WO2023207984A1 - Behavior processing method and apparatus, and terminal, network-side device and medium - Google Patents

Behavior processing method and apparatus, and terminal, network-side device and medium Download PDF

Info

Publication number
WO2023207984A1
WO2023207984A1 PCT/CN2023/090602 CN2023090602W WO2023207984A1 WO 2023207984 A1 WO2023207984 A1 WO 2023207984A1 CN 2023090602 W CN2023090602 W CN 2023090602W WO 2023207984 A1 WO2023207984 A1 WO 2023207984A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
terminal
pdu session
information
behavior
Prior art date
Application number
PCT/CN2023/090602
Other languages
French (fr)
Chinese (zh)
Inventor
张鹏飞
吕华章
康艳超
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023207984A1 publication Critical patent/WO2023207984A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a behavior processing method, device, terminal, network side equipment and medium.
  • the terminal can select and/or establish a corresponding PDU session for the application's traffic based on the traffic characteristics associated with the application.
  • the terminal may experience some abnormal behavior on the PDU session. How to intelligently handle the abnormal behavior of the terminal to select and/or establish an appropriate PDU session has become an urgent problem. The problem.
  • Embodiments of the present application provide a behavior processing method, device, terminal, network side device and medium, which can solve the problem of how to intelligently process abnormal behavior of the terminal to select and/or establish an appropriate PDU session.
  • a behavior processing method includes: a terminal receiving target information from a network side device, where the target information includes an analysis result of the terminal's abnormal behavior; and the terminal makes a decision on the terminal's behavior based on the target information.
  • a behavior processing device includes: a receiving module for receiving target information from a network side device, where the target information includes analysis results of abnormal behavior of the terminal; a decision-making module for based on the target information, Make decisions about the behavior of the terminal.
  • a behavior processing method includes: the network side device analyzes the behavior of the terminal; the network side device sends target information to the terminal, and the target information includes the analysis results of the terminal's abnormal behavior.
  • a behavior processing device includes: an analysis module for analyzing the behavior of the terminal; and a sending module for sending target information to the terminal, where the target information includes analysis results of the terminal's abnormal behavior.
  • a terminal in a fifth aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor, the following implementations are implemented: The steps of the method described in one aspect.
  • a terminal including a processor and a communication interface, wherein the communication interface is used to receive target information from a network side device, where the target information includes analysis results of abnormal behavior of the terminal, and the processor is used to Based on the target information, make decisions on the behavior of the terminal.
  • a network side device in a seventh aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor.
  • a network side device including a processor and a communication interface, wherein the processor is used to analyze the behavior of the terminal, and the communication interface is used to send target information to the terminal, where the target information includes the terminal Analysis results of abnormal behavior.
  • a ninth aspect provides a communication system, including: a terminal and a network side device.
  • the terminal can be used to perform the steps of the behavior processing method as described in the first aspect.
  • the network side device can be used to perform the steps of the behavior processing method as described in the third aspect. The steps of the behavioral processing method.
  • a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the third aspect.
  • a chip in an eleventh aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. method, or implement a method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect The steps of behavioral processing method.
  • the network side device can detect and analyze the behavior of the terminal, and then send the analysis result of the terminal's abnormal behavior to the terminal. After receiving the analysis result sent by the network side device, the terminal can perform the analysis according to the analysis result. , make decisions on the behavior of the terminal.
  • the terminal can make decisions on the terminal's behavior based on the analysis results of the terminal's abnormal behavior by the network-side device, so that the terminal can handle the terminal's abnormal behavior more intelligently and accurately based on the assistance of the network.
  • Figure 1 is a schematic architectural diagram of a communication system provided by an embodiment of the present application.
  • Figure 2 is a schematic diagram of a behavior processing method provided by an embodiment of the present application.
  • Figure 3 is one of the structural schematic diagrams of a behavior processing device provided by an embodiment of the present application.
  • Figure 4 is the second structural schematic diagram of a behavior processing device provided by an embodiment of the present application.
  • Figure 5 is a schematic diagram of the hardware structure of a communication device provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of the hardware structure of a terminal provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of the hardware structure of a network-side device provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • Mobile Internet Device MID
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • VUE vehicle-mounted equipment
  • PUE pedestrian terminal
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • PC personal computers
  • teller machines or self-service Terminal devices such as mobile phones
  • wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets, smart anklets, etc.), Smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device 12 may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or Wireless access network unit.
  • the access network device 12 may include a base station, a WLAN access point or a WiFi node, etc.
  • the base station may be called a Node B, an evolved Node B (eNB), an access point, a Base Transceiver Station (BTS), a radio Base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), Home Node B, Home Evolved Node B, Transmitting Receiving Point (TRP) or all some other appropriate term in the field described, as long as To achieve the same technical effect, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
  • Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration ( Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (Local NEF, or L-NEF), Binding Support Function (Binding Support Function, BSF), application function (Application Function, AF), etc.
  • MME mobility management entities
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • PCF Policy Control Function
  • NWDAF 3rd generation partnership project
  • 3GPP 3rd generation partnership project
  • NWDAF has certain intelligent analysis functions. It collects some data and uses built-in algorithms and analysis capabilities to analyze and obtain results, which are provided to 5G core network elements to perform some operational optimization or statistical analysis.
  • the network data analytics function can provide an observation service experience analysis function by collecting the quality of service (QoS) information of the terminal accessing a certain server, such as the uplink rate or Downlink rate, packet loss rate, etc., and output a statistical information, which includes the user experience of the terminal accessing the server; alternatively, NWDAF can predict based on the historical experience of the terminal accessing the server, for example, in a certain time period in the future In a certain area, if the terminal accesses the server, what is the user experience (such as QoS situation) that the terminal may obtain.
  • QoS quality of service
  • the analysis content and/or prediction content that NWDAF can provide are distinguished by analysis IDs.
  • NWDAF can provide corresponding analysis results and/or predictions. result.
  • NWDAF provides observation service experience analysis. Therefore, as long as you obtain the network element of the NWDAF service and enter the analytic ID when requesting analysis or prediction, NWDAF can provide the corresponding analysis results and/or prediction results.
  • the analysis or prediction results corresponding to the analytic ID that NWDAF can currently provide are shown in Table 1.
  • NWDAF can provide the following performance analysis:
  • NWDAF can provide the performance of the access method, for example, the performance of 3GPP access (such as 4G access and 5G access) or non-3GPP access (such as WLAN access) performance; wherein, the performance of this access method includes: the uplink rate or downlink rate after using this access method, the packet loss rate after using this access method, and the reference signal after using this access method Received power (reference signal received power, RSRP), reference signal received quality (reference signal received quality, RSRQ), received signal strength indicator (received signal strength indicator, RSSI), etc.
  • RSRP reference signal received power
  • RSRQ reference signal received quality
  • RSSI received signal strength indicator
  • NWDAF can provide the performance of the slice, for example, the load status of the currently used slice or the service experience of the currently used slice; where, the performance of the currently used slice
  • the load situation includes: the resource usage of the currently used slice, the load level of the currently used slice, etc.
  • the service experience of the currently used slice includes: the uplink rate or downlink rate after using the slice, and the packet loss rate after using the slice. , the delay after using this slice, etc.
  • NWDAF can provide the performance of the DN, such as the average uplink rate or average downlink rate when accessing a certain DN, the packet loss rate when accessing a certain DN, and the average when accessing a certain DN.
  • the packet delay of a DN the maximum packet delay of accessing a certain DN, etc.
  • NWDAF can provide location analysis of the terminal, for example, the start and end time of the terminal at a certain location, the stay interval of the terminal at a certain location, etc.
  • FIG. 2 shows a flow chart of a behavior processing method provided by an embodiment of the present application.
  • the behavior processing method provided by the embodiment of the present application includes the following steps 201 to 204.
  • Step 201 The network side device analyzes the behavior of the terminal.
  • the network side device can detect and analyze the behavior of the terminal, and then send the analysis result of the terminal's abnormal behavior to the terminal. After receiving the analysis result sent by the network side device, the terminal can, based on the analysis result, Make decisions about the behavior of the terminal, so as to handle abnormal behavior of the terminal more intelligently and accurately.
  • the network side device may be a NWDAF, or may be other network elements with the same function or type, which is not limited in the embodiment of the present application.
  • the network side device can detect and analyze the behavior of the terminal after receiving the request message from the terminal.
  • the network-side device automatically detects and analyzes whether the terminal has abnormal behavior without requesting it from the terminal.
  • Step 202 The network side device sends target information to the terminal.
  • the above target information includes analysis results of abnormal behavior of the terminal.
  • the network side device when the network side device determines that the terminal has abnormal behavior, the network side device may send target information to the terminal.
  • the above target information may include analysis results of the terminal's historical behavior, and may also include prediction results of the terminal's future performance.
  • the analysis results of the abnormal behavior of the terminal include at least one of the following: exception ID (except ID), traffic description information, protocol data unit (PDU) session ID, target unit Network slice selection assistance information (single network slice selection assistance information, S-NSSAI), target data network name (DNN) information, target QoS parameters, periodic time (periodic time), scheduled communication time (scheduled communication time) , scheduled communication type, communication duration time, traffic profile, expected transaction dispersion.
  • the above-mentioned anomaly identification is used to indicate a risk detected by the network-side device, and the risk includes at least one of the following: unexpected long-live/large rate flows, suspected distributed Distributed denial of service (DDoS) attack (suspicion of DDoS attack), too frequent Service access (too frequent service access);
  • DDoS distributed Distributed denial of service
  • the above traffic description information includes at least one of the following: application descriptors, Internet protocol (IP) descriptors (IP descriptors), domain name descriptors (domain descriptors), non-IP descriptors (non-IP descriptors), DNN, connection capabilities.
  • IP Internet protocol
  • IP descriptors IP descriptors
  • domain name descriptors domain descriptors
  • non-IP descriptors non-IP descriptors
  • DNN connection capabilities.
  • the above-mentioned application descriptor may include an operating system identifier (operating system identifier, OS ID) and an operating system application identifier (OS application identifier, OS APP ID).
  • the above-mentioned IP descriptor can be a destination IP triplet (IP address or IPv6 network prefix, port number, protocol ID of a protocol above IP) or IP five-tuple information.
  • the above domain name descriptor can be a fully qualified domain name (Fully Qualified Domain Name, FQDN) used as a domain name matching condition.
  • the above-mentioned non-IP descriptor may be source information and/or destination information of non-IP traffic.
  • the above-mentioned DNN is a data network accessed or connected by application traffic. The above connection capabilities match the information provided by the application when requesting a network connection with certain capabilities.
  • the DNN in the above traffic description information may be a characteristic description of abnormal traffic.
  • the target S-NSSAI may be the S-NSSAI recommended for use by the network side device, or may be the S-NSSAI corresponding to abnormal traffic.
  • the above target QoS parameters may be QoS parameters recommended for use by network-side devices, or may be QoS parameters corresponding to abnormal traffic.
  • the above target DNN information can be the DNN recommended for network-side devices, or it can be the DNN corresponding to abnormal traffic. Specifically, it can be determined according to actual usage requirements, and is not limited by the embodiments of this application.
  • the target DNN information is the DNN corresponding to the abnormal traffic
  • the target DNN information and the DNN content in the traffic description information are the same, but the sending form is different.
  • the network side device can send DNN directly to the terminal, or it can send DNN in the form of traffic description.
  • Step 203 The terminal receives target information from the network side device.
  • Step 204 The terminal makes decisions on the behavior of the terminal based on the target information.
  • the behavior of the terminal is first detected and analyzed through the network side device to obtain the analysis result of the abnormal behavior of the terminal, and then the terminal can judge the behavior of the terminal again based on the analysis result to determine the behavior of the terminal. Handle abnormal terminal behavior.
  • Embodiments of the present application provide a behavior processing method.
  • the network side device can detect and analyze the behavior of the terminal, and then send the analysis results of the terminal's abnormal behavior to the terminal. After receiving the analysis results sent by the network side device, the terminal can Based on the analysis results, decisions are made on the behavior of the terminal.
  • the terminal can make decisions on the terminal's behavior based on the analysis results of the terminal's abnormal behavior by the network-side device, so that the terminal can handle the terminal's abnormal behavior more intelligently and accurately based on the assistance of the network.
  • the behavior processing method provided by the embodiment of the present application further includes the following steps 301 and 302.
  • Step 301 The terminal sends a first message to the network side device.
  • the above-mentioned first message includes an abnormal behavior identifier, and the above-mentioned abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  • the above target information is the analysis result corresponding to the abnormal behavior identification.
  • Step 302 The network side device receives the first message sent by the terminal.
  • step 204 can be specifically implemented through the following steps 204a and 204b.
  • Step 204a If it is determined that the behavior of the terminal is abnormal based on the target information, the terminal performs the target operation.
  • Step 204b If it is determined that the behavior of the terminal is normal based on the target information, the terminal ignores the target information.
  • the terminal can determine whether the terminal's behavior is abnormal based on the target information. If it is determined that the terminal's behavior is abnormal, the terminal performs the target operation. If it is determined that the terminal's behavior is normal, the terminal ignores the target information.
  • the terminal determines that the unexpected long duration/large rate traffic is normal operation, the target information is ignored.
  • the network side device will independently handle the abnormal behavior of the terminal.
  • the network side device can analyze the abnormal behavior of the terminal, and then the terminal makes decisions on the terminal's behavior based on the analysis results of the network side device. , so that the abnormal behavior of the terminal can be handled more intelligently and accurately.
  • the analysis results of the abnormal behavior of the terminal include traffic description information.
  • the above target operations include any of the following:
  • the terminal discards or ignores the uplink or downlink data packets corresponding to the traffic description information.
  • the analysis result of the abnormal behavior of the terminal includes a PDU session identifier.
  • the above target operations include any of the following:
  • the above-mentioned PDU session is a PDU session carrying abnormal traffic.
  • the analysis results of the abnormal behavior of the terminal also include at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information.
  • the above process of modifying the PDU session corresponding to the initiated PDU session identifier includes at least one of the following:
  • If the analysis results include target QoS parameters, modify the Qos parameters in the PDU session to the target QoS parameters;
  • If the analysis result includes the target S-NSSAI, modify the S-NSSAI in the PDU session to the target S-NSSAI;
  • the target S-NSSAI is the S-NSSAI recommended by the network side device
  • the target QoS parameter is the QoS parameter recommended by the network side device
  • the target DNN information is the DNN recommended by the network side device.
  • the terminal can modify certain parameters in the PDU session to parameters recommended by the network side device, so that an appropriate PDU session can be intelligently and accurately selected and/or established.
  • the analysis result of the abnormal behavior of the terminal includes at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information
  • the above target operation is not allowed to establish the target information.
  • the corresponding PDU session when the analysis result of the abnormal behavior of the terminal includes at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information, the above target operation is not allowed to establish the target information.
  • target QoS parameters target S-NSSAI, and target DNN information
  • the target S-NSSAI is the S-NSSAI corresponding to the abnormal traffic
  • the target QoS parameter is the QoS parameter corresponding to the abnormal traffic
  • the target DNN information is the DNN corresponding to the abnormal traffic.
  • the terminal since the target information is information corresponding to abnormal traffic, the terminal is not allowed to establish a PDU session corresponding to the target information, so that an appropriate PDU session can be intelligently and accurately selected and/or established.
  • the above target operation is to set the session management (session management, SM) back-off timer (SM back-off timer).
  • the terminal is not allowed to initiate a service request before the expiration of the session management backoff timer.
  • the terminal can set the SM back-off timer using default parameters; or, the terminal can set the SM back-off timer according to the target information (such as cycle time).
  • the target information such as cycle time
  • the execution subject may be a behavior processing device.
  • a behavior processing device executing a behavior processing method is used as an example to illustrate the behavior processing device provided in the embodiments of this application.
  • the behavior processing device 500 includes: a receiving module 501 and a decision-making module 502.
  • the receiving module 501 is used to receive target information from the network side device, where the target information includes the analysis results of the abnormal behavior of the terminal.
  • the decision-making module 502 is used to make decisions on the behavior of the terminal based on the target information.
  • the above-mentioned behavior processing device 500 further includes: a sending module.
  • the sending module is configured to send the first message to the network side device before the receiving module 501 receives the target information from the network side device.
  • the above-mentioned first message includes an abnormal behavior identifier, and the abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  • the above-mentioned decision-making module 502 is specifically configured to perform the target operation when it is determined that the behavior of the terminal is abnormal based on the target information; when it is determined that the behavior of the terminal is normal based on the target information, ignore the target. information.
  • the above analysis results include at least one of the following: exception identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, cycle time, scheduled communication time, Scheduled communication type, communication duration, traffic profile, expected business dispersion.
  • the above-mentioned abnormality identification is used to indicate the risk detected by the network-side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, and too frequent service access.
  • the above traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, Connectivity.
  • the above analysis results include traffic description information.
  • the above target operations include any of the following:
  • the terminal discards or ignores the uplink or downlink data packets corresponding to the traffic description information.
  • the above analysis results include a PDU session identifier.
  • the above target operations include any of the following:
  • the PDU session is a PDU session carrying abnormal traffic.
  • the above analysis results also include at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information.
  • the above process of modifying the PDU session corresponding to the initiated PDU session identifier includes at least one of the following:
  • If the analysis results include target QoS parameters, modify the Qos parameters in the PDU session to the target QoS parameters;
  • If the analysis result includes the target S-NSSAI, modify the S-NSSAI in the PDU session to the target S-NSSAI;
  • the above target operation is to not allow the establishment of a PDU session corresponding to the target information.
  • the above target operation is to set a session management backoff timer.
  • the terminal is not allowed to initiate a service request before the expiration of the session management backoff timer.
  • Embodiments of the present application provide a behavior processing device that can make decisions on the behavior of the terminal based on the analysis results of the abnormal behavior of the terminal by the network side device, so that the terminal can more intelligently and accurately respond to the abnormal behavior of the terminal based on the assistance of the network. for processing.
  • a behavior processing device provided by an embodiment of the present application is applied to network side equipment.
  • the behavior processing device 600 includes: an analysis module 601 and a sending module 602.
  • the analysis module 601 is used to analyze the behavior of the terminal.
  • the sending module 602 is configured to send target information to the terminal, where the target information includes the analysis results of the abnormal behavior of the terminal.
  • the above-mentioned behavior processing device 600 further includes: a receiving module.
  • the receiving module is configured to receive the first message sent by the terminal before the analysis module 601 analyzes the behavior of the terminal.
  • the above-mentioned One message includes an abnormal behavior identifier, which is used to request analysis or predict whether abnormal behavior occurs on the terminal.
  • the above analysis results include at least one of the following: exception identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, cycle time, scheduled communication time, Scheduled communication type, communication duration, traffic profile, expected business dispersion;
  • the above-mentioned abnormality identification is used to indicate the risk detected by the network-side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, and too frequent service access.
  • the above traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, and connection capability.
  • Embodiments of the present application provide a behavior processing device that can analyze the behavior of a terminal and send analysis results of the terminal's abnormal behavior to the terminal, so that the terminal can make decisions about the behavior of the terminal based on the analysis results, so that the terminal can Network-based assistance handles abnormal terminal behavior more intelligently and accurately.
  • the behavior processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the behavior processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 2 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application also provides a communication device 700, which includes a processor 701 and a memory 702.
  • the memory 702 stores programs or instructions that can be run on the processor 701, such as , when the communication device 700 is a terminal, when the program or instruction is executed by the processor 701, each step of the above behavior processing method embodiment is implemented, and the same technical effect can be achieved.
  • the communication device 700 is a network-side device, when the program or instruction is executed by the processor 701, each step of the above behavior processing method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • Embodiments of the present application also provide a terminal, including a processor and a communication interface.
  • the communication interface is used to receive target information from a network side device.
  • the target information includes analysis results of abnormal behaviors of the terminal.
  • the processor is used to perform analysis on the terminal based on the target information. behavior decisions.
  • This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment.
  • Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 6 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 800 includes but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, etc. At least some parts.
  • the terminal 800 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 810 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in Figure 6 does not constitute a limitation on the terminal.
  • the terminal can include It may include more or fewer components than those shown in the figures, or combine certain components, or arrange different components, which will not be described again here.
  • the input unit 804 may include a graphics processing unit (Graphics Processing Unit, GPU) 8041 and a microphone 8042.
  • the graphics processor 8041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 806 may include a display panel 8061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 807 includes a touch panel 8071 and at least one of other input devices 8072 .
  • Touch panel 8071 also known as touch screen.
  • the touch panel 8071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 8072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 801 after receiving downlink data from the network side device, the radio frequency unit 801 can transmit it to the processor 810 for processing; in addition, the radio frequency unit 801 can send uplink data to the network side device.
  • the radio frequency unit 801 includes, but is not limited to, an antenna, amplifier, transceiver, coupler, low noise amplifier, duplexer, etc.
  • Memory 809 may be used to store software programs or instructions as well as various data.
  • the memory 809 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 809 may include volatile memory or non-volatile memory, or memory 809 may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM Double Data Rate SDRAM
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM enhanced synchronous dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus
  • the processor 810 may include one or more processing units; optionally, the processor 810 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 810.
  • the radio frequency unit 801 is used to receive target information from the network side device, where the target information includes the analysis results of the abnormal behavior of the terminal.
  • the processor 810 is used to make decisions on the behavior of the terminal based on the target information.
  • the radio frequency unit 801 is also configured to send the first message to the network side device before receiving the target information from the network side device.
  • the first message is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  • the processor 810 is specifically configured to determine abnormal behavior of the terminal based on the target information. If the behavior of the terminal is determined to be normal based on the target information, the target information is ignored.
  • Embodiments of the present application also provide a network side device, including a processor and a communication interface.
  • the processor is used to analyze the behavior of the terminal, and the communication interface is used to send target information to the terminal.
  • the target information includes the analysis results of the terminal's abnormal behavior.
  • This network-side device embodiment corresponds to the above-mentioned network-side device method embodiment.
  • Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
  • the network side device 900 includes: a processor 901, a network interface 902 and a memory 903.
  • the network interface 902 is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 900 in this embodiment of the present invention also includes: instructions or programs stored in the memory 903 and executable on the processor 901.
  • the processor 901 calls the instructions or programs in the memory 903 to execute each of the steps shown in Figure 4. The method of module execution and achieving the same technical effect will not be described in detail here to avoid duplication.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above behavioral processing method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above behavior processing method embodiment. Each process can achieve the same technical effect. To avoid duplication, it will not be described again here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above behavioral processing method embodiment.
  • Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • Embodiments of the present application also provide a communication system, including: a terminal and a network side device.
  • the terminal can be used to perform the steps of the behavior processing method as described above.
  • the network side device can be used to perform the behavior processing as described above. Method steps.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Abstract

Disclosed in the present application are a behavior processing method and apparatus, and a terminal, a network-side device and a medium. The behavior processing method in the embodiments of the present application comprises: a terminal receiving target information from a network-side device, wherein the target information includes an analysis result of an abnormal behavior of the terminal; and the terminal making a decision regarding a behavior of the terminal on the basis of the target information.

Description

行为处理方法、装置、终端、网络侧设备及介质Behavior processing method, device, terminal, network side equipment and medium
相关申请的交叉引用Cross-references to related applications
本申请主张在2022年4月27日在中国提交的中国专利申请号No.202210459394.1的优先权,其全部内容通过引用包含于此。This application claims priority from Chinese Patent Application No. 202210459394.1 filed in China on April 27, 2022, the entire content of which is incorporated herein by reference.
技术领域Technical field
本申请属于通信技术领域,具体涉及一种行为处理方法、装置、终端、网络侧设备及介质。This application belongs to the field of communication technology, and specifically relates to a behavior processing method, device, terminal, network side equipment and medium.
背景技术Background technique
目前,终端可以根据应用关联的流量特征,为应用的流量选择和/或建立相应的PDU会话。然而,在选择和/或建立PDU会话之后,终端可能会在该PDU会话上发生一些异常行为,如何智能地对终端的异常行为进行处理,以选择和/或建立合适的PDU会话,成为亟待解决的问题。Currently, the terminal can select and/or establish a corresponding PDU session for the application's traffic based on the traffic characteristics associated with the application. However, after selecting and/or establishing a PDU session, the terminal may experience some abnormal behavior on the PDU session. How to intelligently handle the abnormal behavior of the terminal to select and/or establish an appropriate PDU session has become an urgent problem. The problem.
发明内容Contents of the invention
本申请实施例提供一种行为处理方法、装置、终端、网络侧设备及介质,能够解决如何智能地对终端的异常行为进行处理,以选择和/或建立合适的PDU会话的问题。Embodiments of the present application provide a behavior processing method, device, terminal, network side device and medium, which can solve the problem of how to intelligently process abnormal behavior of the terminal to select and/or establish an appropriate PDU session.
第一方面,提供了一种行为处理方法,该方法包括:终端从网络侧设备接收目标信息,该目标信息包含终端的异常行为的分析结果;终端基于目标信息,对终端的行为进行决策。In the first aspect, a behavior processing method is provided. The method includes: a terminal receiving target information from a network side device, where the target information includes an analysis result of the terminal's abnormal behavior; and the terminal makes a decision on the terminal's behavior based on the target information.
第二方面,提供了一种行为处理装置,该装置包括:接收模块,用于从网络侧设备接收目标信息,该目标信息包含终端的异常行为的分析结果;决策模块,用于基于目标信息,对终端的行为进行决策。In a second aspect, a behavior processing device is provided. The device includes: a receiving module for receiving target information from a network side device, where the target information includes analysis results of abnormal behavior of the terminal; a decision-making module for based on the target information, Make decisions about the behavior of the terminal.
第三方面,提供了一种行为处理方法,该方法包括:网络侧设备对终端的行为进行分析;网络侧设备向终端发送目标信息,该目标信息包含终端的异常行为的分析结果。In the third aspect, a behavior processing method is provided, which method includes: the network side device analyzes the behavior of the terminal; the network side device sends target information to the terminal, and the target information includes the analysis results of the terminal's abnormal behavior.
第四方面,提供了一种行为处理装置,该装置包括:分析模块,用于对终端的行为进行分析;发送模块,用于向终端发送目标信息,该目标信息包含终端的异常行为的分析结果。In a fourth aspect, a behavior processing device is provided. The device includes: an analysis module for analyzing the behavior of the terminal; and a sending module for sending target information to the terminal, where the target information includes analysis results of the terminal's abnormal behavior. .
第五方面,提供了一种终端,该终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。In a fifth aspect, a terminal is provided. The terminal includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. When the program or instructions are executed by the processor, the following implementations are implemented: The steps of the method described in one aspect.
第六方面,提供了一种终端,包括处理器及通信接口,其中,所述通信接口用于从网络侧设备接收目标信息,该目标信息包含终端的异常行为的分析结果,所述处理器用于基于目标信息,对终端的行为进行决策。 In a sixth aspect, a terminal is provided, including a processor and a communication interface, wherein the communication interface is used to receive target information from a network side device, where the target information includes analysis results of abnormal behavior of the terminal, and the processor is used to Based on the target information, make decisions on the behavior of the terminal.
第七方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。In a seventh aspect, a network side device is provided. The network side device includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. The program or instructions are executed by the processor. When implementing the steps of the method described in the third aspect.
第八方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述处理器用于对终端的行为进行分析,所述通信接口用于向终端发送目标信息,该目标信息包含终端的异常行为的分析结果。In an eighth aspect, a network side device is provided, including a processor and a communication interface, wherein the processor is used to analyze the behavior of the terminal, and the communication interface is used to send target information to the terminal, where the target information includes the terminal Analysis results of abnormal behavior.
第九方面,提供了一种通信系统,包括:终端及网络侧设备,所述终端可用于执行如第一方面所述的行为处理方法的步骤,所述网络侧设备可用于执行如第三方面所述的行为处理方法的步骤。A ninth aspect provides a communication system, including: a terminal and a network side device. The terminal can be used to perform the steps of the behavior processing method as described in the first aspect. The network side device can be used to perform the steps of the behavior processing method as described in the third aspect. The steps of the behavioral processing method.
第十方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。In a tenth aspect, a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the third aspect.
第十一方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第三方面所述的方法。In an eleventh aspect, a chip is provided. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the method described in the first aspect. method, or implement a method as described in the third aspect.
第十二方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的行为处理方法的步骤。In a twelfth aspect, a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect The steps of behavioral processing method.
在本申请实施例中,网络侧设备可以对终端的行为进行检测和分析,然后向终端发送终端的异常行为的分析结果,终端在接收到网络侧设备发送的分析结果之后,可以根据该分析结果,对终端的行为进行决策。通过本方案,终端可以根据网络侧设备对终端异常行为的分析结果,对终端的行为进行决策,从而使得终端可以基于网络的协助,更加智能、准确地对终端的异常行为进行处理。In the embodiment of this application, the network side device can detect and analyze the behavior of the terminal, and then send the analysis result of the terminal's abnormal behavior to the terminal. After receiving the analysis result sent by the network side device, the terminal can perform the analysis according to the analysis result. , make decisions on the behavior of the terminal. Through this solution, the terminal can make decisions on the terminal's behavior based on the analysis results of the terminal's abnormal behavior by the network-side device, so that the terminal can handle the terminal's abnormal behavior more intelligently and accurately based on the assistance of the network.
附图说明Description of the drawings
图1是本申请实施例提供的一种通信系统的架构示意图;Figure 1 is a schematic architectural diagram of a communication system provided by an embodiment of the present application;
图2是本申请实施例提供的一种行为处理方法的示意图;Figure 2 is a schematic diagram of a behavior processing method provided by an embodiment of the present application;
图3是本申请实施例提供的一种行为处理装置的结构示意图之一;Figure 3 is one of the structural schematic diagrams of a behavior processing device provided by an embodiment of the present application;
图4是本申请实施例提供的一种行为处理装置的结构示意图之二;Figure 4 is the second structural schematic diagram of a behavior processing device provided by an embodiment of the present application;
图5是本申请实施例提供的一种通信设备的硬件结构示意图;Figure 5 is a schematic diagram of the hardware structure of a communication device provided by an embodiment of the present application;
图6是本申请实施例提供的一种终端的硬件结构示意图;Figure 6 is a schematic diagram of the hardware structure of a terminal provided by an embodiment of the present application;
图7是本申请实施例提供的一种网络侧设备的硬件结构示意图。FIG. 7 is a schematic diagram of the hardware structure of a network-side device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显 然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly described below with reference to the accompanying drawings in the embodiments of the present application. However, the described embodiments are part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art fall within the scope of protection of this application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and "second" are distinguished objects It is usually one type, and the number of objects is not limited. For example, the first object can be one or multiple. In addition, "and/or" in the description and claims indicates at least one of the connected objects, and the character "/" generally indicates that the related objects are in an "or" relationship.
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。It is worth pointing out that the technology described in the embodiments of this application is not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced, LTE-A) systems, and can also be used in other wireless communication systems, such as code Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access, OFDMA), Single-carrier Frequency Division Multiple Access (SC-FDMA) and other systems. The terms "system" and "network" in the embodiments of this application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies. The following description describes a New Radio (NR) system for example purposes, and NR terminology is used in much of the following description, but these techniques can also be applied to applications other than NR system applications, such as 6th generation Generation, 6G) communication system.
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(VUE)、行人终端(PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备12也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备12可以包括基站、WLAN接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要 达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。Figure 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network side device 12. The terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer. (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), augmented reality (AR)/virtual reality (VR) equipment, robots, wearable devices (Wearable Device) , vehicle-mounted equipment (VUE), pedestrian terminal (PUE), smart home (home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.), game consoles, personal computers (PC), teller machines or self-service Terminal devices such as mobile phones, wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets, smart anklets, etc.), Smart wristbands, smart clothing, etc. It should be noted that the embodiment of the present application does not limit the specific type of the terminal 11. The network side device 12 may include an access network device or a core network device, where the access network device 12 may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or Wireless access network unit. The access network device 12 may include a base station, a WLAN access point or a WiFi node, etc. The base station may be called a Node B, an evolved Node B (eNB), an access point, a Base Transceiver Station (BTS), a radio Base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), Home Node B, Home Evolved Node B, Transmitting Receiving Point (TRP) or all some other appropriate term in the field described, as long as To achieve the same technical effect, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited. Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration ( Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (Local NEF, or L-NEF), Binding Support Function (Binding Support Function, BSF), application function (Application Function, AF), etc. It should be noted that in the embodiment of this application, only the core network equipment in the NR system is used as an example for introduction, and the specific type of the core network equipment is not limited.
下面对本申请实施例提供的行为处理方法中涉及的一些概念和/或术语进行解释说明。Some concepts and/or terms involved in the behavioral processing methods provided by the embodiments of this application are explained below.
目前,在第三代合作计划(3rd generation partnership project,3GPP)协议中,引入NWDAF来进行一些智能化的分析。NWDAF具有一定的智能分析功能,通过采集一些数据,并使用内置的算法和分析能力进行分析得到结果,提供给5G核心网网元以执行一些操作优化或者统计分析。Currently, in the 3rd generation partnership project (3GPP) protocol, NWDAF is introduced to perform some intelligent analysis. NWDAF has certain intelligent analysis functions. It collects some data and uses built-in algorithms and analysis capabilities to analyze and obtain results, which are provided to 5G core network elements to perform some operational optimization or statistical analysis.
示例性地,网络数据分析网元(network data analytics function,NWDAF)能够提供一种观测服务体验分析功能,通过采集终端访问某个服务器的服务质量(quality of service,QoS)信息,例如上行速率或下行速率、丢包率等,输出一个统计信息,该统计信息包括终端访问该服务器的用户体验情况;或者,NWDAF可以根据终端访问该服务器的历史体验情况进行预测,例如,在未来某个时间段的某个区域内,如果该终端访问该服务器,那么该终端可能获取的用户体验情况(例如QoS情况)如何。For example, the network data analytics function (NWDAF) can provide an observation service experience analysis function by collecting the quality of service (QoS) information of the terminal accessing a certain server, such as the uplink rate or Downlink rate, packet loss rate, etc., and output a statistical information, which includes the user experience of the terminal accessing the server; alternatively, NWDAF can predict based on the historical experience of the terminal accessing the server, for example, in a certain time period in the future In a certain area, if the terminal accesses the server, what is the user experience (such as QoS situation) that the terminal may obtain.
通常,对于NWDAF所能提供的分析内容和/或预测内容,以分析标识(analytic ID)来区分,通过向NWDAF发送不同的分析标识以及一些参数,NWDAF即可提供对应的分析结果和/或预测结果。例如,若analytic ID=Service Experience,则NWDAF提供观测服务体验分析。因此,只要获取NWDAF服务的网元,在请求分析或预测的时候输入analytic ID,那么NWDAF就可以提供对应的分析结果和/或预测结果。目前NWDAF能够提供的analytic ID所对应的分析或预测结果,如表1所示。 Usually, the analysis content and/or prediction content that NWDAF can provide are distinguished by analysis IDs. By sending different analysis IDs and some parameters to NWDAF, NWDAF can provide corresponding analysis results and/or predictions. result. For example, if analytic ID=Service Experience, NWDAF provides observation service experience analysis. Therefore, as long as you obtain the network element of the NWDAF service and enter the analytic ID when requesting analysis or prediction, NWDAF can provide the corresponding analysis results and/or prediction results. The analysis or prediction results corresponding to the analytic ID that NWDAF can currently provide are shown in Table 1.
表1分析标识及对应的分析结果
Table 1 Analysis identification and corresponding analysis results
示例性地,对于不同的analytics ID,NWDAF能够提供以下性能分析:For example, for different analytics IDs, NWDAF can provide the following performance analysis:
对于analytics ID="Service Experience"或analytics ID="WLAN performance",NWDAF能够提供接入方式的性能,例如,3GPP接入(如4G接入和5G接入)的性能或非3GPP接入(如WLAN接入)的性能;其中,该接入方式的性能包括:使用该接入方式以后的上行速率或下行速率,使用该接入方式以后的丢包率,使用该接入方式以后的参考信号接收功率(reference signal received power,RSRP),参考信号接收质量(reference signal received quality,RSRQ),接收信号强度指示(received signal strength indicator,RSSI)等。For analytics ID="Service Experience" or analytics ID="WLAN performance", NWDAF can provide the performance of the access method, for example, the performance of 3GPP access (such as 4G access and 5G access) or non-3GPP access (such as WLAN access) performance; wherein, the performance of this access method includes: the uplink rate or downlink rate after using this access method, the packet loss rate after using this access method, and the reference signal after using this access method Received power (reference signal received power, RSRP), reference signal received quality (reference signal received quality, RSRQ), received signal strength indicator (received signal strength indicator, RSSI), etc.
对于analytics ID="Load level information"或analytics ID="Service Experience",NWDAF能够提供切片的性能,例如,当前使用的切片的负载情况或当前使用的切片的服务体验;其中,当前使用的切片的负载情况包括:当前使用的切片的资源使用情况,当前使用的切片的负载水平等;当前使用的切片的服务体验包括:使用该切片以后的上行速率或下行速率,使用该切片以后的丢包率,使用该切片以后的时延情况等。 For analytics ID="Load level information" or analytics ID="Service Experience", NWDAF can provide the performance of the slice, for example, the load status of the currently used slice or the service experience of the currently used slice; where, the performance of the currently used slice The load situation includes: the resource usage of the currently used slice, the load level of the currently used slice, etc.; the service experience of the currently used slice includes: the uplink rate or downlink rate after using the slice, and the packet loss rate after using the slice. , the delay after using this slice, etc.
对于analytics ID="Service Experience"或analytics ID="DN Performance",NWDAF能够提供DN的性能,例如,访问某个DN的平均上行速率或平均下行速率,访问某个DN的丢包率,访问某个DN的包的延迟,访问某个DN的最大的包延迟等。For analytics ID="Service Experience" or analytics ID="DN Performance", NWDAF can provide the performance of the DN, such as the average uplink rate or average downlink rate when accessing a certain DN, the packet loss rate when accessing a certain DN, and the average when accessing a certain DN. The packet delay of a DN, the maximum packet delay of accessing a certain DN, etc.
对于analytics ID="UE Mobility",NWDAF能够提供终端的位置分析,例如,终端在某个位置的起止时间,终端在某个位置的停留间隔等。For analytics ID="UE Mobility", NWDAF can provide location analysis of the terminal, for example, the start and end time of the terminal at a certain location, the stay interval of the terminal at a certain location, etc.
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的技术方案进行详细地说明。The technical solutions provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings through some embodiments and their application scenarios.
本申请实施例提供一种行为处理方法,图2示出了本申请实施例提供的一种行为处理方法的流程图。如图2所示,本申请实施例提供的行为处理方法包括下述的步骤201至步骤204。An embodiment of the present application provides a behavior processing method. Figure 2 shows a flow chart of a behavior processing method provided by an embodiment of the present application. As shown in Figure 2, the behavior processing method provided by the embodiment of the present application includes the following steps 201 to 204.
步骤201、网络侧设备对终端的行为进行分析。Step 201: The network side device analyzes the behavior of the terminal.
本申请实施例中,网络侧设备可以对终端的行为进行检测和分析,然后向终端发送终端的异常行为的分析结果,终端在接收到网络侧设备发送的分析结果之后,可以根据该分析结果,对终端的行为进行决策,从而更加智能、准确地对终端的异常行为进行处理。In the embodiment of this application, the network side device can detect and analyze the behavior of the terminal, and then send the analysis result of the terminal's abnormal behavior to the terminal. After receiving the analysis result sent by the network side device, the terminal can, based on the analysis result, Make decisions about the behavior of the terminal, so as to handle abnormal behavior of the terminal more intelligently and accurately.
需要说明的是,本申请实施例中,网络侧设备可以为NWDAF,也可以为其他功能相同或类型相同的网元,本申请实施例对此不做限定。It should be noted that in the embodiment of the present application, the network side device may be a NWDAF, or may be other network elements with the same function or type, which is not limited in the embodiment of the present application.
可选地,本申请实施例中,一种情况下,网络侧设备可以在接收到终端的请求消息之后,对终端的行为进行检测和分析。另一种情况下,网络侧设备不需要终端的请求,自动检测和分析终端是否发生了异常行为。Optionally, in the embodiment of this application, in one case, the network side device can detect and analyze the behavior of the terminal after receiving the request message from the terminal. In another case, the network-side device automatically detects and analyzes whether the terminal has abnormal behavior without requesting it from the terminal.
步骤202、网络侧设备向终端发送目标信息。Step 202: The network side device sends target information to the terminal.
本申请实施例中,上述目标信息包含终端的异常行为的分析结果。In this embodiment of the present application, the above target information includes analysis results of abnormal behavior of the terminal.
可选地,本申请实施例中,在网络侧设备确定终端发生了异常行为的情况下,网络侧设备可以向终端发送目标信息。Optionally, in this embodiment of the present application, when the network side device determines that the terminal has abnormal behavior, the network side device may send target information to the terminal.
可选地,本申请实施例中,上述目标信息可以包括对终端的历史行为的分析结果,也可以包括对终端未来的性能的预测结果。Optionally, in this embodiment of the present application, the above target information may include analysis results of the terminal's historical behavior, and may also include prediction results of the terminal's future performance.
可选地,本申请实施例中,上述终端的异常行为的分析结果包括以下至少之一:异常标识(except ID),流量描述信息,协议数据单元(protocol data unit,PDU)会话标识,目标单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI),目标数据网名称(data network name,DNN)信息,目标QoS参数,周期时间(periodic time),预定通信时间(scheduled communication time),预定通信类型(scheduled communication type),通信时长(communication duration time),流量概况(traffic profile),预期业务分散(expected transaction dispersion)。Optionally, in this embodiment of the present application, the analysis results of the abnormal behavior of the terminal include at least one of the following: exception ID (except ID), traffic description information, protocol data unit (PDU) session ID, target unit Network slice selection assistance information (single network slice selection assistance information, S-NSSAI), target data network name (DNN) information, target QoS parameters, periodic time (periodic time), scheduled communication time (scheduled communication time) , scheduled communication type, communication duration time, traffic profile, expected transaction dispersion.
其中,上述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量(unexpected long-live/large rate flows),疑似分布式拒绝服务(distributed denial of service,DDoS)攻击(suspicion of DDoS attack),过于频繁的 服务接入(too frequent service access);Wherein, the above-mentioned anomaly identification is used to indicate a risk detected by the network-side device, and the risk includes at least one of the following: unexpected long-live/large rate flows, suspected distributed Distributed denial of service (DDoS) attack (suspicion of DDoS attack), too frequent Service access (too frequent service access);
上述流量描述信息包括以下至少之一:应用描述符(application descriptors),网际互联协议(Internet protocol,IP)描述符(IP descriptors),域名描述符(domain descriptors),非IP描述符(non-IP descriptors),DNN,连接能力(connection capabilities)。The above traffic description information includes at least one of the following: application descriptors, Internet protocol (IP) descriptors (IP descriptors), domain name descriptors (domain descriptors), non-IP descriptors (non-IP descriptors), DNN, connection capabilities.
可选地,本申请实施例中,上述应用描述符可以包括操作系统标识(operating system identifier,OS ID)和操作系统应用标识(OS application identifier,OS APP ID)。上述IP描述符可以为目的IP三元组(IP地址或IPv6网络前缀、端口号、IP以上协议的协议ID)或IP五元组信息。上述域名描述符可以为用作域名匹配条件的全限定域名(Fully Qualified Domain Name,FQDN)。上述非IP描述符可以为非IP流量的源信息和/或目的信息。上述DNN为应用流量访问或者连接的数据网。上述连接能力与应用在请求具有某些能力的网络连接时提供的信息相匹配。Optionally, in this embodiment of the present application, the above-mentioned application descriptor may include an operating system identifier (operating system identifier, OS ID) and an operating system application identifier (OS application identifier, OS APP ID). The above-mentioned IP descriptor can be a destination IP triplet (IP address or IPv6 network prefix, port number, protocol ID of a protocol above IP) or IP five-tuple information. The above domain name descriptor can be a fully qualified domain name (Fully Qualified Domain Name, FQDN) used as a domain name matching condition. The above-mentioned non-IP descriptor may be source information and/or destination information of non-IP traffic. The above-mentioned DNN is a data network accessed or connected by application traffic. The above connection capabilities match the information provided by the application when requesting a network connection with certain capabilities.
可选地,本申请实施例中,上述流量描述信息中的DNN可以为异常流量的特征描述。Optionally, in this embodiment of the present application, the DNN in the above traffic description information may be a characteristic description of abnormal traffic.
可选地,本申请实施例中,上述目标S-NSSAI可以为网络侧设备推荐使用的S-NSSAI,也可以为异常流量所对应的S-NSSAI。上述目标QoS参数可以为网络侧设备推荐使用的QoS参数,也可以为异常流量所对应的QoS参数。上述目标DNN信息可以为网络侧设备推荐使用的DNN,也可以为异常流量所对应的DNN。具体地可以根据实际使用需求确定,本申请实施例不做限制。Optionally, in this embodiment of the present application, the target S-NSSAI may be the S-NSSAI recommended for use by the network side device, or may be the S-NSSAI corresponding to abnormal traffic. The above target QoS parameters may be QoS parameters recommended for use by network-side devices, or may be QoS parameters corresponding to abnormal traffic. The above target DNN information can be the DNN recommended for network-side devices, or it can be the DNN corresponding to abnormal traffic. Specifically, it can be determined according to actual usage requirements, and is not limited by the embodiments of this application.
需要说明的是,若目标DNN信息为异常流量所对应的DNN,则目标DNN信息与流量描述信息中的DNN内容相同,而发送形式不同。也就是说,网络侧设备可以直接向终端发送DNN,也可以通过流量描述的方式发送DNN。It should be noted that if the target DNN information is the DNN corresponding to the abnormal traffic, the target DNN information and the DNN content in the traffic description information are the same, but the sending form is different. In other words, the network side device can send DNN directly to the terminal, or it can send DNN in the form of traffic description.
步骤203、终端从网络侧设备接收目标信息。Step 203: The terminal receives target information from the network side device.
步骤204、终端基于目标信息,对终端的行为进行决策。Step 204: The terminal makes decisions on the behavior of the terminal based on the target information.
可以理解,本申请实施例中,先通过网络侧设备对终端的行为进行检测和分析,得到终端的异常行为的分析结果,然后终端可以基于该分析结果,再次对终端的行为进行判断,以对终端的异常行为进行处理。It can be understood that in the embodiment of the present application, the behavior of the terminal is first detected and analyzed through the network side device to obtain the analysis result of the abnormal behavior of the terminal, and then the terminal can judge the behavior of the terminal again based on the analysis result to determine the behavior of the terminal. Handle abnormal terminal behavior.
本申请实施例提供一种行为处理方法,网络侧设备可以对终端的行为进行检测和分析,然后向终端发送终端的异常行为的分析结果,终端在接收到网络侧设备发送的分析结果之后,可以根据该分析结果,对终端的行为进行决策。通过本方案,终端可以根据网络侧设备对终端异常行为的分析结果,对终端的行为进行决策,从而使得终端可以基于网络的协助,更加智能、准确地对终端的异常行为进行处理。Embodiments of the present application provide a behavior processing method. The network side device can detect and analyze the behavior of the terminal, and then send the analysis results of the terminal's abnormal behavior to the terminal. After receiving the analysis results sent by the network side device, the terminal can Based on the analysis results, decisions are made on the behavior of the terminal. Through this solution, the terminal can make decisions on the terminal's behavior based on the analysis results of the terminal's abnormal behavior by the network-side device, so that the terminal can handle the terminal's abnormal behavior more intelligently and accurately based on the assistance of the network.
可选地,本申请实施例中,在上述步骤201之前,本申请实施例提供的行为处理方法还包括下述的步骤301和步骤302。Optionally, in this embodiment of the present application, before the above-mentioned step 201, the behavior processing method provided by the embodiment of the present application further includes the following steps 301 and 302.
步骤301、终端向网络侧设备发送第一消息。Step 301: The terminal sends a first message to the network side device.
其中,上述第一消息中包括异常行为标识,上述异常行为标识用于请求分析或预测终端是否发生异常行为。 Wherein, the above-mentioned first message includes an abnormal behavior identifier, and the above-mentioned abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
可以理解,上述目标信息为异常行为标识所对应的分析结果。It can be understood that the above target information is the analysis result corresponding to the abnormal behavior identification.
步骤302、网络侧设备接收终端发送的第一消息。Step 302: The network side device receives the first message sent by the terminal.
可选地,本申请实施例中,上述步骤204具体可以通过下述的步骤204a和204b实现。Optionally, in this embodiment of the present application, the above step 204 can be specifically implemented through the following steps 204a and 204b.
步骤204a、在基于目标信息确定终端的行为异常的情况下,终端执行目标操作。Step 204a: If it is determined that the behavior of the terminal is abnormal based on the target information, the terminal performs the target operation.
步骤204b、在基于目标信息确定终端的行为正常的情况下,终端忽略目标信息。Step 204b: If it is determined that the behavior of the terminal is normal based on the target information, the terminal ignores the target information.
本申请实施例中,终端可以基于目标信息,判断终端的行为是否异常,在确定终端的行为异常的情况下,终端执行目标操作,在确定终端的行为正常的情况下,终端忽略目标信息。In the embodiment of this application, the terminal can determine whether the terminal's behavior is abnormal based on the target information. If it is determined that the terminal's behavior is abnormal, the terminal performs the target operation. If it is determined that the terminal's behavior is normal, the terminal ignores the target information.
示例性地,假设上述风险包括意外的长持续时间/大速率流量,如果终端确定该意外的长持续时间/大速率流量为正常操作,则忽略该目标信息。For example, assuming that the above risks include unexpected long duration/large rate traffic, if the terminal determines that the unexpected long duration/large rate traffic is normal operation, the target information is ignored.
通常情况下,当网络侧设备发现了终端的异常行为,网络侧设备会自主对终端的异常行为进行处理。相较于网络侧设备自主对终端的异常行为进行处理,本申请实施例中,可以通过网络侧设备分析终端的异常行为,然后,终端再基于网络侧设备的分析结果,对终端的行为进行决策,从而可以更加智能、准确地对终端的异常行为进行处理。Normally, when the network side device discovers abnormal behavior of the terminal, the network side device will independently handle the abnormal behavior of the terminal. Compared with the network side device independently processing the abnormal behavior of the terminal, in the embodiment of the present application, the network side device can analyze the abnormal behavior of the terminal, and then the terminal makes decisions on the terminal's behavior based on the analysis results of the network side device. , so that the abnormal behavior of the terminal can be handled more intelligently and accurately.
可选地,本申请实施例中,上述终端的异常行为的分析结果包括流量描述信息。Optionally, in this embodiment of the present application, the analysis results of the abnormal behavior of the terminal include traffic description information.
上述目标操作包括以下任一项:The above target operations include any of the following:
释放承载流量描述信息所对应的数据包的PDU会话;Release the PDU session carrying the data packet corresponding to the traffic description information;
发起承载流量描述信息所对应的数据包的PDU会话的修改过程;Initiate the modification process of the PDU session carrying the data packet corresponding to the traffic description information;
不允许为流量描述信息所对应的数据包建立PDU会话;It is not allowed to establish a PDU session for the data packet corresponding to the traffic description information;
终端丢弃或忽略流量描述信息所对应的上行或下行数据包。The terminal discards or ignores the uplink or downlink data packets corresponding to the traffic description information.
可选地,本申请实施例中,上述终端的异常行为的分析结果包括PDU会话标识。Optionally, in this embodiment of the present application, the analysis result of the abnormal behavior of the terminal includes a PDU session identifier.
上述目标操作包括以下任一项:The above target operations include any of the following:
释放PDU会话标识对应的PDU会话;Release the PDU session corresponding to the PDU session ID;
发起PDU会话标识对应的PDU会话的修改过程;Initiate the modification process of the PDU session corresponding to the PDU session identifier;
不允许建立到PDU会话标识对应的PDU会话;The establishment of a PDU session corresponding to the PDU session identifier is not allowed;
其中,上述PDU会话为承载异常流量的PDU会话。Among them, the above-mentioned PDU session is a PDU session carrying abnormal traffic.
可选地,本申请实施例中,上述终端的异常行为的分析结果还包括以下至少之一:目标QoS参数,目标S-NSSAI,目标DNN信息。Optionally, in this embodiment of the present application, the analysis results of the abnormal behavior of the terminal also include at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information.
上述发起PDU会话标识对应的PDU会话的修改过程,包括以下至少之一:The above process of modifying the PDU session corresponding to the initiated PDU session identifier includes at least one of the following:
在分析结果包括目标QoS参数的情况下,将PDU会话中的Qos参数修改为目标QoS参数;If the analysis results include target QoS parameters, modify the Qos parameters in the PDU session to the target QoS parameters;
在分析结果包括目标S-NSSAI的情况下,将PDU会话中的S-NSSAI修改为目标S-NSSAI;If the analysis result includes the target S-NSSAI, modify the S-NSSAI in the PDU session to the target S-NSSAI;
在分析结果包括目标DNN信息的情况下,将PDU会话中的DNN信息修改为目标DNN信息。 When the analysis result includes target DNN information, modify the DNN information in the PDU session to the target DNN information.
本申请实施例中,上述目标S-NSSAI为网络侧设备推荐使用的S-NSSAI,目标QoS参数为网络侧设备推荐使用的QoS参数,目标DNN信息为网络侧设备推荐使用的DNN。In the embodiment of this application, the target S-NSSAI is the S-NSSAI recommended by the network side device, the target QoS parameter is the QoS parameter recommended by the network side device, and the target DNN information is the DNN recommended by the network side device.
可以理解,终端可以将PDU会话中的某些参数修改为网络侧设备推荐使用的参数,从而可以智能、准确地选择和/或建立合适的PDU会话。It can be understood that the terminal can modify certain parameters in the PDU session to parameters recommended by the network side device, so that an appropriate PDU session can be intelligently and accurately selected and/or established.
可选地,本申请实施例中,在终端的异常行为的分析结果包括以下至少之一:目标QoS参数,目标S-NSSAI,目标DNN信息的情况下,上述目标操作为不允许建立到目标信息对应的PDU会话。Optionally, in the embodiment of the present application, when the analysis result of the abnormal behavior of the terminal includes at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information, the above target operation is not allowed to establish the target information. The corresponding PDU session.
本申请实施例中,上述目标S-NSSAI为异常流量所对应的S-NSSAI,目标QoS参数为异常流量所对应的QoS参数,目标DNN信息为异常流量所对应的DNN。In the embodiment of this application, the target S-NSSAI is the S-NSSAI corresponding to the abnormal traffic, the target QoS parameter is the QoS parameter corresponding to the abnormal traffic, and the target DNN information is the DNN corresponding to the abnormal traffic.
可以理解,由于目标信息为异常流量所对应的信息,因此不允许终端再建立到目标信息所对应的PDU会话,从而可以智能、准确地选择和/或建立合适的PDU会话。It can be understood that since the target information is information corresponding to abnormal traffic, the terminal is not allowed to establish a PDU session corresponding to the target information, so that an appropriate PDU session can be intelligently and accurately selected and/or established.
可选地,本申请实施例中,上述目标操作为设置会话管理(session management,SM)后退定时器(SM back-off timer)。Optionally, in this embodiment of the present application, the above target operation is to set the session management (session management, SM) back-off timer (SM back-off timer).
其中,在会话管理后退定时器的到期之前,终端不允许发起业务请求。Among them, the terminal is not allowed to initiate a service request before the expiration of the session management backoff timer.
可选地,本申请实施例中,终端可以采用的默认的参数设置SM back-off timer;或者,终端可以根据目标信息(例如周期时间),设置SM back-off timer。Optionally, in the embodiment of this application, the terminal can set the SM back-off timer using default parameters; or, the terminal can set the SM back-off timer according to the target information (such as cycle time).
本申请实施例提供的行为处理方法,执行主体可以为行为处理装置。本申请实施例中以行为处理装置执行行为处理方法为例,说明本申请实施例提供的行为处理装置。For the behavior processing method provided by the embodiments of this application, the execution subject may be a behavior processing device. In the embodiments of this application, a behavior processing device executing a behavior processing method is used as an example to illustrate the behavior processing device provided in the embodiments of this application.
本申请实施例提供的一种行为处理装置,应用于终端,如图3所示,该行为处理装置500包括:接收模块501和决策模块502。其中,接收模块501,用于从网络侧设备接收目标信息,该目标信息包含终端的异常行为的分析结果。决策模块502,用于基于目标信息,对终端的行为进行决策。An embodiment of the present application provides a behavior processing device, which is applied to a terminal. As shown in Figure 3, the behavior processing device 500 includes: a receiving module 501 and a decision-making module 502. Among them, the receiving module 501 is used to receive target information from the network side device, where the target information includes the analysis results of the abnormal behavior of the terminal. The decision-making module 502 is used to make decisions on the behavior of the terminal based on the target information.
可选地,本申请实施例中,上述行为处理装置500还包括:发送模块。发送模块,用于在接收模块501从网络侧设备接收目标信息之前,向网络侧设备发送第一消息。其中,上述第一消息中包括异常行为标识,该异常行为标识用于请求分析或预测终端是否发生异常行为。Optionally, in this embodiment of the present application, the above-mentioned behavior processing device 500 further includes: a sending module. The sending module is configured to send the first message to the network side device before the receiving module 501 receives the target information from the network side device. Wherein, the above-mentioned first message includes an abnormal behavior identifier, and the abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
可选地,本申请实施例中,上述决策模块502,具体用于在基于目标信息确定终端的行为异常的情况下,执行目标操作;在基于目标信息确定终端的行为正常的情况下,忽略目标信息。Optionally, in this embodiment of the present application, the above-mentioned decision-making module 502 is specifically configured to perform the target operation when it is determined that the behavior of the terminal is abnormal based on the target information; when it is determined that the behavior of the terminal is normal based on the target information, ignore the target. information.
可选地,本申请实施例中,上述分析结果包括以下至少之一:异常标识,流量描述信息,PDU会话标识,目标S-NSSAI,目标DNN信息,目标QoS参数,周期时间,预定通信时间,预定通信类型,通信时长,流量概况,预期业务分散。Optionally, in this embodiment of the application, the above analysis results include at least one of the following: exception identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, cycle time, scheduled communication time, Scheduled communication type, communication duration, traffic profile, expected business dispersion.
其中,上述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量,疑似DDoS攻击,过于频繁的服务接入。上述流量描述信息包括以下至少之一:应用描述符,IP描述符,域名描述符,非IP描述符,DNN, 连接能力。Wherein, the above-mentioned abnormality identification is used to indicate the risk detected by the network-side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, and too frequent service access. The above traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, Connectivity.
可选地,本申请实施例中,上述分析结果包括流量描述信息。Optionally, in this embodiment of the present application, the above analysis results include traffic description information.
上述目标操作包括以下任一项:The above target operations include any of the following:
释放承载流量描述信息所对应的数据包的PDU会话;Release the PDU session carrying the data packet corresponding to the traffic description information;
发起承载流量描述信息所对应的数据包的PDU会话的修改过程;Initiate the modification process of the PDU session carrying the data packet corresponding to the traffic description information;
不允许为流量描述信息所对应的数据包建立PDU会话;It is not allowed to establish a PDU session for the data packet corresponding to the traffic description information;
终端丢弃或忽略流量描述信息所对应的上行或下行数据包。The terminal discards or ignores the uplink or downlink data packets corresponding to the traffic description information.
可选地,本申请实施例中,上述分析结果包括PDU会话标识。Optionally, in this embodiment of the present application, the above analysis results include a PDU session identifier.
上述目标操作包括以下任一项:The above target operations include any of the following:
释放PDU会话标识对应的PDU会话;Release the PDU session corresponding to the PDU session ID;
发起PDU会话标识对应的PDU会话的修改过程;Initiate the modification process of the PDU session corresponding to the PDU session identifier;
不允许建立到PDU会话标识对应的PDU会话;The establishment of a PDU session corresponding to the PDU session identifier is not allowed;
其中,该PDU会话为承载异常流量的PDU会话。Among them, the PDU session is a PDU session carrying abnormal traffic.
可选地,本申请实施例中,上述分析结果还包括以下至少之一:目标QoS参数,目标S-NSSAI,目标DNN信息。Optionally, in this embodiment of the present application, the above analysis results also include at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information.
上述发起PDU会话标识对应的PDU会话的修改过程,包括以下至少之一:The above process of modifying the PDU session corresponding to the initiated PDU session identifier includes at least one of the following:
在分析结果包括目标QoS参数的情况下,将PDU会话中的Qos参数修改为目标QoS参数;If the analysis results include target QoS parameters, modify the Qos parameters in the PDU session to the target QoS parameters;
在分析结果包括目标S-NSSAI的情况下,将PDU会话中的S-NSSAI修改为目标S-NSSAI;If the analysis result includes the target S-NSSAI, modify the S-NSSAI in the PDU session to the target S-NSSAI;
在分析结果包括目标DNN信息的情况下,将PDU会话中的DNN信息修改为目标DNN信息。When the analysis result includes target DNN information, modify the DNN information in the PDU session to the target DNN information.
可选地,本申请实施例中,在分析结果包括以下至少之一:目标QoS参数,目标S-NSSAI,目标DNN信息的情况下,上述目标操作为不允许建立到目标信息对应的PDU会话。Optionally, in this embodiment of the present application, when the analysis result includes at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information, the above target operation is to not allow the establishment of a PDU session corresponding to the target information.
可选地,本申请实施例中,上述目标操作为设置会话管理后退定时器。Optionally, in this embodiment of the present application, the above target operation is to set a session management backoff timer.
其中,在会话管理后退定时器的到期之前,终端不允许发起业务请求。Among them, the terminal is not allowed to initiate a service request before the expiration of the session management backoff timer.
本申请实施例提供一种行为处理装置,可以根据网络侧设备对终端异常行为的分析结果,对终端的行为进行决策,从而使得终端可以基于网络的协助,更加智能、准确地对终端的异常行为进行处理。Embodiments of the present application provide a behavior processing device that can make decisions on the behavior of the terminal based on the analysis results of the abnormal behavior of the terminal by the network side device, so that the terminal can more intelligently and accurately respond to the abnormal behavior of the terminal based on the assistance of the network. for processing.
本申请实施例提供的一种行为处理装置,应用于网络侧设备,如图4所示,该行为处理装置600包括:分析模块601和发送模块602。其中,分析模块601,用于对终端的行为进行分析。发送模块602,用于向终端发送目标信息,该目标信息包含终端的异常行为的分析结果。A behavior processing device provided by an embodiment of the present application is applied to network side equipment. As shown in Figure 4, the behavior processing device 600 includes: an analysis module 601 and a sending module 602. Among them, the analysis module 601 is used to analyze the behavior of the terminal. The sending module 602 is configured to send target information to the terminal, where the target information includes the analysis results of the abnormal behavior of the terminal.
可选地,本申请实施例中,上述行为处理装置600还包括:接收模块。接收模块,用于在分析模块601对终端的行为进行分析之前,接收终端发送的第一消息。其中,上述第 一消息中包括异常行为标识,该异常行为标识用于请求分析或预测终端是否发生异常行为。Optionally, in this embodiment of the present application, the above-mentioned behavior processing device 600 further includes: a receiving module. The receiving module is configured to receive the first message sent by the terminal before the analysis module 601 analyzes the behavior of the terminal. Among them, the above-mentioned One message includes an abnormal behavior identifier, which is used to request analysis or predict whether abnormal behavior occurs on the terminal.
可选地,本申请实施例中,上述分析结果包括以下至少之一:异常标识,流量描述信息,PDU会话标识,目标S-NSSAI,目标DNN信息,目标QoS参数,周期时间,预定通信时间,预定通信类型,通信时长,流量概况,预期业务分散;Optionally, in this embodiment of the application, the above analysis results include at least one of the following: exception identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, cycle time, scheduled communication time, Scheduled communication type, communication duration, traffic profile, expected business dispersion;
其中,上述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量,疑似DDoS攻击,过于频繁的服务接入。上述流量描述信息包括以下至少之一:应用描述符,IP描述符,域名描述符,非IP描述符,DNN,连接能力。Wherein, the above-mentioned abnormality identification is used to indicate the risk detected by the network-side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, and too frequent service access. The above traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, and connection capability.
本申请实施例提供一种行为处理装置,可以对终端的行为进行分析,并向终端发送终端的异常行为的分析结果,以使得终端根据该分析结果,对终端的行为进行决策,从而使得终端可以基于网络的协助,更加智能、准确地对终端的异常行为进行处理。Embodiments of the present application provide a behavior processing device that can analyze the behavior of a terminal and send analysis results of the terminal's abnormal behavior to the terminal, so that the terminal can make decisions about the behavior of the terminal based on the analysis results, so that the terminal can Network-based assistance handles abnormal terminal behavior more intelligently and accurately.
本申请实施例中的行为处理装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The behavior processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
本申请实施例提供的行为处理装置能够实现图2的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The behavior processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 2 and achieve the same technical effect. To avoid duplication, the details will not be described here.
可选地,如图5所示,本申请实施例还提供一种通信设备700,包括处理器701和存储器702,存储器702上存储有可在所述处理器701上运行的程序或指令,例如,该通信设备700为终端时,该程序或指令被处理器701执行时实现上述行为处理方法实施例的各个步骤,且能达到相同的技术效果。该通信设备700为网络侧设备时,该程序或指令被处理器701执行时实现上述行为处理方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, as shown in Figure 5, this embodiment of the present application also provides a communication device 700, which includes a processor 701 and a memory 702. The memory 702 stores programs or instructions that can be run on the processor 701, such as , when the communication device 700 is a terminal, when the program or instruction is executed by the processor 701, each step of the above behavior processing method embodiment is implemented, and the same technical effect can be achieved. When the communication device 700 is a network-side device, when the program or instruction is executed by the processor 701, each step of the above behavior processing method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
本申请实施例还提供一种终端,包括处理器和通信接口,通信接口用于从网络侧设备接收目标信息,该目标信息包含终端的异常行为的分析结果,处理器用于基于目标信息,对终端的行为进行决策。该终端实施例与上述终端侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图6为实现本申请实施例的一种终端的硬件结构示意图。Embodiments of the present application also provide a terminal, including a processor and a communication interface. The communication interface is used to receive target information from a network side device. The target information includes analysis results of abnormal behaviors of the terminal. The processor is used to perform analysis on the terminal based on the target information. behavior decisions. This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment. Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect. Specifically, FIG. 6 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
该终端800包括但不限于:射频单元801、网络模块802、音频输出单元803、输入单元804、传感器805、显示单元806、用户输入单元807、接口单元808、存储器809以及处理器810等中的至少部分部件。The terminal 800 includes but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, etc. At least some parts.
本领域技术人员可以理解,终端800还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器810逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图6中示出的终端结构并不构成对终端的限定,终端可以包 括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。Those skilled in the art can understand that the terminal 800 may also include a power supply (such as a battery) that supplies power to various components. The power supply may be logically connected to the processor 810 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions. The terminal structure shown in Figure 6 does not constitute a limitation on the terminal. The terminal can include It may include more or fewer components than those shown in the figures, or combine certain components, or arrange different components, which will not be described again here.
应理解的是,本申请实施例中,输入单元804可以包括图形处理单元(Graphics Processing Unit,GPU)8041和麦克风8042,图形处理器8041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元806可包括显示面板8061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板8061。用户输入单元807包括触控面板8071以及其他输入设备8072中的至少一种。触控面板8071,也称为触摸屏。触控面板8071可包括触摸检测装置和触摸控制器两个部分。其他输入设备8072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。It should be understood that in the embodiment of the present application, the input unit 804 may include a graphics processing unit (Graphics Processing Unit, GPU) 8041 and a microphone 8042. The graphics processor 8041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras). The display unit 806 may include a display panel 8061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 807 includes a touch panel 8071 and at least one of other input devices 8072 . Touch panel 8071, also known as touch screen. The touch panel 8071 may include two parts: a touch detection device and a touch controller. Other input devices 8072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
本申请实施例中,射频单元801接收来自网络侧设备的下行数据后,可以传输给处理器810进行处理;另外,射频单元801可以向网络侧设备发送上行数据。通常,射频单元801包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。In this embodiment of the present application, after receiving downlink data from the network side device, the radio frequency unit 801 can transmit it to the processor 810 for processing; in addition, the radio frequency unit 801 can send uplink data to the network side device. Generally, the radio frequency unit 801 includes, but is not limited to, an antenna, amplifier, transceiver, coupler, low noise amplifier, duplexer, etc.
存储器809可用于存储软件程序或指令以及各种数据。存储器809可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器809可以包括易失性存储器或非易失性存储器,或者,存储器809可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器809包括但不限于这些和任意其它适合类型的存储器。Memory 809 may be used to store software programs or instructions as well as various data. The memory 809 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc. Additionally, memory 809 may include volatile memory or non-volatile memory, or memory 809 may include both volatile and non-volatile memory. Among them, non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM). Memory 809 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
处理器810可包括一个或多个处理单元;可选的,处理器810集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器810中。The processor 810 may include one or more processing units; optionally, the processor 810 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 810.
其中,射频单元801,用于从网络侧设备接收目标信息,该目标信息包含终端的异常行为的分析结果。处理器810,用于基于目标信息,对终端的行为进行决策。Among them, the radio frequency unit 801 is used to receive target information from the network side device, where the target information includes the analysis results of the abnormal behavior of the terminal. The processor 810 is used to make decisions on the behavior of the terminal based on the target information.
可选地,本申请实施例中,射频单元801,还用于在从网络侧设备接收目标信息之前,向网络侧设备发送第一消息。其中,第一消息用于请求分析或预测终端是否发生异常行为。Optionally, in this embodiment of the present application, the radio frequency unit 801 is also configured to send the first message to the network side device before receiving the target information from the network side device. The first message is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
可选地,本申请实施例中,处理器810,具体用于在基于目标信息确定终端的行为异常 的情况下,执行目标操作;在基于目标信息确定终端的行为正常的情况下,忽略目标信息。Optionally, in this embodiment of the present application, the processor 810 is specifically configured to determine abnormal behavior of the terminal based on the target information. If the behavior of the terminal is determined to be normal based on the target information, the target information is ignored.
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,处理器用于对终端的行为进行分析,通信接口用于向终端发送目标信息,该目标信息包含终端的异常行为的分析结果。该网络侧设备实施例与上述网络侧设备方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。Embodiments of the present application also provide a network side device, including a processor and a communication interface. The processor is used to analyze the behavior of the terminal, and the communication interface is used to send target information to the terminal. The target information includes the analysis results of the terminal's abnormal behavior. . This network-side device embodiment corresponds to the above-mentioned network-side device method embodiment. Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
本申请实施例还提供了一种网络侧设备。如图7所示,该网络侧设备900包括:处理器901、网络接口902和存储器903。其中,网络接口902例如为通用公共无线接口(common public radio interface,CPRI)。An embodiment of the present application also provides a network side device. As shown in Figure 7, the network side device 900 includes: a processor 901, a network interface 902 and a memory 903. The network interface 902 is, for example, a common public radio interface (CPRI).
具体地,本发明实施例的网络侧设备900还包括:存储在存储器903上并可在处理器901上运行的指令或程序,处理器901调用存储器903中的指令或程序执行图4所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。Specifically, the network side device 900 in this embodiment of the present invention also includes: instructions or programs stored in the memory 903 and executable on the processor 901. The processor 901 calls the instructions or programs in the memory 903 to execute each of the steps shown in Figure 4. The method of module execution and achieving the same technical effect will not be described in detail here to avoid duplication.
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述行为处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application also provide a readable storage medium. Programs or instructions are stored on the readable storage medium. When the program or instructions are executed by a processor, each process of the above behavioral processing method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。Wherein, the processor is the processor in the terminal described in the above embodiment. The readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述行为处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application further provides a chip. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the above behavior processing method embodiment. Each process can achieve the same technical effect. To avoid duplication, it will not be described again here.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述行为处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application further provide a computer program/program product. The computer program/program product is stored in a storage medium. The computer program/program product is executed by at least one processor to implement the above behavioral processing method embodiment. Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
本申请实施例还提供了一种通信系统,包括:终端及网络侧设备,所述终端可用于执行如上所述的行为处理方法的步骤,所述网络侧设备可用于执行如上所述的行为处理方法的步骤。Embodiments of the present application also provide a communication system, including: a terminal and a network side device. The terminal can be used to perform the steps of the behavior processing method as described above. The network side device can be used to perform the behavior processing as described above. Method steps.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于 所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this document, the terms "comprising", "comprises" or any other variations thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or device that includes a series of elements not only includes those elements, It also includes other elements not expressly listed or inherent in the process, method, article or apparatus. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article or apparatus that includes that element. In addition, it should be pointed out that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, but may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Execution functions, for example, can be pressed differently than The described methods are performed in the order described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation. Based on this understanding, the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology. The computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。 The embodiments of the present application have been described above in conjunction with the accompanying drawings. However, the present application is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Inspired by this application, many forms can be made without departing from the purpose of this application and the scope protected by the claims, all of which fall within the protection of this application.

Claims (27)

  1. 一种行为处理方法,包括:A behavioral approach that includes:
    终端从网络侧设备接收目标信息,所述目标信息包含所述终端的异常行为的分析结果;The terminal receives target information from the network side device, where the target information includes analysis results of abnormal behavior of the terminal;
    所述终端基于所述目标信息,对所述终端的行为进行决策。The terminal makes a decision on the behavior of the terminal based on the target information.
  2. 根据权利要求1所述的方法,其中,所述终端从网络侧设备接收目标信息之前,所述方法还包括:The method according to claim 1, wherein before the terminal receives the target information from the network side device, the method further includes:
    所述终端向所述网络侧设备发送第一消息;The terminal sends a first message to the network side device;
    其中,所述第一消息中包括异常行为标识,所述异常行为标识用于请求分析或预测所述终端是否发生异常行为。Wherein, the first message includes an abnormal behavior identifier, and the abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  3. 根据权利要求1所述的方法,其中,所述终端基于所述目标信息,对所述终端的行为进行决策,包括:The method according to claim 1, wherein the terminal makes decisions on the behavior of the terminal based on the target information, including:
    在基于所述目标信息确定所述终端的行为异常的情况下,所述终端执行目标操作;If it is determined that the behavior of the terminal is abnormal based on the target information, the terminal performs a target operation;
    在基于所述目标信息确定所述终端的行为正常的情况下,所述终端忽略所述目标信息。If it is determined that the behavior of the terminal is normal based on the target information, the terminal ignores the target information.
  4. 根据权利要求1至3任一项所述的方法,其中,所述分析结果包括以下至少之一:异常标识,流量描述信息,协议数据单元PDU会话标识,目标单网络切片选择辅助信息S-NSSAI,目标数据网名称DNN信息,目标服务质量QoS参数,周期时间,预定通信时间,预定通信类型,通信时长,流量概况,预期业务分散;The method according to any one of claims 1 to 3, wherein the analysis results include at least one of the following: exception identification, traffic description information, protocol data unit PDU session identification, target single network slice selection auxiliary information S-NSSAI , target data network name DNN information, target quality of service QoS parameters, cycle time, scheduled communication time, scheduled communication type, communication duration, traffic profile, expected business dispersion;
    其中,所述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量,疑似分布式拒绝服务DDoS攻击,过于频繁的服务接入;Wherein, the abnormality identification is used to indicate the risk detected by the network side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected distributed denial of service DDoS attack, too frequent service Access;
    所述流量描述信息包括以下至少之一:应用描述符,网际互联协议IP描述符,域名描述符,非IP描述符,DNN,连接能力。The traffic description information includes at least one of the following: application descriptor, Internet Protocol IP descriptor, domain name descriptor, non-IP descriptor, DNN, and connection capability.
  5. 根据权利要求4所述的方法,其中,所述分析结果包括流量描述信息;The method according to claim 4, wherein the analysis results include traffic description information;
    所述目标操作包括以下任一项:The target operations include any of the following:
    释放承载所述流量描述信息所对应的数据包的PDU会话;Release the PDU session carrying the data packet corresponding to the traffic description information;
    发起承载所述流量描述信息所对应的数据包的PDU会话的修改过程;Initiate the modification process of the PDU session carrying the data packet corresponding to the traffic description information;
    不允许为所述流量描述信息所对应的数据包建立PDU会话;It is not allowed to establish a PDU session for the data packet corresponding to the traffic description information;
    终端丢弃或忽略所述流量描述信息所对应的上行或下行数据包。The terminal discards or ignores the uplink or downlink data packet corresponding to the traffic description information.
  6. 根据权利要求4所述的方法,其中,所述分析结果包括PDU会话标识;The method according to claim 4, wherein the analysis result includes a PDU session identifier;
    所述目标操作包括以下任一项:The target operations include any of the following:
    释放所述PDU会话标识对应的PDU会话;Release the PDU session corresponding to the PDU session identifier;
    发起所述PDU会话标识对应的PDU会话的修改过程;Initiate the modification process of the PDU session corresponding to the PDU session identifier;
    不允许建立到所述PDU会话标识对应的PDU会话;The establishment of a PDU session corresponding to the PDU session identifier is not allowed;
    其中,所述PDU会话为承载异常流量的PDU会话。Wherein, the PDU session is a PDU session carrying abnormal traffic.
  7. 根据权利要求6所述的方法,其中,所述分析结果还包括以下至少之一:目标QoS 参数,目标S-NSSAI,目标DNN信息;The method according to claim 6, wherein the analysis result further includes at least one of the following: target QoS Parameters, target S-NSSAI, target DNN information;
    所述发起所述PDU会话标识对应的PDU会话的修改过程,包括以下至少之一:The modification process of initiating the PDU session corresponding to the PDU session identifier includes at least one of the following:
    在所述分析结果包括所述目标QoS参数的情况下,将所述PDU会话中的Qos参数修改为所述目标QoS参数;If the analysis result includes the target QoS parameter, modify the Qos parameter in the PDU session to the target QoS parameter;
    在所述分析结果包括所述目标S-NSSAI的情况下,将所述PDU会话中的S-NSSAI修改为所述目标S-NSSAI;If the analysis result includes the target S-NSSAI, modify the S-NSSAI in the PDU session to the target S-NSSAI;
    在所述分析结果包括所述目标DNN信息的情况下,将所述PDU会话中的DNN信息修改为所述目标DNN信息。If the analysis result includes the target DNN information, modify the DNN information in the PDU session to the target DNN information.
  8. 根据权利要求4所述的方法,其中,在所述分析结果包括以下至少之一:目标QoS参数,目标S-NSSAI,目标DNN信息的情况下,所述目标操作为不允许建立到所述目标信息对应的PDU会话。The method of claim 4, wherein when the analysis result includes at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information, the target operation is to not allow establishment to the target The PDU session corresponding to the information.
  9. 根据权利要求3所述的方法,其中,所述目标操作为设置会话管理后退定时器;The method according to claim 3, wherein the target operation is to set a session management backoff timer;
    其中,在所述会话管理后退定时器到期之前,所述终端不允许发起业务请求。Wherein, before the session management backoff timer expires, the terminal is not allowed to initiate a service request.
  10. 一种行为处理方法,包括:A behavioral approach that includes:
    网络侧设备对终端的行为进行分析;The network side device analyzes the behavior of the terminal;
    所述网络侧设备向所述终端发送目标信息,所述目标信息包含所述终端的异常行为的分析结果。The network side device sends target information to the terminal, where the target information includes analysis results of abnormal behavior of the terminal.
  11. 根据权利要求10所述的方法,其中,所述网络侧设备对终端的行为进行分析之前,所述方法还包括:The method according to claim 10, wherein before the network side device analyzes the behavior of the terminal, the method further includes:
    所述网络侧设备接收所述终端发送的第一消息;The network side device receives the first message sent by the terminal;
    其中,所述第一消息中包括异常行为标识,所述异常行为标识用于请求分析或预测所述终端是否发生异常行为。Wherein, the first message includes an abnormal behavior identifier, and the abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  12. 根据权利要求10或11所述的方法,其中,所述分析结果包括以下至少之一:异常标识,流量描述信息,PDU会话标识,目标S-NSSAI,目标DNN信息,目标QoS参数,周期时间,预定通信时间,预定通信类型,通信时长,流量概况,预期业务分散;The method according to claim 10 or 11, wherein the analysis results include at least one of the following: anomaly identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, cycle time, Scheduled communication time, scheduled communication type, communication duration, traffic profile, expected business dispersion;
    其中,所述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量,疑似DDoS攻击,过于频繁的服务接入;Wherein, the abnormality identifier is used to indicate a risk detected by the network side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, too frequent service access;
    所述流量描述信息包括以下至少之一:应用描述符,IP描述符,域名描述符,非IP描述符,DNN,连接能力。The traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, and connection capability.
  13. 一种行为处理装置,包括:A behavioral treatment device comprising:
    接收模块,用于从网络侧设备接收目标信息,所述目标信息包含所述终端的异常行为的分析结果;A receiving module, configured to receive target information from a network side device, where the target information includes analysis results of abnormal behavior of the terminal;
    决策模块,用于基于所述目标信息,对所述终端的行为进行决策。A decision-making module is used to make decisions on the behavior of the terminal based on the target information.
  14. 根据权利要求13所述的装置,其中,所述装置还包括:The device of claim 13, wherein the device further comprises:
    发送模块,用于在所述接收模块从所述网络侧设备接收所述目标信息之前,向所述网 络侧设备发送第一消息;A sending module, configured to send a message to the network before the receiving module receives the target information from the network side device. The network side device sends the first message;
    其中,所述第一消息中包括异常行为标识,所述异常行为标识用于请求分析或预测所述终端是否发生异常行为。Wherein, the first message includes an abnormal behavior identifier, and the abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  15. 根据权利要求13所述的装置,其中,所述决策模块,具体用于在基于所述目标信息确定所述终端的行为异常的情况下,执行目标操作;在基于所述目标信息确定所述终端的行为正常的情况下,忽略所述目标信息。The device according to claim 13, wherein the decision-making module is specifically configured to perform a target operation when it is determined that the behavior of the terminal is abnormal based on the target information; The behavior is normal and the target information is ignored.
  16. 根据权利要求13至15任一项所述的装置,其中,所述分析结果包括以下至少之一:异常标识,流量描述信息,PDU会话标识,目标S-NSSAI,目标DNN信息,目标QoS参数,周期时间,预定通信时间,预定通信类型,通信时长,流量概况,预期业务分散;The device according to any one of claims 13 to 15, wherein the analysis results include at least one of the following: anomaly identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, Cycle time, scheduled communication time, scheduled communication type, communication duration, traffic profile, expected business dispersion;
    其中,所述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量,疑似DDoS攻击,过于频繁的服务接入;Wherein, the abnormality identifier is used to indicate a risk detected by the network side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, too frequent service access;
    所述流量描述信息包括以下至少之一:应用描述符,IP描述符,域名描述符,非IP描述符,DNN,连接能力。The traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, and connection capability.
  17. 根据权利要求16所述的装置,其中,所述分析结果包括流量描述信息;The device according to claim 16, wherein the analysis results include flow description information;
    所述目标操作包括以下任一项:The target operations include any of the following:
    释放承载所述流量描述信息所对应的数据包的PDU会话;Release the PDU session carrying the data packet corresponding to the traffic description information;
    发起承载所述流量描述信息所对应的数据包的PDU会话的修改过程;Initiate the modification process of the PDU session carrying the data packet corresponding to the traffic description information;
    不允许为所述流量描述信息所对应的数据包建立PDU会话;It is not allowed to establish a PDU session for the data packet corresponding to the traffic description information;
    终端丢弃或忽略所述流量描述信息所对应的上行或下行数据包。The terminal discards or ignores the uplink or downlink data packet corresponding to the traffic description information.
  18. 根据权利要求16所述的装置,其中,所述分析结果包括PDU会话标识;The device according to claim 16, wherein the analysis result includes a PDU session identification;
    所述目标操作包括以下任一项:The target operations include any of the following:
    释放所述PDU会话标识对应的PDU会话;Release the PDU session corresponding to the PDU session identifier;
    发起所述PDU会话标识对应的PDU会话的修改过程;Initiate the modification process of the PDU session corresponding to the PDU session identifier;
    不允许建立到所述PDU会话标识对应的PDU会话;The establishment of a PDU session corresponding to the PDU session identifier is not allowed;
    其中,所述PDU会话为承载异常流量的PDU会话。Wherein, the PDU session is a PDU session carrying abnormal traffic.
  19. 根据权利要求18所述的装置,其中,所述分析结果还包括以下至少之一:目标QoS参数,目标S-NSSAI,目标DNN信息;The device according to claim 18, wherein the analysis result further includes at least one of the following: target QoS parameters, target S-NSSAI, and target DNN information;
    所述发起所述PDU会话标识对应的PDU会话的修改过程,包括以下至少之一:The modification process of initiating the PDU session corresponding to the PDU session identifier includes at least one of the following:
    在所述分析结果包括所述目标QoS参数的情况下,将所述PDU会话中的Qos参数修改为所述目标QoS参数;If the analysis result includes the target QoS parameter, modify the Qos parameter in the PDU session to the target QoS parameter;
    在所述分析结果包括所述目标S-NSSAI的情况下,将所述PDU会话中的S-NSSAI修改为所述目标S-NSSAI;If the analysis result includes the target S-NSSAI, modify the S-NSSAI in the PDU session to the target S-NSSAI;
    在所述分析结果包括所述目标DNN信息的情况下,将所述PDU会话中的DNN信息修改为所述目标DNN信息。If the analysis result includes the target DNN information, modify the DNN information in the PDU session to the target DNN information.
  20. 根据权利要求16所述的装置,其中,在所述分析结果包括以下至少之一:目标QoS 参数,目标S-NSSAI,目标DNN信息的情况下,所述目标操作为不允许建立到所述目标信息对应的PDU会话。The device according to claim 16, wherein the analysis result includes at least one of the following: target QoS In the case of parameter, target S-NSSAI, and target DNN information, the target operation is not allowed to establish a PDU session corresponding to the target information.
  21. 根据权利要求15所述的装置,其中,所述目标操作为设置会话管理后退定时器;The apparatus according to claim 15, wherein the target operation is to set a session management backoff timer;
    其中,在所述会话管理后退定时器到期之前,所述终端不允许发起业务请求。Wherein, before the session management backoff timer expires, the terminal is not allowed to initiate a service request.
  22. 一种行为处理装置,包括:A behavioral treatment device comprising:
    分析模块,用于对终端的行为进行分析;Analysis module, used to analyze the behavior of the terminal;
    发送模块,用于向所述终端发送目标信息,所述目标信息包含所述终端的异常行为的分析结果。A sending module, configured to send target information to the terminal, where the target information includes analysis results of abnormal behavior of the terminal.
  23. 根据权利要求22所述的装置,其中,所述装置还包括:The device of claim 22, wherein the device further comprises:
    接收模块,用于在所述分析模块对终端的行为进行分析之前,接收所述终端发送的第一消息;A receiving module, configured to receive the first message sent by the terminal before the analysis module analyzes the behavior of the terminal;
    其中,所述第一消息中包括异常行为标识,所述异常行为标识用于请求分析或预测所述终端是否发生异常行为。Wherein, the first message includes an abnormal behavior identifier, and the abnormal behavior identifier is used to request analysis or prediction of whether abnormal behavior occurs in the terminal.
  24. 根据权利要求22或23所述的装置,其中,所述分析结果包括以下至少之一:异常标识,流量描述信息,PDU会话标识,目标S-NSSAI,目标DNN信息,目标QoS参数,周期时间,预定通信时间,预定通信类型,通信时长,流量概况,预期业务分散;The device according to claim 22 or 23, wherein the analysis result includes at least one of the following: anomaly identification, traffic description information, PDU session identification, target S-NSSAI, target DNN information, target QoS parameters, cycle time, Scheduled communication time, scheduled communication type, communication duration, traffic profile, expected business dispersion;
    其中,所述异常标识用于指示所述网络侧设备检测到的风险,所述风险包括以下至少一项:意外的长持续时间/大速率流量,疑似DDoS攻击,过于频繁的服务接入;Wherein, the abnormality identifier is used to indicate a risk detected by the network side device, and the risk includes at least one of the following: unexpected long duration/large rate traffic, suspected DDoS attack, too frequent service access;
    所述流量描述信息包括以下至少之一:应用描述符,IP描述符,域名描述符,非IP描述符,DNN,连接能力。The traffic description information includes at least one of the following: application descriptor, IP descriptor, domain name descriptor, non-IP descriptor, DNN, and connection capability.
  25. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至9任一项所述的行为处理方法的步骤。A terminal includes a processor and a memory, the memory stores programs or instructions that can be run on the processor, and when the programs or instructions are executed by the processor, the implementation of any one of claims 1 to 9 is achieved. The steps for handling the behavior described above.
  26. 一种网络侧设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求10至12任一项所述的行为处理方法的步骤。A network side device, including a processor and a memory. The memory stores programs or instructions that can be run on the processor. When the program or instructions are executed by the processor, any one of claims 10 to 12 is implemented. Steps in the behavioral approach described in Item .
  27. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至9任一项所述的行为处理方法,或者实现如权利要求10至12任一项所述的行为处理方法的步骤。 A readable storage medium on which programs or instructions are stored. When the programs or instructions are executed by a processor, the behavior processing method as described in any one of claims 1 to 9 is implemented, or the behavior processing method as claimed in any one of claims 1 to 9 is implemented. The steps of the behavioral treatment method described in any one of claims 10 to 12.
PCT/CN2023/090602 2022-04-27 2023-04-25 Behavior processing method and apparatus, and terminal, network-side device and medium WO2023207984A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210459394.1 2022-04-27
CN202210459394.1A CN117014922A (en) 2022-04-27 2022-04-27 Behavior processing method, device, terminal, network equipment and medium

Publications (1)

Publication Number Publication Date
WO2023207984A1 true WO2023207984A1 (en) 2023-11-02

Family

ID=88517783

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/090602 WO2023207984A1 (en) 2022-04-27 2023-04-25 Behavior processing method and apparatus, and terminal, network-side device and medium

Country Status (2)

Country Link
CN (1) CN117014922A (en)
WO (1) WO2023207984A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109698760A (en) * 2017-10-23 2019-04-30 华为技术有限公司 A kind of flow processing method and user face device and terminal device
CN111770490A (en) * 2019-04-02 2020-10-13 电信科学技术研究院有限公司 Method and equipment for determining terminal behavior analysis
CN111918280A (en) * 2019-05-07 2020-11-10 华为技术有限公司 Terminal information processing method, device and system
US20200396657A1 (en) * 2019-06-11 2020-12-17 Spirent Communications, Inc. Abnormal mobility pattern detection for misbehaving devices
CN113271541A (en) * 2020-02-17 2021-08-17 大唐移动通信设备有限公司 Method and device for acquiring terminal behavior data, method and device for transmitting terminal behavior data and network equipment
CN114390567A (en) * 2020-10-22 2022-04-22 大唐移动通信设备有限公司 Exception handling method, terminal and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109698760A (en) * 2017-10-23 2019-04-30 华为技术有限公司 A kind of flow processing method and user face device and terminal device
CN111770490A (en) * 2019-04-02 2020-10-13 电信科学技术研究院有限公司 Method and equipment for determining terminal behavior analysis
CN111918280A (en) * 2019-05-07 2020-11-10 华为技术有限公司 Terminal information processing method, device and system
US20200396657A1 (en) * 2019-06-11 2020-12-17 Spirent Communications, Inc. Abnormal mobility pattern detection for misbehaving devices
CN113271541A (en) * 2020-02-17 2021-08-17 大唐移动通信设备有限公司 Method and device for acquiring terminal behavior data, method and device for transmitting terminal behavior data and network equipment
CN114390567A (en) * 2020-10-22 2022-04-22 大唐移动通信设备有限公司 Exception handling method, terminal and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHINA MOBILE, NEC: "TS 23.288 Performance Improvement and Supervision of general mode for mIoT Terminals", 3GPP DRAFT; S2-1900504-TS 23.288 PERFORMANCE IMPROVEMENT AND SUPERVISION OF GENERAL MODE FOR MIOT TERMINALS, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Kochi, India; 20190121 - 20190125, 15 January 2019 (2019-01-15), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051568589 *

Also Published As

Publication number Publication date
CN117014922A (en) 2023-11-07

Similar Documents

Publication Publication Date Title
WO2023093720A1 (en) Data processing method and apparatus
WO2023207984A1 (en) Behavior processing method and apparatus, and terminal, network-side device and medium
CN116846771A (en) Service operation method, device, terminal and readable storage medium
WO2023185850A1 (en) Ursp rule optimization methods and apparatuses, terminal, network side device and medium
WO2023179558A1 (en) Data collection method and communication device
WO2023179571A1 (en) Non-public network access method and apparatus and terminal
KR20210048836A (en) Method and Apparatus for Integrating Network Function
WO2023143414A1 (en) Data transmission method and apparatus, configuration method and apparatus, and terminal and network-side device
WO2024061091A1 (en) Network communication method and apparatus, and network-side device, terminal and medium
WO2023179709A1 (en) Information processing method and apparatus, communication device, and readable storage medium
WO2023143423A1 (en) Information acquisition, storage and reporting method and device, terminal, and network function
WO2023179595A1 (en) Session channel establishment method and apparatus for non-3gpp device, and device
WO2024017244A1 (en) Information sending method and apparatus, information receiving method and apparatus, and related device
WO2024088195A1 (en) Execution result reporting method and receiving method, and terminal and network-side device
WO2023143436A1 (en) Data forwarding method and apparatus, and terminal device and network device
WO2023216961A1 (en) Privacy protection information processing method and apparatus, and communication device
WO2023151585A1 (en) Terminal target surface capability reporting and acquiring methods, terminal, and network device
WO2024022370A1 (en) Information acquisition and transmission methods, server access and session establishment methods, and device
WO2023165480A1 (en) Data transmission method and apparatus, and terminal, device and storage medium
WO2024078589A1 (en) Information reporting method and apparatus, communication device, and storage medium
WO2024012373A1 (en) Ai model information transmission method and apparatus, and device
WO2024067331A1 (en) Device switching method in personal internet of things network, and communication method and device
WO2024061256A1 (en) Forwarding rule configuration method and apparatus, terminal, and network side device
WO2024017191A1 (en) Interaction method and apparatus, and device and storage medium
WO2023185728A1 (en) Service processing method and apparatus, and terminal, network-side devices and readable storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23795416

Country of ref document: EP

Kind code of ref document: A1