WO2022148254A1 - Procédé de rétroaction de résultat d'analyse d'informations d'utilisateur et dispositif associé - Google Patents

Procédé de rétroaction de résultat d'analyse d'informations d'utilisateur et dispositif associé Download PDF

Info

Publication number
WO2022148254A1
WO2022148254A1 PCT/CN2021/141266 CN2021141266W WO2022148254A1 WO 2022148254 A1 WO2022148254 A1 WO 2022148254A1 CN 2021141266 W CN2021141266 W CN 2021141266W WO 2022148254 A1 WO2022148254 A1 WO 2022148254A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
target terminal
user information
information
request
Prior art date
Application number
PCT/CN2021/141266
Other languages
English (en)
Chinese (zh)
Inventor
毕晓宇
Original Assignee
大唐移动通信设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大唐移动通信设备有限公司 filed Critical 大唐移动通信设备有限公司
Publication of WO2022148254A1 publication Critical patent/WO2022148254A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer

Definitions

  • the present application relates to the field of wireless communication technologies, and in particular, to a method and device for feeding back a user information analysis result.
  • the 5G network defines an intelligent network data analysis function (Network Data Analytics Function, NWDAF) network element, which can collect and analyze network function and user equipment (User Equipment, UE, also known as terminal) information, And provide the analysis results to the network function (Network Function, NF) network element. NWDAF network elements can interact with different network elements for different purposes:
  • NWDAF network element is based on the access and mobility management (Access and Mobility Management Function, AMF) network element, session management function (Session Management Function, SMF) network element, Policy Control Function (Policy Control Function, PCF) NEs, Unified Data Manager (UDM) NEs, Application Function (AF) NEs, and Operation Administration and Maintenance (OAM) NEs provide event subscriptions for data collection.
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • Policy Control Function Policy Control Function
  • PCF Policy Control Function
  • UDM Unified Data Manager
  • AF Application Function
  • OFAM Operation Administration and Maintenance
  • NWDAF network elements can directly interact with AF network elements, or interact with AF network elements through Network Exposure Function (NEF) network elements;
  • NEF Network Exposure Function
  • NWDAF network element retrieves information from data repository, for example, obtains subscriber-related information from UDR (Unified Data Repository, unified data warehouse function) network element through UDM network element;
  • UDR Unified Data Repository, unified data warehouse function
  • the NWDAF network element retrieves information about the NF network element, for example, obtains the information related to the NF network element from the network storage function (NF Repository Function, NRF) network element;
  • NRF Network Repository Function
  • NWDAF network elements provide analysis to consumers on demand.
  • the NWDAF network element provides UE-related analysis, including mobility analysis, UE communication analysis, UE expected behavior parameters and abnormal behavior analysis related to network data analysis.
  • the analysis of UE communication and abnormal behavior analysis can enable the network to know the running status of the UE and the network through the data analysis function.
  • UE mobility analysis which is information related to the user's privacy
  • data analysis is performed to provide UE mobility statistics or predictions.
  • the mobility information of the UE provided by the 5G network involves the privacy of the UE. This information requires the user to know and give permission. Otherwise, it may lead to the leakage of the user's privacy. tracking, and this method of obtaining UE permission is currently lacking.
  • the embodiments of the present application provide a user information analysis result feedback method and device thereof, which are used to improve user information security.
  • a first aspect provides a user information analysis result feedback method, including:
  • the first network element receives the first user information analysis request from the second network element
  • the first network element After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
  • the first network element sends the analysis result of the user information of the target terminal to the second network element, including:
  • the first network element After the first network element obtains the permission, it analyzes the user information of the target terminal to obtain an analysis result, and sends the analysis result to the second network element; or, the first network element obtains the analysis result. For the user information of the target terminal, analyze the user information of the target terminal to obtain an analysis result, and after obtaining the permission, send the analysis result to the second network element.
  • the first network element is an NWDAF network element; the first network element obtains a license that allows analyzing the user information of the target terminal, including:
  • the NWDAF network element sends a first query request to the UDM network element
  • the NWDAF network element receives a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  • the first query response carries permission indication information
  • the permission indication information is obtained by the UDM network element instructing the AMF network element to obtain from the target terminal through the RAN; wherein the permission indication information is used to indicate the Whether the target terminal allows the network to analyze the user information of the target terminal.
  • the second network element is an NF network element.
  • the first query response carries permission indication information
  • the permission indication information is obtained by the UDM network element instructing the second network element to obtain from the target terminal through the AF network element
  • the permission indication information It is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  • the second network element is an NEF network element
  • the first user information analysis request is sent by the NEF network element according to the second user information analysis request from the AF network element.
  • the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the first network element is an NWDAF network element
  • the first user information analysis request carries the permission indication information of the target terminal
  • the first network element obtains permission to perform user information on the target terminal.
  • the analyzed license includes: the NWDAF network element sends a verification request to the UDM network element, and the verification request carries the license indication information; the NWDAF network element receives the verification response sent by the UDM network element, and the verification response Carry the verification result.
  • the permission indication letter is sent by the AF network element to the second network element, and the permission indication information is obtained through negotiation between the AF network element and the target terminal.
  • the second network element is an NF network element; or, the second network element is an NEF network element, and the first user information analysis request is the NEF network element according to the request from the AF network element.
  • the second user information analysis request is sent.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the method further includes: after the NWDAF network element obtains the updated user information of the target terminal, if it is determined according to the validity period information that the validity period has expired, sending a second query request to the UDM network element. ;
  • the NWDAF network element receives the second query response sent by the UDM network element
  • the NWDAF network element analyzes the updated user information, and sends the analysis result to the second network element.
  • the method further includes: if the first network element has not obtained the permission of the target terminal to allow the network to analyze the user of the target terminal, sending the first user information to the second network element An analysis response, where the first user information analysis response is used to indicate rejection of the first user information analysis request.
  • the user information includes mobility-related information and/or communication-related information.
  • the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
  • the user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  • a user information analysis result feedback method including:
  • the UDM network element receives a first request from the NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
  • the UDM network element sends a first response to the NWDAF network element, where the first response is used to indicate whether the user information of the target terminal is allowed to be analyzed.
  • the first request is a first query request, and the first query request is used for requesting to query the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
  • the UDM network element sends a first response to the NWDAF network element, including:
  • the UDM network element obtains, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal;
  • the UDM network element sends a first query response to the NWDAF network element, where the first query response carries permission indication information of whether the target terminal allows the network to analyze the user information of the target terminal.
  • the method further includes: if the UDM network element has not acquired the subscription information, sending a first permission indication acquisition request to the AMF network element, so that the AMF network element acquires a license from the target terminal Indication information; the UDM network element receives a first license indication acquisition response sent by the AMF network element, where the first license indication acquisition response carries the license indication information of the target terminal.
  • the AMF network element sends a second permission indication acquisition request to the target terminal, and receives a second permission indication acquisition response sent by the target terminal, where the second permission indication acquisition response carries the permission of the target terminal.
  • indication information, the second permission indication acquisition request and the second permission indication acquisition response are non-access stratum NAS messages; or, the AMF network element sends a third permission indication acquisition request to the radio access network RAN, to causing the RAN to acquire permission indication information from the target terminal.
  • the first permission indication acquisition request and the third permission indication acquisition request carry the identifier of the target terminal, and the RAN sends an RRC reconfiguration message to the corresponding terminal according to the identifier of the target terminal, to causing the corresponding terminal to send permission indication information to the RAN; or, the first permission indication acquisition request and the third permission indication acquisition request carry the group identifier of the target terminal group, and the RAN determines the target terminal group according to the target terminal group ID.
  • the group identifier of the group sends a broadcast message or a multicast message, so that the corresponding terminal sends permission indication information to the RAN.
  • the first query request is sent by the NWDAF network element after receiving the first user information analysis request from the NEF network element, and the first user information analysis request is received by the NEF network element from the Sent by the second user information analysis request sent by the AF network element;
  • the method also includes:
  • the UDM network element sends a fourth permission indication acquisition request to the NEF network element, and the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element can obtain the request from the NEF network element.
  • the UDM network element receives a fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
  • the first query response carries validity period information
  • the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the first request is a verification request, and the verification request carries the permission indication information of the target terminal;
  • the method also includes:
  • the UDM network element verifies the permission indication information of the target terminal to obtain a verification result, and the verification result is used to indicate whether the permission indication information is verified, or to indicate whether the target terminal allows the network to Analyze the user information of the target terminal;
  • the UDM network element sends a verification response to the NWDAF network element, where the verification response carries the verification result.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the method further includes:
  • the UDM network element receives a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the target terminal's updated user information. Sent after the validity period has expired;
  • the UDM network element sends a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the user information includes mobility-related information and/or communication-related information.
  • the analysis result obtained by analyzing the user information of the target terminal includes at least one of the following:
  • the user information of the target terminal is analyzed to obtain the expected behavior and/or abnormal behavior of the target terminal related to the network data.
  • a network device including:
  • a receiving unit configured to receive a first user information analysis request from a second network element
  • a processing unit configured to obtain a license that allows analyzing the user information of the target terminal
  • the sending unit is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
  • a network device including:
  • a receiving unit configured to receive a first request from a network data analysis function NWDAF network element, where the first request is used to request to obtain whether the target terminal is allowed to analyze the user information of the target terminal;
  • a sending unit configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
  • a communication device comprising: a processor and a memory;
  • the memory storing computer instructions
  • the processor is configured to read the computer instructions and execute the method according to any one of the above first aspects.
  • a communication device comprising: a processor and a memory;
  • the memory storing computer instructions
  • the processor is configured to read the computer instructions and execute the method according to any one of the above second aspects.
  • a computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause a computer to execute any one of the first aspect or the second aspect above method described in item.
  • a computer program product which, when invoked by a computer, causes the computer to execute the method according to any one of the first aspect or the second aspect.
  • the first network element after the first network element receives the user information analysis request from the second network element and obtains the permission to analyze the user information of the target terminal, it will analyze the user information of the target terminal.
  • the analysis result of the user information of the target terminal is sent to the second network element, thereby protecting user privacy and improving user information security.
  • FIG. 1 is a schematic flowchart of a user information analysis result feedback method provided in an embodiment of the present application
  • FIGS. 2a and 2b are schematic flowcharts of a method for feeding back a user information analysis result provided by an embodiment of the present application, respectively;
  • 3 to 7 are respectively schematic diagrams of signaling interaction of a method for feeding back a user information analysis result provided by an embodiment of the present application;
  • FIG. 8 is a schematic structural diagram of a network device (a first network element) provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a network device (a second network element) provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a communication apparatus provided by another embodiment of the present application.
  • a terminal is a device that can provide users with voice and/or data connectivity.
  • the terminal device includes a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • terminal devices can be: mobile phones (mobile phones), tablet computers, notebook computers, PDAs, mobile Internet devices (MIDs), wearable devices, virtual reality (virtual reality, VR) devices, augmented reality (augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in smart grid, wireless terminals in transportation safety A wireless terminal, a wireless terminal in a smart city, or a wireless terminal in a smart home, etc.
  • the NWDAF network element in the 5G network can collect network function and UE information, analyze it, and provide the analysis result to the NF network element or the AF network element. This information requires the user to know and give permission, otherwise it may cause the user The issue of privacy leakage.
  • the embodiments of the present application provide a method and device for feedback of user information analysis results. Only then can we analyze the user information or provide the analysis results obtained by analyzing the user, so as to improve the security of user information.
  • terminal may also be understood as “UE's permission” or “user consent”, which means that the terminal allows the network to collect and/or analyze user information of the terminal.
  • the user of the terminal (UE) is called the user.
  • the terminal (UE) is usually provided with a SIM card (Subscriber Identity Module) or other devices for realizing communication, and the device is configured with a user identity. Therefore, the “terminal (UE)” " has a corresponding relationship with the user "user” of the terminal.
  • SIM card Subscriber Identity Module
  • the embodiments of the present application can be applied to a 5G system, and can also be applied to a subsequent evolution system thereof.
  • FIG. 1 it is a schematic flowchart of a user information analysis result feedback method provided by an embodiment of the present application. As shown in the figure, the process may include:
  • a second network element sends a first user information analysis request to a first network element, where the first user information analysis request is used to request to analyze user information of the target terminal.
  • the first network element and the second network element may be core network network elements in the 5G system.
  • the first network element may be an NWDAF network element
  • the second network element may be an NF network element or a NEF network element.
  • the indication information of the target terminal carried in the first user information analysis request may be used to indicate a target terminal, for example, the indication information may be identification information of a terminal; the indication information of the target terminal may also be Used to indicate multiple target terminals, such as a group of target terminals, the indication information can be the identification information of each target terminal in the multiple target terminals, or the group identification of the terminal group (used to indicate a group of target terminals) .
  • the second network element may also carry information such as filtering information such as the area of interest, analysis target time period or prediction time period, the maximum number of analysis objects, and the target address notified in the contract in the request.
  • the first network element After receiving the first user information analysis request, the first network element obtains a license for allowing analysis of the user information of the target terminal.
  • the first network element may interact with the UDM network element to obtain a license that allows analyzing the user information of the target terminal.
  • the first network element may query the UDM network element whether the target terminal allows the network to analyze the user information of the target terminal, or query the subscription information of the target terminal, where the subscription information is used to indicate Whether to allow the network to analyze the user information of the target terminal.
  • the first network element (such as the NWDAF network element) sends a first query request to the UDM network element, where the first query request is used to request the query target terminal whether the network allows the network to analyze the user information of the target terminal, or is used to request Query whether there is subscription information that allows the network to analyze the user information of the target terminal;
  • the UDM network element returns the first query response to the first network element (such as the NWDAF network element), and the first query response is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed.
  • the first network element such as the NWDAF network element
  • the UDM network element can store the subscription information of the target terminal on whether to allow the network to analyze the user information of the target terminal, and the UDM network element can determine whether the target terminal allows the network to analyze the user information of the target terminal according to the subscription information. analyze, and return the first query response to the first network element (eg, the NWDAF network element).
  • the first network element eg, the NWDAF network element
  • the UDM network element can also send the first permission indication acquisition request to the AMF network element (for example, when the UDM network element does not store the subscription information of the target terminal on whether to allow the network to analyze the user information of the target terminal, or the user information of the target terminal is not queried, or the subscription information), so that the AMF network element obtains the permission indication information from the target terminal, and the AMF network element obtains the permission indication information of the target terminal from the target terminal through the radio access network (RAN) and sends it to the UDM network element,
  • the UDM network element returns a first query response to the first network element (eg, the NWDAF network element) according to the permission indication information.
  • the AMF network element may obtain permission indication information from the target terminal through a non-access stratum (non-access stratum, NAS) for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
  • NAS non-access stratum
  • the AMF network element sends a second permission indication acquisition request to the target terminal, receives a second permission indication acquisition response sent by the target terminal, and the second permission indication acquisition response carries the permission indication information of the target terminal.
  • the second permission indication acquisition request and the second permission indication acquisition response are NAS messages.
  • the AMF network element may also send a third permission indication obtaining request to the RAN to trigger the RAN to obtain permission indication information from the target terminal for indicating whether the target terminal allows the network to analyze the user information of the target terminal.
  • the first permission indication acquisition request sent by the UDM network element to the AMF network element and the third permission indication acquisition request sent by the AMF network element to the RAN carry the identifier of the target terminal, and the RAN sends the request to the RAN according to the identifier of the target terminal.
  • the corresponding terminal sends a radio resource control (radio resource control, RRC) reconfiguration message, so that the corresponding terminal sends permission indication information to the RAN.
  • RRC radio resource control
  • the RAN may send a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends the permission indication to the RAN information.
  • the RAN may send a broadcast message or a multicast message according to the group identifier of the target terminal group, so that the corresponding terminal sends the permission indication to the RAN information.
  • the UDM network element may instruct the second network element (such as the NEF network element) to pass the AF network element.
  • the target terminal for indicating whether the target terminal allows the network to analyze the user information of the target terminal, and carry the permission indication information in the first query response and send it to the first network element (such as the NWDAF network element) .
  • the AF network element sends the second user information analysis request to the NEF network element.
  • the NEF network element After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element, and the NWDAF network element receives the first user information analysis request.
  • a first query request is sent to the UDM network element.
  • the UDM sends a fourth permission indication acquisition request to the NEF network element (for example, the UDM network element sends the fourth permission when it has not obtained the subscription information for indicating whether the target terminal allows the target terminal to perform user information analysis on the target terminal)
  • the NEF network element forwards it to the AF network element, so that the AF network element obtains the license instruction information of the target terminal from the target terminal, and sends the request to the target terminal.
  • the obtained license indication information is forwarded to the UDM network element through the NEF network element; the UDM network element receives the fourth license indication acquisition response sent by the NEF network element, which carries the license indication information of the target terminal.
  • the first user information analysis request sent by the second network element to the first network element carries the permission indication information (such as token) of the target terminal, and the first network element requests the UDM network element to The permission indication information is verified (eg, legality verification). If the verification is passed, it is determined that the user information of the target terminal is allowed to be analyzed; otherwise, it is determined that the user information of the target terminal is not allowed to be analyzed.
  • the permission indication information such as token
  • the permission indication information is verified (eg, legality verification). If the verification is passed, it is determined that the user information of the target terminal is allowed to be analyzed; otherwise, it is determined that the user information of the target terminal is not allowed to be analyzed.
  • the first network element (such as the NWDAF network element) sends a verification request to the UDM network element, where the verification request carries the permission indication information (the permission indication information comes from the first user information analysis request sent by the second network element)
  • the UDM network element verifies the permission indication information, and sends a verification response to the first network element (such as the NWDAF network element), the verification response carries a verification result, and the verification result is used to indicate whether the permission indication information is verified and passed, Or it is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal.
  • the first network element eg, NWDAF network element
  • the first network element After obtaining the permission, the first network element sends the analysis result of the user information of the target terminal to the second network element.
  • the first network element analyzes the user information to obtain an analysis result.
  • the user information may include at least one of the following information:
  • User mobility-related information such as user location information, etc.
  • User's communication-related information which may include: communication slice information, data network name, application ID and area of interest, in a certain time period (communication termination time), traffic and other information.
  • the analysis result obtained by analyzing the user information of the target terminal may include at least one of the following:
  • the user information of the target terminal collected by the first network element is used to support the analysis of the mobility data of the target terminal.
  • the analysis result can be provided to the NF network element or the AF network element.
  • the analysis result can reflect the data of the mobility analysis of the target terminal, such as the identification, time information, and address of a group of UEs or a certain UE, or the data of UE mobility prediction, the identification information of the UE, and the identification information of the UE at a given time.
  • the first network element does not obtain the permission of the target terminal to analyze the user information of the target terminal, it refuses to obtain the user information of the target terminal, or refuses to analyze the user information of the target terminal. Specifically, if the first network element does not obtain the permission of the target terminal to allow the network to analyze the user information of the target terminal, it sends a first user information analysis response to the second network element, where the first user information analysis response is used to indicate rejection Responding to the first user information analysis request received by the first network element.
  • the first network element after the first network element receives the user information analysis request from the second network element and obtains the permission to analyze the user information of the target terminal, it will analyze the user information of the target terminal.
  • the analysis result of the user information of the target terminal is sent to the second network element, thereby protecting user privacy and improving user information security.
  • the license indication information of the target terminal obtained by the first network element may further include validity period information, where the validity period information is used to indicate that the target terminal allows the network to allow the user information of the target terminal The validity period for which the analysis was performed.
  • the validity period information may be carried in a first query response or a verification response sent by the UDM network element to the first network element.
  • the first network element such as the NWDAF network element
  • the first network element obtains the updated user information of the target terminal
  • the updated user information of the target terminal is refused to be performed. analyze.
  • a second query request is sent to the UDM network element, and the The second query request is used to request to query whether to change the validity period for which the target terminal allows the network to analyze the user information of the target terminal; after the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates If the validity period for which the target terminal allows the network to analyze the user information of the target terminal is changed, the updated user information of the target terminal is analyzed, and the analysis result is sent to the second network element.
  • the UDM network element can determine whether to change the validity period of the target terminal according to the validity period change policy. For example, if the validity period change policy allows to extend the validity period of the target terminal, the target terminal can be generated according to the policy. The new validity period of the terminal.
  • the UDM network element may also instruct the AMF network element to request from the target terminal to obtain instruction information on whether to change the validity period of the target terminal, so as to determine whether to change the validity period of the target terminal according to the target terminal's instruction.
  • the process in which the UDM network element instructs the AMF network element to request from the target terminal to obtain the indication information on whether to change the validity period of the target terminal is similar to the process in which the UDM network element instructs the AMF network element to obtain the permission indication information from the target terminal, and is not repeated here. detail.
  • the first network element may analyze the user information of the target terminal after obtaining the permission of the target terminal, and provide the analysis result to the second network element, as shown in FIG. 2a; in another In some embodiments, the first network element may first analyze the user information of the target terminal and obtain the analysis result, then obtain the permission of the target terminal, and after obtaining the permission, send the analysis result to the second network element, Specifically, it can be described in Figure 2b.
  • FIG. 2a it is a schematic flowchart of a method for feeding back a user information analysis result provided in an embodiment of the present application. As shown in the figure, the process may include:
  • the second network element sends a first user information analysis request to the first network element.
  • the first user information analysis request carries the indication information of the target terminal.
  • the first user information analysis request is used to request to analyze the user information of the target terminal.
  • the first network element obtains a license allowing to analyze the user information of the target terminal.
  • S203 The first network element analyzes the user information of the target terminal to obtain an analysis result.
  • each step of the process shown in FIG. 2 a is basically the same as the relevant steps in FIG. 1 .
  • the target terminal After the first network element receives the user information analysis request from the second network element, and obtains the permission to analyze the user information of the target terminal, the target terminal The user information is analyzed, and the analysis result is sent to the second network element, so that user privacy can be protected and user information security can be improved.
  • a schematic flowchart of a method for feeding back a user information analysis result provided by an embodiment of the present application may include:
  • the second network element sends a first user information analysis request to the first network element.
  • the first user information analysis request carries the indication information of the target terminal.
  • the first user information analysis request is used to request to analyze the user information of the target terminal.
  • the first network element analyzes the user information of the target terminal to obtain an analysis result.
  • the first network element obtains a license allowing to analyze the user information of the target terminal.
  • each step of the flow shown in FIG. 2 b is basically the same as the relevant steps in FIG. 1 .
  • the first network element after receiving the user information analysis request from the second network element, the first network element first analyzes the user information of the target terminal, and then obtains the user information that allows the target terminal to be analyzed. If the permission of the target terminal is obtained, the analysis result is sent to the second network element, thereby protecting user privacy and improving user information security.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
  • FIG. 3 it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
  • Step 1 The NF network element sends a first user information analysis request to the NWDAF network element.
  • the NF network element may use the Nnwdaf_AnalyticsInfo service or the Nnwdaf_AnalyticsSubscription service to send the first user information analysis request to the NWDAF network element to analyze the user information of the target UE or a group of target UEs.
  • the first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message or a Nnwdaf_AnalyticsSubscription_Subscribe message.
  • the NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry indication information of the target UE, and the indication information of the target UE may be a UE ID (UE ID) or a group ID (group ID) of a UE group.
  • Step 2 After receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, which is used to request the query target UE whether the network allows the network to analyze the user information of the target UE, or is used to request query Subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query request carries the indication information of the target UE.
  • Step 3a After receiving the first query request, the UDM network element sends a first permission indication acquisition request to the AMF network element, which carries the indication information of the target UE, and the first query request is used to request to query whether the target UE allows the network to perform this request.
  • the user information of the target UE is analyzed.
  • the UDM network element may first query the subscription information of the target UE locally (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE). , then the first query response can be returned to the NWDAF network element according to the subscription information (step 4) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 3a to 3f do not need to be performed. If the UDM network element does not query the above subscription information, step 3a to step 3f are performed.
  • Step 3b After receiving the first permission indication acquisition request, the AMF network element sends a third permission indication acquisition request to the RAN, which carries the indication information of the target UE.
  • the third permission indication acquisition request is used to instruct the RAN to request the target UE to report a policy of whether to allow the network to analyze the user information of the target UE.
  • the third permission indication acquisition request may be sent through the N2 interface, that is, the message may be an N2 interface message.
  • Step 3c After the RAN receives the third permission indication acquisition request, it sends an RRC reconfiguration message to the target UE, which carries a policy acquisition request, which is used to request whether the target UE allows the network to analyze the user information of the target UE. .
  • the RAN may send the policy acquisition request to the target UE in a unicast manner, or may send the policy acquisition request to a group of target UEs in a broadcast manner or a multicast manner.
  • Step 3d The target UE sends policy information of the target UE (ie, permission indication information of the target UE) to the RAN to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • policy information of the target UE ie, permission indication information of the target UE
  • the license indication information sent by the target UE may carry license validity period information, which is used to indicate the validity period for which the target UE allows the network to analyze the user information of the target UE.
  • Step 3e The RAN returns the permission indication information of the target UE to the AMF network element.
  • Step 3f The AMF network element returns the permission indication information of the target UE to the UDM network element.
  • Step 4 After receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze user information of the target UE.
  • the UDM network element queries the subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information can also be carried in the first query.
  • the response is sent to the NWDAF network element.
  • the NWDAF network element may send the first user information analysis response to the NF network element to notify The NF network element refuses to analyze the user information of the target UE, and the subsequent steps 5 to 11 are not executed.
  • Step 5 The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the first query response, and then obtains the user information of the target UE.
  • the NWDAF network element may acquire the user information of the target UE from at least one of the AMF network element and the AF network element.
  • the implementation process of the NWDAF network element acquiring the user information of the target UE from the AMF network element may include: the NWDAF network element sends a subscription request (such as Namf_EventExposure_Subscribe) to the AMF network element to request to subscribe to the user information of the target UE; the AMF network element A notification message (eg Namf_EventExposure_Notify) may be sent to the NWDAF network element according to the subscription request, which carries the user information of the target UE.
  • a subscription request such as Namf_EventExposure_Subscribe
  • a notification message eg Namf_EventExposure_Notify
  • the user information obtained by the NWDAF network element from the AMF is information related to the mobility of the UE, for example, it may include: the identity of the user, the location of the user, the tracking area (TA) or cell entered by the UE, when the AMF network element The timestamp of the UE's entry to the location, the type of location code, and the frequency of mobile registration updates are detected.
  • the implementation process of the NWDAF network element acquiring the user information of the target UE from the AF network element may include: the NWDAF network element sends a subscription request (such as Naf_EventExposure_Subscribe) to the AF network element to request to subscribe to the user information of the target UE; the AF network element A notification message (such as Naf_EventExposure_Notify) may be sent to the NWDAF network element according to the subscription request, which carries the user information of the target UE.
  • a subscription request such as Naf_EventExposure_Subscribe
  • a notification message such as Naf_EventExposure_Notify
  • the NWDAF network element may also acquire user information of the target UE from the SMF network element.
  • the user information obtained by the NWDAF network element from the AF network element or the SMF network element is information related to UE communication, and may include, for example, the user's identity, group ID, network slice information, and the establishment of a packet data unit (packet data unit, PDU) session data network name, application ID, expected user behavior parameters, uplink and downlink data rates, traffic, etc.
  • packet data unit packet data unit, PDU
  • Step 6 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • the NF network element requests to analyze the mobility of the target UE
  • the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE
  • the result obtained by analyzing the user information includes the mobility of the target UE.
  • Step 7 The NWDAF network element sends a first user information analysis response to the NF network element, which carries the analysis result for the target UE.
  • the above process may further include the following steps:
  • Step 8 The NWDAF network element obtains the updated user information of the target UE.
  • the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element
  • the AMF network element and/or the AF network element subscribe to the NWDAF network element.
  • the network element sends updated user information.
  • the AMF network element can send the updated user information of the target UE to the NWDAF network element through a notification message (such as Namf_EventExposure_Notify); for another example, the AF network element can send the updated user information of the target UE to the NWDAF through a notification message (such as Naf_EventExposure_Notify) network element.
  • Step 9 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target. The validity period during which the UE allows the network to analyze the user information of the target UE.
  • the NWDAF network element After the NWDAF network element obtains the updated user information of the target UE, if it is determined that the validity period expires or expires according to the validity period information of the target UE, it sends a second query request to the UDM network element, and the second query request is used for Request to query whether to change the validity period of the target UE that allows the network to analyze the user information of the target UE.
  • the UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request from the target UE to obtain indication information on whether to change the validity period of the target terminal.
  • step 9 is an optional step.
  • the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to The NF network element is notified to refuse to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
  • Step 10 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period.
  • the updated user information of the target UE is analyzed; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and the subsequent step 11 is not performed, and the AF network element can be further notified to refuse to analyze the user information of the target UE, and The reason for the rejection may be further indicated that the license validity period of the target UE has expired.
  • Step 11 The NWDAF network element sends the analysis result to the NF network element.
  • the NWDAF network element may subscribe to the NWDAF network element for multiple times.
  • the element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. The validity period of the target UE has expired or expired, then the above step 9 is performed or the analysis of the updated user information of the target UE is rejected.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
  • FIG. 4 it is a schematic diagram of signaling interaction of another method for feeding back a user information analysis result provided by an embodiment of the present application.
  • the process shown in FIG. 4 is basically the same as the process shown in FIG. 3, except that: in FIG. 4, steps 3b to 3c in FIG. 3 are replaced by step 3b; in FIG. 4, steps in FIG. 3 are replaced by step 3d 3d to step 3e.
  • the AMF network element sends a second permission indication acquisition request, which carries the indication information of the target UE (such as UE ID or UE group ID), which is a NAS message and can be transparently transmitted by the RAN to target UE.
  • the target UE sends a second permission indication acquisition response to the AMF network element, which can carry the permission indication information of the target UE, which is a NAS message and can be transparently transmitted by the RAN to the AMF network element.
  • the UDM network element may directly determine whether to change the validity period of the target UE, or may instruct the AMF network element to request from the target UE to obtain indication information on whether to change the validity period of the target terminal.
  • the process in which the UDM network element instructs the AMF network element to request from the target terminal to obtain the indication information on whether to change the validity period of the target terminal is similar to the process in which the UDM network element instructs the AMF network element to obtain the permission indication information from the target terminal in FIG. 4 . No further details.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
  • FIG. 5 it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
  • Step 1 The AF network element sends a second user information analysis request to the NEF network element, which is used to request to analyze the user information of the target UE.
  • the AF network element may use the Nnef_AnalyticsExpose service to send the second user information analysis request to the NEF network element, so as to analyze the user information of the target UE or a group of target UEs.
  • the second user information analysis request may be an Nnef_AnalyticsExpose_Fetch message.
  • the AF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, or may request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • Step 2 After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element.
  • the NF network element may use the Nnwdaf_AnalyticsInfo service to send the first user information analysis request to the NWDAF network element, so as to analyze the user information of the target UE or a group of target UEs.
  • the first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message.
  • the NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • Step 3 After receiving the first user information analysis request, the NWDAF network element sends a first query request to the UDM network element, which is used for requesting to query whether the target UE allows the network to analyze the user information of the target UE, or for requesting query Subscription information of the target UE, where the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query request carries the indication information of the target UE.
  • Step 4a After receiving the first query request, the UDM network element sends a fourth permission indication acquisition request to the NEF network element, which carries the indication information of the target UE and also carries the identifier of the AF.
  • the UDM network element may first query the subscription information of the target UE locally (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE). , then the first query response can be returned to the NWDAF network element according to the subscription information (step 5) to indicate whether the target UE allows the network to analyze the user information of the target UE, so that steps 4a to 4d do not need to be performed. If the UDM network element does not query the above subscription information, step 4a to step 4d are performed.
  • Step 4b After receiving the fourth permission indication acquisition request, the NEF network element forwards the request to the corresponding AF network element.
  • Step 4c The AF network element provides the user of the target UE with permitted options (such as "allow to analyze user information” and “not allow user information to be analyzed") through the user interface to obtain the user's choice.
  • Step 4d After acquiring the user's selection of the option, the AF network element sends a fourth permission indication acquisition response to the NEF network element according to the user's selection, which carries the permission indication information of the target UE obtained according to the user's selection (this The indication information is used to indicate whether the target UE allows the network to analyze the user information of the target UE).
  • the license indication information of the target UE may carry license validity period information, which is used to indicate the validity period for which the target UE allows the network to analyze the user information of the target UE.
  • Step 4e The NEF network element forwards the fourth permission indication acquisition response to the UDM network element.
  • Step 5 After receiving the permission indication information of the target UE, the UDM network element returns a first query response to the NWDAF network element, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the first query response may carry permission indication information of the target UE, where the permission indication information is used to indicate whether the target UE allows the network to collect or analyze user information of the target UE.
  • the UDM network element queries the subscription information of the target UE (the subscription information is used to indicate whether the target UE allows the network to analyze the user information of the target UE), the subscription information can also be carried in the first query.
  • the response is sent to the NWDAF network element.
  • step 5 if the first query response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a message to the NEF network element to indicate that the user information is rejected for the target UE.
  • the analyzed first user information analyzes the response, and the NEF network element notifies the AF network element to refuse to analyze the user information of the target UE, and the subsequent steps 6 to 14 are not performed.
  • Step 6 The NWDAF network element determines, according to the first query response, that the target UE allows the network to collect and analyze the user information of the target UE, and then acquires the user information of the target UE.
  • this step is the same as the relevant step in the flowchart of FIG. 3 .
  • Step 7 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • the NF network element requests to analyze the mobility of the target UE
  • the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE
  • the result obtained by analyzing the user information includes the mobility of the target UE.
  • Step 8 The NWDAF network element sends a first user information analysis response to the NEF network element, which carries the analysis result for the target UE.
  • Step 9 The NEF network element sends a second user information analysis response to the AF network element, which carries the analysis result for the target UE.
  • the above process may further include the following steps:
  • Step 10 The NWDAF network element acquires the updated user information of the target UE.
  • this step is the same as the relevant step in the flowchart of FIG. 3 .
  • Step 11 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target The validity period during which the UE allows the network to analyze the user information of the target UE.
  • the NWDAF network element After the NWDAF network element obtains the updated user information of the target UE, if it is determined that the validity period expires or expires according to the validity period information of the target UE, it sends a second query request to the UDM network element, and the second query request is used for Request to query whether to change the validity period of the target UE that allows the network to analyze the user information of the target UE.
  • the UDM network element can directly determine whether to change the validity period of the target UE, or can instruct the NEF network element to trigger the AF network element to negotiate with the target UE to obtain indication information on whether to change the validity period of the target terminal.
  • the UDM network element instructs the NEF network element to trigger the process of the AF network element to negotiate with the target UE, which is basically the same as the process of step 4a to step 4e in this flow.
  • step 11 is an optional step.
  • the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NEF network element, and The AF network element is notified by the NEF network element to refuse to analyze the user information of the target UE, and the subsequent steps 12 to 14 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
  • Step 12 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • the NWDAF network element After the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period. Analyze the updated user information of the target UE; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and does not perform steps 12 to 14, and can further notify the AF network element through the NEF network element to reject the target UE. The user information of the target UE is analyzed, and the reason for rejection can be further indicated that the license validity period of the target UE has expired.
  • Step 13 The NWDAF network element sends the analysis result to the NEF network element.
  • Step 14 The NEF network element sends the analysis result to the AF network element.
  • the NWDAF network element may subscribe to the NWDAF network element for multiple times.
  • the element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. The validity period has expired or expired, then perform the above step 11.
  • steps 4a to 4e in the process shown in FIG. 4 are only an example, and the UDM network element may also obtain the license indication information of the target UE in other ways, which is not limited in this embodiment of the present application.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NF network element as an example.
  • FIG. 6 it is a schematic diagram of signaling interaction of a method for feeding back a user information analysis result according to an embodiment of the present application. As shown, the process can include:
  • Step 1 The NF network element sends a first user information analysis request to the NWDAF network element.
  • the NF network element may use the Nnwdaf_AnalyticsInfo service or the Nnwdaf_AnalyticsSubscription service to send the first user information analysis request to the NWDAF network element to analyze the user information of the target UE or a group of target UEs.
  • the first user information analysis request may be an Nswdaf_AnalyticsInfo_Request message or a Nnwdaf_AnalyticsSubscription_Subscribe message.
  • the NF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, may also request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • the request message also carries the permission indication information of the target UE, and the permission indication information may be a token of the target UE, which is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the permission indication information (eg token) can be obtained through negotiation with the target UE.
  • Step 2 After receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, which carries the permission indication information (such as token) of the target UE, and the verification request is used to request the permission indication information for the target UE. authenticating.
  • the permission indication information such as token
  • Step 3 After receiving the verification request, the UDM network element verifies the legality of the permission indication information (eg token) of the target UE, and obtains a verification result, which is used to indicate whether the permission indication information of the target UE is verified.
  • the permission indication information eg token
  • the UDM network element can compare the received permission indication information (such as token) of the target UE with the permission indication information of the target UE saved by the UDM network element. If they are consistent, the verification passes, otherwise the verification fails. By verifying the permission indication information (eg token) of the target UE, the security can be improved.
  • the permission indication information such as token
  • Step 4 The UDM network element returns a verification response to the NWDAF network element, where the verification response is used to indicate whether the permission indication information of the target UE is verified, or whether the target UE allows the network to analyze the user information of the target UE.
  • the verification response may carry the verification result; in other embodiments, the NWDAF network element may also determine whether the target UE allows the network to collect or analyze the user information of the target UE according to the verification result. , and notify the NWDAF network element of the determined result through the verification response.
  • step 4 if the verification response indicates that the target UE does not allow the network to analyze the user information of the target UE, the NWDAF network element may send a message to the NF network element to indicate that the user information of the target UE is refused to be analyzed.
  • the first user information analysis response is to notify the NF network element to refuse to analyze the user information of the target UE, and the subsequent steps 5 to 11 are not executed.
  • Step 5 The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then obtains the user information of the target UE.
  • Step 6 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • the NF network element requests to analyze the mobility of the target UE
  • the user information obtained by the NWDAF network element at least includes the mobility-related information of the target UE
  • the result obtained by analyzing the user information includes the mobility of the target UE.
  • Step 7 The NWDAF network element sends a first user information analysis response to the NF network element, which carries the analysis result for the target UE.
  • the above process may further include the following steps:
  • Step 8 The NWDAF network element obtains the updated user information of the target UE.
  • the NWDAF network element subscribes the user information of the target UE to the AMF network element and/or the AF network element
  • the AMF network element and/or the AF network element subscribe to the NWDAF network element.
  • the network element sends updated user information.
  • the AMF network element can send the updated user information of the target UE to the NWDAF network element through a notification message (such as Namf_EventExposure_Notify); for another example, the AF network element can send the updated user information of the target UE to the NWDAF through a notification message (such as Naf_EventExposure_Notify) network element.
  • Step 9 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target. The validity period during which the UE allows the network to analyze the user information of the target UE.
  • step 9 is an optional step.
  • the NWDAF network element may refuse to analyze the user information of the target UE, and may further send a first user information analysis response to the NF network element to The NF network element is notified to refuse to analyze the user information of the target UE, and the subsequent steps 10 to 11 are not executed. Further, the NWDAF network element may also send a request for unsubscribing the user information of the target UE to the AMF network element and/or the AF network element, so as to no longer receive the updated user information of the target UE.
  • Step 10 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • the NWDAF network element receives the second query response sent by the UDM network element, if the second query response indicates to change the validity period for the target UE to allow the network to analyze the user information of the target UE, the NWDAF network element will request the target UE to change the validity period.
  • the updated user information of the target UE is analyzed; otherwise, the NWDAF network element refuses to analyze the updated user information of the target UE, and the subsequent step 11 is not performed, and the AF network element can be further notified to refuse to analyze the user information of the target UE, and The reason for the rejection may be further indicated that the license validity period of the target UE has expired.
  • Step 11 The NWDAF network element sends the analysis result to the NF network element.
  • the NWDAF network element may subscribe to the NWDAF network element for multiple times.
  • the element sends the updated user information of the target UE. Every time the NWDAF network element receives the updated user information of the target UE, it will judge whether the validity period of the target UE has expired or expired. If it has not expired or expired, it will analyze the updated user information. has expired or expired, go to step 9 above.
  • the embodiments of the present application are described below by taking the first network element as an NWDAF network element and the second network element as an NEF network element as an example.
  • FIG. 7 it is a schematic diagram of signaling interaction of another method for feeding back a user information analysis result provided by an embodiment of the present application. As shown in the figure, the process may include:
  • Step 0 The AF network element and the target UE negotiate the permission indication information of the target UE through the application layer, that is, whether the target UE allows the network to analyze the user information of the target UE.
  • the AF network element and the target UE can use the Network Key Exchange Protocol (IKE) to negotiate whether the target UE allows the network to analyze the user information of the target UE, and the AF network element can generate a command for the target UE according to the negotiation result.
  • the token (token), as the shared information between the target UE and the AF network element, is used to indicate whether the target UE allows the network to analyze the user information of the target UE.
  • the information may be stored in the UDM network element as subscription information of the target UE.
  • Step 1 The AF network element sends a second user information analysis request to the NEF network element for requesting to analyze the user information of the target UE, and the request carries the permission indication information (eg token) of the target UE.
  • the permission indication information eg token
  • the AF network element may use the Nnef_AnalyticsExpose service to send the second user information analysis request to the NEF network element, so as to analyze the user information of the target UE or a group of target UEs.
  • the second user information analysis request may be an Nnef_AnalyticsExpose_Fetch message.
  • the AF network element may request to obtain the mobility statistics information of the target UE by analyzing the user information of the target UE, or may request to obtain the mobility prediction information of the target UE, and may also request to obtain the mobility statistics information and mobility of the target UE. forecast information.
  • the request message may also carry identification information of the target UE, and the indication information of the target UE may be a UE identification (UE ID) or a group identification (group ID) of a UE group.
  • Step 2 After receiving the second user information analysis request, the NEF network element sends the first user information analysis request to the NWDAF network element.
  • Step 3 After receiving the first user information analysis request, the NWDAF network element sends a verification request to the UDM network element, which carries the permission indication information (such as token) of the target UE, and the verification request is used to request the permission indication information for the target UE. authenticating.
  • the permission indication information such as token
  • Step 4 After receiving the verification request, the UDM network element verifies the legality of the permission indication information (eg token) of the target UE, and obtains a verification result, which is used to indicate whether the permission indication information of the target UE is verified.
  • the permission indication information eg token
  • Step 5 The UDM network element returns a verification response to the NWDAF network element, where the verification response is used to indicate whether the permission indication information of the target UE is verified, or whether the target UE allows the network to analyze the user information of the target UE.
  • Step 6 The NWDAF network element determines that the target UE allows the network to collect and analyze the user information of the target UE according to the verification response, and then obtains the user information of the target UE.
  • Step 7 The NWDAF network element analyzes the user information of the target UE to obtain an analysis result.
  • Step 8 The NWDAF network element sends a first user information analysis response to the NEF network element, which carries the analysis result for the target UE.
  • Step 9 The NEF network element sends the analysis result to the AF network element.
  • the above process may further include the following steps:
  • Step 10 The NWDAF network element acquires the updated user information of the target UE.
  • Step 11 The NWDAF network element determines whether the validity period of the target UE (that is, the validity period for which the target UE allows the network to analyze the user information of the target UE) has expired. If it has expired or expired, it will query the UDM network element whether to change the target The validity period during which the UE allows the network to analyze the user information of the target UE.
  • Step 12 The NWDAF network element analyzes the updated user information of the target UE to obtain an analysis result.
  • Step 13 The NWDAF network element sends the analysis result to the NF network element.
  • Step 14 The NEF network element sends the analysis result to the AF network element.
  • an embodiment of the present application further provides a network device, which can implement the function of the first network element (eg, the NWDAF network element) in the foregoing embodiments.
  • the first network element eg, the NWDAF network element
  • the network device may include: a receiving unit 801 , a processing unit 802 , and a sending unit 803 .
  • a receiving unit 801 configured to receive a first user information analysis request from a second network element
  • a processing unit 802 configured to obtain a license allowing to analyze the user information of the target terminal
  • the sending unit 803 is configured to send the analysis result of the user information of the target terminal to the second network element after obtaining the permission.
  • the processing unit 802 is specifically configured to: after obtaining the permission, analyze the user information of the target terminal to obtain an analysis result, and send the analysis result to the second network element; or, obtain the analysis result.
  • user information of the target terminal analyze the user information of the target terminal to obtain an analysis result, and after obtaining the permission, send the analysis result to the second network element.
  • the processing unit 802 may be specifically configured to: send a first query request to the UDM network element; receive a first query response sent by the UDM network element, where the first query response is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed.
  • the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the first user information analysis request carries the permission indication information of the target terminal; the processing unit 802 is specifically configured to: send a verification request to the UDM network element, where the verification request carries the permission indication information; The verification response sent by the UDM network element, where the verification response carries the verification result.
  • the verification result is used to indicate whether the permission indication information passes the verification, or is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal, wherein the permission indication information is verified.
  • the network is allowed to analyze the user information of the target terminal.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the processing unit 802 is further configured to: after acquiring the updated user information of the target terminal, if it is determined that the validity period expires according to the validity period information, send a second query request to the UDM network element, and the first query request is sent to the UDM network element.
  • the second query request is used to query whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal; receive the second query response sent by the UDM network element; if the second query response indicates a change If the target terminal allows the network to analyze the user information of the target terminal within the validity period, the updated user information is analyzed, and the analysis result is sent to the second network element.
  • the above-mentioned network device provided in the embodiment of the present application can implement all the method steps implemented by the first network element in the above-mentioned method embodiment, and can achieve the same technical effect, and this embodiment will not be described here.
  • the same parts and beneficial effects as in the method embodiment will be described in detail.
  • an embodiment of the present application further provides a network device, and the network device can implement the function of the second network element (eg, a UDM network element) in the foregoing embodiments.
  • the network device can implement the function of the second network element (eg, a UDM network element) in the foregoing embodiments.
  • the network device may include: a receiving unit 901 , a processing unit 902 , and a sending unit 903 .
  • a receiving unit 901 configured to receive a first request from an NWDAF network element, where the first request is used to request to obtain whether the user information of the target terminal is allowed to be analyzed;
  • the sending unit 903 is configured to send a first response to the NWDAF network element, where the first response is used to indicate whether to allow the user information of the target terminal to be analyzed.
  • the first request is a first query request
  • the first query request is used to request to query whether the target terminal allows the network to analyze the user information of the target terminal, or to query whether the target terminal has user information.
  • Subscription information that allows the network to analyze the user information of the target terminal.
  • the processing unit 902 is configured to: obtain, according to the first query request, the subscription information of whether the target terminal allows the network to analyze the user information of the target terminal; and determine whether the target terminal allows the network to analyze the user information of the target terminal according to the subscription information; Analyze the user information of the target terminal; the sending unit 903 is specifically configured to: send a first query response to the NWDAF network element, where the first query response is used to indicate whether the target terminal allows the network to respond to the target terminal analysis of user information.
  • the processing unit 902 is further configured to: if the subscription information is not acquired, the instruction sending unit 903 sends a first permission instruction acquisition request to the AMF network element, so that the AMF network element acquires the target terminal from the AMF network element. License indication information, where the license indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal; the receiving unit 901 is further configured to: receive the first license instruction acquisition sent by the AMF network element In response, the first permission indication acquisition response carries the permission indication information of the target terminal.
  • the first query request is sent by the NWDAF network element after receiving the first user information analysis request from the NEF network element, and the first user information analysis request is received by the NEF network element from the Sent by the second user information analysis request sent by the AF network element.
  • the sending unit 903 is further configured to: send a fourth permission indication acquisition request to the NEF network element, where the fourth permission indication acquisition request is forwarded by the NEF network element to the AF network element, so that the AF network element Obtain permission indication information of the target terminal from the target terminal, where the permission indication information is used to indicate whether the target terminal allows the network to analyze the user information of the target terminal; the receiving unit 901 is further configured to: receive the The fourth license indication acquisition response sent by the NEF network element, where the fourth license indication acquisition response carries the license indication information of the target terminal.
  • the first query response carries permission indication information, where the permission indication information includes validity period information, and the validity period information is used to indicate the validity period during which the target terminal allows the network to analyze the user information of the target terminal.
  • the first request is a verification request
  • the verification request carries the permission indication information of the target terminal.
  • the processing unit 902 is further configured to: verify the permission indication information of the target terminal to obtain a verification result, where the verification result is used to indicate whether the permission indication information passes the verification, or is used to indicate whether the target terminal allows the network to The user information of the target terminal is analyzed, wherein the verification of the permission indication information indicates that the target terminal allows the network to analyze the user information of the target terminal; the sending unit 903 is further configured to: send to the NWDAF network element A verification response is sent, where the verification response carries the verification result.
  • the verification response carries validity period information, and the validity period information is used to indicate the validity period for which the target terminal allows the network to analyze the user information of the target terminal.
  • the receiving unit 901 is further configured to: receive a second query request sent by the NWDAF network element, where the second query request is that the NWDAF network element obtains the updated user information of the target terminal and determines the updated user information of the target terminal. Sent after the validity period of the target terminal expires, the second query request is used to request to query whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal; the sending unit 903 is further used for: Send a second query response to the NWDAF network element, where the second query response is used to indicate whether to change the validity period of the target terminal that allows the network to analyze the user information of the target terminal.
  • the above-mentioned network device provided in the embodiment of the present application can implement all the method steps implemented by the second network element in the above-mentioned method embodiment, and can achieve the same technical effect, and this embodiment will not be described here.
  • the same parts and beneficial effects as in the method embodiment will be described in detail.
  • an embodiment of the present application also provides a communication device.
  • the communication apparatus may implement the function of the first network element (eg, the NWDAF network element) in the foregoing embodiment.
  • the communication device may include: a processor 1001 , a memory 1002 , a communication interface 1003 and a bus interface 1004 .
  • the processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations.
  • the communication interface 1003 is used to receive and transmit data under the control of the processor 1001 .
  • the bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 1001 and various circuits of memory represented by memory 1002 linked together.
  • the bus architecture may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be described further herein.
  • the bus interface provides the interface.
  • the processor 1001 is responsible for managing the bus architecture and general processing, and the memory 1002 may store data used by the processor 1001 in performing operations.
  • the processes disclosed in the embodiments of the present application may be applied to the processor 1001 or implemented by the processor 1001 .
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1001 or an instruction in the form of software.
  • the processor 1001 may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory 1002, and the processor 1001 reads the information in the memory 1002, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1001 is configured to read the computer instructions in the memory 1002 and execute the function implemented by the first network element (eg, the NWDAF network element) in the embodiment of the present application.
  • the first network element eg, the NWDAF network element
  • the above-mentioned communication device provided by the embodiment of the present invention can implement all the method steps implemented by the first network element (such as the NWDAF network element) in the above-mentioned method embodiment, and can achieve the same technical effect.
  • the same parts and beneficial effects in this embodiment as those in the method embodiment will not be described in detail here.
  • an embodiment of the present application also provides a communication device.
  • the communication device may implement the function of the second network element (eg, a UDM network element) in the foregoing embodiment.
  • the communication device may include: a processor 1101 , a memory 1102 , a communication interface 1103 and a bus interface 1104 .
  • the processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations.
  • the communication interface 1103 is used to receive and transmit data under the control of the processor 1101 .
  • the bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 1101 and various circuits of memory represented by memory 1102 linked together.
  • the bus architecture may also link together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be described further herein.
  • the bus interface provides the interface.
  • the processor 1101 is responsible for managing the bus architecture and general processing, and the memory 1102 may store data used by the processor 1101 in performing operations.
  • the processes disclosed in the embodiments of the present application may be applied to the processor 1101 or implemented by the processor 1101 .
  • each step of the signal processing flow can be completed by an integrated logic circuit of hardware in the processor 1101 or an instruction in the form of software.
  • the processor 1101 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory 1102, and the processor 1101 reads the information in the memory 1102, and completes the steps of the signal processing flow in combination with its hardware.
  • the processor 1101 is configured to read the computer instructions in the memory 1102 and execute the function implemented by the second network element (eg, the UDM network element) in the embodiment of the present application.
  • the second network element eg, the UDM network element
  • the above-mentioned communication device provided in the embodiment of the present invention can implement all the method steps implemented by the second network element (such as a UDM network element) in the above-mentioned method embodiment, and can achieve the same technical effect.
  • the second network element such as a UDM network element
  • Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the first network element (eg, NWDAF network element) in the foregoing embodiment. method performed.
  • the first network element eg, NWDAF network element
  • Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the second network element (such as a UDM network element) in the foregoing embodiment. method performed.
  • the second network element such as a UDM network element
  • the present application further provides a computer program product, which, when invoked and executed by a computer, can complete the method embodiments and the methods involved in any possible designs of the above method embodiments.
  • the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Abstract

La présente demande divulgue un procédé de rétroaction de résultat d'analyse d'informations d'utilisateur et un dispositif associé. Dans la présente demande, un premier élément de réseau reçoit une première demande d'analyse d'informations d'utilisateur à partir d'un second élément de réseau ; le premier élément de réseau obtient une autorisation pour permettre l'analyse d'informations d'utilisateur du terminal cible ; et après obtention de l'autorisation, le premier élément de réseau envoie un résultat d'analyse pour les informations d'utilisateur du terminal cible au second élément de réseau. Grâce la présente demande, la sécurité des informations d'utilisateur peut être améliorée.
PCT/CN2021/141266 2021-01-08 2021-12-24 Procédé de rétroaction de résultat d'analyse d'informations d'utilisateur et dispositif associé WO2022148254A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110026412.2A CN114760619A (zh) 2021-01-08 2021-01-08 一种用户信息分析结果反馈方法及其装置
CN202110026412.2 2021-01-08

Publications (1)

Publication Number Publication Date
WO2022148254A1 true WO2022148254A1 (fr) 2022-07-14

Family

ID=82325601

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/141266 WO2022148254A1 (fr) 2021-01-08 2021-12-24 Procédé de rétroaction de résultat d'analyse d'informations d'utilisateur et dispositif associé

Country Status (2)

Country Link
CN (1) CN114760619A (fr)
WO (1) WO2022148254A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023201733A1 (fr) * 2022-04-22 2023-10-26 Oppo广东移动通信有限公司 Procédé et dispositif de communication sans fil
WO2024031702A1 (fr) * 2022-08-12 2024-02-15 北京小米移动软件有限公司 Procédé et appareil de traitement d'informations, dispositif de communication et support de stockage
CN117641309A (zh) * 2022-08-12 2024-03-01 维沃移动通信有限公司 用户意愿验证方法、装置及网络侧设备
CN116599862B (zh) * 2023-07-18 2023-09-29 中国电信股份有限公司 通信方法、分析网元和通信系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020070118A1 (fr) * 2018-10-05 2020-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Procédés et appareil de découverte de fonctions analytiques
WO2020145030A1 (fr) * 2019-01-09 2020-07-16 Nec Corporation Nœud de réseau central et procédé

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020070118A1 (fr) * 2018-10-05 2020-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Procédés et appareil de découverte de fonctions analytiques
WO2020145030A1 (fr) * 2019-01-09 2020-07-16 Nec Corporation Nœud de réseau central et procédé

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for 5G System (5GS) to support network data analytics services; (Release 16)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 23.288, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.1.0, 1 February 2019 (2019-02-01), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 40, XP051591861 *

Also Published As

Publication number Publication date
CN114760619A (zh) 2022-07-15

Similar Documents

Publication Publication Date Title
WO2022148254A1 (fr) Procédé de rétroaction de résultat d'analyse d'informations d'utilisateur et dispositif associé
US20200120580A1 (en) Communication method, network device, terminal device, and system
US11770444B2 (en) Edge computing for internet of things security with blockchain authentication
WO2017186092A1 (fr) Procédé et appareil de sélection de tranche de réseau
WO2018176220A1 (fr) Procédé d'accès au réseau, terminal, réseau d'accès et réseau central
KR20200139748A (ko) 서비스 가입 방법 및 장치
CN110351828B (zh) 一种定位方法及装置
KR102202994B1 (ko) 위치 변경 보고 방법, 장치 및 시스템
JP2013528985A (ja) ネットワークにアクセスするためのマシン型通信装置を制御する方法及びシステム
WO2017125025A1 (fr) Procédé, dispositif, système d'appel et support de stockage
US20120202492A1 (en) Method and apparatus for enabling identification of a rejecting network in connection with registration area updating
US20220263672A1 (en) Data Sharing Method, Device, and System
WO2019057027A1 (fr) Procédé et appareil de fourniture de service d'analyse de mégadonnées, et support de stockage lisible par ordinateur
TWI640214B (zh) 一種網路接入方法、相關設備和系統
CN105472550A (zh) 一种wifi连接方法、装置及系统
US20220272511A1 (en) Subscription data management method and apparatus
WO2021168829A1 (fr) Procédé de vérification d'identifiant d'utilisateur et dispositif associé
CN114980034A (zh) 原生算力业务实现方法、装置、网络设备及终端
KR20110122643A (ko) 이동통신 시스템에서의 mtc 서비스 네트워크 오버로드의 제어 방법 및 그 장치
US20180081746A1 (en) Application message processing system, method, and application device
WO2023016255A1 (fr) Procédé et appareil d'autorisation de service de fonction réseau
US20240089735A1 (en) Roaming in cellular communication networks
WO2021233286A1 (fr) Procédé et appareil de traitement de données, dispositif réseau et terminal
CN114025349B (zh) 网络服务方法、装置、系统和存储介质
WO2017103680A1 (fr) Procédé et appareil d'exécution de distribution de messages de groupe mtc

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21917294

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21917294

Country of ref document: EP

Kind code of ref document: A1