Big data analysis service providing method and apparatus, and computer readable storage medium
TWI640214B (en) Network access method, related equipment and system
US20220272511A1 (en) Subscription data management method and apparatus
CN114980034A (en) Method and device for realizing raw computing power service, network equipment and terminal
WO2021168829A1 (en) User identifier verification method and related device
US20240089735A1 (en) Roaming in cellular communication networks
KR20110122643A (en) Method for controlling network overload in machine type communication in mobile communications system and appatarus thereof
US20180081746A1 (en) Application message processing system, method, and application device
WO2023016255A1 (en) Network function service authorization method and apparatus
WO2021233286A1 (en) Data processing method and apparatus, network device, and terminal
CN114025349B (en) Network service method, device, system and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21917294

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21917294

Country of ref document: EP

Kind code of ref document: A1